48 research outputs found
Quasi-Perfect Lee Codes of Radius 2 and Arbitrarily Large Dimension
A construction of two-quasi-perfect Lee codes is given over the space ?np for p prime, p ? ±5 (mod 12), and n = 2[p/4]. It is known that there are infinitely many such primes. Golomb and Welch conjectured that perfect codes for the Lee metric do not exist for dimension n ? 3 and radius r ? 2. This conjecture was proved to be true for large radii as well as for low dimensions. The codes found are very close to be perfect, which exhibits the hardness of the conjecture. A series of computations show that related graphs are Ramanujan, which could provide further connections between coding and graph theories
50 Years of the Golomb--Welch Conjecture
Since 1968, when the Golomb--Welch conjecture was raised, it has become the
main motive power behind the progress in the area of the perfect Lee codes.
Although there is a vast literature on the topic and it is widely believed to
be true, this conjecture is far from being solved. In this paper, we provide a
survey of papers on the Golomb--Welch conjecture. Further, new results on
Golomb--Welch conjecture dealing with perfect Lee codes of large radii are
presented. Algebraic ways of tackling the conjecture in the future are
discussed as well. Finally, a brief survey of research inspired by the
conjecture is given.Comment: 28 pages, 2 figure
On the Expansion of Group-Based Lifts
A -lift of an -vertex base graph is a graph on
vertices, where each vertex of is replaced by vertices
and each edge in is replaced by a matching
representing a bijection so that the edges of are of the form
. Lifts have been studied as a means to efficiently
construct expanders. In this work, we study lifts obtained from groups and
group actions. We derive the spectrum of such lifts via the representation
theory principles of the underlying group. Our main results are:
(1) There is a constant such that for every , there
does not exist an abelian -lift of any -vertex -regular base graph
with being almost Ramanujan (nontrivial eigenvalues of the adjacency matrix
at most in magnitude). This can be viewed as an analogue of the
well-known no-expansion result for abelian Cayley graphs.
(2) A uniform random lift in a cyclic group of order of any -vertex
-regular base graph , with the nontrivial eigenvalues of the adjacency
matrix of bounded by in magnitude, has the new nontrivial
eigenvalues also bounded by in magnitude with probability
. In particular, there is a constant such that for
every , there exists a lift of every Ramanujan graph in
a cyclic group of order with being almost Ramanujan. We use this to
design a quasi-polynomial time algorithm to construct almost Ramanujan
expanders deterministically.
The existence of expanding lifts in cyclic groups of order
can be viewed as a lower bound on the order of the largest abelian group
that produces expanding lifts. Our results show that the lower bound matches
the upper bound for (upto in the exponent)
Combinatorics, Probability and Computing
The main theme of this workshop was the use of probabilistic
methods in combinatorics and theoretical computer science. Although
these methods have been around for decades, they are being refined all
the time: they are getting more and more sophisticated and powerful.
Another theme was the study of random combinatorial structures,
either for their own sake, or to tackle extremal questions. The workshop
also emphasized connections between probabilistic combinatorics and
discrete probability
International Symposium on Mathematics, Quantum Theory, and Cryptography
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography
International Symposium on Mathematics, Quantum Theory, and Cryptography
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography