A Capacity-Achieving T -PIR Scheme Based On MDS Array Codes

Size: px
Start display at page:

Download "A Capacity-Achieving T -PIR Scheme Based On MDS Array Codes"

Transcription

1 A Capacty-Achevng T -PIR Scheme Based On MDS Array Codes Jnge Xu, Yaqan Zhang, Zhfang Zhang KLMM, Academy of Mathematcs and Systems Scence, Chnese Academy of Scences, Bejng , Chna School of Mathematcal Scences, Unversty of Chnese Academy of Scences, Bejng , Chna Emals: xujnge14@mals.ucas.edu.cn, zhangyaqan15@mals.ucas.ac.cn, zfz@amss.ac.cn arxv: v1 [cs.it] 17 Jan 2019 Abstract Suppose a database contanng M records s replcated n each of N servers, and a user wants to prvately retreve one record by accessng the servers such that dentty of the retreved record s secret aganst any up to T servers. A scheme desgned for ths purpose s called a T -prvate nformaton retreval (T -PIR) scheme. In ths paper we focus on the feld sze of T -PIR schemes. We desgn a general capacty-achevng T -PIR scheme whose queres are generated by usng some MDS array codes. It only requres feld sze q l N, where l = mn{t M 2,(n t) M 2 }, t = T/gcd(N,T), n = N/gcd(N,T) and has the optmal sub-pacetzaton Nn M 2. Comparng wth exstng capacty-achevng T -PIR schemes, our scheme has the followng advantage, that s, ts feld sze monotoncally decreases as the number of records M grows. In partcular, the bnary feld s suffcent for buldng a capacty-achevng T-PIR scheme as long as M 2+ log µ log 2 N, where µ = mn{t,n t} > 1. I. INTRODUCTION Prvate nformaton retreval (PIR) s a canoncal problem n the study of prvacy ssues that arse from the retreval of nformaton from publc databases. Typcally, a PIR model nvolves a database contanng M records stored across N servers and a user who wants to prvately retreve one record by accessng the servers. Specfcally, the prvacy requrement means any colludng subset contanng no more than T servers nows nothng about dentty of the retreved record. Snce t s closely related to cryptography [1] and codng theory [2], PIR has become a central research topc n the computer scence lterature snce t was frst ntroduced by Chor et al. [3] n The effcency of PIR scheme s characterzed by ts rate. Specfcally, the rate of a PIR scheme s measured as the rato between the retreved data sze and the downloaded sze, and the capacty s defned as the supremum of the rate over all PIR schemes. Recently, much wor has been done on determnng the capacty of PIR n varous cases. Sun and Jafar derved that the capacty for the non-colludng servers (.e., T = 1) s 1 1/N n [4] and further proved that the capacty for the 1 (1/N) M colludng servers (.e., T > 1) s the latter s called T -PIR. They also determned the capacty of PIR wth symmetrc prvacy n [6]. The capacty of PIR wth MDS coded non-colludng servers s determned n [7]. It remans an open problem to determne the capacty of PIR wth MDS coded colludng servers. For non-mds coded 1 T/N n [5]. Moreover, 1 (T/N) M storage, PIR schemes wth colludng or non-colludng servers are presented n [9], [10]. In general, the capacty of PIR s acheved by dvdng each record nto multple sub-pacets and queryng from each server specally desgned combnatons of these subpacets. Therefore, both the number of sub-pacets and the sze of each sub-pacet are mportant metrcs for measurng the mplementaton complexty of a PIR scheme. As to the former, we call the number of sub-pacets contaned n each record as sub-pacetzaton. The optmal sub-pacetzaton for capacty-achevng PIR schemes has been determned n some cases [8], [12], [13]. As to the latter, snce all exstng PIR schemes are lnear schemes over some fnte felds, t s actually about the sze of the feld on whch the PIR scheme can be bult. The man concern of ths wor s to reduce the feld sze for T -PIR schemes whle mantanng the rate achevng the capacty and the optmal sub-pacetzaton. In [5], t requres a feld of sze q = Ω(N 2 T M 2 ) for the capacty-achevng T -PIR scheme. The feld sze s reduced to q = Ω(Nt M 2 ) for the capacty-achevngt -PIR scheme wth optmal sub-pacetzaton n [12], where t = T/gcd(N,T The best nown result of feld sze for capacty-achevng T - PIR scheme s q = Ω(N) n [14]. But the feld sze s stll unfrendly wth the growth of the number of servers. The man contrbuton of ths wor conssts of desgnng a T -PIR scheme that smultaneously acheves the capacty and the optmal sub-pacetzatonnn M 2 over a fnte feld F q for all possble parameters (N,T,M), and t requres the feld sze q l N, where l = mn{t M 2,(n t) M 2 },n = N/gcd(N,T),t = T/gcd(N,T When l = 1, the constrant of the feld sze n our scheme degenerates nto q N, whch s the same wth that of the capacty-achevng T -PIR scheme n [14]. When l > 1, the bnary feld s suffcent for buldng a capacty-achevng T -PIR scheme provded M 2+ log µ log 2 N, where µ = mn{t,n t}. Reference Feld sze(q) Sun et al. [5] q max{n 2 T M 2,N 2 (N T) M 2 } Zhang et al. [11] q max{nnt M 2,Nn(n t) M 2 } Zhang et al. [12] q max{nt M 2,N(n t) M 2 } Xu et al. [14] q N Ths paper q l N,l = mn{t M 2,(n t) M 2 } Table 1: A lst of all exstng capacty-achevng T -PIR schemes wth T 2. And N n = gcd(n,t),t = T gcd(n,t).

2 Comparng wth all exstng capacty-achevng T -PIR schemes wth T 2 n [5], [11], [12], [14], as dsplayed n Table 1, the man dfference n our scheme s to employ MDS array codes to generate queres, whch s a ey dea for reducng the feld sze. Moreover, an advantage of our scheme s that ts feld sze monotoncally decreases as the number of records M grows. The rest of ths paper s organzed as follows. Frst, the T - PIR model s formally ntroduced and the MDS array code s defned n Secton II. Then n Secton III an example of the T -PIR scheme s presented to explan the desgn dea. The recovery property of MDS array codes s proved and the general descrptons of our scheme are gven n Secton IV. Fnally, Secton V concludes the paper. II. PRELIMINARIES A. Notatons and the T -PIR model For an nteger n N, we denote by [n] the set {1,..., n}. For a vector u = (u 1,...,u n ) and a subset Γ = { 1,..., m } [n], denote u Γ = (u 1,...,u m Most vectors n ths paper are row vectors and they are denoted by the bold lowercase letters (eg. a,b For a bloc matrx A = (A (1),A (2),...,A (N) ) and Γ = { 1,..., m } [N], denote A Γ = (A (1),...,A (m) Suppose there are M records W 1,...,W M and N servers Serv (1),...,Serv (N), each server stores all the M records. Moreover, the records are ndependent and each can be seen as an L-length vector over F q. Then suppose a user wants to prvately retreve W θ for some θ [M]. Formally, a T -PIR scheme conssts of two phases: Query phase. Gven θ [M], the user generates the query Que(θ,S) = (Q (1) θ,...,q(n) θ ), and sends Q (j) θ to Serv (j) for1 j N, wheres are some random resources prvately chosen by the user. Note that Que(, ) s the query functon defned by the scheme. Response phase. After recevng Q (j) θ, the Serv(j) computes the answers Ans (j) (Q (j) θ,w [M]) = A (j) θ for 1 j N, and sends t bac to the user, where Ans (j) (, ) s the answer functon defned by the scheme. Moreover the functons Que(, ) and Ans (j) (, ),1 j N must satsfy the followng two condtons: (1) Correctness: The user can reconstruct W θ after collectng all answers from the N servers,.e., H(W θ A [N] θ,q[n] θ,s,θ)=0, where H( ) s the condtonal entropy. (2) Prvacy: For any Γ [N] wth Γ =T, the serves n Γ can t obtan any nformaton on θ even f they collude wth each other,.e., I(θ;Q Γ θ,a Γ θ,w [M] ) = 0, where I( ; ) denotes the mutual nformaton. Defne the rate R of a T -PIR scheme by R = H(W θ ) N =1 H(A() θ ), that s, R characterzes the amount of retreved nformaton per unt of downloaded data. Furthermore, the capacty of T -PIR s defned by the largest rate over all achevable T - PIR schemes, denoted by C T -PIR. By [5], t has that C T -PIR = 1 T/N 1 (T/N) M. B. MDS Array Codes In ths secton we ntroduce MDS array code used n ths paper and then gve a method to construct such code over F q. Suppose N > T 1 and N,T are two postve ntegers. For a lnear [N,T] code C over F q l, a codeword c = (c 1,c 2,...,c N ) can be seen as an Nl-length vector c = (c 1,c 2,...,c N ) over F q,.e., for [N], the code bloc c = (c,1,c,2,...,c,l ) F l q denotes the l-length vector correspondng to the symbol c F q l. So we call the code C a lnear array code overf q, and refer to the code as an(n,t;l) q lnear array code. Equvalently, an (N,T;l) q lnear array code can be defned by a Tl Nl full ran matrx G over F q as follows, C = {c = (m 1,m 2,...,m T )G : (m 1,m 2,...,m T ) F Tl q }. The matrx G s called a generator matrx of the array code C. Then the generator matrx G can be vewed as a bloc matrx G = (G (1) For [N], the Tl l sub-matrx G () s represented as the thc column assocated wth the th code bloc n the codewords of C. Defnton 1. (MDS Array Codes) A lnear array code C over F q s called an (N,T;l) MDS array code f ts generator matrx G = (G (1) ) Fq Tl Nl has the followng MDS property: Γ [N] wth Γ = T,ran(G Γ ) = Tl (1) where G () F Tl l q for [N] and T < N. By the defnton of (N,T;l) MDS array code C, t degenerates nto a MDS code over F q for l = 1. Next we gve a method to construct an (N,T;l) MDS array code. Suppose α s a prmtve element of F q l, then F q l = {α j : 0 j q l 2} {0}. Suppose m(x) s the mnmal polynomal of α over F q. Let C F l l q be the companon matrx of m(x) and F = {C j : j Z} {0}. Then F s a fnte feld of sze q l and the map whch s defned by ϕ(α j ) = C j and ϕ(0) = 0 s a feld somorphsm from F q l to F by [15]. Let G = (α,j) F T N be a generator matrx of an q l [N,T] MDS code over F q l. Note that each symbol of F q l can be represented as an l l matrx n F over F q by usng the feld somorphsm ϕ( ), then the matrx G can be seen as an T N bloc matrx G,.e., G = (ϕ(α,j )) [T],j [N], and each thc column s an Tl l matrx over F q. It s easy to verfy that for any Γ [N] wth Γ = T, det((ϕ(α,j )) [T],j Γ ) = ϕ(det((α,j ) [T],j Γ )) 0. Hence the lnear array code whch s defned by the generator matrx G over F q s an (N,T;l) MDS array code. Then we can drectly obtan the followng theorem.

3 Theorem 2. Supposeq s a power of a prme and N,T,l N wth N > T 2. If q l N, then there exsts an (N,T;l) MDS array code over F q. Recall that for exstng capacty-achevng T -PIR schemes n [5], [11], [12], some [Nl,Tl ] MDS codes over F q are used to construct the query. And all Nl symbols of each codeword are equally dvded nto N blocs. Then ths MDS code can be seen as an (N,T;l ) MDS array code over F q. Based on ths observaton, we fnd a drecton to reduce the feld sze. That s, we generate the query by usng some MDS array codes over a smaller fnte feld rather than MDS codes. Moreover, the MDS array codes need to satsfy some specal property that s determned by the correctness condton. To formally llustrate ths dea, we wll gve an example n the next secton. III. EXAMPLE FOR N = 5,T = 3,M = 3 Before constructng our schemes, we frst gve an example by usng the method descrbed n [12]. And then, we explan how to reduce the feld sze by modfyng ths scheme. Example 1. Suppose M = 3, N = 5 and T = 3. The feld sze q 15 s enough and the sub-pacetzaton of ths case s L = N M 1 = 25, so each record can be seen as a 25- dmensonal vector over F q,.e., W 1,W 2,W 3 F 25 q. WLOG, suppose W 1 s the desred record,.e., θ = 1. Let S 1,S 2,S 3 be three matrces chosen by the user ndependently and unformly from all nvertble matrces over F q. Actually, S 1,S 2 and S 3 are the random resources prvately held by the user. Then, defne (a 1,a 2,...,a 25 ) = W 1 S 1 (b 1,b 2,...,b 25 ) = W 2 S 2 [:,(1 : 15)]G (c 1,c 2,...,c 25 ) = W 3 S 3 [:,(1 : 15)]G where S [:,(1 : 15)] denotes the 25 ( 15 matrx ) formed by G1 0 the frst 15 columns of S and G = 0 G. Moreover, 2 G 1 F 9 15 q s a generator matrx of an [15,9] MDS code and G 2 Fq 6 10 s a generator matrx of an [10,6] MDS code over F q. It can be seen that the answers are all sums of the symbols a,b,c n Fg.1. For each sum x n Fg.1, we defne ts support as a subset of [3] and ths subset s composed of the label of all terms n the sum x, denoted by supp(x For example, supp(a ) = {1},supp(b + c j ) = {2,3}. For any Λ [3], a sum x n Fg.1 s called an Λ-type sum f Λ = supp(x For Λ [M] {θ}, defne Λ = Λ {θ} and call Λ-type sums as nterference. Let γ () be the number of Λ-type sums n Serv () for each -subset Λ [3] and [5]. Now we show the scheme satsfes the correctness condton and the prvacy condton. Recall the suffcent condtons for the correctness (s1) requrement n [12], that s, for any Λ [M] {θ}, the nterference parts of all Λ-type sums can be lnearly expressed by the Λ-type sums whch appears n all servers. For Λ [M] {θ}, we collect all Λ-type sums and the nterference parts of all Λ-type sums to form a matrx and (2) Serv (1) Serv (2) Serv (3) Serv (4) Serv (5) a 1 a 4 a 7 a 10,a 11,a 12 a 13,a 14,a 15 b 1 b 4 b 7 b 10,b 11,b 12 b 13,b 14,b 15 c 1 c 4 c 7 c 10,c 11,c 12 c 13,c 14,c 15 a 2 +b 2 a 5 +b 5 a 8 +b 8 a 3 +b 3 a 6 +b 6 a 9 +b 9 a 16 +c 2 a 18 +c 5 a 20 +c 14 a 17 +c 3 a 19 +c 6 a 21 +c 15 b 16 +c 16 b 18 +c 18 b 20 +c 20 b 17 +c 17 b 19 +c 19 b 21 +c 21 a 22 +b 22 +c 22 a 23 +b 23 +c 23 a 24 +b 24 +c 24 a 25 +b 25 +c 25 Fg. 1: Answers of the (N = 5,T = 3,M = 3) PIR scheme for retrevng W 1. call ths matrx as the dstrbuton matrx of Λ-type sums. For example, for {2}-type sums {b }, ts dstrbuton matrx has the followng form, b 1 b 4 b 7 b 10 b 13 b 2 b 5 b 8 b 11 b 14. (3) b 3 b 6 b 9 b 12 b 15 where the bold symbols are all {2}-type sums and the rest are the nterference parts of all {2, 3}-type sums. Smlarly, the dstrbuton matrx of {2,3}-type sums {b +c j } s ( ) b16 +c 16 b 18 +c 18 b 20 +c 20 b 22 +c 22 b 24 +c 24 b 17 +c 17 b 19 +c 19 b 21 +c 21 b 23 +c 23 b 25 +c 25. (4) Then by the MDS property of G 1 and G 2, the coordnates labeled by the bold symbols n (3) and (4) form an nformaton set of G 1 and G 2, respectvely. That s, the rest symbols can be recovered by the bold symbols n (3) and (4), respectvely. Note that for any -subset Λ [M] {θ}, the dstrbuton matrx of Λ-type sums n Fg.1 has a smlar form, as the matrx (3) or (4), so the nterference parts of all Λ-type sums can be recovered by all Λ-type sums appeared n 5 columns. Hence ths scheme satsfes the condton (s1) n [12],.e, the correctness condton s guaranteed. As to the prvacy, recall the suffcent condtons for the prvacy (s2) requrement n [12], t s suffcent to ensure that for any Λ [M] {θ}, there are the same number of ndependent symbols contaned n any 3 columns of Λ-type sums dstrbuton matrx (.e., (3) or (4) Actually ths s guaranteed by the MDS property of the lnear code whch s used to generate such type nterference. Thus the prvacy condton s guaranteed. Moreover the desred record conssts of 25 symbols whle the answers totally contan 49 symbols, so the scheme has rate attanng the capacty for ths case The feld sze reles on the maxmum length of the MDS codes used n ths scheme, so t requresq 15 n Example 1. Note that for any Λ-type nterference, f ts dstrbuton matrx s a codeword of some MDS array code, then there are also the same number of ndependent symbols contaned n any 3 columns of ts dstrbuton matrx. For example, suppose Λ = {2}, the matrx (3) can be vewed as a codeword of an

4 (5, 3; 3) MDS array code. Smlarly, the [10, 6] MDS code also can be vewed as an (5,3;2) MDS array code. So f we adopt (5,3;3) and (5,3;2) MDS array codes rather than [15,9] and [10, 6] MDS codes, then the new obtaned scheme also satsfes the T -prvacy condton. However, there s a problem that how to guarantee the correctness condton. So the MDS array codes have to satsfy some property determned by the correctness condton. More precsely, for any -subset Λ of [M] {θ} and MDS array code correspondng to the Λ-type sums, denoted by (5,3;l ), ts generator matrx needs to have the followng recovery property: (a1) for th thc column, there are γ () columns whch are (a2) used to generate the Λ-type sums, and the rest γ () +1 columns are used to generate Λ-type sums, that s, l = γ () +γ() +1. All these N =1 γ() = Tl. columns have full column ran, that s, N =1 γ() Now we gve two admssble matrces G 1 F , G 2 F That s, G 1 = , G 2 = Then one can verfy that the columns labeled by {1,4,7,10,11,12,13,14,15} n G 1 have full column ran and the columns labeled by {1,2,3,4,5,6} n G 2 also have full column ran. Hence G 1 and G 2 satsfy the recovery property. Actually, G1 s obtaned by applyng the method n Theorem 2 to a generator matrx of an [5, 3] Generalzed Reed-Solomon code over F 2 3 and rearrangng the order of columns n each thc column by multplyng some 3 3 permutaton matrx. Smlarly, G2 s obtaned by usng the same method to a generator matrx of a[5, 3] doubly-extended Generalzed Reed- Solomon code overf 2 2. Then the MDS property of G 1 and G 2 s also satsfed. Therefore, the new scheme obtaned by usng G to replace G n (2) s a capacty-achevng T -PIR scheme wth optmal sub-pacetzaton, where G = ) ( G1 0. Note 0 G 2 that the feld sze s reduced to 2. As dsplayed n the example, the man desgn dea behnd our scheme s to mae each (N,T;l ) MDS array code correspondng to Λ-type nterference n the scheme satsfy the recovery property for any -subset Λ of [M] {θ} and some fxed γ (1),...,γ(N). Fortunately, we prove that every MDS array code trvally satsfes the recovery property by Lemma 3 n Secton IV-A. IV. THE GENERAL T -PIR SCHEME BASED ON MDS ARRAY CODES In ths secton we frst characterze the recovery property of MDS array codes and then descrbe our general capactyachevng T -PIR scheme based on MDS array codes. A. The Recovery property of MDS array code Lemma 3. Suppose G = (G (1) ) Fq Tl Nl s a generator matrx of an (N,T;l) MDS array code over F q, where G () = (g () 1,...,g() l ) FTl l q s a Tl-length column vector. Then for any (m 1,...,m N ) {0,1,...,l} N and g () j wth N =1 m = Tl, there exst N subsets,..., of [l] wth Γ = m such that ran(g (1) ) = Tl. Proof. For any fxed (m 1,...,m N ) wth N =1 m = Tl, there exst at least T nonzero numbers of them. Wthout loss of generalty, we may assume that m 0,1 N. Because that f m = 0, the new matrx obtaned by deletng the thc bloc columng () s also a generator matrx of an(n 1,T;l) MDS array code. Let b(m 1,m 2,...,m N) = max ran(g (1) Γ,..., [l], 1 Γ =m,1 N. Then there exst N subsets,..., of [l] wth Γ = m such that b = ran(g (1) Choose a maxmum lnearly ndependent subset of the vectors {G (1) }, denoted by {G () : [N]}, then b = ran(g (1) ), where Γ for 1 2 N [N] and N =1 Γ(1) = b. Then t s suffcent to show that b = Tl. On the contrary, we assume that b < T l. Let V = Cspan(G (1) ), where Cspan( ) denotes the lnear space spanned by all columns of the matrx over F q. Then dmv = b < Tl and {G () : [N]} s a base of the vector space V. To derve a contradcton, we assume the followng clam has been proved. Clam : f b < Tl, then for 1 f T, there exst f dsjont nonempty subsets X 1,...,X f of [N] such that u f =1 X, j [l],g (u) Partcularly, let f = T. Then t follows from the Clam that there exst T dsjont nonempty subsets X 1,...,X T of [N] such that u T =1 X, j [l],g (u) Hence ran(g (u) : u T =1 X ) dmv = b. On the other hand, note that T =1 X = T =1 X T. Combnng wth the MDS property of G, then ran(g (u) : u T =1 X ) = Tl. So one can obtan that Tl b < Tl, a contradcton. To complete the proof, t remans to prove the Clam. Now we prove t by nducton on f. For f = 1, let X 1 = { [N] : Γ }. Snce b < Tl, then X 1 1. For any u X 1, t s suffcent to show that

5 for j [l] Γ u, g (u) j V. Then choosng a m u -subset Γ u of [l] such that u {j} Γ u, one can obtan that V Cspan(G (1) Γ,G(u+1) u Γ u+1 By the defnton of b(m 1,m 2,...,m N ), t holds that ran(g (1) Γ,G(u+1) u Γ u+1 ) b = dmv, whch mples that V = Cspan(G (1) Γ,G(u+1) u Γ u+1 Hence, g (u) Suppose that there exst f 1 dsjont nonempty subsets X 1,...,X f 1 of [N] such that f 1 u X, j [l],g (u) =1 Consder the case f, note that ran(g (u) : u f 1 =1 X ) dmv = b < Tl. By the MDS property (1) of G, then the f 1 =1 X < T, whch mples that the vectors {g (u) j : u f 1 =1 X,j [l]} are lnearly ndependent over F q, so are the vectors {g (u) j : u f 1 =1 X,j Γ u }. Therefore the vectors can extend to be a base of V. Then there exst Γ (f) Γ for 1 N and Γ (f) u = Γ u for u f 1 =1 X such that {G () : [N]} s a base of the vector space V. Let X Γ (f) f = { [N] : Γ (f) Γ }. Then X f, otherwse dmv = N =1 Γ = Tl. By the defnton of X f, one can obtan that X f ( f 1 =1 X) =, that s, such f subsets X, [f] are dsjont. Smlarly, by usng the same way n the case f = 1, one can obtan that u X f, j [l],g (u) Remar 1. Usng the notatons ntroduced above, we may assume that for any fxed (m 1,m 2,...,m N ) wth N =1 m = Tl, Γ = {1,2,...,m }, [N] n a generator matrx of the (N,T;l) MDS array code. Ths s because that we can rearrange the order of l columns n each thc column by multplyng some l l permutaton matrx. B. Formal Descrpton of the general scheme Our scheme can be obtaned by modfyng the capactyachevng T -PIR schemes n [12]. As n Example 1, we replace M 1 MDS codes wth some M 1 MDS array codes. Next we gve these M 1 desred MDS array codes. Specally, for 1 M 1, the th MDS code defned by the generator matrx G n [12] has the parameters [ N T (Tα + (N T)β ),Tα + (N T)β ] over F q, where α,β are defned as n the denttes (35),(36) n [12]. Note that Tα + (N T)β = T(n t) 1 t M 1, and defne l = (n t) 1 t M 1, where t = T/gcd(N,T), n = N/gcd(N,T Then for 1 M 1, the th MDS code can be vewed as an (N,T;l ) MDS array code. By Lemma 3, one can choose a generator matrx G of an (N,T;l ) MDS array code whch has the recovery property for (γ (1),...,γ(N) ), where γ () = α for 1 T and γ () = β for T +1 N. Then these M 1 matrces G are desred. One can verfy that the new scheme satsfes the correctness condton and T -prvacy condton, whch are guaranteed by the recovery property and MDS property of all M 1 MDS array codes, respectvely. Moreover, the new scheme doesn t change the sub-pacetzaton of records and download sze. Therefore the new scheme has the hghest rate and the optmal sub-pacetzaton. Note that there are M 1 MDS array codes used n our scheme over F q, by Theorem 2 t only needs to requres that for 1 M 1, q l N. That s, q l N, where l = mn{t M 2,(n t) M 2 }. V. CONCLUSION In ths paper we buld a general capacty-achevng T -PIR scheme based on MDS array codes overf q, that s, the queres are generated by usng M 1 MDS array codes rather than MDS codes. It requres the feld sze q l N and has optmal sub-pacetzaton. In partcular, the bnary feld s enough to buld our scheme as long as M 2+ log µ log 2 N, where µ = mn{t,n t} > 1. REFERENCES [1] A. Bemel, Y. Isha, E. Kushlevtz, and I. Orlov, Share converson and prvate nformaton retreval, n Proc. 27th Annu. Conf. Comput. Complex., pp , Jun [2] S. Yehann, Locally Decodable Codes and Prvate Informaton Retreval Schemes, Ph.D. dssertaton, Massachusetts Insttute of Technology, [3] B. Chor, E. Kushlevtz, O. Goldrech, M. Sudan, Prvate nformaton retreval, Proc. 36-th IEEE Symposum on Foundatons of Computer Scence, pp.41 50, [4] H. Sun, S. A. Jafar, The capacty of prvate nformaton retreval, IEEE Trans. on Inf. Theory, vol.63, no.7, pp , Jul [5] H. Sun, S. A. Jafar, The capacty of prvate nformaton retreval wth colludng databases, IEEE Global Conference on Sgnal and Informaton Processng (GlobalSIP), pp , [6] H. Sun, S. A. Jafar, The Capacty of Symmetrc Prvate Informaton Retreval, IEEE Globecom Worshops (GC Wshps), pp.1 5, [7] K. Banawan and S. Uluus, The capacty of prvate nformaton retreval from coded databases, IEEE Trans Inf Theory, vol.64 no.3, pp , Mar [8] H. Sun, S. A. Jafar, Optmal Download Cost of Prvate Informaton Retreval for Arbtrary Message Length, IEEE Transactons on Informaton Forenscs and Securty, vol.12, no.12, pp ,2017 [9] H.-Y. Ln, S. Kumar, E. Rosnes, and A. Graell Amat, An MDS- PIR Capacty-Achevng Protocol for Dstrbuted Storage Usng Non- MDS Lnear Codes, Proceedngs of IEEE Internatonal Symposum on Informaton Theory (ISIT), July 2018, pp [10] R. Frej-Hollant, O. W. Gnle, C.Hollant, et al. t-prvate Informaton Retreval Schemes Usng Transtve Codes, IEEE Transactons on Informaton Theorey, DOI /TIT [11] Ywe Zhang and Gennan Ge, A general prvate nformaton retreval scheme for MDS coded databases wth colludng servers. arxv: [12] Zhfang Zhang and Jnge Xu, The Optmal Sub-Pacetzaton of Lnear Capacty-Achevng PIR Schemes wth Colludng Servers, IEEE Transacton on Informaton Theory, DOI /TIT [13] Jnge Xu and Zhfang Zhang, On sub-pacetzaton and access number of capacty-achevng PIR schemes for MDS coded noncolludng servers, Scence Chna Informaton Scence, 2018, Vol. 61 (10), pp [14] Jnge Xu and Zhfang Zhang, Buldng Capacty-Achevng PIR Schemes wth Optmal Sub-Pacetzaton over Small Felds, Proceedngs of IEEE Internatonal Symposum on Informaton Theory (ISIT), July 2018, pp [15] R. Ldl and H. Nederreter, Introducton to fnte felds and ther applcatons, Cambrdge Unversty Press, Cambrdge, UK (1994

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

Exact-Regenerating Codes between MBR and MSR Points

Exact-Regenerating Codes between MBR and MSR Points Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS These are nformal notes whch cover some of the materal whch s not n the course book. The man purpose s to gve a number of nontrval examples

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system.

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system. Chapter Matlab Exercses Chapter Matlab Exercses. Consder the lnear system of Example n Secton.. x x x y z y y z (a) Use the MATLAB command rref to solve the system. (b) Let A be the coeffcent matrx and

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Lecture 4: Constant Time SVD Approximation

Lecture 4: Constant Time SVD Approximation Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

DIFFERENTIAL FORMS BRIAN OSSERMAN

DIFFERENTIAL FORMS BRIAN OSSERMAN DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne

More information

A Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function

A Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function A Local Varatonal Problem of Second Order for a Class of Optmal Control Problems wth Nonsmooth Objectve Functon Alexander P. Afanasev Insttute for Informaton Transmsson Problems, Russan Academy of Scences,

More information

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

NOTES ON SIMPLIFICATION OF MATRICES

NOTES ON SIMPLIFICATION OF MATRICES NOTES ON SIMPLIFICATION OF MATRICES JONATHAN LUK These notes dscuss how to smplfy an (n n) matrx In partcular, we expand on some of the materal from the textbook (wth some repetton) Part of the exposton

More information

Eigenvalues of Random Graphs

Eigenvalues of Random Graphs Spectral Graph Theory Lecture 2 Egenvalues of Random Graphs Danel A. Spelman November 4, 202 2. Introducton In ths lecture, we consder a random graph on n vertces n whch each edge s chosen to be n the

More information

e - c o m p a n i o n

e - c o m p a n i o n OPERATIONS RESEARCH http://dxdoorg/0287/opre007ec e - c o m p a n o n ONLY AVAILABLE IN ELECTRONIC FORM 202 INFORMS Electronc Companon Generalzed Quantty Competton for Multple Products and Loss of Effcency

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

Random Walks on Digraphs

Random Walks on Digraphs Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected

More information

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space. Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

THE WEIGHTED WEAK TYPE INEQUALITY FOR THE STRONG MAXIMAL FUNCTION

THE WEIGHTED WEAK TYPE INEQUALITY FOR THE STRONG MAXIMAL FUNCTION THE WEIGHTED WEAK TYPE INEQUALITY FO THE STONG MAXIMAL FUNCTION THEMIS MITSIS Abstract. We prove the natural Fefferman-Sten weak type nequalty for the strong maxmal functon n the plane, under the assumpton

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 ) Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

An Introduction to Morita Theory

An Introduction to Morita Theory An Introducton to Morta Theory Matt Booth October 2015 Nov. 2017: made a few revsons. Thanks to Nng Shan for catchng a typo. My man reference for these notes was Chapter II of Bass s book Algebrac K-Theory

More information

The Expectation-Maximization Algorithm

The Expectation-Maximization Algorithm The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.

More information

Application of B-Spline to Numerical Solution of a System of Singularly Perturbed Problems

Application of B-Spline to Numerical Solution of a System of Singularly Perturbed Problems Mathematca Aeterna, Vol. 1, 011, no. 06, 405 415 Applcaton of B-Splne to Numercal Soluton of a System of Sngularly Perturbed Problems Yogesh Gupta Department of Mathematcs Unted College of Engneerng &

More information

CHAPTER III Neural Networks as Associative Memory

CHAPTER III Neural Networks as Associative Memory CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem. prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

The Degrees of Nilpotency of Nilpotent Derivations on the Ring of Matrices

The Degrees of Nilpotency of Nilpotent Derivations on the Ring of Matrices Internatonal Mathematcal Forum, Vol. 6, 2011, no. 15, 713-721 The Degrees of Nlpotency of Nlpotent Dervatons on the Rng of Matrces Homera Pajoohesh Department of of Mathematcs Medgar Evers College of CUNY

More information

Erdős-Burgess constant of the multiplicative semigroup of the quotient ring off q [x]

Erdős-Burgess constant of the multiplicative semigroup of the quotient ring off q [x] Erdős-Burgess constant of the multplcatve semgroup of the quotent rng off q [x] arxv:1805.02166v1 [math.co] 6 May 2018 Jun Hao a Haol Wang b Lzhen Zhang a a Department of Mathematcs, Tanjn Polytechnc Unversty,

More information

Communication Complexity 16:198: February Lecture 4. x ij y ij

Communication Complexity 16:198: February Lecture 4. x ij y ij Communcaton Complexty 16:198:671 09 February 2010 Lecture 4 Lecturer: Troy Lee Scrbe: Rajat Mttal 1 Homework problem : Trbes We wll solve the thrd queston n the homework. The goal s to show that the nondetermnstc

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Homework Notes Week 7

Homework Notes Week 7 Homework Notes Week 7 Math 4 Sprng 4 #4 (a Complete the proof n example 5 that s an nner product (the Frobenus nner product on M n n (F In the example propertes (a and (d have already been verfed so we

More information

n ). This is tight for all admissible values of t, k and n. k t + + n t

n ). This is tight for all admissible values of t, k and n. k t + + n t MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what

More information

Appendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis

Appendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis A Appendx for Causal Interacton n Factoral Experments: Applcaton to Conjont Analyss Mathematcal Appendx: Proofs of Theorems A. Lemmas Below, we descrbe all the lemmas, whch are used to prove the man theorems

More information

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A

More information

Singular Value Decomposition: Theory and Applications

Singular Value Decomposition: Theory and Applications Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real

More information

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Determinants Containing Powers of Generalized Fibonacci Numbers

Determinants Containing Powers of Generalized Fibonacci Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol 19 (2016), Artcle 1671 Determnants Contanng Powers of Generalzed Fbonacc Numbers Aram Tangboonduangjt and Thotsaporn Thanatpanonda Mahdol Unversty Internatonal

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

Estimation: Part 2. Chapter GREG estimation

Estimation: Part 2. Chapter GREG estimation Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Math 217 Fall 2013 Homework 2 Solutions

Math 217 Fall 2013 Homework 2 Solutions Math 17 Fall 013 Homework Solutons Due Thursday Sept. 6, 013 5pm Ths homework conssts of 6 problems of 5 ponts each. The total s 30. You need to fully justfy your answer prove that your functon ndeed has

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Bézier curves. Michael S. Floater. September 10, These notes provide an introduction to Bézier curves. i=0

Bézier curves. Michael S. Floater. September 10, These notes provide an introduction to Bézier curves. i=0 Bézer curves Mchael S. Floater September 1, 215 These notes provde an ntroducton to Bézer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,

More information