Proof Assistants for Graph Non-isomorphism

Size: px
Start display at page:

Download "Proof Assistants for Graph Non-isomorphism"

Transcription

1 Proof Assistants for Graph Non-isomorphism Arjeh M. Cohen 8 January 2007 second lecture of Three aspects of exact computation a tutorial at Mathematics: Algorithms and Proofs (MAP) Leiden, January 8 12, /75

2 Outline 1. Introduction 2. Permutation groups 3. Complexity 4. Graph isomorphism algorithms 5. Proof assistant demo Based on work with Scott Murray and Jan Willem Knopper 2/75

3 1. Introduction Usually algorithms give answers without proofs. To what extent can we expect answers with proofs? Such answers could certify correctness serve as a first step towards formal proofs 3/75

4 Focus on graph non-isomorphism Motivated by universality of graph isomorphism use of group theory 4/75

5 Graph A graph G consists of a finite set of vertices V = V (G) and a set of edges E = E(G) whose elements are subsets of V of size two. Here V = {1, 2, 3, 4} and E = {{1, 2}, {1, 4}, {2, 3}, {3, 4}}. 5/75

6 Isomorphism Let G 0 and G 1 be graphs. An isomorphism σ : G 0 G 1 is a bijective map V (G 0 ) V (G 1 ) preserving edges. 6/75

7 Automorphism An automorphism is an isomorphism from a graph to itself. 7/75

8 Isomorphism automorphism Let G and G be two connected graphs. Take v V (G) and v V (G ). There is an isomorphism G G mapping v to v iff there is an automorphism of order 2 on G v v G interchanging v and v. G G v v 8/75

9 Graph isomorphism G 0 and G 1 are graphs. If G 0 = G1 then the specification of an isomorphism G 0 G 1 suffices for the isomorphism proof. If G 0 = G1 then often a simple invariant will work, but not always. 9/75

10 Two graphs that are not isomorphic The first graph has 4 edges, while the second graph has 5 edges. 10/75

11 Invariants Invariants can tell why two graphs are non-isomorphic. Examples: number of vertices (of given degree) number of edges (and distance multiplicities) eigenvalues and Smith normal form of the adjacency matrix Do not separate all isomorphism classes. 11/75

12 Invariants that always work Lexicographically least adjacency matrix McKay s canonical labelling Hard to compute in general. Non-isomorphism proof strategy: build up from cheaper invariants towards McKay s canonical labelling 12/75

13 2. Permutation groups G is a permutation group. G = A, where A = {a 1, a 2,..., a k } consists of permutations of the points {1, 2,..., n}. A word in A is an expression of the form a e 1 i 1 a e 2 i 2 a e m im where the indices i j are in the range 1,..., k and the exponents e j are integers. 13/75

14 Example The Mathieu group on 11 points, M 11, has generating set A = {a 1, a 2 }, where a 1 = (1, 10)(2, 8)(3, 11)(5, 7), a 2 = (1, 4, 7, 6)(2, 11, 10, 9). 14/75

15 Group membership proving by use of GAP Query input A permutation g. A list A of permutations The fact g A. GAP input G := Group(A); IsIn_Proof(g,G); GAP output A word in A that is equal to g. Query output As G = A, the group G consists of those elements that can be expressed as a word in A. In particular g = IsIn_Proof(g, G), and so belongs to G. 15/75

16 Example a1 = (1,10)(2,8)(3,11)(5,7); a2 = (1,4,7,6)(2,11,10,9) G = Group([a1,a2]) g = (1,3,8,2,11,10)(4,9)(5,7,6) Query: prove that g is in G. Answer: The element g can be written as follows as a word in the generators of G: g = a1*a2^3*a1*a2, and so belongs to G. QED 16/75

17 Example a1 = (1,10)(2,8)(3,11)(5,7); a2 = (1,4,7,6)(2,11,10,9) G = Group([a1,a2]) g = (1,2)(3,4)(5,6,7,8) Query: prove that g is in G. Answer: Oops, the element does not belong to the group 17/75

18 Example a1 = (1,10)(2,8)(3,11)(5,7); a2 = (1,4,7,6)(2,11,10,9) G = Group([a1,a2]) g = (1,2)(3,4)(5,6,7,8) Query: prove that g is in G. Answer: Oops, the element does not belong to the group How is that proved? 18/75

19 Subgroup Suppose that H = B. How to prove that H is a subgroup of G? H is a subgroup of G iff each element of B is contained in G. 19/75

20 Orbit The orbit of x under G is xg = {xg : g G}. If G = a 1, a 2,..., a k and X is an orbit of G, then on vertex set X has labeled edges y the orbit graph i z where ya i = z. 20/75

21 # 12 Example M 11 = a 1 = (1, 10)(2, 8)(3, 11)(5, 7), a 2 = (1, 4, 7, 6)(2, 11, 10, 9). Interrupted lines are labeled by 1 and solid lines by /75

22 Orbit proving by use of GAP Query Input A list A of permutations generating G. A point x. GAP input G := Group(A); Orbit_Proof(G,x); GAP output A set of points X and a list B of words in A indexed by X. The set X is just the orbit xg. The word in B corresponding to y X maps x to y. 22/75

23 Stabilizers The stabilizer subgroup in G of x is G x = {g G : xg = x}. 23/75

24 Stabilizers The stabilizer subgroup in G of x is G x = {g G : xg = x}. A generating set for G x? 24/75

25 Orbit Lemma If y xg, then {g G : xg = y} is a coset of G x. In particular, xg = G / G x. A one-to-one correspondence between the orbit and the cosets. 25/75

26 Schreier tree For every y xg, choose t(y) G with the property that xt(y) = y. By the Orbit Lemma the t(y) form coset reps for G x in G. Efficient construction: the Schreier tree rooted at x: a subgraph T of the orbit graph that is a tree with root x (when we view the edges as being undirected). For every y X, there is a unique minimal path in T from x to y. Then t(y) is the product of the labels of this path. 26/75

27 12 Example M 11 = a 1 = (1, 10)(2, 8)(3, 11)(5, 7), a 2 = (1, 4, 7, 6)(2, 11, 10, 9). A Schreier tree T rooted at 1 is shown /75

28 12 Example For M 11, the values of t written as words in a 1, a 2 are as follows. y t(y) 1 a 1 a 2 2 a 1 a 3 2a 1 a 2 a 2 2a 1 a 3 2 a 2 2 a 1 a 2 2a 1 a 1 a 2 a 1 a 1 a /75

29 The Schreier tree leads to coset reps U for G x in G and a transversal t : G U sending an element g of G to the representative of G x g and satisfying xt(g) = xg and t(g) = t(hg) whenever h G x. 29/75

30 Implementation We store this tree in a linearized form, using Backpointer ω : X X {0} ω(z) = { y if y is adjacent to z and on the minimal path from z to x 0 if z = x Schreier vector v : X { m,..., 1, 0, 1,..., m} i i if y = ω(z) and y z is in T v(z) = i i if y = ω(z) and y z is in T 0 if z = x 30/75

31 Construction of the transversal t For g G, there is a minimal path x = x 0, x 1,..., x m = xg in the Schreier tree T from x to xg. Write b j = a v(xj ) if v(x j ) > 0 and b j = a 1 v(x j ) if v(x j ) < 0. Then t(g) = b 1 b m. 31/75

32 12 Example a 1 = (1, 10)(2, 8)(3, 11)(5, 7) and a 2 = (1, 4, 7, 6)(2, 11, 10, 9). The linearized version of the Schreier tree rooted at 1, is v ω /75

33 12 a 1 = (1, 10)(2, 8)(3, 11)(5, 7) and a 2 = (1, 4, 7, 6)(2, 11, 10, 9) Choosing the root to be 5, we find v ω /75

34 Schreier data proving Query Input A list A = [a 1,..., a k ] of permutations generating G. A point x. GAP input G := Group(A); SchreierData(G,x); GAP output A triple [X, v, ω] of integer sequences consisting of the orbit, the Schreier vector, and the backpointer. 34/75

35 Stabilizer generators Use the coset reps to compute a generating set of G x. Schreier s lemma Suppose G = A, and H G. If U is a set of coset representatives for H in G, and the function t : G U maps an element g of G to the representative of Hg, then a generating set for H is given by { ua t(ua) 1 : u U, a A }. Interpretation: loops in the graph created by the edges left out to create T from G 35/75

36 Stabilizer subgroup identification by use of GAP Query Input G = A and a point x. GAP input G := Group(A); H := Stabilizer(G,x); IsStabiliser_Proof(G,x,H); GAP output A proof that H is a subgroup of G. Schreier data for G wrt x A sequence of quadruples (y, i, g, h) consisting of y X, an index i, the Schreier generator t(y)a i t(t(y)a i ) 1 written as a word g in A, and as a word h in the generators of H. 36/75

37 Base A base for G is a finite sequence B = [x 1,..., x k ] of distinct points in {1, 2,..., n} such that G x1,x 2,...,x k = 1. Hence, the only element of G which fixes all of the points x 1, x 2,..., x k is the identity. Write G (i) = G x1,x 2,...,x i. Then we have a chain of stabilizers G = G (0) G (1) G (k 1) G (k) = 1. We often require the additional property G (i) G (i+1). A base is easy to construct. 37/75

38 Example M 11 = a 1 = (1, 10)(2, 8)(3, 11)(5, 7), a 2 = (1, 4, 7, 6)(2, 11, 10, 9) has a base [1, 2, 3, 4]. The Schreier trees and backpointers for the stabilizer chain are given in the following table v ω v ω v ω v ω /75

39 Base proving by use of GAP Query Input G = A. GAP input G := Group(A); B := BaseOfGroup(G); IsBase_Proof(G,B); GAP output A base B = [x 1,..., x k ] and sets A i with A i 1 xi = A i Query output From IsBase_Proof(G,B) we read off, for each i, a sequence A i of permutations; a proof that A i is the stabilizer of x i in A i 1 ; the determination of the A i 1 -orbit of x i. Check A k = 1. Now B is a base with stabilizer chain { A i }. 39/75

40 Nonmembership Given a base B = [x 1,..., x k ] of G, take G (i) = G x1,...,x i 1 and t(g (i) ) Schreier elements for G (i) rooted at x i 1. Sifting: if g G, then g = u k u k 1 u 1 u 0 where each u i t(g (i) ) is uniquely determined by g. If g G, then sifting fails because at some stage x i h i 1 x i G (i 1), and so h i 1 G (i 1). This gives a proof of nonmembership. 40/75

41 Base proving by use of GAP Query Input g G = A. GAP input G := Group(A); IsNotIn_Proof(g,G) GAP output A base [x 1,..., x k ] and generators for G (i) = G x1,...,x i, the Schreier trees for G (i 1) rooted at x i, and sets A i with G (i) = A i. A sequence of permutations [h 0, h 1,..., h j 1 ] (where j k) such that h i G (i) and x i h i 1 h 1 h 0 = x i g for i = 1,..., j 1 and x j h j 1 h 1 h 0 x j G (j 1). 41/75

42 Order lemma If B = [x 1,..., x k ] is a base for G, then G = k i=1 x ig (i 1). 42/75

43 Example The Mathieu group M 11 on 11 points has order 1 M 11 2 M (1) 11 3 M (2) 11 4 M (3) 11 = = /75

44 Order proving by use of GAP Query Input A list A of permutations generating G. GAP input G := Group(A); Order_Proof(G); GAP output A base [x 1,..., x k ], the corresponding stabilizer chain G (i), and the orbit sizes x i G (i 1). Query output The base and stabilizer chain proof are as before. By the Order Lemma, G is the product of the orbit sizes x i G (i 1). 44/75

45 Permutation groups, conclusion All basic permutation group operations membership orbit Schreier transversal stabilizer base non-membership order are in NP and can be supplied with efficient proofs. 45/75

46 3. Complexity graph non-isomorphism is neither known nor believed to be in NP quantum complexity of graph isomorphism is unknown 46/75

47 Complexity, positive graph isomorphism has time complexity O(exp(n 1/2+o(1) )) Babai and Luks, 1983, compare with n! = O(exp(n log n)) graph non-isomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses Klivans and Van Melkebeek, 2002 subexponential: O(exp(n ɛ )) for every ɛ > 0 there is a zero-knowledge proof of graph non-isomorphism 47/75

48 Arthur-Merlin proof A simplication of the zero-knowledge proof. Arthur is verifier, Merlin is prover. Given two graphs G 0 and G 1 on n vertices. Iterate the following procedure Arthur chooses a random bit α Arthur chooses a random permutation σ of {1,..., n} Arthur constructs H = σ(g α ) Arthur sends H to Merlin Merlin provides β such that H = G β Merlin sends β to Arthur Arthur checks α = β and keeps score 48/75

49 Complexity theorem IP = Interactive Proof using a probabilistic interactive protocol, with unbounded Merlin and polynomial time Arthur Theorem (Shamir 1992) IP = PSPACE. 49/75

50 Graph isomorphism algorithms Merlin s methods 1. Integer programming 2. Weisfeiler-Leman methods 3. bounded degree: polynomial time [Babai, Luks] 4. fast implementation: nauty [McKay] 50/75

51 3.1. Integer programming (Derksen) A G adjacency matrix of G G 0 = G1 iff there exists X O n ({0, 1}) with XA G0 = A G1 X Gives relations on entries of X of degree at most 2 Use Gröbner bases methods to solve for X Efficiency? 51/75

52 3.2. Weisfeiler-Leman methods Label vertices with their degrees Iterate: label vertices with multiset of the labels of their neighbors Between iterations: replace the labels by their order numbers in the lex order of all occurring labels (will be called a partition) Terminate when no new distinctions occur This labels at least 1 c n log(n)/ log log(n) of all graphs on n vertices. Fails on regular graphs. 52/75

53 Higher-dimensional Weisfeiler-Leman method dimension 2: Replace vertices by pairs First label pair by presence of an edge (or equality) between its vertices (isomorphism type) Iterate by computing for pair p the n element multiset of pairs of colors p {v} \ {u} for u p and v arbitrary. Terminate when no new distinctions occur Similarly for higher dimensions. 53/75

54 Higher-dimensional Weisfeiler-Leman method implemented in STABCOL by Babel, Baumann, Lüdecke, Tinhofer at TU München implemented in STABIL by Babel, Chuvaeva, Klin, Pasechnik (1997) 1-dimensional version used in nauty [McKay] 54/75

55 3.3. Luks algorithm Fix G and G. For v, v Luks checks for an isomorphism σ with v = σ(v ). If for all v no such σ exists, then there are no isomorphisms. G G v v 55/75

56 Luks algorithm, cont d The algorithm constructs the automorphism group inductively. In the induction step, families are used: A family of type (2, 0) (left) and one of type (2, 3) (right). 56/75

57 Luks algorithm, cont d The algorithm by Luks inductively constructs the automorphisms. Initialization: A 0 = {(v, v )} Induction step: consider the vertices at distance i and i + 1 of {v, v }. restrict A i to the interior and the vertices at distance i look at the connections to the vertices at distance i + 1 group the edges in families and by their family s type calculate the automorphisms on the boundary that stabilize the sets of families extend automorphisms on the boundary to the graph so far add interior and boundary automorphisms 57/75

58 Luks example A 0 = (1, 5) A 1 = (1, 5)(2, 6)(4, 8), (2, 4), (6, 8) The reduction of A 1 to the boundary is (2, 6)(4, 8), (2, 4), (6, 8). The families are ({2, 4}, {3}), ({6, 8}, {7}) and ({6, 8}, ). A 2 = (2, 4), (6, 8) 58/75

59 Luks algorithm, conclusion The algorithm by Luks is implemented in PAGN with proof production. The permutation group routines discussed above are used. 59/75

60 3.4. Nauty by McKay fast canonical label or automorphism works with building a tree of labelings restricts the computation by Weisfeiler-Leman kind of labeling backtracks using automorphisms 60/75

61 Nauty: partitions A partition is an ordered vertex labeling The partition is here [ ], with WHITE<BLACK. 61/75

62 Nauty: partitions A partition every vertex of which has its own label is called complete. A pair of two complete partitions gives a map on the vertices (smallest label to smallest label, etc.) Check for each complete partition in the tree whether the map to the first complete partition gives an automorphism. Refine partition by Weisfeiler-Leman. 62/75

63 McKay example The graph with starting partition [ ]. 63/75

64 McKay example, The partition [ ] is refined to [ ]. 64/75

65 McKay example, The partition [ ] is refined to [ ]. 65/75

66 McKay example, The partition [ ] is refined to [ ]. 66/75

67 McKay example, The partition [ ] is refined to [ ]. Separation of 1 and 5 suffices for non-isomorphism part /75

68 McKay example, Now case distinction is used: from [ ] we get both [ ] and [ ]. 68/75

69 McKay example, 7a Continuing with the case [ ] gives: Now case distinction is used: from [ ] we get both [ ] and [ ]. Comparing with the first complete partition [ ] gives the maps () and (6, 8) (an automorphism). 69/75

70 McKay example, 7b Continuing with the case [ ] gives: Since we know the automorphism (6, 8) we can choose here: a choice from [ ] is [ ]. Comparing with the first complete partition [ ] gives the map (2, 4) (automorphism). 70/75

71 McKay example, 8 [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] 71/75

72 3.5. Nauty by McKay conclusion Automated proofs: Spot where automorphisms interchanging G 0 and G 1 fail to exist. 72/75

73 4. Proof Assistant for Graph Non-isomorphism 73/75

74 5. Conclusion Merlin s proof construction more or less understood Merlin s automated presentation needs work Gröbner bases methods to be investigated 74/75

75 Coming Friday Rewriting rules for algebras related to Knot theory 75/75

An automated proof theory approach to computation with permutation groups

An automated proof theory approach to computation with permutation groups An automated proof theory approach to computation with permutation groups Arjeh M. Cohen Department of Mathematics Eindhoven University of Technology Netherlands Scott H. Murray School of Mathematics and

More information

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 2 Lecture 15 Public Coins and Graph (Non)Isomorphism 3 Intro Goal and Plan Goal understand

More information

Sherali-Adams Relaxations of Graph Isomorphism Polytopes. Peter N. Malkin* and Mohammed Omar + UC Davis

Sherali-Adams Relaxations of Graph Isomorphism Polytopes. Peter N. Malkin* and Mohammed Omar + UC Davis Sherali-Adams Relaxations of Graph Isomorphism Polytopes Peter N. Malkin* and Mohammed Omar + UC Davis University of Washington May 18th 2010 *Partly funded by an IBM OCR grant and the NSF. + Partly funded

More information

Permutation groups and the graph isomorphism problem

Permutation groups and the graph isomorphism problem Permutation groups and the graph isomorphism problem Sumanta Ghosh and Piyush P Kurur Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, Kanpur, Uttar Pradesh, India

More information

2 Permutation Groups

2 Permutation Groups 2 Permutation Groups Last Time Orbit/Stabilizer algorithm: Orbit of a point. Transversal of transporter elements. Generators for stabilizer. Today: Use in a ``divide-and-conquer approach for permutation

More information

Graph Isomorphism is in SPP

Graph Isomorphism is in SPP Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur Institute of Mathematical Sciences, C.I.T Campus Chennai 600113, India email: {arvind,ppk}@imsc.ernet.in Abstract We show that Graph Isomorphism

More information

Basic Algorithms for Permutation Groups

Basic Algorithms for Permutation Groups Basic Algorithms for Permutation Groups Alexander Hulpke Department of Mathematics Colorado State University Fort Collins, CO, 80523-1874 Arizona Summer Program 2008 JAH, Arizona Summer Program 2008 Basic

More information

Lecture 22: Oct 29, Interactive proof for graph non-isomorphism

Lecture 22: Oct 29, Interactive proof for graph non-isomorphism E0 4 Computational Complexity Theory Indian Institute of Science, Bangalore Fall 04 Department of Computer Science and Automation Lecture : Oct 9, 04 Lecturer: Chandan Saha

More information

Solving an arbitrary permutation puzzle

Solving an arbitrary permutation puzzle T.C. Brouwer Solving an arbitrary permutation puzzle Bachelor thesis, June 18, 2016 Supervisor: Dr. R.M. van Luijk Mathematisch Instituut, Universiteit Leiden Contents 1 Introduction 2 Mathematical formulation

More information

Tractable Approximations of Graph Isomorphism.

Tractable Approximations of Graph Isomorphism. Tractable Approximations of Graph Isomorphism. Anuj Dawar University of Cambridge Computer Laboratory visiting RWTH Aachen joint work with Bjarki Holm Darmstadt, 5 February 2014 Graph Isomorphism Graph

More information

Certifying Solutions to Permutation Group Problems

Certifying Solutions to Permutation Group Problems Certifying Solutions to Permutation Group Problems Arjeh Cohen 1, Scott H. Murray 1,, Martin Pollet 2,, and Volker Sorge 3, 1 RIACA, Technische Universiteit Eindhoven, The Netherlands {amc,smurray}@win.tue.nl

More information

Computing Isomorphism [Ch.7, Kreher & Stinson] [Ch.3, Kaski & Östergård]

Computing Isomorphism [Ch.7, Kreher & Stinson] [Ch.3, Kaski & Östergård] Computing Isomorphism [Ch.7, Kreher & Stinson] [Ch.3, Kaski & Östergård] Winter 2009 Introduction Isomorphism of Combinatorial Objects In general, isomorphism is an equivalence relation on a set of objects.

More information

AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS

AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS MAX GOLDBERG Abstract. We explore ways to concisely describe circulant graphs, highly symmetric graphs with properties that are easier to generalize

More information

Reductions to Graph Isomorphism

Reductions to Graph Isomorphism Reductions to raph Isomorphism Jacobo Torán Institut für Theoretische Informatik Universität Ulm D-89069 Ulm, ermany jacobo.toran@uni-ulm.de June 13, 2008 Keywords: Computational complexity, reducibilities,

More information

Permutation Group Algorithms

Permutation Group Algorithms Permutation Group Algorithms 2016 1 / 32 Permutation Group Algorithms Zoltán Halasi Eötvös Loránd University 2016 More group theory Permutation Group Algorithms 2016 2 / 32 Going into deeper to the structure

More information

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam Limits to Approximability: When Algorithms Won't Help You Note: Contents of today s lecture won t be on the exam Outline Limits to Approximability: basic results Detour: Provers, verifiers, and NP Graph

More information

Creating Groups Caveat:

Creating Groups Caveat: Method Selection GAP tries to select the best method (of several) for a particular operation (say NormalSubgroups) based on: What kind of object (Category group of permutations) How is it stored (Representation

More information

Notes on Complexity Theory Last updated: November, Lecture 10

Notes on Complexity Theory Last updated: November, Lecture 10 Notes on Complexity Theory Last updated: November, 2015 Lecture 10 Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Randomized Time Complexity 1.1 How Large is BPP? We know that P ZPP = RP corp

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Asymptotically optimal induced universal graphs

Asymptotically optimal induced universal graphs Asymptotically optimal induced universal graphs Noga Alon Abstract We prove that the minimum number of vertices of a graph that contains every graph on vertices as an induced subgraph is (1 + o(1))2 (

More information

Lecture 22: Counting

Lecture 22: Counting CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

if G permutes the set of its subgroups by conjugation then Stab G (H) = N G (H),

if G permutes the set of its subgroups by conjugation then Stab G (H) = N G (H), 1 0.1 G-sets We introduce a part of the theory of G-sets, suitable for understanding the approach GAP uses to compute with permutation groups, using stabilizer chains. Rotman s book describes other results

More information

2 Natural Proofs: a barrier for proving circuit lower bounds

2 Natural Proofs: a barrier for proving circuit lower bounds Topics in Theoretical Computer Science April 4, 2016 Lecturer: Ola Svensson Lecture 6 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent

More information

Connectivity of Cayley Graphs: A Special Family

Connectivity of Cayley Graphs: A Special Family Connectivity of Cayley Graphs: A Special Family Joy Morris Department of Mathematics and Statistics Trent University Peterborough, Ont. K9J 7B8 January 12, 2004 1 Introduction Taking any finite group G,

More information

Permutation Group Algorithms, Part 2

Permutation Group Algorithms, Part 2 Permutation Group Algorithms, Part 2 Jason B. Hill University of Colorado October 5, 2010 Two recent opening sentences for presentations on polynomial-time permutation group algorithms have each had five

More information

Gröbner Bases for Noncommutative Polynomials

Gröbner Bases for Noncommutative Polynomials Gröbner Bases for Noncommutative Polynomials Arjeh M. Cohen 8 January 2007 first lecture of Three aspects of exact computation a tutorial at Mathematics: Algorithms and Proofs (MAP) Leiden, January 8 12,

More information

Lecture 24: Approximate Counting

Lecture 24: Approximate Counting CS 710: Complexity Theory 12/1/2011 Lecture 24: Approximate Counting Instructor: Dieter van Melkebeek Scribe: David Guild and Gautam Prakriya Last time we introduced counting problems and defined the class

More information

CS151 Complexity Theory. Lecture 13 May 15, 2017

CS151 Complexity Theory. Lecture 13 May 15, 2017 CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P

More information

McKay s Canonical Graph Labeling Algorithm

McKay s Canonical Graph Labeling Algorithm Contemporary Mathematics McKay s Canonical Graph Labeling Algorithm Stephen G. Hartke and A. J. Radcliffe Abstract. The problem of deciding whether two graphs are isomorphic is fundamental in graph theory.

More information

Groups and Symmetries

Groups and Symmetries Groups and Symmetries Definition: Symmetry A symmetry of a shape is a rigid motion that takes vertices to vertices, edges to edges. Note: A rigid motion preserves angles and distances. Definition: Group

More information

Elementary Equivalence in Finite Structures

Elementary Equivalence in Finite Structures Elementary Equivalence in Finite Structures Anuj Dawar University of Cambridge Computer Laboratory YuriFest, Berlin, 11 September 2015 When I First Met Yuri When I was a graduate student, I sent Yuri a

More information

Great Theoretical Ideas in Computer Science

Great Theoretical Ideas in Computer Science 15-251 Great Theoretical Ideas in Computer Science Lecture 28: A Computational Lens on Proofs December 6th, 2016 Evolution of proof First there was GORM GORM = Good Old Regular Mathematics Pythagoras s

More information

Lecture 18: Zero-Knowledge Proofs

Lecture 18: Zero-Knowledge Proofs COM S 6810 Theory of Computing March 26, 2009 Lecture 18: Zero-Knowledge Proofs Instructor: Rafael Pass Scribe: Igor Gorodezky 1 The formal definition We intuitively defined an interactive proof to be

More information

Finite Model Theory and Graph Isomorphism. II.

Finite Model Theory and Graph Isomorphism. II. Finite Model Theory and Graph Isomorphism. II. Anuj Dawar University of Cambridge Computer Laboratory visiting RWTH Aachen Beroun, 13 December 2013 Recapitulation Finite Model Theory aims to study the

More information

Total Ordering on Subgroups and Cosets

Total Ordering on Subgroups and Cosets Total Ordering on Subgroups and Cosets Alexander Hulpke Department of Mathematics Colorado State University 1874 Campus Delivery Fort Collins, CO 80523-1874 hulpke@math.colostate.edu Steve Linton Centre

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

Every Linear Order Isomorphic to Its Cube is Isomorphic to Its Square

Every Linear Order Isomorphic to Its Cube is Isomorphic to Its Square Every Linear Order Isomorphic to Its Cube is Isomorphic to Its Square Garrett Ervin University of California, Irvine May 21, 2016 We do not know so far any type α such that α = α 3 = α 2. W. Sierpiński,

More information

Lecture 26: Arthur-Merlin Games

Lecture 26: Arthur-Merlin Games CS 710: Complexity Theory 12/09/2011 Lecture 26: Arthur-Merlin Games Instructor: Dieter van Melkebeek Scribe: Chetan Rao and Aaron Gorenstein Last time we compared counting versus alternation and showed

More information

Selected Topics in AGT Lecture 4 Introduction to Schur Rings

Selected Topics in AGT Lecture 4 Introduction to Schur Rings Selected Topics in AGT Lecture 4 Introduction to Schur Rings Mikhail Klin (BGU and UMB) September 14 18, 2015 M. Klin Selected topics in AGT September 2015 1 / 75 1 Schur rings as a particular case of

More information

ORBITAL DIGRAPHS OF INFINITE PRIMITIVE PERMUTATION GROUPS

ORBITAL DIGRAPHS OF INFINITE PRIMITIVE PERMUTATION GROUPS ORBITAL DIGRAPHS OF INFINITE PRIMITIVE PERMUTATION GROUPS SIMON M. SMITH Abstract. If G is a group acting on a set Ω and α, β Ω, the digraph whose vertex set is Ω and whose arc set is the orbit (α, β)

More information

Asymptotically optimal induced universal graphs

Asymptotically optimal induced universal graphs Asymptotically optimal induced universal graphs Noga Alon Abstract We prove that the minimum number of vertices of a graph that contains every graph on vertices as an induced subgraph is (1+o(1))2 ( 1)/2.

More information

Enumerative Combinatorics 7: Group actions

Enumerative Combinatorics 7: Group actions Enumerative Combinatorics 7: Group actions Peter J. Cameron Autumn 2013 How many ways can you colour the faces of a cube with three colours? Clearly the answer is 3 6 = 729. But what if we regard two colourings

More information

Introduction to Association Schemes

Introduction to Association Schemes Introduction to Association Schemes Akihiro Munemasa Tohoku University June 5 6, 24 Algebraic Combinatorics Summer School, Sendai Assumed results (i) Vandermonde determinant: a a m =. a m a m m i

More information

Some Applications of pq-groups in Graph Theory

Some Applications of pq-groups in Graph Theory Some Applications of pq-groups in Graph Theory Geoffrey Exoo Department of Mathematics and Computer Science Indiana State University Terre Haute, IN 47809 g-exoo@indstate.edu January 25, 2002 Abstract

More information

Computational Group Theory

Computational Group Theory Computational Group Theory Soria Summer School 2009 Session 3: Coset enumeration July 2009, Hans Sterk (sterk@win.tue.nl) Where innovation starts Coset enumeration: contents 2/25 What is coset enumeration

More information

Implementations of 3 Types of the Schreier-Sims Algorithm

Implementations of 3 Types of the Schreier-Sims Algorithm Implementations of 3 Types of the Schreier-Sims Algorithm Martin Jaggi m.jaggi@gmx.net MAS334 - Mathematics Computing Project Under supervison of Dr L.H.Soicher Queen Mary University of London March 2005

More information

Last Time. Decompose group: Subgroup and Cosets. Use for permutation groups with subgroup being point stabilizer.

Last Time. Decompose group: Subgroup and Cosets. Use for permutation groups with subgroup being point stabilizer. Last Time Orbit / Stabilizer algorithm Decompose group: Subgroup and Cosets Use for permutation groups with subgroup being point stabilizer. Can iterate again for subgroups: Logarithmize problem. Stabilizer

More information

The Lovász Local Lemma: constructive aspects, stronger variants and the hard core model

The Lovász Local Lemma: constructive aspects, stronger variants and the hard core model The Lovász Local Lemma: constructive aspects, stronger variants and the hard core model Jan Vondrák 1 1 Dept. of Mathematics Stanford University joint work with Nick Harvey (UBC) The Lovász Local Lemma

More information

The cycle polynomial of a permutation group

The cycle polynomial of a permutation group The cycle polynomial of a permutation group Peter J. Cameron School of Mathematics and Statistics University of St Andrews North Haugh St Andrews, Fife, U.K. pjc0@st-andrews.ac.uk Jason Semeraro Department

More information

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted

More information

HW Graph Theory SOLUTIONS (hbovik) - Q

HW Graph Theory SOLUTIONS (hbovik) - Q 1, Diestel 3.5: Deduce the k = 2 case of Menger s theorem (3.3.1) from Proposition 3.1.1. Let G be 2-connected, and let A and B be 2-sets. We handle some special cases (thus later in the induction if these

More information

Combinatorial Optimization

Combinatorial Optimization Combinatorial Optimization Problem set 8: solutions 1. Fix constants a R and b > 1. For n N, let f(n) = n a and g(n) = b n. Prove that f(n) = o ( g(n) ). Solution. First we observe that g(n) 0 for all

More information

-bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE ATIME QSAT, GEOGRAPHY, SUCCINCT REACH.

-bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE ATIME QSAT, GEOGRAPHY, SUCCINCT REACH. CMPSCI 601: Recall From Last Time Lecture 26 Theorem: All CFL s are in sac. Facts: ITADD, MULT, ITMULT and DIVISION on -bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE

More information

10.4 The Kruskal Katona theorem

10.4 The Kruskal Katona theorem 104 The Krusal Katona theorem 141 Example 1013 (Maximum weight traveling salesman problem We are given a complete directed graph with non-negative weights on edges, and we must find a maximum weight Hamiltonian

More information

4. How to prove a problem is NPC

4. How to prove a problem is NPC The reducibility relation T is transitive, i.e, A T B and B T C imply A T C Therefore, to prove that a problem A is NPC: (1) show that A NP (2) choose some known NPC problem B define a polynomial transformation

More information

Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia

Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Andreas Krause krausea@cs.tum.edu Technical University of Munich February 12, 2003 This survey gives an introduction

More information

Interactive Proofs. Merlin-Arthur games (MA) [Babai] Decision problem: D;

Interactive Proofs. Merlin-Arthur games (MA) [Babai] Decision problem: D; Interactive Proofs n x: read-only input finite σ: random bits control Π: Proof work tape Merlin-Arthur games (MA) [Babai] Decision problem: D; input string: x Merlin Prover chooses the polynomial-length

More information

2 Evidence that Graph Isomorphism is not NP-complete

2 Evidence that Graph Isomorphism is not NP-complete Topics in Theoretical Computer Science April 11, 2016 Lecturer: Ola Svensson Lecture 7 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent

More information

Ma/CS 6b Class 12: Graphs and Matrices

Ma/CS 6b Class 12: Graphs and Matrices Ma/CS 6b Class 2: Graphs and Matrices 3 3 v 5 v 4 v By Adam Sheffer Non-simple Graphs In this class we allow graphs to be nonsimple. We allow parallel edges, but not loops. Incidence Matrix Consider a

More information

Regular actions of groups and inverse semigroups on combinatorial structures

Regular actions of groups and inverse semigroups on combinatorial structures Regular actions of groups and inverse semigroups on combinatorial structures Tatiana Jajcayová Comenius University, Bratislava CSA 2016, Lisbon August 1, 2016 (joint work with Robert Jajcay) Group of Automorphisms

More information

1 Review of Vertex Cover

1 Review of Vertex Cover CS266: Parameterized Algorithms and Complexity Stanford University Lecture 3 Tuesday, April 9 Scribe: Huacheng Yu Spring 2013 1 Review of Vertex Cover In the last lecture, we discussed FPT algorithms for

More information

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals

More information

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized

More information

Quantum walk algorithms

Quantum walk algorithms Quantum walk algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 28 September 2011 Randomized algorithms Randomness is an important tool in computer science Black-box problems

More information

Rewriting Polynomials

Rewriting Polynomials Rewriting Polynomials 1 Roots and Eigenvalues the companion matrix of a polynomial the ideal membership problem 2 Automatic Geometric Theorem Proving the circle theorem of Appolonius 3 The Division Algorithm

More information

arxiv: v1 [math.co] 19 Aug 2016

arxiv: v1 [math.co] 19 Aug 2016 THE EXCHANGE GRAPHS OF WEAKLY SEPARATED COLLECTIONS MEENA JAGADEESAN arxiv:1608.05723v1 [math.co] 19 Aug 2016 Abstract. Weakly separated collections arise in the cluster algebra derived from the Plücker

More information

Kernelization by matroids: Odd Cycle Transversal

Kernelization by matroids: Odd Cycle Transversal Lecture 8 (10.05.2013) Scribe: Tomasz Kociumaka Lecturer: Marek Cygan Kernelization by matroids: Odd Cycle Transversal 1 Introduction The main aim of this lecture is to give a polynomial kernel for the

More information

Chordal Coxeter Groups

Chordal Coxeter Groups arxiv:math/0607301v1 [math.gr] 12 Jul 2006 Chordal Coxeter Groups John Ratcliffe and Steven Tschantz Mathematics Department, Vanderbilt University, Nashville TN 37240, USA Abstract: A solution of the isomorphism

More information

A note on the Isomorphism Problem for Monomial Digraphs

A note on the Isomorphism Problem for Monomial Digraphs A note on the Isomorphism Problem for Monomial Digraphs Aleksandr Kodess Department of Mathematics University of Rhode Island kodess@uri.edu Felix Lazebnik Department of Mathematical Sciences University

More information

Zero sum partition of Abelian groups into sets of the same order and its applications

Zero sum partition of Abelian groups into sets of the same order and its applications Zero sum partition of Abelian groups into sets of the same order and its applications Sylwia Cichacz Faculty of Applied Mathematics AGH University of Science and Technology Al. Mickiewicza 30, 30-059 Kraków,

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

120A LECTURE OUTLINES

120A LECTURE OUTLINES 120A LECTURE OUTLINES RUI WANG CONTENTS 1. Lecture 1. Introduction 1 2 1.1. An algebraic object to study 2 1.2. Group 2 1.3. Isomorphic binary operations 2 2. Lecture 2. Introduction 2 3 2.1. The multiplication

More information

Notes on cycle generating functions

Notes on cycle generating functions Notes on cycle generating functions. The cycle generating function of a species A combinatorial species is a rule attaching to each finite set X a set of structures on X, in such a way that the allowed

More information

Strongly regular graphs and Borsuk s conjecture

Strongly regular graphs and Borsuk s conjecture Optimal Point Configurations and Orthogonal Polynomials 2017 Strongly regular graphs and Borsuk s conjecture Andriy Bondarenko Norwegian University of Science and Technology 19 April 2017 Andriy Bondarenko

More information

Topics in Approximation Algorithms Solution for Homework 3

Topics in Approximation Algorithms Solution for Homework 3 Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L

More information

On the query complexity of counterfeiting quantum money

On the query complexity of counterfeiting quantum money On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum

More information

Tree-width and algorithms

Tree-width and algorithms Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding

More information

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.

More information

Permutation Groups. John Bamberg, Michael Giudici and Cheryl Praeger. Centre for the Mathematics of Symmetry and Computation

Permutation Groups. John Bamberg, Michael Giudici and Cheryl Praeger. Centre for the Mathematics of Symmetry and Computation Notation Basics of permutation group theory Arc-transitive graphs Primitivity Normal subgroups of primitive groups Permutation Groups John Bamberg, Michael Giudici and Cheryl Praeger Centre for the Mathematics

More information

Lecture 15: The Hidden Subgroup Problem

Lecture 15: The Hidden Subgroup Problem CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry

More information

Out-colourings of Digraphs

Out-colourings of Digraphs Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.

More information

Kernelization Lower Bounds: A Brief History

Kernelization Lower Bounds: A Brief History Kernelization Lower Bounds: A Brief History G Philip Max Planck Institute for Informatics, Saarbrücken, Germany New Developments in Exact Algorithms and Lower Bounds. Pre-FSTTCS 2014 Workshop, IIT Delhi

More information

Automorphism groups of wreath product digraphs

Automorphism groups of wreath product digraphs Automorphism groups of wreath product digraphs Edward Dobson Department of Mathematics and Statistics Mississippi State University PO Drawer MA Mississippi State, MS 39762 USA dobson@math.msstate.edu Joy

More information

(c) Give a proof of or a counterexample to the following statement: (3n 2)= n(3n 1) 2

(c) Give a proof of or a counterexample to the following statement: (3n 2)= n(3n 1) 2 Question 1 (a) Suppose A is the set of distinct letters in the word elephant, B is the set of distinct letters in the word sycophant, C is the set of distinct letters in the word fantastic, and D is the

More information

Outline. Complexity Theory. Example. Sketch of a log-space TM for palindromes. Log-space computations. Example VU , SS 2018

Outline. Complexity Theory. Example. Sketch of a log-space TM for palindromes. Log-space computations. Example VU , SS 2018 Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 3. Logarithmic Space Reinhard Pichler Institute of Logic and Computation DBAI Group TU Wien 3. Logarithmic Space 3.1 Computational

More information

Lecture 1. (i,j) N 2 kx i y j, and this makes k[x, y]

Lecture 1. (i,j) N 2 kx i y j, and this makes k[x, y] Lecture 1 1. Polynomial Rings, Gröbner Bases Definition 1.1. Let R be a ring, G an abelian semigroup, and R = i G R i a direct sum decomposition of abelian groups. R is graded (G-graded) if R i R j R i+j

More information

BASIC GROUP THEORY : G G G,

BASIC GROUP THEORY : G G G, BASIC GROUP THEORY 18.904 1. Definitions Definition 1.1. A group (G, ) is a set G with a binary operation : G G G, and a unit e G, possessing the following properties. (1) Unital: for g G, we have g e

More information

Strongly chordal and chordal bipartite graphs are sandwich monotone

Strongly chordal and chordal bipartite graphs are sandwich monotone Strongly chordal and chordal bipartite graphs are sandwich monotone Pinar Heggernes Federico Mancini Charis Papadopoulos R. Sritharan Abstract A graph class is sandwich monotone if, for every pair of its

More information

The Strong Largeur d Arborescence

The Strong Largeur d Arborescence The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics

More information

The Graph Isomorphism Problem and the Module Isomorphism Problem. Harm Derksen

The Graph Isomorphism Problem and the Module Isomorphism Problem. Harm Derksen The Graph Isomorphism Problem and the Module Isomorphism Problem Harm Derksen Department of Mathematics Michigan Center for Integrative Research in Critical Care University of Michigan Partially supported

More information

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Pinar Heggernes Pim van t Hof Daniel Meister Yngve Villanger Abstract Given two graphs G and H as input, the Induced Subgraph

More information

Löwenheim-Skolem Theorems, Countable Approximations, and L ω. David W. Kueker (Lecture Notes, Fall 2007)

Löwenheim-Skolem Theorems, Countable Approximations, and L ω. David W. Kueker (Lecture Notes, Fall 2007) Löwenheim-Skolem Theorems, Countable Approximations, and L ω 0. Introduction David W. Kueker (Lecture Notes, Fall 2007) In its simplest form the Löwenheim-Skolem Theorem for L ω1 ω states that if σ L ω1

More information

Graph Isomorphism is in SPP

Graph Isomorphism is in SPP Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur 1 Institute of Mathematical Sciences, Chennai 600113, India Abstract We show that Graph Isomorphism is in the complexity class SPP, and hence it

More information

Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr.

Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Radhika Nagpal Quiz 1 Appendix Appendix Contents 1 Induction 2 2 Relations

More information

Elliptic Curve Discrete Logarithm Problem

Elliptic Curve Discrete Logarithm Problem Elliptic Curve Discrete Logarithm Problem Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM October 19, 2009 Vanessa VITSE (UVSQ) Elliptic Curve Discrete Logarithm Problem October

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 19 November 8, 2017 CPSC 467, Lecture 19 1/37 Zero Knowledge Interactive Proofs (ZKIP) ZKIP for graph isomorphism Feige-Fiat-Shamir

More information

Chapter One. Affine Coxeter Diagrams

Chapter One. Affine Coxeter Diagrams Chapter One Affine Coxeter Diagrams By the results summarized in Chapter VI, Section 43, of [3], affine Coxeter groups can be characterized as groups generated by reflections of an affine space (by which

More information

arxiv: v2 [math.co] 30 Jun 2013

arxiv: v2 [math.co] 30 Jun 2013 A polynomial representation and a unique code of a simple undirected graph arxiv:1304.5847v2 [math.co] 30 Jun 2013 Shamik Ghosh, Raibatak Sen Gupta, M. K. Sen Abstract In this note we introduce a representation

More information