Beating the Probabilistic Lower Bound on q-Perfect Hashing

被引:4
作者
Xing, Chaoping [1 ]
Yuan, Chen [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Perfect hash code; List recovery; Perfect hash family; NUMBER;
D O I
10.1007/s00493-023-00014-x
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In this paper, we investigate the achievable rate of perfect hash code. For an integer q >= 2, a perfect q-hash code C is a block code over [q] := {1,..., q} of length n in which every subset {c(1), c(2),..., c(q)} of q elements is separated, i.e., there exists i is an element of[n] such that {proj(i) (c(1)),..., proji (cq)} = [q], where proji (c j) denotes the ith position of c j. Finding the maximum size M(n, q) of perfect q-hash codes of length n, for given q and n, is a fundamental problem in combinatorics, information theory, and computer science. In this paper, we are interested in asymptotic behavior of this problem. Precisely speaking, we will focus on the quantity R-q := lim sup(n ->infinity) log2 M(n,q)/n. A well-known probabilistic argument shows an existence lower bound on Rq, namely R-q >= 1 /q-1 log(2) (1/1-q!/q(q) ) (Fredman and Komlos, SIAM J Algebr Discrete Methods 5(1):61-68, 1984; Korner, SIAM J Algebr Discrete Methods 7(4):560-570, 1986). This is still the best-known lower bound till now except for the case q = 3 (Korner and Marton, Eur J Comb 9(6):523-530, 1988). The improved lower bound of R-3 was discovered in 1988 and there has been no progress on the lower bound of R-q for more than 30 years. In this paper we show that this probabilistic lower bound can be improved for q from 4 to 15 and all odd integers between 17 and 25, and all sufficiently large q.
引用
收藏
页码:347 / 366
页数:20
相关论文
共 20 条
[1]   COLOR-CODING [J].
ALON, N ;
YUSTER, R ;
ZWICK, U .
JOURNAL OF THE ASSOCIATION FOR COMPUTING MACHINERY, 1995, 42 (04) :844-856
[2]   AN UPPER BOUND ON THE ZERO-ERROR LIST-CODING CAPACITY [J].
ARIKAN, E .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (04) :1237-1240
[3]  
Bona M, 2015, HDB ENUMERATIVE COMB, DOI DOI 10.1201/B18255
[4]   Estimation of the number of "good" permutations with applications to cryptography [J].
Cooper, C ;
Gilchrist, R ;
Kovalenko, IN ;
Novakovic, D .
CYBERNETICS AND SYSTEMS ANALYSIS, 1999, 35 (05) :688-693
[5]  
Cooper C., 2000, Nat. Acad. Sci. Ukraine, V213, P15
[6]  
Costa S., 2020, ABS200211025 CORR
[7]  
Dalai M, 2017, IEEE INT SYMP INFO, P1658, DOI 10.1109/ISIT.2017.8006811
[8]  
Eberhard S., 2017, ABS170402407 CORR
[9]   Additive triples of bijections, or the toroidal semiqueens problem [J].
Eberhard, Sean ;
Manners, Freddie ;
Mrazovic, Rudi .
JOURNAL OF THE EUROPEAN MATHEMATICAL SOCIETY, 2019, 21 (02) :441-463
[10]   ZERO ERROR CAPACITY UNDER LIST DECODING [J].
ELIAS, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1988, 34 (05) :1070-1074