Skip to main content

Showing 1–24 of 24 results for author: Csirmaz, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.15502  [pdf, ps, other

    math.CO cs.IT

    Attempting the impossible: enumerating extremal submodular functions for n=6

    Authors: Elod P. Csirmaz, Laszlo Csirmaz

    Abstract: Enumerating the extremal submodular functions defined on subsets of a fixed base set has only been done for base sets up to five elements. This paper reports the results of attempting to generate all such functions on a six-element base set. Using improved tools from polyhedral geometry, we have computed 360 billion of them, and provide the first reasonable estimate of their total number, which is… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

    MSC Class: 52B05; 52B15; 68Q25; 90C57

  2. arXiv:2306.14718  [pdf, other

    math.PR cs.IT

    A short proof of the Gács--Körner theorem

    Authors: Laszlo Csirmaz

    Abstract: We present a short proof of a celebrated result of Gács and Körner giving sufficient and necessary condition on the joint distribution of two discrete random variables $X$ and $Y$ for the case when their mutual information matches the extractable (in the limit) common information. Our proof is based on the observation that the mere existence of certain random variables jointly distributed with… ▽ More

    Submitted 25 September, 2023; v1 submitted 26 June, 2023; originally announced June 2023.

    MSC Class: 94A15; 94A24 94A15; 94A24 94A15; 94A24

  3. arXiv:2302.09666  [pdf, ps, other

    cs.IT

    Synchronizing Many Filesystems in Near Linear Time

    Authors: Elod P. Csirmaz, Laszlo Csirmaz

    Abstract: Finding a provably correct subquadratic synchronization algorithm for many filesystem replicas is one of the main theoretical problems in Operational Transformation (OT) and Conflict-free Replicated Data Types (CRDT) frameworks. Based on the Algebraic Theory of Filesystems, which incorporates non-commutative filesystem commands natively, we developed and built a proof-of-concept implementation of… ▽ More

    Submitted 17 May, 2023; v1 submitted 19 February, 2023; originally announced February 2023.

    Comments: with pseudocode

    MSC Class: 08A02; 08A70; 68M07; 68P05 ACM Class: D.4.3; E.5; F.2.2; G.2

  4. arXiv:2210.04565  [pdf, other

    cs.IT

    Data Synchronization: A Complete Theoretical Solution for Filesystems

    Authors: Elod P. Csirmaz, Laszlo Csirmaz

    Abstract: Data reconciliation in general, and filesystem synchronization in particular, lacks rigorous theoretical foundation. This paper presents, for the first time, a complete analysis of synchronization for two replicas of a theoretical filesystem. Synchronization has two main stages: identifying the conflicts, and resolving them. All existing (both theoretical and practical) synchronizers are operation… ▽ More

    Submitted 12 November, 2022; v1 submitted 10 October, 2022; originally announced October 2022.

    MSC Class: 08A02; 08A70; 68M07; 68P05

  5. arXiv:2110.06313  [pdf, ps, other

    cs.IT

    Algebra of Data Reconciliation

    Authors: Elod P. Csirmaz, Laszlo Csirmaz

    Abstract: With distributed computing and mobile applications becoming ever more prevalent, synchronizing diverging replicas of the same data is a common problem. Reconciliation -- bringing two replicas of the same data structure as close as possible without overriding local changes -- is investigated in an algebraic model. Our approach is to consider two sequences of simple commands that describe the change… ▽ More

    Submitted 9 August, 2022; v1 submitted 12 October, 2021; originally announced October 2021.

    MSC Class: 08A02 08A70 68M07 68P05 ACM Class: D.4.3; E.5; F.2.2; G.2

  6. arXiv:2103.04904  [pdf, ps, other

    cs.CR cs.IT

    Bipartite secret sharing and staircases

    Authors: Laszlo Csirmaz, František Matúš, Carles Padró

    Abstract: Bipartite secret sharing schemes have a bipartite access structure in which the set of participants is divided into two parts and all participants in the same part play an equivalent role. Such a bipartite scheme can be described by a \emph{staircase}: the collection of its minimal points. The complexity of a scheme is the maximal share size relative to the secret size; and the $κ$-complexity of a… ▽ More

    Submitted 5 October, 2023; v1 submitted 8 March, 2021; originally announced March 2021.

    Comments: To appear in Discrete Mathematics

    MSC Class: 94A62; 05B35

  7. arXiv:2009.12574  [pdf, ps, other

    math.OC cs.CR

    An optimization problem for continuous submodular functions

    Authors: Laszlo Csirmaz

    Abstract: Real continuous submodular functions, as a generalization of the corresponding discrete notion to the continuous domain, gained considerable attention recently. The analog notion for entropy functions requires additional properties: a real function defined on the non-negative orthant of $\mathbb R^n$ is entropy-like (EL) if it is submodular, takes zero at zero, non-decreasing, and has the Diminish… ▽ More

    Submitted 11 February, 2021; v1 submitted 26 September, 2020; originally announced September 2020.

    MSC Class: 90C26; 46N10; 49Q10

  8. arXiv:1911.04205  [pdf, ps, other

    cs.IT math.CO

    Sticky polymatroids on at most five elements

    Authors: Laszlo Csirmaz

    Abstract: The sticky polymatroid conjecture states that any two extensions of the polymatroid have an amalgam if and only if the polymatroid has no non-modular pairs of flats. We show that the conjecture holds for polymatroids on five or less elements.

    Submitted 3 February, 2020; v1 submitted 11 November, 2019; originally announced November 2019.

    MSC Class: 05B35 06C10 52B40

  9. arXiv:1909.13663  [pdf, ps, other

    cs.IT math.CO

    Secret sharing and duality

    Authors: Laszlo Csirmaz

    Abstract: Secret sharing is an important building block in cryptography. All explicitly defined secret sharing schemes with known exact complexity bounds are multi-linear, thus are closely related to linear codes. The dual of such a linear scheme, in the sense of duality of linear codes, gives another scheme for the dual access structure. These schemes have the same complexity, namely the largest share size… ▽ More

    Submitted 3 February, 2020; v1 submitted 30 September, 2019; originally announced September 2019.

    MSC Class: 05B35; 94A15; 06D50; 94A62

  10. arXiv:1909.02353  [pdf, ps, other

    math.CO cs.IT

    Sticky matroids and convolution

    Authors: Laszlo Csirmaz

    Abstract: Motivated by the characterization of the lattice of cyclic flats of a matroid, the convolution of a ranked lattice and a discrete measure is defined, generalizing polymatroid convolution. Using the convolution technique we prove that if a matroid has a non-principal modular cut then it is not sticky. A similar statement for matroids has been proved in [8] using different technique.

    Submitted 2 October, 2019; v1 submitted 5 September, 2019; originally announced September 2019.

    MSC Class: 03G10; 05B35; 06C10

  11. Complexity of universal access structures

    Authors: Laszlo Csirmaz

    Abstract: An important parameter in a secret sharing scheme is the number of minimal qualified sets. Given this number, the universal access structure is the richest possible structure, namely the one in which there are one or more participants in every possible Boolean combination of the minimal qualified sets. Every access structure is a substructure of the universal structure for the same number of minim… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

    MSC Class: 94A62; 90C25; 05B35

    Journal ref: Information Processing Letters, Volume 112 Issue 4, February, 2012, Pages 149-152

  12. arXiv:1904.07565  [pdf, ps, other

    cs.IT math.CO

    One-adhesive polymatroids

    Authors: Laszlo Csirmaz

    Abstract: Adhesive polymatroids were defined by F. Matúš motivated by entropy functions. Two polymatroids are adhesive if they can be glued together along their joint part in a modular way; and are one-adhesive, if one of them has a single point outside their intersection. It is shown that two polymatroids are one-adhesive if and only if two closely related polymatroids have any extension. Using this result… ▽ More

    Submitted 27 August, 2019; v1 submitted 16 April, 2019; originally announced April 2019.

    MSC Class: 05B35; 94A15; 52B12

  13. arXiv:1808.01786  [pdf, ps, other

    math.OC cs.CG cs.DS

    Inner approximation algorithm for solving linear multiobjective optimization problems

    Authors: Laszlo Csirmaz

    Abstract: Benson's outer approximation algorithm and its variants are the most frequently used methods for solving linear multiobjective optimization problems. These algorithms have two intertwined components: one-dimensional linear optimization one one hand, and a combinatorial part closely related to vertex numeration on the other. Their separation provides a deeper insight into Benson's algorithm, and po… ▽ More

    Submitted 20 March, 2019; v1 submitted 6 August, 2018; originally announced August 2018.

    MSC Class: 90C29; 90C05

  14. arXiv:1705.10520  [pdf, ps, other

    cs.IT math.CO

    Secret sharing on large girth graphs

    Authors: Laszlo Csirmaz, Peter Ligeti

    Abstract: We investigate graph based secret sharing schemes and its information ratio, also called complexity, measuring the maximal amount of information the vertices has to store. It was conjectured that in large girth graphs, where the interaction between far away nodes is restricted to a single path, this ratio is bounded. This conjecture was supported by several result, most notably by a result of Csir… ▽ More

    Submitted 30 May, 2017; originally announced May 2017.

    MSC Class: 94A60; 94A17; 05C12; 05B35; 05C45

  15. On-line secret sharing

    Authors: Laszlo Csirmaz, Gábor Tardos

    Abstract: In an on-line secret sharing scheme the dealer assigns shares in the order the participants show up, knowing only those qualified subsets whose all members she has seen. We assume that the overall access structure is known and only the order of the participants is unknown. On-line secret sharing is a useful primitive when the set of participants grows in time, and redistributing the secret is too… ▽ More

    Submitted 6 February, 2014; originally announced February 2014.

    MSC Class: 05C85; 05C15; 94A62

    Journal ref: Des. Codes Cryptopgr (2012) 63: 127-147

  16. arXiv:1312.6490  [pdf, ps, other

    cs.IT

    Book inequalities

    Authors: Laszlo Csirmaz

    Abstract: Information theoretical inequalities have strong ties with polymatroids and their representability. A polymatroid is entropic if its rank function is given by the Shannon entropy of the subsets of some discrete random variables. The book is a special iterated adhesive extension of a polymatroid with the property that entropic polymatroids have $n$-page book extensions over an arbitrary spine. We p… ▽ More

    Submitted 29 May, 2014; v1 submitted 23 December, 2013; originally announced December 2013.

    MSC Class: 05B35; 26A12; 52B12; 90C29; 94A17

  17. arXiv:1311.5027  [pdf, ps, other

    math.CO cs.CR

    Erdős-Pyber theorem for hypergraphs and secret sharing

    Authors: László Csirmaz, Péter Ligeti, Gábor Tardos

    Abstract: A new, constructive proof with a small explicit constant is given to the Erdős-Pyber theorem which says that the edges of a graph on $n$ vertices can be partitioned into complete bipartite subgraphs so that every vertex is covered at most $O(n/\log n)$ times. The theorem is generalized to uniform hypergraphs. Similar bounds with smaller constant value is provided for fractional partitioning both f… ▽ More

    Submitted 20 November, 2013; originally announced November 2013.

    MSC Class: 05C99; 05C65; 05D40; 94A60

  18. arXiv:1310.7423  [pdf, ps, other

    cs.CR cs.IT math.PR

    Infinite Probabilistic Secret Sharing

    Authors: László Csirmaz

    Abstract: A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a collection of secret recovery functions. The study of schemes using arbitrary probability spaces and unbounded number of participants allows us to investigate their abstract properties, to connect the topic to other branches of mathematics, and to discover new design paradigms. A… ▽ More

    Submitted 24 October, 2022; v1 submitted 28 October, 2013; originally announced October 2013.

    MSC Class: 60B05; 94A62; 46C99; 54D10

  19. arXiv:1310.7418  [pdf, ps, other

    cs.CR cs.IT math.PR

    Infinite Secret Sharing -- Examples

    Authors: Alexander Dibert, László Csirmaz

    Abstract: The motivation for extending secret sharing schemes to cases when either the set of players is infinite or the domain from which the secret and/or the shares are drawn is infinite or both, is similar to the case when switching to abstract probability spaces from classical combinatorial probability. It might shed new light on old problems, could connect seemingly unrelated problems, and unify diver… ▽ More

    Submitted 28 October, 2013; originally announced October 2013.

    MSC Class: 60A99; 60B05; 60G15; 62F10; 94A62; 46C99; 54D10

  20. arXiv:1310.5957  [pdf, other

    cs.IT math.PR

    Entropy region and convolution

    Authors: František Matúš, Lászlo Csirmaz

    Abstract: The entropy region is constructed from vectors of random variables by collecting Shannon entropies of all subvectors. Its shape is studied here by means of polymatroidal constructions, notably by convolution. The closure of the region is decomposed into the direct sum of tight and modular parts, reducing the study to the tight part. The relative interior of the reduction belongs to the entropy reg… ▽ More

    Submitted 22 October, 2013; originally announced October 2013.

    MSC Class: 94A17; 68Q30; 94A15

  21. arXiv:1310.4652  [pdf, ps, other

    cs.CR

    Gruppen secret sharing, or, how to share several secrets if you must?

    Authors: Laszlo Csirmaz

    Abstract: Each member of an $n$-person team has a secret, say a password. The $k$ out of $n$ gruppen secret sharing requires that any group of $k$ members should be able to recover the secrets of the other $n-k$ members, while any group of $k-1$ or less members should have no information on the secret of other team member even if other secrets leak out. We prove that when all secrets are chosen independentl… ▽ More

    Submitted 17 October, 2013; originally announced October 2013.

    MSC Class: 94A62; 90C25; 05B35

  22. Secret sharing on the $d$-dimensional cube

    Authors: Laszlo Csirmaz

    Abstract: We prove that for $d>1$ the best information ratio of the perfect secret sharing scheme based on the edge set of the $d$-dimensional cube is exactly $d/2$. Using the technique developed, we also prove that the information ratio of the infinite $d$-dimensional lattice is $d$.

    Submitted 17 October, 2013; originally announced October 2013.

    MSC Class: 94A60; 94A17; 52B40; 68R10

  23. arXiv:1310.4638  [pdf, ps, other

    cs.IT math.OC

    Using multiobjective optimization to map the entropy region of four random variables

    Authors: Laszlo Csirmaz

    Abstract: Presently the only available method of exploring the 15-dimensional entropy region formed by the entropies of four random variables is the one of Zhang and Yeung from 1998. It is argued that their method is equivalent to solving linear multiobjective optimization problems. Benson's outer approximation algorithm is a fundamental tool for solving these optimization problems. An improved version of B… ▽ More

    Submitted 28 October, 2013; v1 submitted 17 October, 2013; originally announced October 2013.

    MSC Class: 90C60; 90C05; 94A17; 90C29

  24. arXiv:1302.4609  [pdf, ps, other

    cs.CR cs.DS

    Optimal information rate of secret sharing schemes on trees

    Authors: L. Csirmaz, G. Tardos

    Abstract: The information rate for an access structure is the reciprocal of the load of the optimal secret sharing scheme for this structure. We determine this value for all trees: it is 1/(2-1/c), where c is the size of the largest core of the tree. A subset of the vertices of a tree is a core if it induces a connected subgraph and for each vertex in the subset one finds a neighbor outside the subset. Our… ▽ More

    Submitted 19 February, 2013; originally announced February 2013.

    Comments: 4 pages, 2 figures

    MSC Class: 05B40; 05C85; 94A62; 94A60 ACM Class: E.3