58 research outputs found

    The Z2\mathbb{Z}_2-genus of Kuratowski minors

    Full text link
    A drawing of a graph on a surface is independently even if every pair of nonadjacent edges in the drawing crosses an even number of times. The Z2\mathbb{Z}_2-genus of a graph GG is the minimum gg such that GG has an independently even drawing on the orientable surface of genus gg. An unpublished result by Robertson and Seymour implies that for every tt, every graph of sufficiently large genus contains as a minor a projective t×tt\times t grid or one of the following so-called tt-Kuratowski graphs: K3,tK_{3,t}, or tt copies of K5K_5 or K3,3K_{3,3} sharing at most 22 common vertices. We show that the Z2\mathbb{Z}_2-genus of graphs in these families is unbounded in tt; in fact, equal to their genus. Together, this implies that the genus of a graph is bounded from above by a function of its Z2\mathbb{Z}_2-genus, solving a problem posed by Schaefer and \v{S}tefankovi\v{c}, and giving an approximate version of the Hanani-Tutte theorem on orientable surfaces. We also obtain an analogous result for Euler genus and Euler Z2\mathbb{Z}_2-genus of graphs.Comment: 23 pages, 7 figures; a few references added and correcte

    Subtractive Sets over Cyclotomic Rings:Limits of Schnorr-like Arguments over Lattices

    Get PDF
    We study when (dual) Vandermonde systems of the form VT()z=sw{V}_T^{{(\intercal)}} \cdot \vec{z} = s\cdot \vec{w} admit a solution z\vec{z} over a ring R\mathcal{R}, where VT{V}_T is the Vandermonde matrix defined by a set TT and where the slack ss is a measure of the quality of solutions. To this end, we propose the notion of (s,t)(s,t)-subtractive sets over a ring R\mathcal{R}, with the property that if SS is (s,t)(s,t)-subtractive then the above (dual) Vandermonde systems defined by any tt-subset TST \subseteq S are solvable over R\mathcal{R}. The challenge is then to find large sets SS while minimising (the norm of) ss when given a ring R\mathcal{R}. By constructing families of (s,t)(s,t)-subtractive sets SS of size n=n = poly over cyclotomic rings R=Z[ζp]\mathcal{R} = \mathbb{Z}[\zeta_{p^\ell}] for prime pp, we construct Schnorr-like lattice-based proofs of knowledge for the SIS relation Ax=symodq{A} \cdot \vec{x} = s \cdot \vec{y} \bmod q with O(1/n)O(1/n) knowledge error, and s=1s = 1 in case p=p = poly. Our technique slots naturally into the lattice Bulletproof framework from Crypto\u2720, producing lattice-based succinct arguments for NP with better parameters. We then give matching impossibility results constraining nn relative to ss, which suggest that our Bulletproof-compatible protocols are optimal unless fundamentally new techniques are discovered. Noting that the knowledge error of lattice Bulletproofs is Ω(logk/n)\Omega(\log k/n) for witnesses in Rk\mathcal{R}^k and subtractive set size nn, our result represents a barrier to practically efficient lattice-based succinct arguments in the Bulletproof framework. Beyond these main results, the concept of (s,t)(s,t)-subtractive sets bridges group-based threshold cryptography to lattice settings, which we demonstrate by relating it to distributed pseudorandom functions

    Black Box White Arrow

    Full text link
    The present paper proposes a new and systematic approach to the so-called black box group methods in computational group theory. Instead of a single black box, we consider categories of black boxes and their morphisms. This makes new classes of black box problems accessible. For example, we can enrich black box groups by actions of outer automorphisms. As an example of application of this technique, we construct Frobenius maps on black box groups of untwisted Lie type in odd characteristic (Section 6) and inverse-transpose automorphisms on black box groups encrypting (P)SLn(Fq){\rm (P)SL}_n(\mathbb{F}_q). One of the advantages of our approach is that it allows us to work in black box groups over finite fields of big characteristic. Another advantage is explanatory power of our methods; as an example, we explain Kantor's and Kassabov's construction of an involution in black box groups encrypting SL2(2n){\rm SL}_2(2^n). Due to the nature of our work we also have to discuss a few methodological issues of the black box group theory. The paper is further development of our text "Fifty shades of black" [arXiv:1308.2487], and repeats parts of it, but under a weaker axioms for black box groups.Comment: arXiv admin note: substantial text overlap with arXiv:1308.248
    corecore