19 research outputs found

    Hypercube orientations with only two in-degrees

    Get PDF
    We consider the problem of orienting the edges of the nn-dimensional hypercube so only two different in-degrees aa and bb occur. We show that this can be done, for two specified in-degrees, if and only if an obvious necessary condition holds. Namely, there exist non-negative integers ss and tt so that s+t=2ns+t=2^n and as+bt=n2n−1as+bt=n2^{n-1}. This is connected to a question arising from constructing a strategy for a "hat puzzle."Comment: 9 pages, 4 figure

    5PM: Secure Pattern Matching

    Get PDF
    In this paper we consider the problem of secure pattern matching that allows single-character wildcards and substring matching in the malicious (stand-alone) setting. Our protocol, called 5PM, is executed between two parties: Server, holding a text of length nn, and Client, holding a pattern of length mm to be matched against the text, where our notion of matching is more general and includes non-binary alphabets, non-binary Hamming distance and non-binary substring matching. 5PM is the first secure expressive pattern matching protocol designed to optimize round complexity by carefully specifying the entire protocol round by round. In the malicious model, 5PM requires O((m+n)k2)O((m+n)k^2) bandwidth and O(m+n)O(m+n) encryptions, where mm is the pattern length and nn is the text length. Further, 5PM can hide pattern size with no asymptotic additional costs in either computation or bandwidth. Finally, 5PM requires only two rounds of communication in the honest-but-curious model and eight rounds in the malicious model. Our techniques reduce pattern matching and generalized Hamming distance problems to a novel linear algebra formulation that allows for generic solutions based on any additively homomorphic encryption. We believe our efficient algebraic techniques are of independent interest
    corecore