48 research outputs found

    Quasi-Perfect Lee Codes of Radius 2 and Arbitrarily Large Dimension

    Get PDF
    A construction of two-quasi-perfect Lee codes is given over the space ?np for p prime, p ? ±5 (mod 12), and n = 2[p/4]. It is known that there are infinitely many such primes. Golomb and Welch conjectured that perfect codes for the Lee metric do not exist for dimension n ? 3 and radius r ? 2. This conjecture was proved to be true for large radii as well as for low dimensions. The codes found are very close to be perfect, which exhibits the hardness of the conjecture. A series of computations show that related graphs are Ramanujan, which could provide further connections between coding and graph theories

    50 Years of the Golomb--Welch Conjecture

    Full text link
    Since 1968, when the Golomb--Welch conjecture was raised, it has become the main motive power behind the progress in the area of the perfect Lee codes. Although there is a vast literature on the topic and it is widely believed to be true, this conjecture is far from being solved. In this paper, we provide a survey of papers on the Golomb--Welch conjecture. Further, new results on Golomb--Welch conjecture dealing with perfect Lee codes of large radii are presented. Algebraic ways of tackling the conjecture in the future are discussed as well. Finally, a brief survey of research inspired by the conjecture is given.Comment: 28 pages, 2 figure

    On the Expansion of Group-Based Lifts

    Get PDF
    A kk-lift of an nn-vertex base graph GG is a graph HH on n×kn\times k vertices, where each vertex vv of GG is replaced by kk vertices v1,⋯,vkv_1,\cdots{},v_k and each edge (u,v)(u,v) in GG is replaced by a matching representing a bijection πuv\pi_{uv} so that the edges of HH are of the form (ui,vπuv(i))(u_i,v_{\pi_{uv}(i)}). Lifts have been studied as a means to efficiently construct expanders. In this work, we study lifts obtained from groups and group actions. We derive the spectrum of such lifts via the representation theory principles of the underlying group. Our main results are: (1) There is a constant c1c_1 such that for every k≥2c1ndk\geq 2^{c_1nd}, there does not exist an abelian kk-lift HH of any nn-vertex dd-regular base graph with HH being almost Ramanujan (nontrivial eigenvalues of the adjacency matrix at most O(d)O(\sqrt{d}) in magnitude). This can be viewed as an analogue of the well-known no-expansion result for abelian Cayley graphs. (2) A uniform random lift in a cyclic group of order kk of any nn-vertex dd-regular base graph GG, with the nontrivial eigenvalues of the adjacency matrix of GG bounded by λ\lambda in magnitude, has the new nontrivial eigenvalues also bounded by λ+O(d)\lambda+O(\sqrt{d}) in magnitude with probability 1−ke−Ω(n/d2)1-ke^{-\Omega(n/d^2)}. In particular, there is a constant c2c_2 such that for every k≤2c2n/d2k\leq 2^{c_2n/d^2}, there exists a lift HH of every Ramanujan graph in a cyclic group of order kk with HH being almost Ramanujan. We use this to design a quasi-polynomial time algorithm to construct almost Ramanujan expanders deterministically. The existence of expanding lifts in cyclic groups of order k=2O(n/d2)k=2^{O(n/d^2)} can be viewed as a lower bound on the order k0k_0 of the largest abelian group that produces expanding lifts. Our results show that the lower bound matches the upper bound for k0k_0 (upto d3d^3 in the exponent)

    Combinatorics, Probability and Computing

    Get PDF
    The main theme of this workshop was the use of probabilistic methods in combinatorics and theoretical computer science. Although these methods have been around for decades, they are being refined all the time: they are getting more and more sophisticated and powerful. Another theme was the study of random combinatorial structures, either for their own sake, or to tackle extremal questions. The workshop also emphasized connections between probabilistic combinatorics and discrete probability

    Master index of volumes 161–170

    Get PDF

    International Symposium on Mathematics, Quantum Theory, and Cryptography

    Get PDF
    This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography

    International Symposium on Mathematics, Quantum Theory, and Cryptography

    Get PDF
    This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography
    corecore