Skip to main content
Erschienen in: Designs, Codes and Cryptography 12/2018

31.03.2018

Some results on generalized strong external difference families

verfasst von: Xiaojuan Lu, Xiaolei Niu, Haitao Cao

Erschienen in: Designs, Codes and Cryptography | Ausgabe 12/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A generalized strong external difference family (briefly \((v, m; k_1,\dots ,k_m; \lambda _1,\dots ,\lambda _m)\)-GSEDF) was introduced by Paterson and Stinson in 2016. In this paper, we give some nonexistence results for GSEDFs. In particular, we prove that a \((v, 3;k_1,k_2,k_3; \lambda _1,\lambda _2,\lambda _3)\)-GSEDF does not exist when \(k_1+k_2+k_3< v\). We also give a first recursive construction for GSEDFs and prove that if there is a \((v,2;2\lambda ,\frac{v-1}{2};\lambda ,\lambda )\)-GSEDF, then there is a \((vt,2;4\lambda ,\frac{vt-1}{2};2\lambda ,2\lambda )\)-GSEDF with \(v>1\), \(t>1\) and \(v\equiv t\equiv 1\pmod 2\). Then we use it to obtain some new GSEDFs for \(m=2\). In particular, for any prime power q with \(q\equiv 1\pmod 4\), we show that there exists a \((qt, 2;(q-1)2^{n-1},\frac{qt-1}{2};(q-1)2^{n-2},(q-1)2^{n-2})\)-GSEDF, where \(t=p_1p_2\dots p_n\), \(p_i>1\), \(1\le i\le n\), \(p_1, p_2,\dots ,p_n\) are odd integers.
Literatur
2.
Zurück zum Zitat Baumert L.D.: Cyclic Difference Sets, vol. 182. Lecture Notes in MathematicsSpringer, Berlin (1971).MATH Baumert L.D.: Cyclic Difference Sets, vol. 182. Lecture Notes in MathematicsSpringer, Berlin (1971).MATH
3.
Zurück zum Zitat Bondy J.A., Murty U.S.R.: Graph Theory, vol. 244. Graduate Texts in MathematicsSpringer, New York (2008).MATH Bondy J.A., Murty U.S.R.: Graph Theory, vol. 244. Graduate Texts in MathematicsSpringer, New York (2008).MATH
4.
Zurück zum Zitat Colbourn C.J., Dinitz J.H. (eds.): Handbook of Combinatorial Designs, 2nd edn. Chapman & Hall/CRC, Boca Raton, FL (2007).MATH Colbourn C.J., Dinitz J.H. (eds.): Handbook of Combinatorial Designs, 2nd edn. Chapman & Hall/CRC, Boca Raton, FL (2007).MATH
5.
Zurück zum Zitat Cramer R., Dodis Y., Fehr S., Padro C., Wichs D.: Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. Lecture Notes in Computer Science, vol. 4965, pp. 471–488 (2008). Cramer R., Dodis Y., Fehr S., Padro C., Wichs D.: Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. Lecture Notes in Computer Science, vol. 4965, pp. 471–488 (2008).
6.
Zurück zum Zitat Cramer R., Fehr S., Padro C.: Algebraic manipulation detection codes. Sci. China Math. 56, 1349–1358 (2013).MathSciNetCrossRef Cramer R., Fehr S., Padro C.: Algebraic manipulation detection codes. Sci. China Math. 56, 1349–1358 (2013).MathSciNetCrossRef
7.
Zurück zum Zitat Cramer R., Padro C., Xing C.: Optimal algebraic manipulation detection codes in the constant-error model. Lect. Notes Comput. Sci. 9014, 481–501 (2015).MathSciNetCrossRef Cramer R., Padro C., Xing C.: Optimal algebraic manipulation detection codes in the constant-error model. Lect. Notes Comput. Sci. 9014, 481–501 (2015).MathSciNetCrossRef
8.
Zurück zum Zitat Huczynska S., Paterson M.B.: Existence and non-existence results for strong external difference families. Discret. Math. 341, 87–95 (2018).MathSciNetCrossRef Huczynska S., Paterson M.B.: Existence and non-existence results for strong external difference families. Discret. Math. 341, 87–95 (2018).MathSciNetCrossRef
11.
Zurück zum Zitat Lander E.S.: Symmetric Designs: An Algebraic Approach. London Mathematical Society Lecture Note Series, vol. 74. Cambridge University Press, Cambridge (1983).CrossRef Lander E.S.: Symmetric Designs: An Algebraic Approach. London Mathematical Society Lecture Note Series, vol. 74. Cambridge University Press, Cambridge (1983).CrossRef
12.
Zurück zum Zitat Ledermann W.: Introduction to Group Characters, 2nd edn. Cambridge University Press, Cambridge (1987).CrossRef Ledermann W.: Introduction to Group Characters, 2nd edn. Cambridge University Press, Cambridge (1987).CrossRef
13.
Zurück zum Zitat Lidl R., Niederreiter H.: Finite Fields. Advanced Book ProgramAddison-Wesley Publishing Company, Reading, MA (1983).MATH Lidl R., Niederreiter H.: Finite Fields. Advanced Book ProgramAddison-Wesley Publishing Company, Reading, MA (1983).MATH
14.
Zurück zum Zitat Martin W.J., Stinson D.R.: Some nonexistence results for strong external difference families using character theory. Bull. Inst. Comb. Appl. 80, 79–92 (2017).MathSciNetMATH Martin W.J., Stinson D.R.: Some nonexistence results for strong external difference families using character theory. Bull. Inst. Comb. Appl. 80, 79–92 (2017).MathSciNetMATH
15.
Zurück zum Zitat Paterson M.B., Stinson D.R.: Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families. Discret. Math. 339, 2891–2906 (2016).MathSciNetCrossRef Paterson M.B., Stinson D.R.: Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families. Discret. Math. 339, 2891–2906 (2016).MathSciNetCrossRef
17.
Zurück zum Zitat Stinson D.R.: Combinatorial Designs: Constructions and Analysis. Springer, New York (2004).MATH Stinson D.R.: Combinatorial Designs: Constructions and Analysis. Springer, New York (2004).MATH
18.
Zurück zum Zitat Wen J., Yang M., Feng K.: The \((n,m, k,\lambda )\)-strong external difference family with \(m\ge 5\) exists (2016). Arxiv preprint arXiv:1612.09495. Wen J., Yang M., Feng K.: The \((n,m, k,\lambda )\)-strong external difference family with \(m\ge 5\) exists (2016). Arxiv preprint arXiv:​1612.​09495.
Metadaten
Titel
Some results on generalized strong external difference families
verfasst von
Xiaojuan Lu
Xiaolei Niu
Haitao Cao
Publikationsdatum
31.03.2018
Verlag
Springer US
Erschienen in
Designs, Codes and Cryptography / Ausgabe 12/2018
Print ISSN: 0925-1022
Elektronische ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-018-0481-6

Weitere Artikel der Ausgabe 12/2018

Designs, Codes and Cryptography 12/2018 Zur Ausgabe