Skip to main content

Showing 1–50 of 59 results for author: Stinson, D

Searching in archive math. Search in all archives.
.
  1. arXiv:2505.22838  [pdf, ps, other

    math.CO

    A Unified Treatment of Some Classic Combinatorial Inequalities Using the Variance Method

    Authors: Douglas R. Stinson

    Abstract: The "variance method" has been used to prove many classical inequalities in design theory and coding theory. The purpose of this expository note is to review and present some of these inequalities in a unified setting. I will also discuss some examples from my own research where I have employed these techniques.

    Submitted 28 May, 2025; originally announced May 2025.

    MSC Class: 05B05

  2. arXiv:2503.09325  [pdf, ps, other

    math.GR math.CO

    $λ$-fold near-factorizations of groups

    Authors: Donald L. Kreher, Shuxing Li, Douglas R. Stinson

    Abstract: We initiate the study of $λ$-fold near-factorizations of groups with $λ> 1$. While $λ$-fold near-factorizations of groups with $λ= 1$ have been studied in numerous papers, this is the first detailed treatment for $λ> 1$. We establish fundamental properties of $λ$-fold near-factorizations and introduce the notion of equivalence. We prove various necessary conditions of $λ$-fold near-factorizations,… ▽ More

    Submitted 22 April, 2025; v1 submitted 12 March, 2025; originally announced March 2025.

    MSC Class: 05B10

  3. arXiv:2411.15890  [pdf, ps, other

    math.GR math.CO

    Uniqueness and explicit computation of mates in near-factorizations

    Authors: Donald L. Kreher, William J. Martin, Douglas R. Stinson

    Abstract: We show that a "mate'' $B$ of a set $A$ in a near-factorization $(A,B)$ of a finite group $G$ is unique. Further, we describe how to compute the mate $B$ very efficiently using an explicit formula for $B$. We use this approach to give an alternate proof of a theorem of Wu, Yang and Feng, which states that a strong circular external difference family cannot have more than two sets. We prove some ne… ▽ More

    Submitted 24 November, 2024; originally announced November 2024.

    MSC Class: 05B10

  4. arXiv:2411.15884  [pdf, ps, other

    math.GR math.CO

    Near-factorizations of dihedral groups

    Authors: Donald L. Kreher, Maura B. Paterson, Douglas R. Stinson

    Abstract: We investigate near-factorizations of nonabelian groups, concentrating on dihedral groups. We show that some known constructions of near-factorizations in dihedral groups yield equivalent near-factorizations. In fact, there are very few known examples of nonequivalent near-factorizations in dihedral or other nonabelian groups; we provide some new examples with the aid of the computer. We also anal… ▽ More

    Submitted 28 January, 2025; v1 submitted 24 November, 2024; originally announced November 2024.

    MSC Class: 05B10

  5. arXiv:2409.08094  [pdf, ps, other

    math.CO

    Daniel Litt's Probability Puzzle

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: In this expository note, we discuss a ``balls-and-urns'' probability puzzle posed by Daniel Litt.

    Submitted 12 September, 2024; originally announced September 2024.

    MSC Class: 05-01

  6. arXiv:2406.09075  [pdf, ps, other

    math.CO

    Strong External Difference Families and Classification of $α$-valuations

    Authors: Donald L. Kreher, Maura B. Paterson, Douglas R. Stinson

    Abstract: One method of constructing $(a^2+1, 2,a, 1)$-SEDFs (i.e., strong external difference families) in $\mathbb{Z}_{a^2+1}$ makes use of $α$-valuations of complete bipartite graphs $K_{a,a}$. We explore this approach and we provide a classification theorem which shows that all such $α$-valuations can be constructed recursively via a sequence of ``blow-up'' operations. We also enumerate all… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    MSC Class: 05B10; 05C78

  7. arXiv:2405.12820  [pdf, ps, other

    math.CO

    Weak and Strong Nestings of BIBDs

    Authors: Douglas R. Stinson

    Abstract: We study two types of nestings of balanced incomplete block designs (BIBDs). In both types of nesting, we wish to add a point (the nested point) to every block of a $(v,k,λ)$-BIBD in such a way that we end up with a partial $(w,k+1,λ+1)$-BIBD for some $w \geq v$. In the case where $w > v$, we are introducing $w-v$ new points. This is called a weak nesting. A strong nesting satisfies the stronger p… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    MSC Class: 05B05

  8. arXiv:2404.02666  [pdf, ps, other

    math.CO

    Nestings of BIBDs with block size four

    Authors: Marco Buratti, Donald L. Kreher, Douglas R. Stinson

    Abstract: In a nesting of a balanced incomplete block design (or BIBD), we wish to add a point (the \emph{nested point}) to every block of a $(v,k,λ)$-BIBD in such a way that we end up with a partial $(v,k+1,λ+1)$-BIBD. In the case where the partial $(v,k+1,λ+1)$-BIBD is in fact a $(v,k+1,λ+1)$-BIBD, we have a \emph{perfect nesting}. We show that a nesting is perfect if and only if $k = 2 λ+ 1$. Perfect n… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    MSC Class: 05B05

  9. arXiv:2403.17602  [pdf, ps, other

    math.CO

    A method of constructing pairwise balanced designs containing parallel classes

    Authors: Douglas R. Stinson

    Abstract: The obvious way to construct a GDD (group-divisible design) recursively is to use Wilson's Fundamental Construction for GDDs (WFC). Then a PBD (pairwise balanced design) is often obtained by adding a new point to each group of the GDD. However, after constructing such a PBD, it might be the case that we then want to identify a parallel class of blocks. In this short note, we explore some possible… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    MSC Class: 05B05

  10. arXiv:2401.07351  [pdf, ps, other

    math.NT

    On min-base palindromic representations of powers of 2

    Authors: Donald L. Kreher, Douglas R. Stinson

    Abstract: A positive integer $N$ is \emph{palindromic in the base $b$} when $N = \sum_{i=0}^{k} c_i b^i$, $c_k\neq 0$,and $c_i=c_{k-i},\; i=0,1,2,...,k$, Focusing on powers of 2, we investigate the smallest base $b$ when $N=2^n$ is palindromic in the base $b$.

    Submitted 14 January, 2024; originally announced January 2024.

    Comments: 11 pages

    MSC Class: 11B75

  11. arXiv:2310.02810  [pdf, ps, other

    math.CO cs.CR

    Circular external difference families, graceful labellings and cyclotomy

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: (Strong) circular external difference families (which we denote as CEDFs and SCEDFs) can be used to construct nonmalleable threshold schemes. They are a variation of (strong) external difference families, which have been extensively studied in recent years. We provide a variety of constructions for CEDFs based on graceful labellings ($α$-valuations) of lexicographic products… ▽ More

    Submitted 27 October, 2023; v1 submitted 4 October, 2023; originally announced October 2023.

    MSC Class: 05B10; 94A60; 05C78; 11T22

  12. arXiv:2309.00213  [pdf, other

    math.CO

    Bounds on data limits for all-to-all comparison from combinatorial designs

    Authors: Joanne Hall, Daniel Horsley, Douglas R. Stinson

    Abstract: In situations where every item in a data set must be compared with every other item in the set, it may be desirable to store the data across a number of machines in such a way that any two data items are stored together on at least one machine. One way to evaluate the efficiency of such a distribution is by the largest fraction of the data it requires to be allocated to any one machine. The all-to… ▽ More

    Submitted 31 August, 2023; originally announced September 2023.

    Comments: 16 pages, 1 figure

    MSC Class: 68P05 (Primary) 05B40; 05C70 (Secondary)

  13. arXiv:2305.09405  [pdf, ps, other

    cs.CR math.CO

    Unconditionally Secure Non-malleable Secret Sharing and Circular External Difference Families

    Authors: Shannon Veitch, Douglas R. Stinson

    Abstract: Various notions of non-malleable secret sharing schemes have been considered. In this paper, we review the existing work on non-malleable secret sharing and suggest a novel game-based definition. We provide a new construction of an unconditionally secure non-malleable threshold scheme with respect to a specified relation. To do so, we introduce a new type of algebraic manipulation detection (AMD)… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    MSC Class: 05B10; 94A60

  14. arXiv:2301.11713  [pdf, ps, other

    math.CO

    Dispersed graph labellings

    Authors: William J. Martin, Douglas R. Stinson

    Abstract: A $k$-dispersed labelling of a graph $G$ on $n$ vertices is a labelling of the vertices of $G$ by the integers $1, \dots , n$ such that $d(i,i+1) \geq k$ for $1 \leq i \leq n-1$. $DL(G)$ denotes the maximum value of $k$ such that $G$ has a $k$-dispersed labelling. In this paper, we study upper and lower bounds on $DL(G)$. Computing $DL(G)$ is NP-hard. However, we determine the exact values of… ▽ More

    Submitted 15 October, 2023; v1 submitted 27 January, 2023; originally announced January 2023.

    Comments: To be published in Australasian Journal of Combinatorics

    MSC Class: 05C15

  15. arXiv:2211.12367  [pdf, ps, other

    math.CO

    Some new results on skew frame starters in cyclic groups

    Authors: Douglas R. Stinson

    Abstract: In this paper, we study skew frame starters, which are strong frame starters that satisfy an additional "skew" property. We prove three new non-existence results for cyclic skew frame starters of certain types. We also construct several small examples of previously unknown cyclic skew frame starters by computer.

    Submitted 22 November, 2022; originally announced November 2022.

    MSC Class: 05B15

  16. arXiv:2211.10309  [pdf, ps, other

    cs.IT cs.DM math.CO

    Constructions and bounds for codes with restricted overlaps

    Authors: Simon R. Blackburn, Navid Nasr Esfahani, Donald L. Kreher, Douglas R. Stinson

    Abstract: Non-overlapping codes have been studied for almost 60 years. In such a code, no proper, non-empty prefix of any codeword is a suffix of any codeword. In this paper, we study codes in which overlaps of certain specified sizes are forbidden. We prove some general bounds and we give several constructions in the case of binary codes. Our techniques also allow us to provide an alternative, elementary p… ▽ More

    Submitted 22 August, 2023; v1 submitted 18 November, 2022; originally announced November 2022.

    Comments: 17 pages. Theorems etc renumbered

    MSC Class: 94A45

  17. arXiv:2210.00517  [pdf, ps, other

    math.CO

    In the Frame

    Authors: Douglas R. Stinson

    Abstract: In this expository paper, I survey Room frames and Kirkman frames, concentrating on the early history of these objects. I mainly look at the basic construction techniques, but I also provide some historical remarks and discussion. I also briefly discuss some other types of frames that have been investigated as well as some applications of frames to the construction of other types of designs.

    Submitted 2 October, 2022; originally announced October 2022.

    MSC Class: 05B05; 05B15

  18. arXiv:2208.09276  [pdf, ps, other

    math.CO

    Orthogonal and strong frame starters, revisited

    Authors: Douglas R. Stinson

    Abstract: In this paper, I survey frame starters, as well as orthogonal and strong frame starters, in abelian groups. I mainly recall and re-examine existence and nonexistence results, but I will prove some new results as well.

    Submitted 24 August, 2022; v1 submitted 19 August, 2022; originally announced August 2022.

    MSC Class: 05B15

  19. arXiv:2202.06311  [pdf, ps, other

    math.CO

    On maximum parallel classes in packings

    Authors: Douglas R. Stinson, Ruizhong Wei

    Abstract: The integer $β(ρ, v, k)$ is defined to be the maximum number of blocks in any $(v, k)$-packing in which the maximum partial parallel class (or PPC) has size $ρ$. This problem was introduced and studied by Stinson for the case $k=3$. Here, we mainly consider the case $k = 4$ and we obtain some upper bounds and lower bounds on $β(ρ, v, 4)$. We also provide some explicit constructions of $(v,4)$-pack… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

    MSC Class: 05B05

  20. arXiv:2111.05961  [pdf, other

    math.CO cs.CR cs.IT

    Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms

    Authors: Navid Nasr Esfahani, Douglas Stinson

    Abstract: All-or-nothing transforms (AONTs) were originally defined by Rivest as bijections from $s$ input blocks to $s$ output blocks such that no information can be obtained about any input block in the absence of any output block. Numerous generalizations and extensions of all-or-nothing transforms have been discussed in recent years, many of which are motivated by diverse applications in cryptography, i… ▽ More

    Submitted 10 November, 2021; originally announced November 2021.

  21. arXiv:2108.12635  [pdf, other

    math.CO

    An Analysis and Critique of the Scoring Method Used for Sport Climbing at the 2020 Tokyo Olympics

    Authors: Michela J. Stinson, Douglas R. Stinson

    Abstract: Sport climbing was a new Olympic event introduced at the Tokyo 2020 Olympics. It was composed of three disciplines, and the final rankings were determined by computing the product of each climber's rankings in the three disciplines, with the lowest score winning. In this paper, we compare this product-based scoring method with the more usual sum-based method. As well, we propose and analyze a new… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

    MSC Class: 05A99

  22. arXiv:2105.14988  [pdf, other

    math.CO cs.CR

    Asymmetric All-or-nothing Transforms

    Authors: Navid Nasr Esfahani, Douglas R. Stinson

    Abstract: In this paper, we initiate a study of asymmetric all-or-nothing transforms (or asymmetric AONTs). A (symmetric) $t$-all-or-nothing transform is a bijective mapping defined on the set of $s$-tuples over a specified finite alphabet. It is required that knowledge of all but $t$ outputs leaves any $t$ inputs completely undetermined. There have been numerous papers developing the theory of AONTs as wel… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

    MSC Class: 05B30; 94A60

  23. arXiv:2104.11076  [pdf, ps, other

    cs.CR math.CO

    Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: A splitting BIBD is a type of combinatorial design that can be used to construct splitting authentication codes with good properties. In this paper we show that a design-theoretic approach is useful in the analysis of more general splitting authentication codes. Motivated by the study of algebraic manipulation detection (AMD) codes, we define the concept of a group generated splitting authenticati… ▽ More

    Submitted 24 August, 2021; v1 submitted 22 April, 2021; originally announced April 2021.

    MSC Class: 94A62; 05B05; 05B10

  24. arXiv:2103.05697  [pdf, ps, other

    math.CO

    On Security Properties of All-or-nothing Transforms

    Authors: Navid Nasr Esfahani, Douglas R. Stinson

    Abstract: All-or-nothing transforms have been defined as bijective mappings on all s-tuples over a specified finite alphabet. These mappings are required to satisfy certain "perfect security" conditions specified using entropies of the probability distribution defined on the input s-tuples. Alternatively, purely combinatorial definitions of AONTs have been given, which involve certain kinds of "unbiased arr… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

    MSC Class: 05B30 (Primary) 94A60 (Secondary)

  25. arXiv:2007.11033  [pdf, ps, other

    math.CO

    On partial parallel classes in partial Steiner triple systems

    Authors: Douglas R. Stinson

    Abstract: For an integer $ρ$ such that $1 \leq ρ\leq v/3$, define $β(ρ,v)$ to be the maximum number of blocks in any partial Steiner triple system on $v$ points in which the maximum partial parallel class has size $ρ$. We obtain lower bounds on $β(ρ,v)$ by giving explicit constructions, and upper bounds on $β(ρ,v)$ result from counting arguments. We show that $β(ρ,v) \in Θ(v)$ if $ρ$ is a constant, and… ▽ More

    Submitted 21 July, 2020; originally announced July 2020.

    MSC Class: 05B07

  26. arXiv:2007.01908  [pdf, ps, other

    math.CO

    New Results on Modular Golomb Rulers, Optical Orthogonal Codes and Related Structures

    Authors: Marco Buratti, Douglas R. Stinson

    Abstract: We prove new existence and nonexistence results for modular Golomb rulers in this paper. We completely determine which modular Golomb rulers of order $k$ exist, for all $k\leq 11$, and we present a general existence result that holds for all $k \geq 3$. We also derive new nonexistence results for infinite classes of modular Golomb rulers and related structures such as difference packings, optical… ▽ More

    Submitted 11 October, 2020; v1 submitted 3 July, 2020; originally announced July 2020.

    Comments: Typos in Corollary 3.4 were corrected

    MSC Class: 05B10

  27. arXiv:2004.04088  [pdf, ps, other

    math.CO

    On Resolvable Golomb Rulers, Symmetric Configurations and Progressive Dinner Parties

    Authors: Marco Buratti, Douglas R. Stinson

    Abstract: We define a new type of Golomb ruler, which we term a resolvable Golomb ruler. These are Golomb rulers that satisfy an additional "resolvability" condition that allows them to generate resolvable symmetric configurations. The resulting configurations give rise to progressive dinner parties. In this paper, we investigate existence results for resolvable Golomb rulers and their application to the co… ▽ More

    Submitted 14 April, 2020; v1 submitted 8 April, 2020; originally announced April 2020.

    MSC Class: 05B05

  28. arXiv:2001.05394  [pdf, ps, other

    math.CO

    Designing Progressive Dinner Parties

    Authors: Douglas R. Stinson

    Abstract: I recently came across a combinatorial design problem involving progressive dinner parties (also known as safari suppers). In this note, I provide some elementary methods of designing schedules for these kinds of dinner parties.

    Submitted 17 March, 2020; v1 submitted 15 January, 2020; originally announced January 2020.

    Comments: revised version corrects a few small typos and removes the exception in Theorem 3.7

    MSC Class: 05B15

  29. arXiv:1910.05572  [pdf, ps, other

    cs.CR math.CO

    On the equivalence of authentication codes and robust (2,2)-threshold schemes

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: In this paper, we show a "direct" equivalence between certain authentication codes and robust secret sharing schemes. It was previously known that authentication codes and robust secret sharing schemes are closely related to similar types of designs, but direct equivalences had not been considered in the literature. Our new equivalences motivate the consideration of a certain "key-substitution att… ▽ More

    Submitted 12 October, 2019; originally announced October 2019.

    MSC Class: 94A62; 05B05; 05B10

  30. arXiv:1909.09101  [pdf, ps, other

    math.CO

    Block-avoiding point sequencings of Mendelsohn triple systems

    Authors: Donald L. Kreher, Douglas R. Stinson, Shannon Veitch

    Abstract: A cyclic ordering of the points in a Mendelsohn triple system of order $v$ (or MTS$(v)$) is called a sequencing. A sequencing $D$ is $\ell$-good if there does not exist a triple $(x,y,z)$ in the MTS$(v)$ such that (1) the three points $x,y,$ and $z$ occur (cyclically) in that order in $D$; and (2) $\{x,y,z\}$ is a subset of $\ell$ cyclically consecutive points of $D$. In this paper, we prove some… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.

    MSC Class: 05B07

  31. arXiv:1909.06475  [pdf, ps, other

    math.CO

    Good sequencings for small Mendelsohn triple systems

    Authors: Donald L. Kreher, Douglas R. Stinson, Shannon Veitch

    Abstract: A Mendelsohn triple system of order $v$ (or MTS$(v)$) is a decomposition of the complete graph into directed 3-cyles. We denote the directed 3-cycle with edges $(x,y)$, $(y,z)$ and $(z,x)$ by $(x,y,z)$, $(y,z,x)$ or $(z,x,y)$. An $\ell$-good sequencing of a MTS$(v)$ is a permutation of the points of the design, say $[x_1 \; \cdots \; x_v]$, such that, for every triple $(x,y,z)$ in the design, it i… ▽ More

    Submitted 13 September, 2019; originally announced September 2019.

    Comments: 121 pages

  32. arXiv:1907.11186  [pdf, ps, other

    math.CO

    Block-avoiding point sequencings of directed triple systems

    Authors: Donald L. Kreher, Douglas R. Stinson, Shannon Veitch

    Abstract: A directed triple system of order $v$ (or, DTS$(v)$) is decomposition of the complete directed graph $\vec{K_v}$ into transitive triples. A $v$-good sequencing of a DTS$(v)$ is a permutation of the points of the design, say $[x_1 \; \cdots \; x_v]$, such that, for every triple $(x,y,z)$ in the design, it is not the case that $x = x_i$, $y = x_j$ and $z = x_k$ with $i < j < k$. We prove that there… ▽ More

    Submitted 25 July, 2019; originally announced July 2019.

  33. arXiv:1907.11144  [pdf, ps, other

    math.CO

    Good sequencings for small directed triple systems

    Authors: Donald L. Kreher, Douglas R. Stinson, Shannon Veitch

    Abstract: A directed triple system of order $v$ (or, DTS$(v)$) is a decomposition of the complete directed graph $\vec{K_v}$ into transitive triples. An $\ell$-good sequencing of a DTS$(v)$ is a permutation of the points of the design, say $[x_1 \; \cdots \; x_v]$, such that, for every triple $(x,y,z)$ in the design, it is $not$ the case that $x = x_i$, $y = x_j$ and $z = x_k$ with $i < j < k$ and… ▽ More

    Submitted 27 November, 2019; v1 submitted 25 July, 2019; originally announced July 2019.

    Comments: 305 pages

  34. arXiv:1907.04416  [pdf, ps, other

    math.CO cs.DM

    Block-avoiding point sequencings of arbitrary length in Steiner triple systems

    Authors: Douglas R. Stinson, Shannon Veitch

    Abstract: An $\ell$-good sequencing of an STS$(v)$ is a permutation of the points of the design such that no $\ell$ consecutive points in this permutation contain a block of the design. We prove that, for every integer $\ell \geq 3$, there is an $\ell$-good sequencing of any STS$(v)$ provided that $v$ is sufficiently large. We also prove some new nonexistence results for $\ell$-good sequencings of STS$(v)$.

    Submitted 9 July, 2019; originally announced July 2019.

    MSC Class: 05B07

  35. arXiv:1903.08719  [pdf, ps, other

    math.CO

    Nonsequenceable Steiner triple systems

    Authors: Donald L. Kreher, Douglas R. Stinson

    Abstract: A partial Steiner triple system is is $sequenceable$ if the points can be sequenced so that no proper segment can be partitioned into blocks. We show that, if $0 \leq a \leq (n-1)/3$, then there exists a nonsequenceable PSTS$(n)$ of size $\frac{1}{3}\binom{n}{2}-a$, for all $n \equiv 1 \pmod{6}$ except for $n=7$.

    Submitted 20 March, 2019; originally announced March 2019.

  36. arXiv:1901.06754  [pdf, ps, other

    math.CO

    Block-avoiding sequencings of points in Steiner triple systems

    Authors: Donald L. Kreher, Douglas R. Stinson

    Abstract: Given an STS(v), we ask if there is a permutation of the points of the design such that no $\ell$ consecutive points in this permutation contain a block of the design. Results are obtained in the cases $\ell = 3,4$.

    Submitted 14 February, 2019; v1 submitted 20 January, 2019; originally announced January 2019.

    MSC Class: 05B07

  37. arXiv:1812.05147  [pdf, ps, other

    math.CO

    Constructions of optimal orthogonal arrays with repeated rows

    Authors: Charles J. Colbourn, Douglas R. Stinson, Shannon Veitch

    Abstract: We construct orthogonal arrays OA$_λ (k,n)$ (of strength two) having a row that is repeated $m$ times, where $m$ is as large as possible. In particular, we consider OAs where the ratio $m / λ$ is as large as possible; these OAs are termed optimal. We provide constructions of optimal OAs for any $k \geq n+1$, albeit with large $λ$. We also study basic OAs; these are optimal OAs in which… ▽ More

    Submitted 12 December, 2018; originally announced December 2018.

    MSC Class: 05B15

  38. arXiv:1812.05145  [pdf, ps, other

    math.CO

    Bounds for orthogonal arrays with repeated rows

    Authors: Douglas R. Stinson

    Abstract: In this expository paper, we mainly study orthogonal arrays (OAs) of strength two having a row that is repeated $m$ times. It turns out that the Plackett-Burman bound (\cite{PB}) can be strengthened by a factor of $m$ for orthogonal arrays of strength two that contain a row that is repeated $m$ times. This is a consequence of a more general result due to Mukerjee, Qian and Wu \cite{Muk} that appli… ▽ More

    Submitted 12 December, 2018; originally announced December 2018.

    MSC Class: 05B15

  39. arXiv:1811.01766  [pdf, ps, other

    math.CO cs.CR

    A Network Reliability Approach to the Analysis of Combinatorial Repairable Threshold Schemes

    Authors: Bailey Kacsmar, Douglas R. Stinson

    Abstract: A repairable threshold scheme (which we abbreviate to RTS) is a $(τ,n)$-threshold scheme in which a subset of players can "repair" another player's share in the event that their share has been lost or corrupted. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the (unconditional) security of the threshold scheme. Combi… ▽ More

    Submitted 5 November, 2018; originally announced November 2018.

    MSC Class: 05B05

  40. arXiv:1803.04931  [pdf, ps, other

    math.CO

    A polynomial ideal associated to any $t$-$(v,k,λ)$ design

    Authors: William J. Martin, Douglas R. Stinson

    Abstract: We consider ordered pairs $(X,\mathcal{B})$ where $X$ is a finite set of size $v$ and $\mathcal{B}$ is some collection of $k$-element subsets of $X$ such that every $t$-element subset of $X$ is contained in exactly $λ$ "blocks" $B\in \mathcal{B}$ for some fixed $λ$. We represent each block $B$ by a zero-one vector $\mathbf{c}_B$ of length $v$ and explore the ideal $\mathcal{I}(\mathcal{B})$ of pol… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: 26 pages, 1 figure

    MSC Class: 05B05; 05E30

  41. arXiv:1705.06247  [pdf, ps, other

    cs.CR math.CO

    Optimal Ramp Schemes and Related Combinatorial Objects

    Authors: Douglas R. Stinson

    Abstract: In 1996, Jackson and Martin proved that a strong ideal ramp scheme is equivalent to an orthogonal array. However, there was no good characterization of ideal ramp schemes that are not strong. Here we show the equivalence of ideal ramp schemes to a new variant of orthogonal arrays that we term augmented orthogonal arrays. We give some constructions for these new kinds of arrays, and, as a consequen… ▽ More

    Submitted 17 May, 2017; originally announced May 2017.

    MSC Class: 94A62 (Primary) 05B15 (Secondary)

  42. arXiv:1702.06612  [pdf, ps, other

    math.CO cs.CR

    Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

    Authors: Navid Nasr Esfahani, Ian Goldberg, Douglas R. Stinson

    Abstract: A $(t, s, v)$-all-or-nothing transform is a bijective mapping defined on $s$-tuples over an alphabet of size $v$, which satisfies the condition that the values of any $t$ input co-ordinates are completely undetermined, given only the values of any $s-t$ output co-ordinates. The main question we address in this paper is: for which choices of parameters does a $(t, s, v)$-all-or-nothing transform (A… ▽ More

    Submitted 21 February, 2017; originally announced February 2017.

    Comments: 13 pages

  43. arXiv:1610.06432  [pdf, ps, other

    math.CO

    Some Nonexistence Results for Strong External Difference Families Using Character Theory

    Authors: William J. Martin, Douglas R. Stinson

    Abstract: In this paper, we study the existence of $(v,m,k,λ)$-strong external difference families (SEDFs). We use character-theoretic techniques to show that no SEDF exists when $v$ is prime, $k > 1$ and $m > 2$. In the case where $v$ is the product of two distinct odd primes, some necessary conditions are derived, which can be used to rule out certain parameter sets. Further, we show that, when $m=3$ or… ▽ More

    Submitted 23 April, 2017; v1 submitted 20 October, 2016; originally announced October 2016.

    Comments: Revision notes: Result on abelian 2-groups has been retracted. Other minor errors corrected; notational consistency is improved

    MSC Class: 05B10

  44. arXiv:1609.01240  [pdf, ps, other

    math.CO cs.CR

    Combinatorial Repairability for Threshold Schemes

    Authors: Douglas R. Stinson, Ruizhong Wei

    Abstract: In this paper, we consider methods whereby a subset of players in a $(k,n)$-threshold scheme can "repair" another player's share in the event that their share has been lost or corrupted. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the (unconditional) security of the threshold scheme, and it should be efficient, wh… ▽ More

    Submitted 5 September, 2016; originally announced September 2016.

    MSC Class: 94C30; 94A62

  45. arXiv:1510.03655  [pdf, ps, other

    math.CO cs.CR cs.IT

    All or Nothing at All

    Authors: Paolo D'Arco, Navid Nasr Esfahani, Douglas R. Stinson

    Abstract: We continue a study of unconditionally secure all-or-nothing transforms (AONT) begun in \cite{St}. An AONT is a bijective mapping that constructs s outputs from s inputs. We consider the security of t inputs, when s-t outputs are known. Previous work concerned the case t=1; here we consider the problem for general t, focussing on the case t=2. We investigate constructions of binary matrices for wh… ▽ More

    Submitted 14 October, 2015; v1 submitted 13 October, 2015; originally announced October 2015.

    Comments: 23 pages

  46. arXiv:1510.00293  [pdf, ps, other

    cs.IT cs.DM math.CO

    A tight bound on the size of certain separating hash families

    Authors: Chuan Guo, Douglas R. Stinson

    Abstract: In this paper, we present a new lower bound on the size of separating hash families of type {w_1^{q-1},w_2} where w_1 < w_2. Our result extends the paper by Guo et al. on binary frameproof codes. This bound compares well against known general bounds, and is especially useful when trying to bound the size of strong separating hash families. We also show that our new bound is tight by constructing h… ▽ More

    Submitted 1 October, 2015; originally announced October 2015.

  47. arXiv:1506.02711  [pdf, ps, other

    math.CO cs.CR

    Combinatorial Characterizations of Algebraic Manipulation Detection Codes Involving Generalized Difference Families

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes. We prove several lower bounds on the success probability of an adversary and we then give some combinatorial characterizations of AMD codes that meet the bounds with equality. These characterizations involve various types of generalized difference families. Constructing these difference families is… ▽ More

    Submitted 8 June, 2015; originally announced June 2015.

  48. arXiv:1501.06872  [pdf, ps, other

    math.CO

    On Partial Sums in Cyclic Groups

    Authors: D. S. Archdeacon, J. H. Dinitz, A. Mattern, D. R. Stinson

    Abstract: We are interested in ordering the elements of a subset A of the non-zero integers modulo n in such a way that all the partial sums are distinct. We conjecture that this can always be done and we prove various partial results about this problem.

    Submitted 27 January, 2015; originally announced January 2015.

  49. arXiv:1406.6920  [pdf, ps, other

    cs.IT math.CO

    On tight bounds for binary frameproof codes

    Authors: Chuan Guo, Douglas R. Stinson, Tran van Trung

    Abstract: In this paper, we study $w$-frameproof codes, which are equivalent to $\{1,w\}$-separating hash families. Our main results concern binary codes, which are defined over an alphabet of two symbols. For all $w \geq 3$, and for $w+1 \leq N \leq 3w$, we show that an $SHF(N; n,2, \{1,w \})$ exists only if $n \leq N$, and an $SHF(N; N,2, \{1,w \})$ must be a permutation matrix of degree $N$.

    Submitted 26 June, 2014; originally announced June 2014.

  50. arXiv:1403.1468  [pdf, ps, other

    cs.CR math.CO

    Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: We study a method for key predistribution in a network of $n$ users where pairwise keys are computed by hashing users' IDs along with secret information that has been (pre)distributed to the network users by a trusted entity. A communication graph $G$ can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of th… ▽ More

    Submitted 6 March, 2014; originally announced March 2014.