-
Stability with minuscule structure for chromatic thresholds
Authors:
Jaehoon Kim,
Hong Liu,
Chong Shangguan,
Guanghui Wang,
Zhuo Wu,
Yisai Xue
Abstract:
The chromatic threshold $δ_χ(H)$ of a graph $H$ is the infimum of $d>0$ such that the chromatic number of every $n$-vertex $H$-free graph with minimum degree at least $d n$ is bounded by a constant depending only on $H$ and $d$. Allen, B{ö}ttcher, Griffiths, Kohayakawa, and Morris determined the chromatic threshold for every $H$; in particular, they showed that if $χ(H)=r\ge 3$, then…
▽ More
The chromatic threshold $δ_χ(H)$ of a graph $H$ is the infimum of $d>0$ such that the chromatic number of every $n$-vertex $H$-free graph with minimum degree at least $d n$ is bounded by a constant depending only on $H$ and $d$. Allen, B{ö}ttcher, Griffiths, Kohayakawa, and Morris determined the chromatic threshold for every $H$; in particular, they showed that if $χ(H)=r\ge 3$, then $δ_χ(H) \in\{\frac{r-3}{r-2},~\frac{2 r-5}{2 r-3},~\frac{r-2}{r-1}\}$. While the chromatic thresholds have been completely determined, rather surprisingly the structural behaviors of extremal graphs near the threshold remain unexplored.
In this paper, we establish the stability theorems for chromatic threshold problems. We prove that every $n$-vertex $H$-free graph $G$ with $δ(G)\ge (δ_χ(H)-o(1))n$ and $χ(G)=ω(1)$ must be structurally close to one of the extremal configurations. Furthermore, we give a stronger stability result when $H$ is a clique, showing that $G$ admits a partition into independent sets and a small subgraph on sublinear number of vertices. We show that this small subgraph has fractional chromatic number $2+o(1)$ and is homomorphic to a Kneser graph defined by subsets of a logarithmic size set; both these two bounds are best possible. This is the first stability result that captures the lower-order structural features of extremal graphs.
We also study two variations of chromatic thresholds. Replacing chromatic number by its fractional counterpart, we determine the fractional chromatic thresholds for all graphs. Another variation is the bounded-VC chromatic thresholds, which was introduced by Liu, Shangguan, Skokan, and Xu very recently. Extending work of Łuczak and Thomass{é} on the triangle case, we determine the bounded-VC chromatic thresholds for all cliques.
△ Less
Submitted 17 June, 2025;
originally announced June 2025.
-
Asymptotically sharp bounds for cancellative and union-free hypergraphs
Authors:
Miao Liu,
Chong Shangguan,
Chenyang Zhang
Abstract:
An $r$-graph is called $t$-cancellative if for arbitrary $t+2$ distinct edges $A_1,\ldots,A_t,B,C$, it holds that $(\cup_{i=1}^t A_i)\cup B\neq (\cup_{i=1}^t A_i)\cup C$; it is called $t$-union-free if for arbitrary two distinct subsets $\mathcal{A},\mathcal{B}$, each consisting of at most $t$ edges, it holds that $\cup_{A\in\mathcal{A}} A\neq \cup_{B\in\mathcal{B}} B$. Let $C_t(n,r)$ and…
▽ More
An $r$-graph is called $t$-cancellative if for arbitrary $t+2$ distinct edges $A_1,\ldots,A_t,B,C$, it holds that $(\cup_{i=1}^t A_i)\cup B\neq (\cup_{i=1}^t A_i)\cup C$; it is called $t$-union-free if for arbitrary two distinct subsets $\mathcal{A},\mathcal{B}$, each consisting of at most $t$ edges, it holds that $\cup_{A\in\mathcal{A}} A\neq \cup_{B\in\mathcal{B}} B$. Let $C_t(n,r)$ and $U_t(n,r)$ denote the maximum number of edges that can be contained in an $n$-vertex $t$-cancellative and $t$-union-free $r$-graph, respectively. The study of $C_t(n,r)$ and $U_t(n,r)$ has a long history, dating back to the classic works of Erdős and Katona, and Erdős and Moser in the 1970s. In 2020, Shangguan and Tamo showed that $C_{2(t-1)}(n,tk)=Θ(n^k)$ and $U_{t+1}(n,tk)=Θ(n^k)$ for all $t\ge 2$ and $k\ge 2$. In this paper, we determine the asymptotics of these two functions up to a lower order term, by showing that for all $t\ge 2$ and $k\ge 2$,
\begin{align*}
\text{$\lim_{n\rightarrow\infty}\frac{C_{2(t-1)}(n,tk)}{n^k}=\lim_{n\rightarrow\infty}\frac{U_{t+1}(n,tk)}{n^k}=\frac{1}{k!}\cdot \frac{1}{\binom{tk-1}{k-1}}$.}
\end{align*}
Previously, it was only known by a result of Füredi in 2012 that $\lim_{n\rightarrow\infty}\frac{C_{2}(n,4)}{n^2}=\frac{1}{6}$.
To prove the lower bounds of the limits, we utilize a powerful framework developed recently by Delcourt and Postle, and independently by Glock, Joos, Kim, Kühn, and Lichev, which shows the existence of near-optimal hypergraph packings avoiding certain small configurations, and to prove the upper bounds, we apply a novel counting argument that connects $C_{2(t-1)}(n,tk)$ to a classic result of Kleitman and Frankl on a special case of the famous Erdős Matching Conjecture.
△ Less
Submitted 12 November, 2024;
originally announced November 2024.
-
Focal-free uniform hypergraphs and codes
Authors:
Xinqi Huang,
Chong Shangguan,
Xiande Zhang,
Yuhao Zhao
Abstract:
Motivated by the study of a variant of sunflowers, Alon and Holzman recently introduced focal-free hypergraphs. In this paper, we show that there is an interesting connection between the maximum size of focal-free hypergraphs and the renowned Erdős Matching Conjecture on the maximum number of edges that can be contained in a uniform hypergraph with bounded matching number. As a consequence, we giv…
▽ More
Motivated by the study of a variant of sunflowers, Alon and Holzman recently introduced focal-free hypergraphs. In this paper, we show that there is an interesting connection between the maximum size of focal-free hypergraphs and the renowned Erdős Matching Conjecture on the maximum number of edges that can be contained in a uniform hypergraph with bounded matching number. As a consequence, we give asymptotically optimal bounds on the maximum sizes of focal-free uniform hypergraphs and codes, thereby significantly improving the previous results of Alon and Holzman. Moreover, by using the existentce results of combinatorial designs and orthogonal arrays, we are able to explicitly determine the exact sizes of maximum focal-free uniform hypergraphs and codes for a wide range of parameters.
△ Less
Submitted 30 October, 2024;
originally announced October 2024.
-
Constrained coding upper bounds via Goulden-Jackson cluster theorem
Authors:
Yuanting Shen,
Chong Shangguan,
Zhicong Lin,
Gennian Ge
Abstract:
Motivated by applications in DNA-based data storage, constrained codes have attracted a considerable amount of attention from both academia and industry. We study the maximum cardinality of constrained codes for which the constraints can be characterized by a set of forbidden substrings, where by a substring we mean some consecutive coordinates in a string.
For finite-type constrained codes (for…
▽ More
Motivated by applications in DNA-based data storage, constrained codes have attracted a considerable amount of attention from both academia and industry. We study the maximum cardinality of constrained codes for which the constraints can be characterized by a set of forbidden substrings, where by a substring we mean some consecutive coordinates in a string.
For finite-type constrained codes (for which the set of forbidden substrings is finite), one can compute their capacity (code rate) by the ``spectral method'', i.e., by applying the Perron-Frobenious theorem to the de Brujin graph defined by the code. However, there was no systematic method to compute the exact cardinality of these codes.
We show that there is a surprisingly powerful method arising from enumerative combinatorics, which is based on the Goulden-Jackson cluster theorem (previously not known to the coding community), that can be used to compute not only the capacity, but also the exact formula for the cardinality of these codes, for each fixed code length. Moreover, this can be done by solving a system of linear equations of size equal to the number of constraints.
We also show that the spectral method and the cluster method are inherently related by establishing a direct connection between the spectral radius of the de Brujin graph used in the first method and the convergence radius of the generating function used in the second method.
Lastly, to demonstrate the flexibility of the new method, we use it to give an explicit upper bound on the maximum cardinality of variable-length non-overlapping codes, which are a class of constrained codes defined by an infinite number of forbidden substrings.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Beyond chromatic threshold via the $(p,q)$-theorem, and a sharp blow-up phenomenon
Authors:
Hong Liu,
Chong Shangguan,
Jozef Skokan,
Zixiang Xu
Abstract:
We establish a novel connection between the well-known chromatic threshold problem in extremal combinatorics and the celebrated $(p,q)$-theorem in discrete geometry. In particular, for a graph $G$ with bounded clique number and a natural density condition, we prove a $(p,q)$-theorem for an abstract convexity space associated with $G$. Our result strengthens those of Thomassen and Nikiforov on the…
▽ More
We establish a novel connection between the well-known chromatic threshold problem in extremal combinatorics and the celebrated $(p,q)$-theorem in discrete geometry. In particular, for a graph $G$ with bounded clique number and a natural density condition, we prove a $(p,q)$-theorem for an abstract convexity space associated with $G$. Our result strengthens those of Thomassen and Nikiforov on the chromatic threshold of cliques. Our $(p,q)$-theorem can also be viewed as a $χ$-boundedness result for (what we call) ultra maximal $K_r$-free graphs.
We further show that the graphs under study are blow-ups of constant size graphs, improving a result of Oberkampf and Schacht on homomorphism threshold of cliques. Our result unravels the cause underpinning such a blow-up phenomenon, differentiating the chromatic and homomorphism threshold problems for cliques. It implies that for the homomorphism threshold problem, rather than the minimum degree condition usually considered in the literature, the decisive factor is a clique density condition on co-neighborhoods of vertices. More precisely, we show that if an $n$-vertex $K_{r}$-free graph $G$ satisfies that the common neighborhood of every pair of non-adjacent vertices induces a subgraph with $K_{r-2}$-density at least $\varepsilon>0$, then $G$ must be a blow-up of some $K_r$-free graph $F$ on at most $2^{O(\frac{r}{\varepsilon}\log\frac{1}{\varepsilon})}$ vertices. Furthermore, this single exponential bound is optimal. We construct examples with no $K_r$-free homomorphic image of size smaller than $2^{Ω_r(\frac{1}{\varepsilon})}$.
△ Less
Submitted 27 August, 2024; v1 submitted 26 March, 2024;
originally announced March 2024.
-
Near optimal constructions of frameproof codes
Authors:
Miao Liu,
Zengjiao Ma,
Chong Shangguan
Abstract:
Frameproof codes are a class of secure codes that were originally introduced in the pioneering work of Boneh and Shaw in the context of digital fingerprinting. They can be used to enhance the security and credibility of digital content. Let $M_{c,l}(q)$ denote the largest cardinality of a $q$-ary $c$-frameproof code with length $l$. Based on an intriguing observation that relates $M_{c,l}(q)$ to t…
▽ More
Frameproof codes are a class of secure codes that were originally introduced in the pioneering work of Boneh and Shaw in the context of digital fingerprinting. They can be used to enhance the security and credibility of digital content. Let $M_{c,l}(q)$ denote the largest cardinality of a $q$-ary $c$-frameproof code with length $l$. Based on an intriguing observation that relates $M_{c,l}(q)$ to the renowned Erdős Matching Conjecture in extremal set theory, in 2003, Blackburn posed an open problem on the precise value of the limit $R_{c,l}=\lim_{q\rightarrow\infty}\frac{M_{c,l}(q)}{q^{\lceil l/c \rceil}}$. By combining several ideas from the probabilistic method, we present a lower bound for $M_{c,l}(q)$, which, together with an upper bound of Blackburn, completely determines $R_{c,l}$ for {\it all} fixed $c,l$, and resolves the above open problem in the full generality. We also present an improved upper bound for $M_{c,l}(q)$.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Approximate generalized Steiner systems and near-optimal constant weight codes
Authors:
Miao Liu,
Chong Shangguan
Abstract:
Constant weight codes (CWCs) and constant composition codes (CCCs) are two important classes of codes that have been studied extensively in both combinatorics and coding theory for nearly sixty years. In this paper we show that for {\it all} fixed odd distances, there exist near-optimal CWCs and CCCs asymptotically achieving the classic Johnson-type upper bounds.
Let $A_q(n,w,d)$ denote the maxi…
▽ More
Constant weight codes (CWCs) and constant composition codes (CCCs) are two important classes of codes that have been studied extensively in both combinatorics and coding theory for nearly sixty years. In this paper we show that for {\it all} fixed odd distances, there exist near-optimal CWCs and CCCs asymptotically achieving the classic Johnson-type upper bounds.
Let $A_q(n,w,d)$ denote the maximum size of $q$-ary CWCs of length $n$ with constant weight $w$ and minimum distance $d$. One of our main results shows that for {\it all} fixed $q,w$ and odd $d$, one has $\lim_{n\rightarrow\infty}\frac{A_q(n,d,w)}{\binom{n}{t}}=\frac{(q-1)^t}{\binom{w}{t}}$, where $t=\frac{2w-d+1}{2}$. This implies the existence of near-optimal generalized Steiner systems originally introduced by Etzion, and can be viewed as a counterpart of a celebrated result of Rödl on the existence of near-optimal Steiner systems. Note that prior to our work, very little is known about $A_q(n,w,d)$ for $q\ge 3$. A similar result is proved for the maximum size of CCCs.
We provide different proofs for our two main results, based on two strengthenings of the well-known Frankl-Rödl-Pippenger theorem on the existence of near-optimal matchings in hypergraphs: the first proof follows by Kahn's linear programming variation of the above theorem, and the second follows by the recent independent work of Delcour-Postle, and Glock-Joos-Kim-Kühn-Lichev on the existence of near-optimal matchings avoiding certain forbidden configurations.
We also present several intriguing open questions for future research.
△ Less
Submitted 20 January, 2024; v1 submitted 1 January, 2024;
originally announced January 2024.
-
When can an expander code correct $Ω(n)$ errors in $O(n)$ time?
Authors:
Kuan Cheng,
Minghui Ouyang,
Chong Shangguan,
Yuanting Shen
Abstract:
Tanner codes are graph-based linear codes whose parity-check matrices can be characterized by a bipartite graph $G$ together with a linear inner code $C_0$. Expander codes are Tanner codes whose defining bipartite graph $G$ has good expansion property. This paper is motivated by the following natural and fundamental problem in decoding expander codes:
What are the sufficient and necessary condit…
▽ More
Tanner codes are graph-based linear codes whose parity-check matrices can be characterized by a bipartite graph $G$ together with a linear inner code $C_0$. Expander codes are Tanner codes whose defining bipartite graph $G$ has good expansion property. This paper is motivated by the following natural and fundamental problem in decoding expander codes:
What are the sufficient and necessary conditions that $δ$ and $d_0$ must satisfy, so that \textit{every} bipartite expander $G$ with vertex expansion ratio $δ$ and \textit{every} linear inner code $C_0$ with minimum distance $d_0$ together define an expander code that corrects $Ω(n)$ errors in $O(n)$ time?
For $C_0$ being the parity-check code, the landmark work of Sipser and Spielman (IEEE-TIT'96) showed that $δ>3/4$ is sufficient; later Viderman (ACM-TOCT'13) improved this to $δ>2/3-Ω(1)$ and he also showed that $δ>1/2$ is necessary. For general linear code $C_0$, the previously best-known result of Dowling and Gao (IEEE-TIT'18) showed that $d_0=Ω(cδ^{-2})$ is sufficient, where $c$ is the left-degree of $G$.
In this paper, we give a near-optimal solution to the above question for general $C_0$ by showing that $δd_0>3$ is sufficient and $δd_0>1$ is necessary, thereby also significantly improving Dowling-Gao's result. We present two novel algorithms for decoding expander codes, where the first algorithm is deterministic, and the second one is randomized and has a larger decoding radius.
△ Less
Submitted 17 July, 2024; v1 submitted 26 December, 2023;
originally announced December 2023.
-
Improved Gilbert-Varshamov bounds for hopping cyclic codes and optical orthogonal codes
Authors:
Chenyang Zhang,
Chong Shangguan,
Gennian Ge
Abstract:
Hopping cyclic codes (HCCs) are (non-linear) cyclic codes with the additional property that the $n$ cyclic shifts of every given codeword are all distinct, where $n$ is the code length. Constant weight binary hopping cyclic codes are also known as optical orthogonal codes (OOCs). HCCs and OOCs have various practical applications and have been studied extensively over the years.
The main concern…
▽ More
Hopping cyclic codes (HCCs) are (non-linear) cyclic codes with the additional property that the $n$ cyclic shifts of every given codeword are all distinct, where $n$ is the code length. Constant weight binary hopping cyclic codes are also known as optical orthogonal codes (OOCs). HCCs and OOCs have various practical applications and have been studied extensively over the years.
The main concern of this paper is to present improved Gilbert-Varshamov type lower bounds for these codes, when the minimum distance is bounded below by a linear factor of the code length. For HCCs, we improve the previously best known lower bound of Niu, Xing, and Yuan by a linear factor of the code length. For OOCs, we improve the previously best known lower bound of Chung, Salehi, and Wei, and Yang and Fuja by a quadratic factor of the code length. As by-products, we also provide improved lower bounds for frequency hopping sequences sets and error-correcting weakly mutually uncorrelated codes. Our proofs are based on tools from probability theory and graph theory, in particular the McDiarmid's inequality on the concentration of Lipschitz functions and the independence number of locally sparse graphs.
△ Less
Submitted 5 January, 2023;
originally announced January 2023.
-
Degenerate Turán densities of sparse hypergraphs II: a solution to the Brown-Erdős-Sós problem for every uniformity
Authors:
Chong Shangguan
Abstract:
For fixed integers $r\ge 3, e\ge 3$, and $v\ge r+1$, let $f_r(n,v,e)$ denote the maximum number of edges in an $n$-vertex $r$-uniform hypergraph in which the union of arbitrary $e$ distinct edges contains at least $v+1$ vertices. In 1973, Brown, Erdős and Sós proved that $f_r(n,er-(e-1)k,e)=Θ(n^k)$ and conjectured that the limit $\lim_{n\rightarrow\infty}\frac{f_3(n,e+2,e)}{n^2}$ always exists for…
▽ More
For fixed integers $r\ge 3, e\ge 3$, and $v\ge r+1$, let $f_r(n,v,e)$ denote the maximum number of edges in an $n$-vertex $r$-uniform hypergraph in which the union of arbitrary $e$ distinct edges contains at least $v+1$ vertices. In 1973, Brown, Erdős and Sós proved that $f_r(n,er-(e-1)k,e)=Θ(n^k)$ and conjectured that the limit $\lim_{n\rightarrow\infty}\frac{f_3(n,e+2,e)}{n^2}$ always exists for all fixed integers $e\ge 3$. In 2020 Shangguan and Tamo conjectured that the limit $\lim_{n\rightarrow\infty}\frac{f_r(n,er-(e-1)k,e)}{n^k}$ always exists for all fixed integers $r>k\ge 2$ and $e\ge 3$, which contains the BES conjecture as a special case for $r=3, k=2$. Recently, based on a result of Glock, Joos, Kim, Kühn, Lichev, and Pikhurko, Delcourt and Postle proved the BES conjecture. Extending their result, we show that the limit $\lim_{n\rightarrow\infty}\frac{f_r(n,er-2(e-1),e)}{n^2}$ always exists, thereby proving the BES conjecture for every uniformity.
△ Less
Submitted 20 October, 2022;
originally announced October 2022.
-
Singleton-type bounds for list-decoding and list-recovery, and related results
Authors:
Eitan Goldberg,
Chong Shangguan,
Itzhak Tamo
Abstract:
List-decoding and list-recovery are important generalizations of unique decoding that received considerable attention over the years. However, the optimal trade-off among list-decoding (resp. list-recovery) radius, list size, and the code rate are not fully understood in both problems. This paper takes a step towards this direction when the list size is a given constant and the alphabet size is la…
▽ More
List-decoding and list-recovery are important generalizations of unique decoding that received considerable attention over the years. However, the optimal trade-off among list-decoding (resp. list-recovery) radius, list size, and the code rate are not fully understood in both problems. This paper takes a step towards this direction when the list size is a given constant and the alphabet size is large (as a function of the code length). We prove a new Singleton-type upper bound for list-decodable codes, which improves upon the previously known bound by roughly a factor of $1/L$, where $L$ is the list size. We also prove a Singleton-type upper bound for list-recoverable codes, which is to the best of our knowledge, the first such bound for list-recovery. We apply these results to obtain new lower bounds that are optimal up to a multiplicative constant on the list size for list-decodable and list-recoverable codes with rates approaching capacity.
Moreover, we show that list-decodable \emph{nonlinear} codes can strictly outperform list-decodable linear codes. More precisely, we show that there is a gap for a wide range of parameters, which grows fast with the alphabet size, between the size of the largest list-decodable nonlinear code and the size of the largest list-decodable linear codes. This is achieved by a novel connection between list-decoding and the notion of sparse hypergraphs in extremal combinatorics. We remark that such a gap is not known to exist in the problem of unique decoding.
Lastly, we show that list-decodability or recoverability of codes implies in some sense good unique decodability.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
List-decoding and list-recovery of Reed-Solomon codes beyond the Johnson radius for any rate
Authors:
Eitan Goldberg,
Chong Shangguan,
Itzhak Tamo
Abstract:
Understanding the limits of list-decoding and list-recovery of Reed-Solomon (RS) codes is of prime interest in coding theory and has attracted a lot of attention in recent decades. However, the best possible parameters for these problems are still unknown, and in this paper, we take a step in this direction. We show the existence of RS codes that are list-decodable or list-recoverable beyond the J…
▽ More
Understanding the limits of list-decoding and list-recovery of Reed-Solomon (RS) codes is of prime interest in coding theory and has attracted a lot of attention in recent decades. However, the best possible parameters for these problems are still unknown, and in this paper, we take a step in this direction. We show the existence of RS codes that are list-decodable or list-recoverable beyond the Johnson radius for \emph{any} rate, with a polynomial field size in the block length. In particular, we show that for any $ε\in (0,1)$ there exist RS codes that are list-decodable from radius $1-ε$ and rate less than $\fracε{2-ε}$, with constant list size. We deduce our results by extending and strengthening a recent result of Ferber, Kwan, and Sauermann on puncturing codes with large minimum distance and by utilizing the underlying code's linearity.
△ Less
Submitted 31 May, 2021;
originally announced May 2021.
-
Improved List-Decodability of Reed--Solomon Codes via Tree Packings
Authors:
Zeyu Guo,
Ray Li,
Chong Shangguan,
Itzhak Tamo,
Mary Wootters
Abstract:
This paper shows that there exist Reed--Solomon (RS) codes, over \black{exponentially} large finite fields \black{in the code length}, that are combinatorially list-decodable well beyond the Johnson radius, in fact almost achieving the list-decoding capacity.
In particular, we show that for any $ε\in (0,1]$ there exist RS codes with rate $Ω(\fracε{\log(1/ε)+1})$ that are list-decodable from radi…
▽ More
This paper shows that there exist Reed--Solomon (RS) codes, over \black{exponentially} large finite fields \black{in the code length}, that are combinatorially list-decodable well beyond the Johnson radius, in fact almost achieving the list-decoding capacity.
In particular, we show that for any $ε\in (0,1]$ there exist RS codes with rate $Ω(\fracε{\log(1/ε)+1})$ that are list-decodable from radius of $1-ε$. We generalize this result to list-recovery, showing that there exist $(1 - ε, \ell, O(\ell/ε))$-list-recoverable RS codes with rate $Ω\left( \fracε{\sqrt{\ell} (\log(1/ε)+1)} \right)$. Along the way we use our techniques to give a new proof of a result of Blackburn on optimal linear perfect hash matrices, and strengthen it to obtain a construction of strongly perfect hash matrices.
To derive the results in this paper we show a surprising connection of the above problems to graph theory, and in particular to the tree packing theorem of Nash-Williams and Tutte. We also state a new conjecture that generalizes the tree-packing theorem to hypergraphs, and show that if this conjecture holds, then there would exist RS codes that are \em optimally \em (non-asymptotically) list-decodable.
△ Less
Submitted 26 December, 2023; v1 submitted 9 November, 2020;
originally announced November 2020.
-
New Turán exponents for two extremal hypergraph problems
Authors:
Chong Shangguan,
Itzhak Tamo
Abstract:
An $r$-uniform hypergraph is called $t$-cancellative if for any $t+2$ distinct edges $A_1,\ldots,A_t,B,C$, it holds that $(\cup_{i=1}^t A_i)\cup B\neq (\cup_{i=1}^t A_i)\cup C$. It is called $t$-union-free if for any two distinct subsets $\mathcal{A},\mathcal{B}$, each consisting of at most $t$ edges, it holds that $\cup_{A\in\mathcal{A}} A\neq \cup_{B\in\mathcal{B}} B$. Let $C_t(n,r)$ (resp.…
▽ More
An $r$-uniform hypergraph is called $t$-cancellative if for any $t+2$ distinct edges $A_1,\ldots,A_t,B,C$, it holds that $(\cup_{i=1}^t A_i)\cup B\neq (\cup_{i=1}^t A_i)\cup C$. It is called $t$-union-free if for any two distinct subsets $\mathcal{A},\mathcal{B}$, each consisting of at most $t$ edges, it holds that $\cup_{A\in\mathcal{A}} A\neq \cup_{B\in\mathcal{B}} B$. Let $C_t(n,r)$ (resp. $U_t(n,r)$) denote the maximum number of edges of a $t$-cancellative (resp. $t$-union-free) $r$-uniform hypergraph on $n$ vertices. Among other results, we show that for fixed $r\ge 3,t\ge 3$ and $n\rightarrow\infty$ $$Ω(n^{\lfloor\frac{2r}{t+2}\rfloor+\frac{2r\pmod{t+2}}{t+1}})=C_t(n,r)=O(n^{\lceil\frac{r}{\lfloor t/2\rfloor+1}\rceil})\text{ and } Ω(n^{\frac{r}{t-1}})=U_t(n,r)=O(n^{\lceil\frac{r}{t-1}\rceil}),$$ thereby significantly narrowing the gap between the previously known lower and upper bounds. In particular, we determine the Turán exponent of $C_t(n,r)$ when $2\mid t \text{ and } (t/2+1)\mid r$, and of $U_t(n,r)$ when $(t-1)\mid r$.
The main tool used in proving the two lower bounds is a novel connection between these problems and sparse hypergraphs.
△ Less
Submitted 21 August, 2020; v1 submitted 6 April, 2020;
originally announced April 2020.
-
Error Detection and Correction in Communication Networks
Authors:
Chong Shangguan,
Itzhak Tamo
Abstract:
Let $G$ be a connected graph on $n$ vertices and $C$ be an $(n,k,d)$ code with $d\ge 2$, defined on the alphabet set $\{0,1\}^m$. Suppose that for $1\le i\le n$, the $i$-th vertex of $G$ holds an input symbol $x_i\in\{0,1\}^m$ and let $\vec{x}=(x_1,\ldots,x_n)\in\{0,1\}^{mn}$ be the input vector formed by those symbols. Assume that each vertex of $G$ can communicate with its neighbors by transmitt…
▽ More
Let $G$ be a connected graph on $n$ vertices and $C$ be an $(n,k,d)$ code with $d\ge 2$, defined on the alphabet set $\{0,1\}^m$. Suppose that for $1\le i\le n$, the $i$-th vertex of $G$ holds an input symbol $x_i\in\{0,1\}^m$ and let $\vec{x}=(x_1,\ldots,x_n)\in\{0,1\}^{mn}$ be the input vector formed by those symbols. Assume that each vertex of $G$ can communicate with its neighbors by transmitting messages along the edges, and these vertices must decide deterministically, according to a predetermined communication protocol, that whether $\vec{x}\in C$. Then what is the minimum communication cost to solve this problem? Moreover, if $\vec{x}\not\in C$, say, there is less than $\lfloor(d-1)/2\rfloor$ input errors among the $x_i$'s, then what is the minimum communication cost for error correction?
In this paper we initiate the study of the two problems mentioned above. For the error detection problem, we obtain two lower bounds on the communication cost as functions of $n,k,d,m$, and our bounds are tight for several graphs and codes. For the error correction problem, we design a protocol which can efficiently correct a single input error when $G$ is a cycle and $C$ is a repetition code. We also present several interesting problems for further research.
△ Less
Submitted 3 April, 2020;
originally announced April 2020.
-
Combinatorial list-decoding of Reed-Solomon codes beyond the Johnson radius
Authors:
Chong Shangguan,
Itzhak Tamo
Abstract:
List-decoding of Reed-Solomon (RS) codes beyond the so called Johnson radius has been one of the main open questions since the work of Guruswami and Sudan. It is now known by the work of Rudra and Wootters, using techniques from high dimensional probability, that over large enough alphabets most RS codes are indeed list-decodable beyond this radius.
In this paper we take a more combinatorial app…
▽ More
List-decoding of Reed-Solomon (RS) codes beyond the so called Johnson radius has been one of the main open questions since the work of Guruswami and Sudan. It is now known by the work of Rudra and Wootters, using techniques from high dimensional probability, that over large enough alphabets most RS codes are indeed list-decodable beyond this radius.
In this paper we take a more combinatorial approach which allows us to determine the precise relation (up to the exact constant) between the decoding radius and the list size. We prove a generalized Singleton bound for a given list size, and conjecture that the bound is tight for most RS codes over large enough finite fields. We also show that the conjecture holds true for list sizes $2 \text{ and }3$, and as a by product show that most RS codes with a rate of at least $1/9$ are list-decodable beyond the Johnson radius. Lastly, we give the first explicit construction of such RS codes. The main tools used in the proof are a new type of linear dependency between codewords of a code that are contained in a small Hamming ball, and the notion of cycle space from Graph Theory. Both of them have not been used before in the context of list-decoding.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
Degenerate Turán densities of sparse hypergraphs
Authors:
Chong Shangguan,
Itzhak Tamo
Abstract:
For fixed integers $r>k\ge 2,e\ge 3$, let $f_r(n,er-(e-1)k,e)$ be the maximum number of edges in an $r$-uniform hypergraph in which the union of any $e$ distinct edges contains at least $er-(e-1)k+1$ vertices. A classical result of Brown, Erdős and Sós in 1973 showed that $f_r(n,er-(e-1)k,e)=Θ(n^k).$ The degenerate Turán density is defined to be the limit (if it exists)…
▽ More
For fixed integers $r>k\ge 2,e\ge 3$, let $f_r(n,er-(e-1)k,e)$ be the maximum number of edges in an $r$-uniform hypergraph in which the union of any $e$ distinct edges contains at least $er-(e-1)k+1$ vertices. A classical result of Brown, Erdős and Sós in 1973 showed that $f_r(n,er-(e-1)k,e)=Θ(n^k).$ The degenerate Turán density is defined to be the limit (if it exists) $$π(r,k,e):=\lim_{n\rightarrow\infty}\frac{f_r(n,er-(e-1)k,e)}{n^k}.$$ Extending a recent result of Glock for the special case of $r=3,k=2,e=3$, we show that $$π(r,2,3):=\lim_{n\rightarrow\infty}\frac{f_r(n,3r-4,3)}{n^2}=\frac{1}{r^2-r-1}$$ for arbitrary fixed $r\ge 4$. For the more general cases $r>k\ge 3$, we show that $$\frac{1}{r^k-r}\le\liminf_{n\rightarrow\infty}\frac{f_r(n,3r-2k,3)}{n^k}\le\limsup_{n\rightarrow\infty}\frac{f_r(n,3r-2k,3)}{n^k}\le \frac{1}{k!\binom{r}{k}-\frac{k!}{2}}.$$
The main difficulties in proving these results are the constructions establishing the lower bounds. The first construction is recursive and purely combinatorial, and is based on a (carefully designed) approximate induced decomposition of the complete graph, whereas the second construction is algebraic, and is proved by a newly defined matrix property which we call {\it strongly 3-perfect hashing}.
△ Less
Submitted 2 February, 2020; v1 submitted 10 July, 2019;
originally announced July 2019.
-
Sparse Hypergraphs with Applications to Coding Theory
Authors:
Chong Shangguan,
Itzhak Tamo
Abstract:
For fixed integers $r\ge 3,e\ge 3,v\ge r+1$, an $r$-uniform hypergraph is called $\mathscr{G}_r(v,e)$-free if the union of any $e$ distinct edges contains at least $v+1$ vertices.
Brown, Erdős and Sós showed that the maximum number of edges of such a hypergraph on $n$ vertices, denoted as $f_r(n,v,e)$, satisfies…
▽ More
For fixed integers $r\ge 3,e\ge 3,v\ge r+1$, an $r$-uniform hypergraph is called $\mathscr{G}_r(v,e)$-free if the union of any $e$ distinct edges contains at least $v+1$ vertices.
Brown, Erdős and Sós showed that the maximum number of edges of such a hypergraph on $n$ vertices, denoted as $f_r(n,v,e)$, satisfies
$$Ω(n^{\frac{er-v}{e-1}})=f_r(n,v,e)=\mathcal{O}(n^{\lceil\frac{er-v}{e-1}\rceil}).$$
For $e-1\mid er-v$, the lower bound matches the upper bound up to a constant factor; whereas for $e-1\nmid er-v$, in general it is a notoriously hard problem to determine the correct exponent of $n$.
Among other results, we improve the above lower bound by showing that
$$f_r(n,v,e)=Ω(n^{\frac{er-v}{e-1}}(\log n)^{\frac{1}{e-1}})$$
for any $r,e,v$ satisfying $\gcd(e-1,er-v)=1$.
The hypergraph we constructed is in fact $\mathscr{G}_r(ir-\lceil\frac{(i-1)(er-v)}{e-1}\rceil,i)$-free for every $2\le i\le e$, and it has several interesting applications in Coding Theory.
The proof of the new lower bound is based on a novel application of the lower bound on the hypergraph independence number due to Duke, Lefmann, and R{ö}dl.
△ Less
Submitted 6 April, 2020; v1 submitted 15 February, 2019;
originally announced February 2019.
-
The hat guessing number of graphs
Authors:
Noga Alon,
Omri Ben-Eliezer,
Chong Shangguan,
Itzhak Tamo
Abstract:
Consider the following hat guessing game: $n$ players are placed on $n$ vertices of a graph, each wearing a hat whose color is arbitrarily chosen from a set of $q$ possible colors. Each player can see the hat colors of his neighbors, but not his own hat color. All of the players are asked to guess their own hat colors simultaneously, according to a predetermined guessing strategy and the hat color…
▽ More
Consider the following hat guessing game: $n$ players are placed on $n$ vertices of a graph, each wearing a hat whose color is arbitrarily chosen from a set of $q$ possible colors. Each player can see the hat colors of his neighbors, but not his own hat color. All of the players are asked to guess their own hat colors simultaneously, according to a predetermined guessing strategy and the hat colors they see, where no communication between them is allowed. Given a graph $G$, its hat guessing number ${\rm{HG}}(G)$ is the largest integer $q$ such that there exists a guessing strategy guaranteeing at least one correct guess for any hat assignment of $q$ possible colors.
In 2008, Butler et al. asked whether the hat guessing number of the complete bipartite graph $K_{n,n}$ is at least some fixed positive (fractional) power of $n$. We answer this question affirmatively, showing that for sufficiently large $n$, the complete $r$-partite graph $K_{n,\ldots,n}$ satisfies ${\rm{HG}}(K_{n,\ldots,n})=Ω(n^{\frac{r-1}{r}-o(1)})$. Our guessing strategy is based on a probabilistic construction and other combinatorial ideas, and can be extended to show that ${\rm{HG}}(\vec{C}_{n,\ldots,n})=Ω(n^{\frac{1}{r}-o(1)})$, where $\vec{C}_{n,\ldots,n}$ is the blow-up of a directed $r$-cycle, and where for directed graphs each player sees only the hat colors of his outneighbors.
△ Less
Submitted 15 January, 2020; v1 submitted 23 December, 2018;
originally announced December 2018.
-
Some intriguing upper bounds for separating hash families
Authors:
Gennian Ge,
Chong Shangguan,
Xin Wang
Abstract:
An $N\times n$ matrix on $q$ symbols is called $\{w_1,\ldots,w_t\}$-separating if for arbitrary $t$ pairwise disjoint column sets $C_1,\ldots,C_t$ with $|C_i|=w_i$ for $1\le i\le t$, there exists a row $f$ such that $f(C_1),\ldots,f(C_t)$ are also pairwise disjoint, where $f(C_i)$ denotes the collection of components of $C_i$ restricted to row $f$.
Given integers $N,q$ and $w_1,\ldots,w_t$, deno…
▽ More
An $N\times n$ matrix on $q$ symbols is called $\{w_1,\ldots,w_t\}$-separating if for arbitrary $t$ pairwise disjoint column sets $C_1,\ldots,C_t$ with $|C_i|=w_i$ for $1\le i\le t$, there exists a row $f$ such that $f(C_1),\ldots,f(C_t)$ are also pairwise disjoint, where $f(C_i)$ denotes the collection of components of $C_i$ restricted to row $f$.
Given integers $N,q$ and $w_1,\ldots,w_t$, denote by $C(N,q,\{w_1,\ldots,w_t\})$ the maximal $n$ such that a corresponding matrix does exist.
The determination of $C(N,q,\{w_1,\ldots,w_t\})$ has received remarkable attentions during the recent years.
The main purpose of this paper is to introduce two novel methodologies to attack the upper bound of $C(N,q,\{w_1,\ldots,w_t\})$.
The first one is a combination of the famous graph removal lemma in extremal graph theory and a Johnson-type recursive inequality in coding theory, and the second one is the probabilistic method.
As a consequence, we obtain several intriguing upper bounds for some parameters of $C(N,q,\{w_1,\ldots,w_t\})$, which significantly improve the previously known results.
△ Less
Submitted 20 August, 2018; v1 submitted 6 July, 2017;
originally announced July 2017.
-
Sparse hypergraphs: new bounds and constructions
Authors:
Gennian Ge,
Chong Shangguan
Abstract:
Let $f_r(n,v,e)$ denote the maximum number of edges in an $r$-uniform hypergraph on $n$ vertices, in which the union of any $e$ distinct edges contains at least $v+1$ vertices. The study of $f_r(n,v,e)$ was initiated by Brown, Erd{ő}s and S{ó}s more than forty years ago. In the literature, the following conjecture is well known.
Conjecture: $n^{k-o(1)}<f_r(n,er-(e-1)k+1,e)=o(n^k)$ holds for all…
▽ More
Let $f_r(n,v,e)$ denote the maximum number of edges in an $r$-uniform hypergraph on $n$ vertices, in which the union of any $e$ distinct edges contains at least $v+1$ vertices. The study of $f_r(n,v,e)$ was initiated by Brown, Erd{ő}s and S{ó}s more than forty years ago. In the literature, the following conjecture is well known.
Conjecture: $n^{k-o(1)}<f_r(n,er-(e-1)k+1,e)=o(n^k)$ holds for all fixed integers $r>k\ge 2$ and $e\ge 3$ as $n\rightarrow\infty$.
For $r=3, e=3, k=2$, the bound $n^{2-o(1)}<f_3(n,6,3)=o(n^2)$ was proved by the celebrated (6,3)-theorem of Ruzsa and Szemer{é}di. In this paper, we add more evidence for the validity of the conjecture. On one hand, using the hypergraph removal lemma we show that the upper bound part of the conjecture is true for all fixed integers $r\ge k+1\ge e\ge3$.
On the other hand, using tools from additive number theory we present several constructions showing that the lower bound part of the conjecture is true for $r\ge3$, $k=2$ and $e=4,5,7,8$.
Prior to our results, all known constructions that match the conjectured lower bound satisfy either $r=3$ or $e=3$. Our constructions are the first ones in the literature that break this barrier.
△ Less
Submitted 22 October, 2020; v1 submitted 11 June, 2017;
originally announced June 2017.
-
Maximum subsets of $\mathbb{F}^n_q$ containing no right angles
Authors:
Gennian Ge,
Chong Shangguan
Abstract:
Recently, Croot, Lev, and Pach (Ann. of Math., 185:331--337, 2017.) and Ellenberg and Gijswijt (Ann. of Math., 185:339--443, 2017.) developed a new polynomial method and used it to prove upper bounds for three-term arithmetic progression free sets in $\mathbb{Z}_4^n$ and $\mathbb{F}_3^n$, respectively.
Their approach was later summarized by Tao and is now known as the slice rank method.
In thi…
▽ More
Recently, Croot, Lev, and Pach (Ann. of Math., 185:331--337, 2017.) and Ellenberg and Gijswijt (Ann. of Math., 185:339--443, 2017.) developed a new polynomial method and used it to prove upper bounds for three-term arithmetic progression free sets in $\mathbb{Z}_4^n$ and $\mathbb{F}_3^n$, respectively.
Their approach was later summarized by Tao and is now known as the slice rank method.
In this paper, we apply this method to obtain a new upper bound on the cardinality of subsets of $\mathbb{F}^n_q$ which contain no right angles.
More precisely, let $q$ be a fixed odd prime power and $x\cdot y$ be the standard inner product of two vectors $x,y\in\mathbb{F}_q^n$, we prove that the maximum cardinality of a subset $A\subseteq\mathbb{F}_q^n$ without three distinct elements $x,y,z\in A$ satisfying $(z-x)\cdot (y-x)=0$ is at most $\binom{n+q}{q-1}+3$.
For sufficiently large $n$, our result significantly improves the previous upper bound of Bennett (European J.
Combin., 70:155--163, 2018.), who showed that $|A|=\mathcal{O}(q^{\frac{n+2}{3}})$.
△ Less
Submitted 30 September, 2019; v1 submitted 25 December, 2016;
originally announced December 2016.
-
New results for traitor tracing schemes
Authors:
Chong Shangguan,
Jingxue Ma,
Gennian Ge
Abstract:
In the last two decades, several classes of codes are introduced to protect the copyrighted digital data. They have important applications in the scenarios like digital fingerprinting and broadcast encryption schemes. In this paper we will discuss three important classes of such codes, namely, frameproof codes, parent-identifying codes and traceability codes.
Firstly, suppose $N(t)$ is the minim…
▽ More
In the last two decades, several classes of codes are introduced to protect the copyrighted digital data. They have important applications in the scenarios like digital fingerprinting and broadcast encryption schemes. In this paper we will discuss three important classes of such codes, namely, frameproof codes, parent-identifying codes and traceability codes.
Firstly, suppose $N(t)$ is the minimal integer such that there exists a binary $t$-frameproof code of length $N$ with cardinality larger than $N$, we prove that $N(t)\ge\frac{15+\sqrt{33}}{24} (t-2)^2$, which is a great improvement of the previously known bound $N(t)\ge\binom{t+1}{2}$. Moreover, we find that the determination of $N(t)$ is closely related to a conjecture of Erdős, Frankl and Füredi posed in the 1980's, which implies the conjectured value $N(t)=t^2+o(t^2)$. Secondly, we derive a new upper bound for parent-identifying codes, which is superior than all previously known bounds. Thirdly, we present an upper bound for 3-traceability codes, which shows that a $q$-ary 3-traceability code of length $N$ can have at most $cq^{\lceil N/9\rceil}$ codewords, where $c$ is a constant only related to the code length $N$. It is the first meaningful upper bound for 3-traceability codes and our result supports a conjecture of Blackburn et al. posed in 2010.
△ Less
Submitted 24 October, 2016;
originally announced October 2016.
-
Separating hash families: A Johnson-type bound and new constructions
Authors:
Chong Shangguan,
Gennian Ge
Abstract:
Separating hash families are useful combinatorial structures which are generalizations of many well-studied objects in combinatorics, cryptography and coding theory. In this paper, using tools from graph theory and additive number theory, we solve several open problems and conjectures concerning bounds and constructions for separating hash families. Firstly, we discover that the cardinality of a s…
▽ More
Separating hash families are useful combinatorial structures which are generalizations of many well-studied objects in combinatorics, cryptography and coding theory. In this paper, using tools from graph theory and additive number theory, we solve several open problems and conjectures concerning bounds and constructions for separating hash families. Firstly, we discover that the cardinality of a separating hash family satisfies a Johnson-type inequality. As a result, we obtain a new upper bound, which is superior to all previous ones. Secondly, we present a construction for an infinite class of perfect hash families. It is based on the Hamming graphs in coding theory and generalizes many constructions that appeared before. It provides an affirmative answer to both Bazrafshan-Trung's open problem on separating hash families and Alon-Stav's conjecture on parent-identifying codes. Thirdly, let $p_t(N,q)$ denote the maximal cardinality of a $t$-perfect hash family of length $N$ over an alphabet of size $q$. Walker II and Colbourn conjectured that $p_3(3,q)=o(q^2)$. We verify this conjecture by proving $q^{2-o(1)}<p_3(3,q)=o(q^2)$. Our proof can be viewed as an application of Ruzsa-Szemer{é}di's (6,3)-theorem. We also prove $q^{2-o(1)}<p_4(4,q)=o(q^2)$. Two new notions in graph theory and additive number theory, namely rainbow cycles and $R$-sum-free sets, are introduced to prove this result. These two bounds support a question of Blackburn, Etzion, Stinson and Zaverucha. Finally, we establish a bridge between perfect hash families and hypergraph Tur{á}n problems. This connection has not been noticed before. As a consequence, many new results and problems arise.
△ Less
Submitted 24 October, 2016; v1 submitted 19 January, 2016;
originally announced January 2016.
-
New bounds on the number of tests for disjunct matrices
Authors:
Chong Shangguan,
Gennian Ge
Abstract:
Given $n$ items with at most $d$ of which being positive, instead of testing these items individually, the theory of combinatorial group testing aims to identify all positive items using as few tests as possible. This paper is devoted to a fundamental and thirty-year-old problem in the nonadaptive group testing theory. A binary matrix is called $d$-disjunct if the boolean sum of arbitrary $d$ colu…
▽ More
Given $n$ items with at most $d$ of which being positive, instead of testing these items individually, the theory of combinatorial group testing aims to identify all positive items using as few tests as possible. This paper is devoted to a fundamental and thirty-year-old problem in the nonadaptive group testing theory. A binary matrix is called $d$-disjunct if the boolean sum of arbitrary $d$ columns does not contain another column not in this collection. Let $T(d)$ denote the minimal $t$ such that there exists a $t\times n$ $d$-disjunct matrix with $n>t$. $T(d)$ can also be viewed as the minimal $t$ such that there exists a nonadaptive group testing scheme which is better than the trivial one that tests each item individually. It was known that $T(d)\ge\binom{d+2}{2}$ and was conjectured that $T(d)\ge(d+1)^2$. In this paper we narrow the gap by proving $T(d)/d^2\ge(15+\sqrt{33})/24$, a quantity in [6/7,7/8].
△ Less
Submitted 24 October, 2016; v1 submitted 14 January, 2015;
originally announced January 2015.
-
New Bounds For Frameproof Codes
Authors:
Chong Shangguan,
Xin Wang,
Gennian Ge,
Ying Miao
Abstract:
Frameproof codes are used to fingerprint digital data. It can prevent copyrighted materials from unauthorized use. In this paper, we study upper and lower bounds for $w$-frameproof codes of length $N$ over an alphabet of size $q$. The upper bound is based on a combinatorial approach and the lower bound is based on a probabilistic construction. Both bounds can improve previous results when $q$ is s…
▽ More
Frameproof codes are used to fingerprint digital data. It can prevent copyrighted materials from unauthorized use. In this paper, we study upper and lower bounds for $w$-frameproof codes of length $N$ over an alphabet of size $q$. The upper bound is based on a combinatorial approach and the lower bound is based on a probabilistic construction. Both bounds can improve previous results when $q$ is small compared to $w$, say $cq\leq w$ for some constant $c\leq q$. Furthermore, we pay special attention to binary frameproof codes. We show a binary $w$-frameproof code of length $N$ can not have more than $N$ codewords if $N<\binom{w+1}{2}$.
△ Less
Submitted 21 November, 2014;
originally announced November 2014.