1,135 research outputs found
Card-Shuffling via Convolutions of Projections on Combinatorial Hopf Algebras
Recently, Diaconis, Ram and I created Markov chains out of the
coproduct-then-product operator on combinatorial Hopf algebras. These chains
model the breaking and recombining of combinatorial objects. Our motivating
example was the riffle-shuffling of a deck of cards, for which this Hopf
algebra connection allowed explicit computation of all the eigenfunctions. The
present note replaces in this construction the coproduct-then-product map with
convolutions of projections to the graded subspaces, effectively allowing us to
dictate the distribution of sizes of the pieces in the breaking step of the
previous chains. An important example is removing one "vertex" and reattaching
it, in analogy with top-to-random shuffling. This larger family of Markov
chains all admit analysis by Hopf-algebraic techniques. There are simple
combinatorial expressions for their stationary distributions and for their
eigenvalues and multiplicities and, in some cases, the eigenfunctions are also
calculable.Comment: 12 pages. This is an extended abstract, to appear in Proceedings of
the 27th International Conference on Formal Power Series and Algebraic
Combinatorics (FPSAC). Comments are very welcom
Asymptotic laws for compositions derived from transformed subordinators
A random composition of appears when the points of a random closed set
are used to separate into blocks
points sampled from the uniform distribution. We study the number of parts
of this composition and other related functionals under the assumption
that , where is a
subordinator and is a diffeomorphism. We derive the
asymptotics of when the L\'{e}vy measure of the subordinator is regularly
varying at 0 with positive index. Specializing to the case of exponential
function , we establish a connection between the asymptotics
of and the exponential functional of the subordinator.Comment: Published at http://dx.doi.org/10.1214/009117905000000639 in the
Annals of Probability (http://www.imstat.org/aop/) by the Institute of
Mathematical Statistics (http://www.imstat.org
Locally Restricted Compositions IV. Nearly Free Large Parts and Gap-Freeness
We define the notion of asymptotically free for locally restricted
compositions, which means roughly that large parts can often be replaced by any
larger parts. Two well-known examples are Carlitz and alternating compositions.
We show that large parts have asymptotically geometric distributions. This
leads to asymptotically independent Poisson variables for numbers of various
large parts. Based on this we obtain asymptotic formulas for the probability of
being gap free and for the expected values of the largest part, number of
distinct parts and number of parts of multiplicity k, all accurate to o(1).Comment: 28 page
Functions of random walks on hyperplane arrangements
Many seemingly disparate Markov chains are unified when viewed as random
walks on the set of chambers of a hyperplane arrangement. These include the
Tsetlin library of theoretical computer science and various shuffling schemes.
If only selected features of the chains are of interest, then the mixing times
may change. We study the behavior of hyperplane walks, viewed on a
subarrangement of a hyperplane arrangement. These include many new examples,
for instance a random walk on the set of acyclic orientations of a graph. All
such walks can be treated in a uniform fashion, yielding diagonalizable
matrices with known eigenvalues, stationary distribution and good rates of
convergence to stationarity.Comment: Final version; Section 4 has been split into two section
Hard isogeny problems over RSA moduli and groups with infeasible inversion
We initiate the study of computational problems on elliptic curve isogeny
graphs defined over RSA moduli. We conjecture that several variants of the
neighbor-search problem over these graphs are hard, and provide a comprehensive
list of cryptanalytic attempts on these problems. Moreover, based on the
hardness of these problems, we provide a construction of groups with infeasible
inversion, where the underlying groups are the ideal class groups of imaginary
quadratic orders.
Recall that in a group with infeasible inversion, computing the inverse of a
group element is required to be hard, while performing the group operation is
easy. Motivated by the potential cryptographic application of building a
directed transitive signature scheme, the search for a group with infeasible
inversion was initiated in the theses of Hohenberger and Molnar (2003). Later
it was also shown to provide a broadcast encryption scheme by Irrer et al.
(2004). However, to date the only case of a group with infeasible inversion is
implied by the much stronger primitive of self-bilinear map constructed by
Yamakawa et al. (2014) based on the hardness of factoring and
indistinguishability obfuscation (iO). Our construction gives a candidate
without using iO.Comment: Significant revision of the article previously titled "A Candidate
Group with Infeasible Inversion" (arXiv:1810.00022v1). Cleared up the
constructions by giving toy examples, added "The Parallelogram Attack" (Sec
5.3.2). 54 pages, 8 figure
- …