456 research outputs found

    A Diffie-Hellman based key management scheme for hierarchical access control

    Get PDF
    All organizations share data in a carefully managed fashion\ud by using access control mechanisms. We focus on enforcing access control by encrypting the data and managing the encryption keys. We make the realistic assumption that the structure of any organization is a hierarchy of security classes. Data from a certain security class can only be accessed by another security class, if it is higher or at the same level in the hierarchy. Otherwise access is denied. Our solution is based on the Die-Hellman key exchange protocol. We show, that the theoretical worst case performance of our solution is slightly better than that of all other existing solutions. We also show, that our performance in practical cases is linear in the size of the hierarchy, whereas the best results from the literature are quadratic

    The complexity of counting poset and permutation patterns

    Full text link
    We introduce a notion of pattern occurrence that generalizes both classical permutation patterns as well as poset containment. Many questions about pattern statistics and avoidance generalize naturally to this setting, and we focus on functional complexity problems -- particularly those that arise by constraining the order dimensions of the pattern and text posets. We show that counting the number of induced, injective occurrences among dimension 2 posets is #P-hard; enumerating the linear extensions that occur in realizers of dimension 2 posets can be done in polynomial time, while for unconstrained dimension it is GI-complete; counting not necessarily induced, injective occurrences among dimension 2 posets is #P-hard; counting injective or not necessarily injective occurrences of an arbitrary pattern in a dimension 1 text is #P-hard, although it is in FP if the pattern poset is constrained to have bounded intrinsic width; and counting injective occurrences of a dimension 1 pattern in an arbitrary text is #P-hard, while it is in FP for bounded dimension texts. This framework easily leads to a number of open questions, chief among which are (1) is it #P-hard to count the number of occurrences of a dimension 2 pattern in a dimension 1 text, and (2) is it #P-hard to count the number of texts which avoid a given pattern?Comment: 15 page

    Fast M\"obius and Zeta Transforms

    Full text link
    M\"obius inversion of functions on partially ordered sets (posets) P\mathcal{P} is a classical tool in combinatorics. For finite posets it consists of two, mutually inverse, linear transformations called zeta and M\"obius transform, respectively. In this paper we provide novel fast algorithms for both that require O(nk)O(nk) time and space, where n=∣P∣n = |\mathcal{P}| and kk is the width (length of longest antichain) of P\mathcal{P}, compared to O(n2)O(n^2) for a direct computation. Our approach assumes that P\mathcal{P} is given as directed acyclic graph (DAG) (E,P)(\mathcal{E}, \mathcal{P}). The algorithms are then constructed using a chain decomposition for a one time cost of O(∣E∣+∣Ered∣k)O(|\mathcal{E}| + |\mathcal{E}_\text{red}| k), where Ered\mathcal{E}_\text{red} is the number of edges in the DAG's transitive reduction. We show benchmarks with implementations of all algorithms including parallelized versions. The results show that our algorithms enable M\"obius inversion on posets with millions of nodes in seconds if the defining DAGs are sufficiently sparse.Comment: 16 pages, 7 figures, submitted for revie

    A faster tree-decomposition based algorithm for counting linear extensions

    Get PDF
    We consider the problem of counting the linear extensions of an n-element poset whose cover graph has treewidth at most t. We show that the problem can be solved in time Õ(nt+3), where Õ suppresses logarithmic factors. Our algorithm is based on fast multiplication of multivariate polynomials, and so differs radically from a previous Õ(nt+4)-time inclusion–exclusion algorithm. We also investigate the algorithm from a practical point of view. We observe that the running time is not well characterized by the parameters n and t alone, fixing of which leaves large variance in running times due to uncontrolled features of the selected optimal-width tree decomposition. For selecting an efficient tree decomposition we adopt the method of empirical hardness models, and show that it typically enables picking a tree decomposition that is significantly more efficient than a random optimal-width tree decomposition. © Kustaa Kangas, Mikko Koivisto, and Sami Salonen; licensed under Creative Commons License CC-BY.Peer reviewe

    A representation for the modules of a graph and applications

    Get PDF
    We describe a simple representation for the modules of a graph C. We show that the modules of C are in one-to-one correspondence with the ideaIs of certain posets. These posets are characterizaded and shown to be layered posets, that is, transitive closures of bipartite tournaments. Additionaly, we describe applications of the representation. Employing the above correspondence, we present methods for solving the following problems: (i) generate alI modules of C, (ii) count the number of modules of C, (iii) find a maximal module satisfying some hereditary property of C and (iv) find a connected non-trivial module of C

    Stable Matchings with Restricted Preferences: Structure and Complexity

    Get PDF
    It is well known that every stable matching instance II has a rotation poset R(I)R(I) that can be computed efficiently and the downsets of R(I)R(I) are in one-to-one correspondence with the stable matchings of II. Furthermore, for every poset PP, an instance I(P)I(P) can be constructed efficiently so that the rotation poset of I(P)I(P) is isomorphic to PP. In this case, we say that I(P)I(P) realizes PP. Many researchers exploit the rotation poset of an instance to develop fast algorithms or to establish the hardness of stable matching problems. In order to gain a parameterized understanding of the complexity of sampling stable matchings, Bhatnagar et al. [SODA 2008] introduced stable matching instances whose preference lists are restricted but nevertheless model situations that arise in practice. In this paper, we study four such parameterized restrictions; our goal is to characterize the rotation posets that arise from these models: kk-bounded, kk-attribute, (k1,k2)(k_1, k_2)-list, kk-range. We prove that there is a constant kk so that every rotation poset is realized by some instance in the first three models for some fixed constant kk. We describe efficient algorithms for constructing such instances given the Hasse diagram of a poset. As a consequence, the fundamental problem of counting stable matchings remains #\#BIS-complete even for these restricted instances. For kk-range preferences, we show that a poset PP is realizable if and only if the Hasse diagram of PP has pathwidth bounded by functions of kk. Using this characterization, we show that the following problems are fixed parameter tractable when parametrized by the range of the instance: exactly counting and uniformly sampling stable matchings, finding median, sex-equal, and balanced stable matchings.Comment: Various updates and improvements in response to reviewer comment
    • …
    corecore