Pub Date : 2024-10-10DOI: 10.1007/s10623-024-01505-8
Jan De Beule, Jonathan Mannaert, Leo Storme
This paper focuses on non-existence results for Cameron–Liebler k-sets. A Cameron–Liebler k-set is a collection of k-spaces in ({{,mathrm{textrm{PG}},}}(n,q)) or ({{,mathrm{textrm{AG}},}}(n,q)) admitting a certain parameter x, which is dependent on the size of this collection. One of the main research questions remains the (non-)existence of Cameron–Liebler k-sets with parameter x. This paper improves two non-existence results. First we show that the parameter of a non-trivial Cameron–Liebler k-set in ({{,mathrm{textrm{PG}},}}(n,q)) should be larger than (q^{n-frac{5k}{2}-1}), which is an improvement of an earlier known lower bound. Secondly, we prove a modular equality on the parameter x of Cameron–Liebler k-sets in ({{,mathrm{textrm{PG}},}}(n,q)) with (x<frac{q^{n-k}-1}{q^{k+1}-1}), (nge 2k+1), (n-k+1ge 7) and (n-k) even. In the affine case we show a similar result for (n-k+1ge 3) and (n-k) even. This is a generalization of earlier known modular equalities in the projective and affine case.
本文主要研究卡梅隆-利伯勒 k 集的不存在结果。Cameron-Liebler k 集是 ({{,mathrmtextrm{PG}},}}(n,q)) 或 ({{,mathrmtextrm{AG}},}}(n,q)) 中的 k 空间集合,它允许一定的参数 x,而这个参数取决于这个集合的大小。本文改进了两个不存在结果。首先,我们证明了在({{,mathrm{textrm{PG}},}(n,q))中的非难卡梅隆-利勃勒 k 集的参数应该大于(q^{n-frac{5k}{2}-1}),这是对早期已知下限的改进。其次,我们证明了在({{,mathrm{textrm{PG}},}}(n,q))中卡梅隆-利伯勒 k 集的参数 x 上的模相等,其中 (x<frac{q^{n-k}-1}{q^{k+1}-1})、(n/ge 2k+1)、(n-k+1/ge 7) 和(n-k) 偶数。在仿射情况下,我们对(n-k+1ge 3)和(n-k)偶数证明了类似的结果。这是对早先已知的投影和仿射情况下的模等式的推广。
{"title":"On two non-existence results for Cameron–Liebler k-sets in $${{,mathrm{textrm{PG}},}}(n,q)$$","authors":"Jan De Beule, Jonathan Mannaert, Leo Storme","doi":"10.1007/s10623-024-01505-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01505-8","url":null,"abstract":"<p>This paper focuses on non-existence results for Cameron–Liebler <i>k</i>-sets. A Cameron–Liebler <i>k</i>-set is a collection of <i>k</i>-spaces in <span>({{,mathrm{textrm{PG}},}}(n,q))</span> or <span>({{,mathrm{textrm{AG}},}}(n,q))</span> admitting a certain parameter <i>x</i>, which is dependent on the size of this collection. One of the main research questions remains the (non-)existence of Cameron–Liebler <i>k</i>-sets with parameter <i>x</i>. This paper improves two non-existence results. First we show that the parameter of a non-trivial Cameron–Liebler <i>k</i>-set in <span>({{,mathrm{textrm{PG}},}}(n,q))</span> should be larger than <span>(q^{n-frac{5k}{2}-1})</span>, which is an improvement of an earlier known lower bound. Secondly, we prove a modular equality on the parameter <i>x</i> of Cameron–Liebler <i>k</i>-sets in <span>({{,mathrm{textrm{PG}},}}(n,q))</span> with <span>(x<frac{q^{n-k}-1}{q^{k+1}-1})</span>, <span>(nge 2k+1)</span>, <span>(n-k+1ge 7)</span> and <span>(n-k)</span> even. In the affine case we show a similar result for <span>(n-k+1ge 3)</span> and <span>(n-k)</span> even. This is a generalization of earlier known modular equalities in the projective and affine case.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"13 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142405484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-09DOI: 10.1007/s10623-024-01507-6
Carlos Aguilar-Melchor, Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit, Jérôme Lacan, Gilles Zémor
The HQC post-quantum cryptosystem enables two parties to share noisy versions of a common secret binary string, and an error-correcting code is required to deal with the mismatch between both versions. This code is required to deal with binary symmetric channels with as large a transition parameter as possible, while guaranteeing, for cryptographic reasons, a decoding error probability of provably not more than 2-128. This requirement is non-standard for digital communications, and modern coding techniques are not amenable to this setting. This paper explains how this issue is addressed in the last version of HQC: precisely, we introduce a coding scheme that consists of concatenating a Reed–Solomon code with the tensor product of a Reed–Muller code and a repetition code. We analyze its behavior in detail and show that it significantly improves upon the previous proposition for HQC, which consisted of tensoring a BCH and a repetition code. As additional results, we also provide a better approximation of the weight distribution for HQC error vectors, and we remark that the size of the exchanged secret in HQC can be reduced to match the protocol security which also significantly improves performance.
{"title":"Efficient error-correcting codes for the HQC post-quantum cryptosystem","authors":"Carlos Aguilar-Melchor, Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit, Jérôme Lacan, Gilles Zémor","doi":"10.1007/s10623-024-01507-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01507-6","url":null,"abstract":"<p>The HQC post-quantum cryptosystem enables two parties to share noisy versions of a common secret binary string, and an error-correcting code is required to deal with the mismatch between both versions. This code is required to deal with binary symmetric channels with as large a transition parameter as possible, while guaranteeing, for cryptographic reasons, a decoding error probability of provably not more than 2<sup>-128</sup>. This requirement is non-standard for digital communications, and modern coding techniques are not amenable to this setting. This paper explains how this issue is addressed in the last version of HQC: precisely, we introduce a coding scheme that consists of concatenating a Reed–Solomon code with the tensor product of a Reed–Muller code and a repetition code. We analyze its behavior in detail and show that it significantly improves upon the previous proposition for HQC, which consisted of tensoring a BCH and a repetition code. As additional results, we also provide a better approximation of the weight distribution for HQC error vectors, and we remark that the size of the exchanged secret in HQC can be reduced to match the protocol security which also significantly improves performance.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-05DOI: 10.1007/s10623-024-01508-5
Guangkui Xu, Xiwang Cao, Gaojun Luo, Huawei Wu
Tang and Ding (IEEE Trans Inf Theory 67(1):244–254, 2021) opened a new direction of searching for t-designs from elementary symmetric polynomials, which are used to construct the first infinite family of linear codes supporting 4-designs. In this paper, we first study the properties of elementary symmetric polynomials with 6 or 7 variables over (textrm{GF}(3^{m})). Based on them, we present more infinite families of 3-designs that contain some 3-designs with new parameters as checked by Magma for small numbers m. We also construct an infinite family of cyclic codes over (textrm{GF}(q^2)) and prove that the codewords of any nonzero weight support a 3-design. In particular, we present an infinite family of 6-dimensional AMDS codes over (textrm{GF}(3^{2m})) holding an infinite family of 3-designs and an infinite family of 7-dimensional NMDS codes over (textrm{GF}(3^{2m})) holding an infinite family of 3-designs.
{"title":"Infinite families of 3-designs from special symmetric polynomials","authors":"Guangkui Xu, Xiwang Cao, Gaojun Luo, Huawei Wu","doi":"10.1007/s10623-024-01508-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01508-5","url":null,"abstract":"<p>Tang and Ding (IEEE Trans Inf Theory 67(1):244–254, 2021) opened a new direction of searching for <i>t</i>-designs from elementary symmetric polynomials, which are used to construct the first infinite family of linear codes supporting 4-designs. In this paper, we first study the properties of elementary symmetric polynomials with 6 or 7 variables over <span>(textrm{GF}(3^{m}))</span>. Based on them, we present more infinite families of 3-designs that contain some 3-designs with new parameters as checked by Magma for small numbers <i>m</i>. We also construct an infinite family of cyclic codes over <span>(textrm{GF}(q^2))</span> and prove that the codewords of any nonzero weight support a 3-design. In particular, we present an infinite family of 6-dimensional AMDS codes over <span>(textrm{GF}(3^{2m}))</span> holding an infinite family of 3-designs and an infinite family of 7-dimensional NMDS codes over <span>(textrm{GF}(3^{2m}))</span> holding an infinite family of 3-designs.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"7 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142377701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-04DOI: 10.1007/s10623-024-01498-4
Kazuhiko Minematsu, Shingo Sato, Junji Shikata
In this paper, we propose a formal security model and a construction methodology of interactive aggregate message authentication codes with detecting functionality (IAMDs). The IAMD is an interactive aggregate MAC protocol which can identify invalid messages with a small amount of tag-size. Several aggregate MAC schemes that can detect invalid messages have been proposed so far by using non-adaptive group testing in the prior work. In this paper, we utilize adaptive group testing to construct IAMD scheme, and we show that the resulting IAMD scheme can identify invalid messages with a small amount of tag-size compared to the previous schemes. To this end, we give the formalization of adaptive group testing and IAMD, and propose a generic construction starting from any aggregate MAC and any adaptive group testing method. In addition, we compare instantiations of our generic constructions, in terms of total tag-size and several properties. Furthermore, we show advantages of IAMD by implementing constructions of (non-)adaptive aggregate message authentication with detecting functionality and comparing these ones in terms of the data-size and running time of verification algorithms.
本文提出了具有检测功能的交互式聚合消息验证码(IAMD)的正式安全模型和构建方法。IAMD 是一种交互式聚合 MAC 协议,只需少量标签大小就能识别无效信息。迄今为止,已有几种聚合 MAC 方案通过使用非适应性分组测试来检测无效信息。本文利用自适应分组测试构建了 IAMD 方案,并证明与之前的方案相比,IAMD 方案能以较小的标签大小识别无效信息。为此,我们给出了自适应分组测试和 IAMD 的形式化,并提出了一种从任意聚合 MAC 和任意自适应分组测试方法出发的通用构造。此外,我们还从总标签大小和几个属性方面比较了通用结构的实例。此外,我们还通过实现具有检测功能的(非)自适应聚合消息验证结构,并从数据大小和验证算法的运行时间方面对这些结构进行比较,从而展示了 IAMD 的优势。
{"title":"Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing","authors":"Kazuhiko Minematsu, Shingo Sato, Junji Shikata","doi":"10.1007/s10623-024-01498-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01498-4","url":null,"abstract":"<p>In this paper, we propose a formal security model and a construction methodology of interactive aggregate message authentication codes with detecting functionality (IAMDs). The IAMD is an interactive aggregate MAC protocol which can identify invalid messages with a small amount of tag-size. Several aggregate MAC schemes that can detect invalid messages have been proposed so far by using non-adaptive group testing in the prior work. In this paper, we utilize adaptive group testing to construct IAMD scheme, and we show that the resulting IAMD scheme can identify invalid messages with a small amount of tag-size compared to the previous schemes. To this end, we give the formalization of adaptive group testing and IAMD, and propose a generic construction starting from any aggregate MAC and any adaptive group testing method. In addition, we compare instantiations of our generic constructions, in terms of total tag-size and several properties. Furthermore, we show advantages of IAMD by implementing constructions of (non-)adaptive aggregate message authentication with detecting functionality and comparing these ones in terms of the data-size and running time of verification algorithms.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"12 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142377699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-04DOI: 10.1007/s10623-024-01488-6
Shuxing Li, Maosheng Xiong
Given a polynomial f over the finite field (mathbb {F}_q), its intersection distribution provides fruitful information on how lines in the affine plane intersect the graph of f over (mathbb {F}_q). The intersection distribution in its simplest cases gives rise to oval polynomials in finite geometry and Steiner triple systems in design theory. Previously, the intersection distribution of degree two and degree three polynomials has been computed. In this paper, we determine the intersection distribution of all degree four polynomials over finite fields. As an application, we present a direct construction of Steiner systems using polynomials with prescribed intersection distribution.
给定有限域 (mathbb {F}_q)上的多项式 f,它的交点分布提供了关于仿射平面上的线如何与 (mathbb {F}_q)上的 f 的图相交的有用信息。在最简单的情况下,交点分布产生了有限几何中的椭圆多项式和设计理论中的斯坦纳三重系统。在此之前,人们已经计算了二度和三度多项式的交集分布。在本文中,我们确定了有限域上所有四度多项式的交集分布。作为应用,我们提出了一种使用具有规定交集分布的多项式直接构建斯坦纳系统的方法。
{"title":"Intersection distribution of degree four polynomials over finite fields","authors":"Shuxing Li, Maosheng Xiong","doi":"10.1007/s10623-024-01488-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01488-6","url":null,"abstract":"<p>Given a polynomial <i>f</i> over the finite field <span>(mathbb {F}_q)</span>, its intersection distribution provides fruitful information on how lines in the affine plane intersect the graph of <i>f</i> over <span>(mathbb {F}_q)</span>. The intersection distribution in its simplest cases gives rise to oval polynomials in finite geometry and Steiner triple systems in design theory. Previously, the intersection distribution of degree two and degree three polynomials has been computed. In this paper, we determine the intersection distribution of all degree four polynomials over finite fields. As an application, we present a direct construction of Steiner systems using polynomials with prescribed intersection distribution.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-04DOI: 10.1007/s10623-024-01506-7
Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu
The quantum security of message authentication codes (MACs) has been gaining increasing attention in recent years, particularly with regard to proving the quantum security of classical MACs, which has emerged as a significant area of interest. In this work, we present two variants of classical MACs: QPMAC, a quantum-secure parallel version of PMAC, and QCBCMAC, a quantum-secure variant of CBCMAC and NMAC that supports variable-length input. We demonstrate that QPMAC is a parallel quantum-secure MAC, with an inverse relationship between its degree of parallelism and its level of quantum security. On the other hand, QCBCMAC provides quantum security for variable-length inputs. To achieve an optimal balance between parallelism and quantum security, we propose QPCBC, a hybrid construction that combines the strengths of QPMAC and QCBCMAC. We also provide an instantiation of QPCBC using tweakable block ciphers.
{"title":"A quantum-secure partial parallel MAC QPCBC","authors":"Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu","doi":"10.1007/s10623-024-01506-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01506-7","url":null,"abstract":"<p>The quantum security of message authentication codes (MACs) has been gaining increasing attention in recent years, particularly with regard to proving the quantum security of classical MACs, which has emerged as a significant area of interest. In this work, we present two variants of classical MACs: QPMAC, a quantum-secure parallel version of PMAC, and QCBCMAC, a quantum-secure variant of CBCMAC and NMAC that supports variable-length input. We demonstrate that QPMAC is a parallel quantum-secure MAC, with an inverse relationship between its degree of parallelism and its level of quantum security. On the other hand, QCBCMAC provides quantum security for variable-length inputs. To achieve an optimal balance between parallelism and quantum security, we propose QPCBC, a hybrid construction that combines the strengths of QPMAC and QCBCMAC. We also provide an instantiation of QPCBC using tweakable block ciphers.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-04DOI: 10.1007/s10623-024-01495-7
Yadi Wei, Jiaxin Wang, Fang-Wei Fu
Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in Özbudak and Pelen (J Algebr Comb 56:635–658, 2022), Özbudak and Pelen constructed infinite families of symmetric association schemes of classes 5 and 6 by using ternary non-weakly regular bent functions. They also stated that “constructing 2p-class association schemes from p-ary non-weakly regular bent functions is an interesting problem", where (p>3) is an odd prime. In this paper, using non-weakly regular bent functions, we construct infinite families of symmetric association schemes of classes 2p, ((2p+1)) and (frac{3p+1}{2}) for any odd prime p. Fusing those association schemes, we obtain t-class symmetric association schemes, where (t=4,5,6,7). In addition, we give the sufficient and necessary conditions for the partitions P, D, T, U and V (defined in this paper) to induce symmetric association schemes.
{"title":"Association schemes arising from non-weakly regular bent functions","authors":"Yadi Wei, Jiaxin Wang, Fang-Wei Fu","doi":"10.1007/s10623-024-01495-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01495-7","url":null,"abstract":"<p>Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in Özbudak and Pelen (J Algebr Comb 56:635–658, 2022), Özbudak and Pelen constructed infinite families of symmetric association schemes of classes 5 and 6 by using ternary non-weakly regular bent functions. They also stated that “constructing 2<i>p</i>-class association schemes from <i>p</i>-ary non-weakly regular bent functions is an interesting problem\", where <span>(p>3)</span> is an odd prime. In this paper, using non-weakly regular bent functions, we construct infinite families of symmetric association schemes of classes 2<i>p</i>, <span>((2p+1))</span> and <span>(frac{3p+1}{2})</span> for any odd prime <i>p</i>. Fusing those association schemes, we obtain <i>t</i>-class symmetric association schemes, where <span>(t=4,5,6,7)</span>. In addition, we give the sufficient and necessary conditions for the partitions <i>P</i>, <i>D</i>, <i>T</i>, <i>U</i> and <i>V</i> (defined in this paper) to induce symmetric association schemes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"59 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01493-9
Ajani De Vas Gunasekara, Alice Devillers
An H-decomposition of a graph (Gamma ) is a partition of its edge set into subgraphs isomorphic to H. A transitive decomposition is a special kind of H-decomposition that is highly symmetrical in the sense that the subgraphs (copies of H) are preserved and transitively permuted by a group of automorphisms of (Gamma ). This paper concerns transitive H-decompositions of the graph (K_n Box K_n) where H is a path. When n is an odd prime, we present a construction for a transitive path decomposition where the paths in the decomposition are considerably large compared to the number of vertices. Our main result supports well-known Gallai’s conjecture and an extended version of Ringel’s conjecture.
一个图 (Gamma )的 H 分解是将它的边集分割成与 H 同构的子图。反式分解是一种特殊的 H 分解,它具有高度对称性,即子图(H 的副本)通过 (Gamma )的一组自动形变得到保留和反式置换。本文关注图 (K_n Box K_n) 的传递 H 分解,其中 H 是一条路径。当 n 是奇素数时,我们提出了一种反式路径分解的构造,分解中的路径与顶点数相比相当大。我们的主要结果支持众所周知的加莱猜想和林格尔猜想的扩展版本。
{"title":"Transitive path decompositions of Cartesian products of complete graphs","authors":"Ajani De Vas Gunasekara, Alice Devillers","doi":"10.1007/s10623-024-01493-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01493-9","url":null,"abstract":"<p>An <i>H</i>-decomposition of a graph <span>(Gamma )</span> is a partition of its edge set into subgraphs isomorphic to <i>H</i>. A transitive decomposition is a special kind of <i>H</i>-decomposition that is highly symmetrical in the sense that the subgraphs (copies of <i>H</i>) are preserved and transitively permuted by a group of automorphisms of <span>(Gamma )</span>. This paper concerns transitive <i>H</i>-decompositions of the graph <span>(K_n Box K_n)</span> where <i>H</i> is a path. When <i>n</i> is an odd prime, we present a construction for a transitive path decomposition where the paths in the decomposition are considerably large compared to the number of vertices. Our main result supports well-known Gallai’s conjecture and an extended version of Ringel’s conjecture.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"5 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01499-3
Zhiguo Ding, Michael E. Zieve
For each odd prime power q, we present two rational functions (f(X)in mathbb {F}_q(X)) which have the unusual property that, for every odd n, the function induced by f(X) on (mathbb {F}_{q^n}setminus mathbb {F}_q) is ((q-1))-to-1.
{"title":"Two classes of exceptional m-to-1 rational functions","authors":"Zhiguo Ding, Michael E. Zieve","doi":"10.1007/s10623-024-01499-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01499-3","url":null,"abstract":"<p>For each odd prime power <i>q</i>, we present two rational functions <span>(f(X)in mathbb {F}_q(X))</span> which have the unusual property that, for every odd <i>n</i>, the function induced by <i>f</i>(<i>X</i>) on <span>(mathbb {F}_{q^n}setminus mathbb {F}_q)</span> is <span>((q-1))</span>-to-1.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01490-y
John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle
For finite classical groups acting naturally on the set of points of their ambient polar spaces, the symmetry properties of synchronising and separating are equivalent to natural and well-studied problems on the existence of certain configurations in finite geometry. The more general class of spreading permutation groups is harder to describe, and it is the purpose of this paper to explore this property for finite classical groups. In particular, we show that for most finite classical groups, their natural action on the points of its polar space is non-spreading. We develop and use a result on tactical decompositions (an AB-Lemma) that provides a useful technique for finding witnesses for non-spreading permutation groups. We also consider some of the other primitive actions of the classical groups.
{"title":"Tactical decompositions in finite polar spaces and non-spreading classical group actions","authors":"John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle","doi":"10.1007/s10623-024-01490-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01490-y","url":null,"abstract":"<p>For finite classical groups acting naturally on the set of points of their ambient polar spaces, the symmetry properties of <i>synchronising</i> and <i>separating</i> are equivalent to natural and well-studied problems on the existence of certain configurations in finite geometry. The more general class of <i>spreading</i> permutation groups is harder to describe, and it is the purpose of this paper to explore this property for finite classical groups. In particular, we show that for most finite classical groups, their natural action on the points of its polar space is non-spreading. We develop and use a result on tactical decompositions (an <i>AB-Lemma</i>) that provides a useful technique for finding witnesses for non-spreading permutation groups. We also consider some of the other primitive actions of the classical groups.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}