Spelling suggestions: "subject:"combinatorics anda aptimization"" "subject:"combinatorics anda anoptimization""
31 |
Modularity and Structure in MatroidsKapadia, Rohan January 2013 (has links)
This thesis concerns sufficient conditions for a matroid to admit one of two types of structural characterization: a representation over a finite field or a description as a frame matroid.
We call a restriction N of a matroid M modular if, for every flat F of M,
r_M(F) + r(N) = r_M(F ∩ E(N)) + r_M(F ∪ E(N)).
A consequence of a theorem of Seymour is that any 3-connected matroid with a modular U_{2,3}-restriction is binary.
We extend this fact to arbitrary finite fields, showing that if N is a modular rank-3 restriction of a vertically 4-connected matroid M, then any representation of N over a finite field extends to a representation of M.
We also look at a more general notion of modularity that applies to minors of a matroid, and use it to present conditions for a matroid with a large projective geometry minor to be representable over a finite field.
In particular, we show that a 3-connected, representable matroid with a sufficiently large projective geometry over a finite field GF(q) as a minor is either representable over GF(q) or has a U_{2,q^2+1}-minor.
A second result of Seymour is that any vertically 4-connected matroid with a modular M(K_4)-restriction is graphic.
Geelen, Gerards, and Whittle partially generalized this from M(K_4) to larger frame matroids, showing that any vertically 5-connected, representable matroid with a rank-4 Dowling geometry as a modular restriction is a frame matroid.
As with projective geometries, we prove a version of this result for matroids with large Dowling geometries as minors, providing conditions which imply that they are frame matroids.
|
32 |
On Excluded Minors for Even Cut MatroidsPivotto, Irene January 2006 (has links)
In this thesis we will present two main theorems that can be used to study
minor minimal non even cut matroids.
Given any signed graph we can associate an even cut matroid. However, given
an even cut matroid, there are in general, several signed graphs which
represent that matroid. This is in contrast to, for instance graphic (or
cographic) matroids, where all graphs corresponding to a particular
graphic matroid are essentially equivalent. To tackle the multiple
non equivalent representations of even cut matroids we use the concept of
Stabilizer first introduced by Wittle. Namely, we show the following:
given a "substantial" signed graph, which represents a matroid N that is a
minor of a matroid M, then if the signed graph extends to a signed graph
which represents M then it does so uniquely. Thus the representations of the
small matroid determine the representations of the larger matroid containing
it. This allows us to consider each representation of an even cut matroid
essentially independently.
Consider a small even cut matroid N that is a minor of a matroid M that is
not an even cut matroid. We would like to prove that there exists a
matroid N' which contains N and is contained in M such that the size of N'
is small and such that N' is not an even cut matroid (this would imply in
particular that there are only finitely many minimally non even cut
matroids containing N). Clearly, none of the representations of N extends to
M. We will show that (under certain technical conditions) starting from a
fixed representation of N, there exists a matroid N' which contains N
and is contained in M such that the size of N' is small and such that the
representation of N does not extend to N'.
|
33 |
Welch Bounds and Quantum State TomographyBelovs, Aleksandrs January 2008 (has links)
In this thesis we investigate complete systems of MUBs and SIC-POVMs. These are highly
symmetric sets of vectors in Hilbert space, interesting because of their applications in quantum
tomography, quantum cryptography and other areas. It is known that these objects
form complex projective 2-designs, that is, they satisfy Welch bounds for k = 2 with equality.
Using this fact, we derive a necessary and sufficient condition for a set of vectors to be
a complete system of MUBs or a SIC-POVM. This condition uses the orthonormality of a
specific set of vectors.
Then we define homogeneous systems, as a special case of systems of vectors for which
the condition takes an especially elegant form. We show how known results and some new
results naturally follow from this construction.
|
34 |
Classical Authenticated Key Exchange and Quantum CryptographyStebila, Douglas January 2009 (has links)
Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still major concerns. The main goal in this thesis is to consider how cryptographic techniques can be extended to offer greater defence against these non-traditional security threats.
In the first part of this thesis, we consider problems in classical cryptography. We introduce multi-factor password-authenticated key exchange which allows secure authentication and key agreement based on multiple short secrets, such as a long-term password and a one-time response; it can provide an enhanced level of assurance in higher security scenarios because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised due to attacks such as phishing or spyware. Next, we consider the integration of denial of service countermeasures with key exchange protocols: by introducing a formal model for denial of service resilience that complements the extended Canetti-Krawczyk model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client puzzles. Additionally, we look at how side-channel attacks affect certain types of formulae used in elliptic curve cryptography, and demonstrate that information leaked during field operations such as addition, subtraction, and multiplication can be exploited by an attacker.
In the second part of this thesis, we examine cryptography in the quantum setting. We argue that quantum key distribution will have an important role to play in future information security infrastructures and will operate best when integrated with the powerful public key infrastructures that are used today. Finally, we present a new look at quantum money and describe a quantum coin scheme where the coins are not easily counterfeited, are locally verifiable, and can be transferred to another party.
|
35 |
The Linkage Problem for Group-labelled GraphsHuynh, Tony January 2009 (has links)
This thesis aims to extend some of the results of the Graph Minors Project of Robertson and Seymour to "group-labelled graphs". Let $\Gamma$ be a group. A $\Gamma$-labelled graph is an oriented graph with its edges labelled from $\Gamma$, and is thus a generalization of a signed graph.
Our primary result is a generalization of the main result from Graph Minors XIII. For any finite abelian group $\Gamma$, and any fixed $\Gamma$-labelled graph $H$, we present a polynomial-time algorithm that determines if an input $\Gamma$-labelled graph $G$ has an $H$-minor. The correctness of our algorithm relies on much of the machinery developed throughout the graph minors papers. We therefore hope it can serve as a reasonable introduction to the subject.
Remarkably, Robertson and Seymour also prove that for any sequence $G_1, G_2, \dots$ of graphs, there exist indices $i<j$ such that $G_i$ is isomorphic to a minor of $G_j$. Geelen, Gerards and Whittle recently announced a proof of the analogous result for $\Gamma$-labelled graphs, for $\Gamma$ finite abelian. Together with the main result of this thesis, this implies that membership in any minor closed class of $\Gamma$-labelled graphs can be decided in polynomial-time. This also has some implications for well-quasi-ordering certain classes of matroids, which we discuss.
|
36 |
Path Tableaux and the Combinatorics of the Immanant FunctionTessier, Rebecca January 2013 (has links)
Immanants are a generalization of the well-studied determinant and permanent. Although the combinatorial interpretations for the determinant and permanent have been studied in excess, there remain few combinatorial interpretations for the immanant.
The main objective of this thesis is to consider the immanant, and its possible combinatorial interpretations, in terms of recursive structures on the character. This thesis presents a comprehensive view of previous interpretations of immanants. Furthermore, it discusses algebraic techniques that may be used to investigate further into the combinatorial aspects of the immanant.
We consider the Temperley-Lieb algebra and the class of immanants over the elements of this algebra. Combinatorial tools including the Temperley-Lieb algebra and Kauffman diagrams will be used in a number of interpretations. In particular, we extend some results for the permanent and determinant based on the $R$-weighted planar network construction, where $R$ is a convenient ring, by Clearman, Shelton, and Skandera. This thesis also presents some cases in which this construction cannot be extended. Finally, we present some extensions to combinatorial interpretations on certain classes of tableaux, as well as certain classes of matrices.
|
37 |
On Excluded Minors for Even Cut MatroidsPivotto, Irene January 2006 (has links)
In this thesis we will present two main theorems that can be used to study
minor minimal non even cut matroids.
Given any signed graph we can associate an even cut matroid. However, given
an even cut matroid, there are in general, several signed graphs which
represent that matroid. This is in contrast to, for instance graphic (or
cographic) matroids, where all graphs corresponding to a particular
graphic matroid are essentially equivalent. To tackle the multiple
non equivalent representations of even cut matroids we use the concept of
Stabilizer first introduced by Wittle. Namely, we show the following:
given a "substantial" signed graph, which represents a matroid N that is a
minor of a matroid M, then if the signed graph extends to a signed graph
which represents M then it does so uniquely. Thus the representations of the
small matroid determine the representations of the larger matroid containing
it. This allows us to consider each representation of an even cut matroid
essentially independently.
Consider a small even cut matroid N that is a minor of a matroid M that is
not an even cut matroid. We would like to prove that there exists a
matroid N' which contains N and is contained in M such that the size of N'
is small and such that N' is not an even cut matroid (this would imply in
particular that there are only finitely many minimally non even cut
matroids containing N). Clearly, none of the representations of N extends to
M. We will show that (under certain technical conditions) starting from a
fixed representation of N, there exists a matroid N' which contains N
and is contained in M such that the size of N' is small and such that the
representation of N does not extend to N'.
|
38 |
Welch Bounds and Quantum State TomographyBelovs, Aleksandrs January 2008 (has links)
In this thesis we investigate complete systems of MUBs and SIC-POVMs. These are highly
symmetric sets of vectors in Hilbert space, interesting because of their applications in quantum
tomography, quantum cryptography and other areas. It is known that these objects
form complex projective 2-designs, that is, they satisfy Welch bounds for k = 2 with equality.
Using this fact, we derive a necessary and sufficient condition for a set of vectors to be
a complete system of MUBs or a SIC-POVM. This condition uses the orthonormality of a
specific set of vectors.
Then we define homogeneous systems, as a special case of systems of vectors for which
the condition takes an especially elegant form. We show how known results and some new
results naturally follow from this construction.
|
39 |
Classical Authenticated Key Exchange and Quantum CryptographyStebila, Douglas January 2009 (has links)
Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Yet security problems abound in electronic communication: spyware, phishing, denial of service, and side-channel attacks are still major concerns. The main goal in this thesis is to consider how cryptographic techniques can be extended to offer greater defence against these non-traditional security threats.
In the first part of this thesis, we consider problems in classical cryptography. We introduce multi-factor password-authenticated key exchange which allows secure authentication and key agreement based on multiple short secrets, such as a long-term password and a one-time response; it can provide an enhanced level of assurance in higher security scenarios because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised due to attacks such as phishing or spyware. Next, we consider the integration of denial of service countermeasures with key exchange protocols: by introducing a formal model for denial of service resilience that complements the extended Canetti-Krawczyk model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client puzzles. Additionally, we look at how side-channel attacks affect certain types of formulae used in elliptic curve cryptography, and demonstrate that information leaked during field operations such as addition, subtraction, and multiplication can be exploited by an attacker.
In the second part of this thesis, we examine cryptography in the quantum setting. We argue that quantum key distribution will have an important role to play in future information security infrastructures and will operate best when integrated with the powerful public key infrastructures that are used today. Finally, we present a new look at quantum money and describe a quantum coin scheme where the coins are not easily counterfeited, are locally verifiable, and can be transferred to another party.
|
40 |
The Linkage Problem for Group-labelled GraphsHuynh, Tony January 2009 (has links)
This thesis aims to extend some of the results of the Graph Minors Project of Robertson and Seymour to "group-labelled graphs". Let $\Gamma$ be a group. A $\Gamma$-labelled graph is an oriented graph with its edges labelled from $\Gamma$, and is thus a generalization of a signed graph.
Our primary result is a generalization of the main result from Graph Minors XIII. For any finite abelian group $\Gamma$, and any fixed $\Gamma$-labelled graph $H$, we present a polynomial-time algorithm that determines if an input $\Gamma$-labelled graph $G$ has an $H$-minor. The correctness of our algorithm relies on much of the machinery developed throughout the graph minors papers. We therefore hope it can serve as a reasonable introduction to the subject.
Remarkably, Robertson and Seymour also prove that for any sequence $G_1, G_2, \dots$ of graphs, there exist indices $i<j$ such that $G_i$ is isomorphic to a minor of $G_j$. Geelen, Gerards and Whittle recently announced a proof of the analogous result for $\Gamma$-labelled graphs, for $\Gamma$ finite abelian. Together with the main result of this thesis, this implies that membership in any minor closed class of $\Gamma$-labelled graphs can be decided in polynomial-time. This also has some implications for well-quasi-ordering certain classes of matroids, which we discuss.
|
Page generated in 0.0981 seconds