456 research outputs found
A Diffie-Hellman based key management scheme for hierarchical access control
All organizations share data in a carefully managed fashion\ud
by using access control mechanisms. We focus on enforcing access control by encrypting the data and managing the encryption keys. We make the realistic assumption that the structure of any organization is a hierarchy of security classes. Data from a certain security class can only be accessed by another security class, if it is higher or at the same level in the hierarchy. Otherwise access is denied. Our solution is based on the Die-Hellman key exchange protocol. We show, that the theoretical worst case performance of our solution is slightly better than that of all other existing solutions. We also show, that our performance in practical cases is linear in the size of the hierarchy, whereas the best results from the literature are quadratic
The complexity of counting poset and permutation patterns
We introduce a notion of pattern occurrence that generalizes both classical
permutation patterns as well as poset containment. Many questions about pattern
statistics and avoidance generalize naturally to this setting, and we focus on
functional complexity problems -- particularly those that arise by constraining
the order dimensions of the pattern and text posets. We show that counting the
number of induced, injective occurrences among dimension 2 posets is #P-hard;
enumerating the linear extensions that occur in realizers of dimension 2 posets
can be done in polynomial time, while for unconstrained dimension it is
GI-complete; counting not necessarily induced, injective occurrences among
dimension 2 posets is #P-hard; counting injective or not necessarily injective
occurrences of an arbitrary pattern in a dimension 1 text is #P-hard, although
it is in FP if the pattern poset is constrained to have bounded intrinsic
width; and counting injective occurrences of a dimension 1 pattern in an
arbitrary text is #P-hard, while it is in FP for bounded dimension texts. This
framework easily leads to a number of open questions, chief among which are (1)
is it #P-hard to count the number of occurrences of a dimension 2 pattern in a
dimension 1 text, and (2) is it #P-hard to count the number of texts which
avoid a given pattern?Comment: 15 page
Fast M\"obius and Zeta Transforms
M\"obius inversion of functions on partially ordered sets (posets)
is a classical tool in combinatorics. For finite posets it
consists of two, mutually inverse, linear transformations called zeta and
M\"obius transform, respectively. In this paper we provide novel fast
algorithms for both that require time and space, where and is the width (length of longest antichain) of
, compared to for a direct computation. Our approach
assumes that is given as directed acyclic graph (DAG)
. The algorithms are then constructed using a chain
decomposition for a one time cost of , where is the number of
edges in the DAG's transitive reduction. We show benchmarks with
implementations of all algorithms including parallelized versions. The results
show that our algorithms enable M\"obius inversion on posets with millions of
nodes in seconds if the defining DAGs are sufficiently sparse.Comment: 16 pages, 7 figures, submitted for revie
A faster tree-decomposition based algorithm for counting linear extensions
We consider the problem of counting the linear extensions of an n-element poset whose cover graph has treewidth at most t. We show that the problem can be solved in time Õ(nt+3), where Õ suppresses logarithmic factors. Our algorithm is based on fast multiplication of multivariate polynomials, and so differs radically from a previous Õ(nt+4)-time inclusion–exclusion algorithm. We also investigate the algorithm from a practical point of view. We observe that the running time is not well characterized by the parameters n and t alone, fixing of which leaves large variance in running times due to uncontrolled features of the selected optimal-width tree decomposition. For selecting an efficient tree decomposition we adopt the method of empirical hardness models, and show that it typically enables picking a tree decomposition that is significantly more efficient than a random optimal-width tree decomposition. © Kustaa Kangas, Mikko Koivisto, and Sami Salonen; licensed under Creative Commons License CC-BY.Peer reviewe
A representation for the modules of a graph and applications
We describe a simple representation for the modules of a graph C. We show that the modules of C are in one-to-one correspondence with the ideaIs of certain posets. These posets are characterizaded and shown to be layered posets, that is, transitive closures of bipartite tournaments. Additionaly, we describe applications of the representation. Employing the above correspondence, we present methods for solving the following problems: (i) generate alI modules of C, (ii) count the number of modules of C, (iii) find a maximal module satisfying some hereditary property of C and (iv) find a connected non-trivial module of C
Stable Matchings with Restricted Preferences: Structure and Complexity
It is well known that every stable matching instance has a rotation poset
that can be computed efficiently and the downsets of are in
one-to-one correspondence with the stable matchings of . Furthermore, for
every poset , an instance can be constructed efficiently so that the
rotation poset of is isomorphic to . In this case, we say that
realizes . Many researchers exploit the rotation poset of an instance to
develop fast algorithms or to establish the hardness of stable matching
problems.
In order to gain a parameterized understanding of the complexity of sampling
stable matchings, Bhatnagar et al. [SODA 2008] introduced stable matching
instances whose preference lists are restricted but nevertheless model
situations that arise in practice. In this paper, we study four such
parameterized restrictions; our goal is to characterize the rotation posets
that arise from these models: -bounded, -attribute, -list,
-range.
We prove that there is a constant so that every rotation poset is
realized by some instance in the first three models for some fixed constant
. We describe efficient algorithms for constructing such instances given the
Hasse diagram of a poset. As a consequence, the fundamental problem of counting
stable matchings remains BIS-complete even for these restricted instances.
For -range preferences, we show that a poset is realizable if and only
if the Hasse diagram of has pathwidth bounded by functions of . Using
this characterization, we show that the following problems are fixed parameter
tractable when parametrized by the range of the instance: exactly counting and
uniformly sampling stable matchings, finding median, sex-equal, and balanced
stable matchings.Comment: Various updates and improvements in response to reviewer comment
- …