1,135 research outputs found

    Card-Shuffling via Convolutions of Projections on Combinatorial Hopf Algebras

    Get PDF
    Recently, Diaconis, Ram and I created Markov chains out of the coproduct-then-product operator on combinatorial Hopf algebras. These chains model the breaking and recombining of combinatorial objects. Our motivating example was the riffle-shuffling of a deck of cards, for which this Hopf algebra connection allowed explicit computation of all the eigenfunctions. The present note replaces in this construction the coproduct-then-product map with convolutions of projections to the graded subspaces, effectively allowing us to dictate the distribution of sizes of the pieces in the breaking step of the previous chains. An important example is removing one "vertex" and reattaching it, in analogy with top-to-random shuffling. This larger family of Markov chains all admit analysis by Hopf-algebraic techniques. There are simple combinatorial expressions for their stationary distributions and for their eigenvalues and multiplicities and, in some cases, the eigenfunctions are also calculable.Comment: 12 pages. This is an extended abstract, to appear in Proceedings of the 27th International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC). Comments are very welcom

    Asymptotic laws for compositions derived from transformed subordinators

    Full text link
    A random composition of nn appears when the points of a random closed set R~⊂[0,1]\widetilde{\mathcal{R}}\subset[0,1] are used to separate into blocks nn points sampled from the uniform distribution. We study the number of parts KnK_n of this composition and other related functionals under the assumption that R~=ϕ(S∙)\widetilde{\mathcal{R}}=\phi(S_{\bullet}), where (St,t≥0)(S_t,t\geq0) is a subordinator and ϕ:[0,∞]→[0,1]\phi:[0,\infty]\to[0,1] is a diffeomorphism. We derive the asymptotics of KnK_n when the L\'{e}vy measure of the subordinator is regularly varying at 0 with positive index. Specializing to the case of exponential function ϕ(x)=1−e−x\phi(x)=1-e^{-x}, we establish a connection between the asymptotics of KnK_n and the exponential functional of the subordinator.Comment: Published at http://dx.doi.org/10.1214/009117905000000639 in the Annals of Probability (http://www.imstat.org/aop/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Locally Restricted Compositions IV. Nearly Free Large Parts and Gap-Freeness

    Full text link
    We define the notion of asymptotically free for locally restricted compositions, which means roughly that large parts can often be replaced by any larger parts. Two well-known examples are Carlitz and alternating compositions. We show that large parts have asymptotically geometric distributions. This leads to asymptotically independent Poisson variables for numbers of various large parts. Based on this we obtain asymptotic formulas for the probability of being gap free and for the expected values of the largest part, number of distinct parts and number of parts of multiplicity k, all accurate to o(1).Comment: 28 page

    Functions of random walks on hyperplane arrangements

    Get PDF
    Many seemingly disparate Markov chains are unified when viewed as random walks on the set of chambers of a hyperplane arrangement. These include the Tsetlin library of theoretical computer science and various shuffling schemes. If only selected features of the chains are of interest, then the mixing times may change. We study the behavior of hyperplane walks, viewed on a subarrangement of a hyperplane arrangement. These include many new examples, for instance a random walk on the set of acyclic orientations of a graph. All such walks can be treated in a uniform fashion, yielding diagonalizable matrices with known eigenvalues, stationary distribution and good rates of convergence to stationarity.Comment: Final version; Section 4 has been split into two section

    Hard isogeny problems over RSA moduli and groups with infeasible inversion

    Get PDF
    We initiate the study of computational problems on elliptic curve isogeny graphs defined over RSA moduli. We conjecture that several variants of the neighbor-search problem over these graphs are hard, and provide a comprehensive list of cryptanalytic attempts on these problems. Moreover, based on the hardness of these problems, we provide a construction of groups with infeasible inversion, where the underlying groups are the ideal class groups of imaginary quadratic orders. Recall that in a group with infeasible inversion, computing the inverse of a group element is required to be hard, while performing the group operation is easy. Motivated by the potential cryptographic application of building a directed transitive signature scheme, the search for a group with infeasible inversion was initiated in the theses of Hohenberger and Molnar (2003). Later it was also shown to provide a broadcast encryption scheme by Irrer et al. (2004). However, to date the only case of a group with infeasible inversion is implied by the much stronger primitive of self-bilinear map constructed by Yamakawa et al. (2014) based on the hardness of factoring and indistinguishability obfuscation (iO). Our construction gives a candidate without using iO.Comment: Significant revision of the article previously titled "A Candidate Group with Infeasible Inversion" (arXiv:1810.00022v1). Cleared up the constructions by giving toy examples, added "The Parallelogram Attack" (Sec 5.3.2). 54 pages, 8 figure
    • …
    corecore