Raylin Tsot1, Ying Miao2, Eiji Okamotolt3
1raylin@cipher.risk.tsukuba.ac.jp
2miao@risk.tsukuba.ac.jp
3okamoto@risk.tsukuba.ac.jp
Abstract:

In the Shamir \( (k,n) \) threshold scheme, if one or more of the \( n \) shares are fake, then the secret may not be reconstructed correctly by some sets of \( k \) shares. Supposing that at most \( t \) of the \( n \) shares are fake, Rees et al. (1999) described two algorithms to determine consistent sets of shares so that the secret can be reconstructed correctly from \( k \) shares in any of these consistent sets. In their algorithms, no honest participant can be absent and at least \( n – t \) shares should be pooled during the secret reconstruction phase. In this paper, we propose a modified algorithm for this problem so that the number of participants taking part in the secret reconstruction can be reduced to \( k + 2t \) and the shares need to be pooled can be reduced to, in the best case, \( k + t \), and less than or equal to \( k + 2t \) in the others. Its performance is evaluated. A construction for \( t \)-coverings, which play key roles in these algorithms, is also provided.

Chih-Hung Yen1, Hung-Lin Fu1
1Department of Applied Mathematics National Chiao Tung University Hsinchu 30050, Taiwan R.O.C.
Abstract:

A linear \( k \)-forest is a graph whose components are paths with lengths at most \( k \). The minimum number of linear \( k \)-forests needed to decompose a graph \( G \) is the linear \( k \)-arboricity of \( G \) and is denoted by \( la_k(G) \). In this paper, we study the linear \( 3 \)-arboricity of balanced complete multipartite graphs and we obtain some substantial results.

Abstract:

Let \( m_2(N, q) \) denote the size of the largest caps in \( PG(N, q) \) and let \( m_2′(N, q) \) denote the size of the second-largest complete caps in \( PG(N, q) \). Presently, it is known that \( m_2(4, 5) \leq 111 \) and that \( m_2(4, 7) \leq 316 \). Via computer searches for caps in \( PG(4, 5) \) using the result of Abatangelo, Larato, and Korchmáros that \( m_2′(3, 5) = 20 \), we improve the first upper bound to \( m_2(4, 5) \leq 88 \). Computer searches in \( PG(3, 7) \) show that \( m_2′(3, 7) = 32 \), and this latter result then improves the upper bound on \( m_2(4, 7) \) to \( m_2(4, 7) \leq 238 \). We also present the known upper bounds on \( m_2(N, 5) \) and \( m_2(N, 7) \) for \( N > 4 \).

Lorenzo Traldi1
1Department of Mathematics, Lafayette College Easton, PA 18042 USA
Abstract:

A sum of disjoint products (SDP) representation of a Boolean function is useful because it provides readily available information about the function; however, a typical SDP contains many more terms than an equivalent ordinary sum of products. We conjecture the existence of certain particular SDP forms of \( x_1 + \cdots + x_t \), which could be used as patterns in creating relatively economical SDP forms of other Boolean functions.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;