A Capacity-Achieving T -PIR Scheme Based On MDS Array Codes
|
|
- Crystal Ryan
- 5 years ago
- Views:
Transcription
1 A Capacty-Achevng T -PIR Scheme Based On MDS Array Codes Jnge Xu, Yaqan Zhang, Zhfang Zhang KLMM, Academy of Mathematcs and Systems Scence, Chnese Academy of Scences, Bejng , Chna School of Mathematcal Scences, Unversty of Chnese Academy of Scences, Bejng , Chna Emals: xujnge14@mals.ucas.edu.cn, zhangyaqan15@mals.ucas.ac.cn, zfz@amss.ac.cn arxv: v1 [cs.it] 17 Jan 2019 Abstract Suppose a database contanng M records s replcated n each of N servers, and a user wants to prvately retreve one record by accessng the servers such that dentty of the retreved record s secret aganst any up to T servers. A scheme desgned for ths purpose s called a T -prvate nformaton retreval (T -PIR) scheme. In ths paper we focus on the feld sze of T -PIR schemes. We desgn a general capacty-achevng T -PIR scheme whose queres are generated by usng some MDS array codes. It only requres feld sze q l N, where l = mn{t M 2,(n t) M 2 }, t = T/gcd(N,T), n = N/gcd(N,T) and has the optmal sub-pacetzaton Nn M 2. Comparng wth exstng capacty-achevng T -PIR schemes, our scheme has the followng advantage, that s, ts feld sze monotoncally decreases as the number of records M grows. In partcular, the bnary feld s suffcent for buldng a capacty-achevng T-PIR scheme as long as M 2+ log µ log 2 N, where µ = mn{t,n t} > 1. I. INTRODUCTION Prvate nformaton retreval (PIR) s a canoncal problem n the study of prvacy ssues that arse from the retreval of nformaton from publc databases. Typcally, a PIR model nvolves a database contanng M records stored across N servers and a user who wants to prvately retreve one record by accessng the servers. Specfcally, the prvacy requrement means any colludng subset contanng no more than T servers nows nothng about dentty of the retreved record. Snce t s closely related to cryptography [1] and codng theory [2], PIR has become a central research topc n the computer scence lterature snce t was frst ntroduced by Chor et al. [3] n The effcency of PIR scheme s characterzed by ts rate. Specfcally, the rate of a PIR scheme s measured as the rato between the retreved data sze and the downloaded sze, and the capacty s defned as the supremum of the rate over all PIR schemes. Recently, much wor has been done on determnng the capacty of PIR n varous cases. Sun and Jafar derved that the capacty for the non-colludng servers (.e., T = 1) s 1 1/N n [4] and further proved that the capacty for the 1 (1/N) M colludng servers (.e., T > 1) s the latter s called T -PIR. They also determned the capacty of PIR wth symmetrc prvacy n [6]. The capacty of PIR wth MDS coded non-colludng servers s determned n [7]. It remans an open problem to determne the capacty of PIR wth MDS coded colludng servers. For non-mds coded 1 T/N n [5]. Moreover, 1 (T/N) M storage, PIR schemes wth colludng or non-colludng servers are presented n [9], [10]. In general, the capacty of PIR s acheved by dvdng each record nto multple sub-pacets and queryng from each server specally desgned combnatons of these subpacets. Therefore, both the number of sub-pacets and the sze of each sub-pacet are mportant metrcs for measurng the mplementaton complexty of a PIR scheme. As to the former, we call the number of sub-pacets contaned n each record as sub-pacetzaton. The optmal sub-pacetzaton for capacty-achevng PIR schemes has been determned n some cases [8], [12], [13]. As to the latter, snce all exstng PIR schemes are lnear schemes over some fnte felds, t s actually about the sze of the feld on whch the PIR scheme can be bult. The man concern of ths wor s to reduce the feld sze for T -PIR schemes whle mantanng the rate achevng the capacty and the optmal sub-pacetzaton. In [5], t requres a feld of sze q = Ω(N 2 T M 2 ) for the capacty-achevng T -PIR scheme. The feld sze s reduced to q = Ω(Nt M 2 ) for the capacty-achevngt -PIR scheme wth optmal sub-pacetzaton n [12], where t = T/gcd(N,T The best nown result of feld sze for capacty-achevng T - PIR scheme s q = Ω(N) n [14]. But the feld sze s stll unfrendly wth the growth of the number of servers. The man contrbuton of ths wor conssts of desgnng a T -PIR scheme that smultaneously acheves the capacty and the optmal sub-pacetzatonnn M 2 over a fnte feld F q for all possble parameters (N,T,M), and t requres the feld sze q l N, where l = mn{t M 2,(n t) M 2 },n = N/gcd(N,T),t = T/gcd(N,T When l = 1, the constrant of the feld sze n our scheme degenerates nto q N, whch s the same wth that of the capacty-achevng T -PIR scheme n [14]. When l > 1, the bnary feld s suffcent for buldng a capacty-achevng T -PIR scheme provded M 2+ log µ log 2 N, where µ = mn{t,n t}. Reference Feld sze(q) Sun et al. [5] q max{n 2 T M 2,N 2 (N T) M 2 } Zhang et al. [11] q max{nnt M 2,Nn(n t) M 2 } Zhang et al. [12] q max{nt M 2,N(n t) M 2 } Xu et al. [14] q N Ths paper q l N,l = mn{t M 2,(n t) M 2 } Table 1: A lst of all exstng capacty-achevng T -PIR schemes wth T 2. And N n = gcd(n,t),t = T gcd(n,t).
2 Comparng wth all exstng capacty-achevng T -PIR schemes wth T 2 n [5], [11], [12], [14], as dsplayed n Table 1, the man dfference n our scheme s to employ MDS array codes to generate queres, whch s a ey dea for reducng the feld sze. Moreover, an advantage of our scheme s that ts feld sze monotoncally decreases as the number of records M grows. The rest of ths paper s organzed as follows. Frst, the T - PIR model s formally ntroduced and the MDS array code s defned n Secton II. Then n Secton III an example of the T -PIR scheme s presented to explan the desgn dea. The recovery property of MDS array codes s proved and the general descrptons of our scheme are gven n Secton IV. Fnally, Secton V concludes the paper. II. PRELIMINARIES A. Notatons and the T -PIR model For an nteger n N, we denote by [n] the set {1,..., n}. For a vector u = (u 1,...,u n ) and a subset Γ = { 1,..., m } [n], denote u Γ = (u 1,...,u m Most vectors n ths paper are row vectors and they are denoted by the bold lowercase letters (eg. a,b For a bloc matrx A = (A (1),A (2),...,A (N) ) and Γ = { 1,..., m } [N], denote A Γ = (A (1),...,A (m) Suppose there are M records W 1,...,W M and N servers Serv (1),...,Serv (N), each server stores all the M records. Moreover, the records are ndependent and each can be seen as an L-length vector over F q. Then suppose a user wants to prvately retreve W θ for some θ [M]. Formally, a T -PIR scheme conssts of two phases: Query phase. Gven θ [M], the user generates the query Que(θ,S) = (Q (1) θ,...,q(n) θ ), and sends Q (j) θ to Serv (j) for1 j N, wheres are some random resources prvately chosen by the user. Note that Que(, ) s the query functon defned by the scheme. Response phase. After recevng Q (j) θ, the Serv(j) computes the answers Ans (j) (Q (j) θ,w [M]) = A (j) θ for 1 j N, and sends t bac to the user, where Ans (j) (, ) s the answer functon defned by the scheme. Moreover the functons Que(, ) and Ans (j) (, ),1 j N must satsfy the followng two condtons: (1) Correctness: The user can reconstruct W θ after collectng all answers from the N servers,.e., H(W θ A [N] θ,q[n] θ,s,θ)=0, where H( ) s the condtonal entropy. (2) Prvacy: For any Γ [N] wth Γ =T, the serves n Γ can t obtan any nformaton on θ even f they collude wth each other,.e., I(θ;Q Γ θ,a Γ θ,w [M] ) = 0, where I( ; ) denotes the mutual nformaton. Defne the rate R of a T -PIR scheme by R = H(W θ ) N =1 H(A() θ ), that s, R characterzes the amount of retreved nformaton per unt of downloaded data. Furthermore, the capacty of T -PIR s defned by the largest rate over all achevable T - PIR schemes, denoted by C T -PIR. By [5], t has that C T -PIR = 1 T/N 1 (T/N) M. B. MDS Array Codes In ths secton we ntroduce MDS array code used n ths paper and then gve a method to construct such code over F q. Suppose N > T 1 and N,T are two postve ntegers. For a lnear [N,T] code C over F q l, a codeword c = (c 1,c 2,...,c N ) can be seen as an Nl-length vector c = (c 1,c 2,...,c N ) over F q,.e., for [N], the code bloc c = (c,1,c,2,...,c,l ) F l q denotes the l-length vector correspondng to the symbol c F q l. So we call the code C a lnear array code overf q, and refer to the code as an(n,t;l) q lnear array code. Equvalently, an (N,T;l) q lnear array code can be defned by a Tl Nl full ran matrx G over F q as follows, C = {c = (m 1,m 2,...,m T )G : (m 1,m 2,...,m T ) F Tl q }. The matrx G s called a generator matrx of the array code C. Then the generator matrx G can be vewed as a bloc matrx G = (G (1) For [N], the Tl l sub-matrx G () s represented as the thc column assocated wth the th code bloc n the codewords of C. Defnton 1. (MDS Array Codes) A lnear array code C over F q s called an (N,T;l) MDS array code f ts generator matrx G = (G (1) ) Fq Tl Nl has the followng MDS property: Γ [N] wth Γ = T,ran(G Γ ) = Tl (1) where G () F Tl l q for [N] and T < N. By the defnton of (N,T;l) MDS array code C, t degenerates nto a MDS code over F q for l = 1. Next we gve a method to construct an (N,T;l) MDS array code. Suppose α s a prmtve element of F q l, then F q l = {α j : 0 j q l 2} {0}. Suppose m(x) s the mnmal polynomal of α over F q. Let C F l l q be the companon matrx of m(x) and F = {C j : j Z} {0}. Then F s a fnte feld of sze q l and the map whch s defned by ϕ(α j ) = C j and ϕ(0) = 0 s a feld somorphsm from F q l to F by [15]. Let G = (α,j) F T N be a generator matrx of an q l [N,T] MDS code over F q l. Note that each symbol of F q l can be represented as an l l matrx n F over F q by usng the feld somorphsm ϕ( ), then the matrx G can be seen as an T N bloc matrx G,.e., G = (ϕ(α,j )) [T],j [N], and each thc column s an Tl l matrx over F q. It s easy to verfy that for any Γ [N] wth Γ = T, det((ϕ(α,j )) [T],j Γ ) = ϕ(det((α,j ) [T],j Γ )) 0. Hence the lnear array code whch s defned by the generator matrx G over F q s an (N,T;l) MDS array code. Then we can drectly obtan the followng theorem.
3 Theorem 2. Supposeq s a power of a prme and N,T,l N wth N > T 2. If q l N, then there exsts an (N,T;l) MDS array code over F q. Recall that for exstng capacty-achevng T -PIR schemes n [5], [11], [12], some [Nl,Tl ] MDS codes over F q are used to construct the query. And all Nl symbols of each codeword are equally dvded nto N blocs. Then ths MDS code can be seen as an (N,T;l ) MDS array code over F q. Based on ths observaton, we fnd a drecton to reduce the feld sze. That s, we generate the query by usng some MDS array codes over a smaller fnte feld rather than MDS codes. Moreover, the MDS array codes need to satsfy some specal property that s determned by the correctness condton. To formally llustrate ths dea, we wll gve an example n the next secton. III. EXAMPLE FOR N = 5,T = 3,M = 3 Before constructng our schemes, we frst gve an example by usng the method descrbed n [12]. And then, we explan how to reduce the feld sze by modfyng ths scheme. Example 1. Suppose M = 3, N = 5 and T = 3. The feld sze q 15 s enough and the sub-pacetzaton of ths case s L = N M 1 = 25, so each record can be seen as a 25- dmensonal vector over F q,.e., W 1,W 2,W 3 F 25 q. WLOG, suppose W 1 s the desred record,.e., θ = 1. Let S 1,S 2,S 3 be three matrces chosen by the user ndependently and unformly from all nvertble matrces over F q. Actually, S 1,S 2 and S 3 are the random resources prvately held by the user. Then, defne (a 1,a 2,...,a 25 ) = W 1 S 1 (b 1,b 2,...,b 25 ) = W 2 S 2 [:,(1 : 15)]G (c 1,c 2,...,c 25 ) = W 3 S 3 [:,(1 : 15)]G where S [:,(1 : 15)] denotes the 25 ( 15 matrx ) formed by G1 0 the frst 15 columns of S and G = 0 G. Moreover, 2 G 1 F 9 15 q s a generator matrx of an [15,9] MDS code and G 2 Fq 6 10 s a generator matrx of an [10,6] MDS code over F q. It can be seen that the answers are all sums of the symbols a,b,c n Fg.1. For each sum x n Fg.1, we defne ts support as a subset of [3] and ths subset s composed of the label of all terms n the sum x, denoted by supp(x For example, supp(a ) = {1},supp(b + c j ) = {2,3}. For any Λ [3], a sum x n Fg.1 s called an Λ-type sum f Λ = supp(x For Λ [M] {θ}, defne Λ = Λ {θ} and call Λ-type sums as nterference. Let γ () be the number of Λ-type sums n Serv () for each -subset Λ [3] and [5]. Now we show the scheme satsfes the correctness condton and the prvacy condton. Recall the suffcent condtons for the correctness (s1) requrement n [12], that s, for any Λ [M] {θ}, the nterference parts of all Λ-type sums can be lnearly expressed by the Λ-type sums whch appears n all servers. For Λ [M] {θ}, we collect all Λ-type sums and the nterference parts of all Λ-type sums to form a matrx and (2) Serv (1) Serv (2) Serv (3) Serv (4) Serv (5) a 1 a 4 a 7 a 10,a 11,a 12 a 13,a 14,a 15 b 1 b 4 b 7 b 10,b 11,b 12 b 13,b 14,b 15 c 1 c 4 c 7 c 10,c 11,c 12 c 13,c 14,c 15 a 2 +b 2 a 5 +b 5 a 8 +b 8 a 3 +b 3 a 6 +b 6 a 9 +b 9 a 16 +c 2 a 18 +c 5 a 20 +c 14 a 17 +c 3 a 19 +c 6 a 21 +c 15 b 16 +c 16 b 18 +c 18 b 20 +c 20 b 17 +c 17 b 19 +c 19 b 21 +c 21 a 22 +b 22 +c 22 a 23 +b 23 +c 23 a 24 +b 24 +c 24 a 25 +b 25 +c 25 Fg. 1: Answers of the (N = 5,T = 3,M = 3) PIR scheme for retrevng W 1. call ths matrx as the dstrbuton matrx of Λ-type sums. For example, for {2}-type sums {b }, ts dstrbuton matrx has the followng form, b 1 b 4 b 7 b 10 b 13 b 2 b 5 b 8 b 11 b 14. (3) b 3 b 6 b 9 b 12 b 15 where the bold symbols are all {2}-type sums and the rest are the nterference parts of all {2, 3}-type sums. Smlarly, the dstrbuton matrx of {2,3}-type sums {b +c j } s ( ) b16 +c 16 b 18 +c 18 b 20 +c 20 b 22 +c 22 b 24 +c 24 b 17 +c 17 b 19 +c 19 b 21 +c 21 b 23 +c 23 b 25 +c 25. (4) Then by the MDS property of G 1 and G 2, the coordnates labeled by the bold symbols n (3) and (4) form an nformaton set of G 1 and G 2, respectvely. That s, the rest symbols can be recovered by the bold symbols n (3) and (4), respectvely. Note that for any -subset Λ [M] {θ}, the dstrbuton matrx of Λ-type sums n Fg.1 has a smlar form, as the matrx (3) or (4), so the nterference parts of all Λ-type sums can be recovered by all Λ-type sums appeared n 5 columns. Hence ths scheme satsfes the condton (s1) n [12],.e, the correctness condton s guaranteed. As to the prvacy, recall the suffcent condtons for the prvacy (s2) requrement n [12], t s suffcent to ensure that for any Λ [M] {θ}, there are the same number of ndependent symbols contaned n any 3 columns of Λ-type sums dstrbuton matrx (.e., (3) or (4) Actually ths s guaranteed by the MDS property of the lnear code whch s used to generate such type nterference. Thus the prvacy condton s guaranteed. Moreover the desred record conssts of 25 symbols whle the answers totally contan 49 symbols, so the scheme has rate attanng the capacty for ths case The feld sze reles on the maxmum length of the MDS codes used n ths scheme, so t requresq 15 n Example 1. Note that for any Λ-type nterference, f ts dstrbuton matrx s a codeword of some MDS array code, then there are also the same number of ndependent symbols contaned n any 3 columns of ts dstrbuton matrx. For example, suppose Λ = {2}, the matrx (3) can be vewed as a codeword of an
4 (5, 3; 3) MDS array code. Smlarly, the [10, 6] MDS code also can be vewed as an (5,3;2) MDS array code. So f we adopt (5,3;3) and (5,3;2) MDS array codes rather than [15,9] and [10, 6] MDS codes, then the new obtaned scheme also satsfes the T -prvacy condton. However, there s a problem that how to guarantee the correctness condton. So the MDS array codes have to satsfy some property determned by the correctness condton. More precsely, for any -subset Λ of [M] {θ} and MDS array code correspondng to the Λ-type sums, denoted by (5,3;l ), ts generator matrx needs to have the followng recovery property: (a1) for th thc column, there are γ () columns whch are (a2) used to generate the Λ-type sums, and the rest γ () +1 columns are used to generate Λ-type sums, that s, l = γ () +γ() +1. All these N =1 γ() = Tl. columns have full column ran, that s, N =1 γ() Now we gve two admssble matrces G 1 F , G 2 F That s, G 1 = , G 2 = Then one can verfy that the columns labeled by {1,4,7,10,11,12,13,14,15} n G 1 have full column ran and the columns labeled by {1,2,3,4,5,6} n G 2 also have full column ran. Hence G 1 and G 2 satsfy the recovery property. Actually, G1 s obtaned by applyng the method n Theorem 2 to a generator matrx of an [5, 3] Generalzed Reed-Solomon code over F 2 3 and rearrangng the order of columns n each thc column by multplyng some 3 3 permutaton matrx. Smlarly, G2 s obtaned by usng the same method to a generator matrx of a[5, 3] doubly-extended Generalzed Reed- Solomon code overf 2 2. Then the MDS property of G 1 and G 2 s also satsfed. Therefore, the new scheme obtaned by usng G to replace G n (2) s a capacty-achevng T -PIR scheme wth optmal sub-pacetzaton, where G = ) ( G1 0. Note 0 G 2 that the feld sze s reduced to 2. As dsplayed n the example, the man desgn dea behnd our scheme s to mae each (N,T;l ) MDS array code correspondng to Λ-type nterference n the scheme satsfy the recovery property for any -subset Λ of [M] {θ} and some fxed γ (1),...,γ(N). Fortunately, we prove that every MDS array code trvally satsfes the recovery property by Lemma 3 n Secton IV-A. IV. THE GENERAL T -PIR SCHEME BASED ON MDS ARRAY CODES In ths secton we frst characterze the recovery property of MDS array codes and then descrbe our general capactyachevng T -PIR scheme based on MDS array codes. A. The Recovery property of MDS array code Lemma 3. Suppose G = (G (1) ) Fq Tl Nl s a generator matrx of an (N,T;l) MDS array code over F q, where G () = (g () 1,...,g() l ) FTl l q s a Tl-length column vector. Then for any (m 1,...,m N ) {0,1,...,l} N and g () j wth N =1 m = Tl, there exst N subsets,..., of [l] wth Γ = m such that ran(g (1) ) = Tl. Proof. For any fxed (m 1,...,m N ) wth N =1 m = Tl, there exst at least T nonzero numbers of them. Wthout loss of generalty, we may assume that m 0,1 N. Because that f m = 0, the new matrx obtaned by deletng the thc bloc columng () s also a generator matrx of an(n 1,T;l) MDS array code. Let b(m 1,m 2,...,m N) = max ran(g (1) Γ,..., [l], 1 Γ =m,1 N. Then there exst N subsets,..., of [l] wth Γ = m such that b = ran(g (1) Choose a maxmum lnearly ndependent subset of the vectors {G (1) }, denoted by {G () : [N]}, then b = ran(g (1) ), where Γ for 1 2 N [N] and N =1 Γ(1) = b. Then t s suffcent to show that b = Tl. On the contrary, we assume that b < T l. Let V = Cspan(G (1) ), where Cspan( ) denotes the lnear space spanned by all columns of the matrx over F q. Then dmv = b < Tl and {G () : [N]} s a base of the vector space V. To derve a contradcton, we assume the followng clam has been proved. Clam : f b < Tl, then for 1 f T, there exst f dsjont nonempty subsets X 1,...,X f of [N] such that u f =1 X, j [l],g (u) Partcularly, let f = T. Then t follows from the Clam that there exst T dsjont nonempty subsets X 1,...,X T of [N] such that u T =1 X, j [l],g (u) Hence ran(g (u) : u T =1 X ) dmv = b. On the other hand, note that T =1 X = T =1 X T. Combnng wth the MDS property of G, then ran(g (u) : u T =1 X ) = Tl. So one can obtan that Tl b < Tl, a contradcton. To complete the proof, t remans to prove the Clam. Now we prove t by nducton on f. For f = 1, let X 1 = { [N] : Γ }. Snce b < Tl, then X 1 1. For any u X 1, t s suffcent to show that
5 for j [l] Γ u, g (u) j V. Then choosng a m u -subset Γ u of [l] such that u {j} Γ u, one can obtan that V Cspan(G (1) Γ,G(u+1) u Γ u+1 By the defnton of b(m 1,m 2,...,m N ), t holds that ran(g (1) Γ,G(u+1) u Γ u+1 ) b = dmv, whch mples that V = Cspan(G (1) Γ,G(u+1) u Γ u+1 Hence, g (u) Suppose that there exst f 1 dsjont nonempty subsets X 1,...,X f 1 of [N] such that f 1 u X, j [l],g (u) =1 Consder the case f, note that ran(g (u) : u f 1 =1 X ) dmv = b < Tl. By the MDS property (1) of G, then the f 1 =1 X < T, whch mples that the vectors {g (u) j : u f 1 =1 X,j [l]} are lnearly ndependent over F q, so are the vectors {g (u) j : u f 1 =1 X,j Γ u }. Therefore the vectors can extend to be a base of V. Then there exst Γ (f) Γ for 1 N and Γ (f) u = Γ u for u f 1 =1 X such that {G () : [N]} s a base of the vector space V. Let X Γ (f) f = { [N] : Γ (f) Γ }. Then X f, otherwse dmv = N =1 Γ = Tl. By the defnton of X f, one can obtan that X f ( f 1 =1 X) =, that s, such f subsets X, [f] are dsjont. Smlarly, by usng the same way n the case f = 1, one can obtan that u X f, j [l],g (u) Remar 1. Usng the notatons ntroduced above, we may assume that for any fxed (m 1,m 2,...,m N ) wth N =1 m = Tl, Γ = {1,2,...,m }, [N] n a generator matrx of the (N,T;l) MDS array code. Ths s because that we can rearrange the order of l columns n each thc column by multplyng some l l permutaton matrx. B. Formal Descrpton of the general scheme Our scheme can be obtaned by modfyng the capactyachevng T -PIR schemes n [12]. As n Example 1, we replace M 1 MDS codes wth some M 1 MDS array codes. Next we gve these M 1 desred MDS array codes. Specally, for 1 M 1, the th MDS code defned by the generator matrx G n [12] has the parameters [ N T (Tα + (N T)β ),Tα + (N T)β ] over F q, where α,β are defned as n the denttes (35),(36) n [12]. Note that Tα + (N T)β = T(n t) 1 t M 1, and defne l = (n t) 1 t M 1, where t = T/gcd(N,T), n = N/gcd(N,T Then for 1 M 1, the th MDS code can be vewed as an (N,T;l ) MDS array code. By Lemma 3, one can choose a generator matrx G of an (N,T;l ) MDS array code whch has the recovery property for (γ (1),...,γ(N) ), where γ () = α for 1 T and γ () = β for T +1 N. Then these M 1 matrces G are desred. One can verfy that the new scheme satsfes the correctness condton and T -prvacy condton, whch are guaranteed by the recovery property and MDS property of all M 1 MDS array codes, respectvely. Moreover, the new scheme doesn t change the sub-pacetzaton of records and download sze. Therefore the new scheme has the hghest rate and the optmal sub-pacetzaton. Note that there are M 1 MDS array codes used n our scheme over F q, by Theorem 2 t only needs to requres that for 1 M 1, q l N. That s, q l N, where l = mn{t M 2,(n t) M 2 }. V. CONCLUSION In ths paper we buld a general capacty-achevng T -PIR scheme based on MDS array codes overf q, that s, the queres are generated by usng M 1 MDS array codes rather than MDS codes. It requres the feld sze q l N and has optmal sub-pacetzaton. In partcular, the bnary feld s enough to buld our scheme as long as M 2+ log µ log 2 N, where µ = mn{t,n t} > 1. REFERENCES [1] A. Bemel, Y. Isha, E. Kushlevtz, and I. Orlov, Share converson and prvate nformaton retreval, n Proc. 27th Annu. Conf. Comput. Complex., pp , Jun [2] S. Yehann, Locally Decodable Codes and Prvate Informaton Retreval Schemes, Ph.D. dssertaton, Massachusetts Insttute of Technology, [3] B. Chor, E. Kushlevtz, O. Goldrech, M. Sudan, Prvate nformaton retreval, Proc. 36-th IEEE Symposum on Foundatons of Computer Scence, pp.41 50, [4] H. Sun, S. A. Jafar, The capacty of prvate nformaton retreval, IEEE Trans. on Inf. Theory, vol.63, no.7, pp , Jul [5] H. Sun, S. A. Jafar, The capacty of prvate nformaton retreval wth colludng databases, IEEE Global Conference on Sgnal and Informaton Processng (GlobalSIP), pp , [6] H. Sun, S. A. Jafar, The Capacty of Symmetrc Prvate Informaton Retreval, IEEE Globecom Worshops (GC Wshps), pp.1 5, [7] K. Banawan and S. Uluus, The capacty of prvate nformaton retreval from coded databases, IEEE Trans Inf Theory, vol.64 no.3, pp , Mar [8] H. Sun, S. A. Jafar, Optmal Download Cost of Prvate Informaton Retreval for Arbtrary Message Length, IEEE Transactons on Informaton Forenscs and Securty, vol.12, no.12, pp ,2017 [9] H.-Y. Ln, S. Kumar, E. Rosnes, and A. Graell Amat, An MDS- PIR Capacty-Achevng Protocol for Dstrbuted Storage Usng Non- MDS Lnear Codes, Proceedngs of IEEE Internatonal Symposum on Informaton Theory (ISIT), July 2018, pp [10] R. Frej-Hollant, O. W. Gnle, C.Hollant, et al. t-prvate Informaton Retreval Schemes Usng Transtve Codes, IEEE Transactons on Informaton Theorey, DOI /TIT [11] Ywe Zhang and Gennan Ge, A general prvate nformaton retreval scheme for MDS coded databases wth colludng servers. arxv: [12] Zhfang Zhang and Jnge Xu, The Optmal Sub-Pacetzaton of Lnear Capacty-Achevng PIR Schemes wth Colludng Servers, IEEE Transacton on Informaton Theory, DOI /TIT [13] Jnge Xu and Zhfang Zhang, On sub-pacetzaton and access number of capacty-achevng PIR schemes for MDS coded noncolludng servers, Scence Chna Informaton Scence, 2018, Vol. 61 (10), pp [14] Jnge Xu and Zhfang Zhang, Buldng Capacty-Achevng PIR Schemes wth Optmal Sub-Pacetzaton over Small Felds, Proceedngs of IEEE Internatonal Symposum on Informaton Theory (ISIT), July 2018, pp [15] R. Ldl and H. Nederreter, Introducton to fnte felds and ther applcatons, Cambrdge Unversty Press, Cambrdge, UK (1994
Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationSL n (F ) Equals its Own Derived Group
Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu
More informationComposite Hypotheses testing
Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter
More informationExact-Regenerating Codes between MBR and MSR Points
Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationA CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS
Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More informationBOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS
BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationAnti-van der Waerden numbers of 3-term arithmetic progressions.
Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationRefined Coding Bounds for Network Error Correction
Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationMATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS
MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS These are nformal notes whch cover some of the materal whch s not n the course book. The man purpose s to gve a number of nontrval examples
More informationEdge Isoperimetric Inequalities
November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary
More informationfind (x): given element x, return the canonical element of the set containing x;
COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:
More informationPerfect Competition and the Nash Bargaining Solution
Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange
More information= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system.
Chapter Matlab Exercses Chapter Matlab Exercses. Consder the lnear system of Example n Secton.. x x x y z y y z (a) Use the MATLAB command rref to solve the system. (b) Let A be the coeffcent matrx and
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationNP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More informationLINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity
LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have
More informationLecture 4: Constant Time SVD Approximation
Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),
More informationPerron Vectors of an Irreducible Nonnegative Interval Matrix
Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationGraph Reconstruction by Permutations
Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)
ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationDIFFERENTIAL FORMS BRIAN OSSERMAN
DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne
More informationA Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function
A Local Varatonal Problem of Second Order for a Class of Optmal Control Problems wth Nonsmooth Objectve Functon Alexander P. Afanasev Insttute for Informaton Transmsson Problems, Russan Academy of Scences,
More informationDISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization
DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationNOTES ON SIMPLIFICATION OF MATRICES
NOTES ON SIMPLIFICATION OF MATRICES JONATHAN LUK These notes dscuss how to smplfy an (n n) matrx In partcular, we expand on some of the materal from the textbook (wth some repetton) Part of the exposton
More informationEigenvalues of Random Graphs
Spectral Graph Theory Lecture 2 Egenvalues of Random Graphs Danel A. Spelman November 4, 202 2. Introducton In ths lecture, we consder a random graph on n vertces n whch each edge s chosen to be n the
More informatione - c o m p a n i o n
OPERATIONS RESEARCH http://dxdoorg/0287/opre007ec e - c o m p a n o n ONLY AVAILABLE IN ELECTRONIC FORM 202 INFORMS Electronc Companon Generalzed Quantty Competton for Multple Products and Loss of Effcency
More informationComments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards
Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com
More informationRandom Walks on Digraphs
Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected
More informationLinear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.
Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +
More informationHMMT February 2016 February 20, 2016
HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,
More informationAmusing Properties of Odd Numbers Derived From Valuated Binary Tree
IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree
More informationComplete subgraphs in multipartite graphs
Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More informationTHE WEIGHTED WEAK TYPE INEQUALITY FOR THE STRONG MAXIMAL FUNCTION
THE WEIGHTED WEAK TYPE INEQUALITY FO THE STONG MAXIMAL FUNCTION THEMIS MITSIS Abstract. We prove the natural Fefferman-Sten weak type nequalty for the strong maxmal functon n the plane, under the assumpton
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationYong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )
Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often
More informationChapter 7 Channel Capacity and Coding
Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models
More informationRecover plaintext attack to block ciphers
Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationAn Introduction to Morita Theory
An Introducton to Morta Theory Matt Booth October 2015 Nov. 2017: made a few revsons. Thanks to Nng Shan for catchng a typo. My man reference for these notes was Chapter II of Bass s book Algebrac K-Theory
More informationThe Expectation-Maximization Algorithm
The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.
More informationApplication of B-Spline to Numerical Solution of a System of Singularly Perturbed Problems
Mathematca Aeterna, Vol. 1, 011, no. 06, 405 415 Applcaton of B-Splne to Numercal Soluton of a System of Sngularly Perturbed Problems Yogesh Gupta Department of Mathematcs Unted College of Engneerng &
More informationCHAPTER III Neural Networks as Associative Memory
CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people
More informationAn efficient algorithm for multivariate Maclaurin Newton transformation
Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,
More informationLecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.
prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove
More informationEntropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or
Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda
More informationThe Degrees of Nilpotency of Nilpotent Derivations on the Ring of Matrices
Internatonal Mathematcal Forum, Vol. 6, 2011, no. 15, 713-721 The Degrees of Nlpotency of Nlpotent Dervatons on the Rng of Matrces Homera Pajoohesh Department of of Mathematcs Medgar Evers College of CUNY
More informationErdős-Burgess constant of the multiplicative semigroup of the quotient ring off q [x]
Erdős-Burgess constant of the multplcatve semgroup of the quotent rng off q [x] arxv:1805.02166v1 [math.co] 6 May 2018 Jun Hao a Haol Wang b Lzhen Zhang a a Department of Mathematcs, Tanjn Polytechnc Unversty,
More informationCommunication Complexity 16:198: February Lecture 4. x ij y ij
Communcaton Complexty 16:198:671 09 February 2010 Lecture 4 Lecturer: Troy Lee Scrbe: Rajat Mttal 1 Homework problem : Trbes We wll solve the thrd queston n the homework. The goal s to show that the nondetermnstc
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationFINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN
FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationHomework Notes Week 7
Homework Notes Week 7 Math 4 Sprng 4 #4 (a Complete the proof n example 5 that s an nner product (the Frobenus nner product on M n n (F In the example propertes (a and (d have already been verfed so we
More informationn ). This is tight for all admissible values of t, k and n. k t + + n t
MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what
More informationAppendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis
A Appendx for Causal Interacton n Factoral Experments: Applcaton to Conjont Analyss Mathematcal Appendx: Proofs of Theorems A. Lemmas Below, we descrbe all the lemmas, whch are used to prove the man theorems
More informationMEM 255 Introduction to Control Systems Review: Basics of Linear Algebra
MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A
More informationSingular Value Decomposition: Theory and Applications
Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real
More information8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars
More informationOn the correction of the h-index for career length
1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat
More informationDeterminants Containing Powers of Generalized Fibonacci Numbers
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol 19 (2016), Artcle 1671 Determnants Contanng Powers of Generalzed Fbonacc Numbers Aram Tangboonduangjt and Thotsaporn Thanatpanonda Mahdol Unversty Internatonal
More informationThe L(2, 1)-Labeling on -Product of Graphs
Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh
More informationEstimation: Part 2. Chapter GREG estimation
Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More informationMath 217 Fall 2013 Homework 2 Solutions
Math 17 Fall 013 Homework Solutons Due Thursday Sept. 6, 013 5pm Ths homework conssts of 6 problems of 5 ponts each. The total s 30. You need to fully justfy your answer prove that your functon ndeed has
More informationExample: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,
The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson
More informationAssortment Optimization under MNL
Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationBézier curves. Michael S. Floater. September 10, These notes provide an introduction to Bézier curves. i=0
Bézer curves Mchael S. Floater September 1, 215 These notes provde an ntroducton to Bézer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of
More informationANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)
Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationLecture Space-Bounded Derandomization
Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval
More informationTornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003
Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel
More informationRotation Invariant Shape Contexts based on Feature-space Fourier Transformation
Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,
More information