Optimal Information Ratio of Secret Sharing Schemes on Dutch Windmill Graphs

Total Page:16

File Type:pdf, Size:1020Kb

Optimal Information Ratio of Secret Sharing Schemes on Dutch Windmill Graphs Advances in Mathematics of Communications doi:10.3934/amc.2019005 Volume 13, No. 1, 2019, 89–99 OPTIMAL INFORMATION RATIO OF SECRET SHARING SCHEMES ON DUTCH WINDMILL GRAPHS Bagher Bagherpour∗, Shahrooz Janbaz and Ali Zaghian Applied Mathematics and Cryptography Department Malek Ashtar university of technology, Isfahan, Iran (Communicated by Jens Zumbraegel) Abstract. One of the basic problems in secret sharing is to determine the exact values of the information ratio of the access structures. This task is important from the practical point of view, since the security of any system degrades as the amount of secret information increases. A Dutch windmill graph consists of the edge-disjoint cycles such that all of them meet in one vertex. In this paper, we determine the exact information ratio of secret sharing schemes on the Dutch windmill graphs. Furthermore, we determine the exact ratio of some related graph families. 1. Introduction Let P = {p1,p2,...,pn} be the set of participants among which the dealer wants to share some secret s in such a way that only the qualified subsets of P can reconstruct the secret s. A secret sharing scheme is called perfect if the non-qualified subsets of P can not obtain any information about the secret s. 2P denotes the set of all subsets of the set P , and Γ is a collection of subsets of P . We say that Γ is monotone over P if A ∈ Γ and A ⊆ A′, then A′ ∈ Γ. In the secret sharing schemes, the access structure Γ over P is a collection of all qualified subsets of P that is monotone and ∅ ∈/ Γ. A qualified subset is minimal if it is not a proper subset of any qualified subset. The collection of all minimal qualified subsets is called the basis. Since Γ is monotone, it is fully determined by its basis. The information ratio of a secret sharing scheme is the ratio between the maximum length (in bit) of the shares given to the participants and the length of the secret. Secret sharing scheme was introduced by Blakley and Shamir [2, 20]. Ito et al. showed that there exists a secret sharing scheme to realize any access structure Γ[15, 16]. Also, for arbitrary monotone access structures, Benaloh and Leichter proposed another construction to realize secret sharing schemes [1]. Perfect secret sharing schemes for graphical access structures have attracted the interest of the scientific community [7, 10, 17, 22, 24]. Stinson introduced the decomposition con- struction method to obtain an upper bound for the information ratio of graphical access structure [21]. Jackson and Martin in [17] have studied the information ra- tio of perfect secret sharing schemes on five participants. The information ratio of secret sharing schemes on graphical access structures with six vertices has been studied by Van Dijk in [24]. Sun and Chen proposed the weighted decomposition 2010 Mathematics Subject Classification: Primary: 94A60, 94A62. Key words and phrases: Secret sharing, information ratio, access structure, Dutch windmill graphs. ∗ Corresponding author: Bagher Bagherpour. 89 c 2019 AIMS 90 BagherBagherpour,ShahroozJanbazandAliZaghian construction for secret sharing schemes. Csirmaz and Tardos in [9] determined the exact information ratio for all trees. Csirmaz and Liegti have investigated the information ratio of an infinite family of graphs in [12]. In this paper, we firstly give some preliminaries and introduce some important concepts. After that, our main results are introduced in details. In section 3, we determine the exact information ratio of secret sharing schemes on the Dutch windmill graphs. Furthermore, the information ratio of secret sharing schemes on the cone graphs is studied and the information ratio of secret sharing schemes on some variations of the studied graphs is determined. Finally, we propose some research problems. 2. Preliminaries Let S be the set of all secrets and p ∈ P be an arbitrary participant. The set of all possible shares given to the participant p is denoted by K(p). A secret sharing scheme can be seen as a distribution rule by which the dealer distributes a secret s ∈ S, according to some probability distribution, among the participants in P by giving a share to each participant of P . Thus, each secret sharing scheme induces random variables on the sets S and K(p), where p ∈ P . The Shannon entropy of the random variable taking values in S is denoted by H(S). Also, for each A = {pi1 ,...,pir } ⊆ P , the Shannon entropy of the random variable taking values in K(A) = K(pi1 ) ×···× K(pir ) is denoted by H(A) (for more details see [5]). Let Γ be an access structure on the set of participants P , and let S be the set of secrets. In terms of the entropy, a secret sharing scheme Σ for access structure Γ and the set of secrets S is called perfect secret sharing scheme if the two following conditions hold: 1. ∀A ∈ Γ, H(S|A)=0 2. ∀A∈ / Γ, H(S|A)= H(S). Suppose Γ is an access structure with the participants set P . Suppose Σ is a secret sharing scheme to realize Γ. The information ratio of a participant p ∈ P in Σ, denoted by σp(Σ, Γ), is defined by σp(Σ, Γ) = H(p)/H(S). Also, the information ratio of the scheme Σ is defined by σ(Σ, Γ) = maxp∈P σp(Σ, Γ). The optimal information ratio of the access structure Γ is defined as σ(Γ) = inf(σ(Σ, Γ)), where the infimum is taken over all secret sharing schemes Σ for the access structure Γ. A secret sharing scheme for an access structure Γ is ideal if σ(Γ) = 1. The intuition and the basics of the entropy method can be found in here [14, 24]. Lemma 2.1 which was introduced in [9], is a good tool to obtain some lower bounds for the information ratio of an arbitrary access structure Γ. Lemma 2.1 ([9]). Suppose that Σ is a secret sharing scheme with access structure Γ on a set of participants P . Let S be the set of secrets and A, B ⊆ P . Then we have 1) if A ⊆ B, B ∈ Γ, but A∈ / Γ, then H(B) ≥ H(A)+ H(S), 2) if A, B ∈ Γ but A ∩ B∈ / Γ, then H(A)+ H(B) ≥ H(A ∪ B)+ H(A ∩ B)+ H(S) An equivalent form of the second condition of lemma 2.1 is that if X,Y,Z ⊂ P,X ∪ Z ∈ Γ, Y ∪ Z ∈ Γ and Z∈ / Γ, then we have I(X; Y |Z) ≥ H(S). The following lemma is immediate from H(XZ)= H(XZ|Y )+ I(X; Y |Z)+ I(Y ; Z). Advances in Mathematics of Communications Volume 13, No. 1 (2019), 89–99 Dutch windmill graph access structures 91 Lemma 2.2. Suppose that Σ is a secret sharing scheme with access structure Γ on a set of participants P . Let S be the set of secrets and X,Y,Z ⊆ P . If X ∪ Z ∈ Γ, Y ∪ Z ∈ Γ and Z∈ / Γ, then H(XZ) ≥ H(XZ|Y )+ H(S). M. Van Dijk proved the following property in [24]. Lemma 2.3 ([24], Corollary 2.2, Corollary 2.6). Suppose that Σ is a secret sharing scheme with access structure Γ on a set of participants P . Let S be the set of secrets. Then for all X,Y,Z ⊆ P , if Y ∪ Z∈ / Γ but X ∪ Y ∪ Z ∈ Γ, then H(S) ≤ H(X|Y ). In the above lemma, if we set Z = ∅, then the fact H(S) ≤ H(X) is concluded (for further details see [7]). A complete graph on n vertices is denoted by Kn, and the n-vertex cycle is Cn. A n-vertex complete multipartite graph with partition sets X1,...,Xk is denoted k by Kn1,...,nk , where n = i=1 ni and |Xi| = ni for i = 1,...,k. When necessary, the vertices and edges of a graph G are denoted by V (G) and E(G), respectively. Also, v′ ∼ v if and only ifPvv′ ∈ E(G). Let G and H be two graphs, with vertices x and y, respectively. If we identify the vertices x and y, the resulting graph is called the coalescence of G and H at x and y (we denote it by C({G, H} : x, y)). Let Fk = {G1,...,Gk} be a family of k connected graphs. Let x1,...,xk be the vertices of the graphs G1,...,Gk, respectively. By the coalescence over the family Fk we mean that we identify the vertices x1,...,xk of the graphs G1,...,Gk, respectively. The resulting coalescence graph over the family Fk is denoted by C(Fk : x1,...,xk). If every graph of the family Fk is isomorphic to the complete graph K2, then C(Fk : x1,...,xk) is isomorphic to the star graph K1,n. Also, C(Fk : x1,...,xk) (k) is called the Dutch Windmill graph (denoted by Dn ) if every graph of the family Fk is isomorphic to the cycle graph Cn. We say that C(Fk : x1,...,xk) is the (k) Windmill graph (denoted by Wn ) if every graph of the family Fk is isomorphic to (k) the complete graph Kn. In the case n = 3, the graph D3 is quite famous and is called the friendship graph (denoted by Fk)[13]. In the graph G, the length of the shortest induced cycle is called the girth of G, and is denoted by g(G). Suppose that the complete graph K1 is denoted by a single vertex v. The union of disjoint copies of the graphs G and H is denoted by G ∪ H.
Recommended publications
  • Odd Harmonious Labeling on Pleated of the Dutch Windmill Graphs
    CAUCHY – JURNAL MATEMATIKA MURNI DAN APLIKASI Volume 4 (4) (2017), Pages 161-166 p-ISSN: 2086-0382; e-ISSN: 2477-3344 Odd Harmonious Labeling on Pleated of the Dutch Windmill Graphs Fery Firmansah1, Muhammad Ridlo Yuwono2 1, 2Mathematics Edu. Depart. University of Widya Dharma Klaten, Indonesia Email: [email protected], [email protected] ABSTRACT A graph 퐺(푉(퐺), 퐸(퐺)) is called graph 퐺(푝, 푞) if it has 푝 = |푉(퐺)| vertices and 푞 = |퐸(퐺)| edges. The graph 퐺(푝, 푞) is said to be odd harmonious if there exist an injection 푓: 푉(퐺) → {0,1,2, … ,2푞 − 1} such that the induced function 푓∗: 퐸(퐺) → {1,3,5, … ,2푞 − 1} defined by 푓∗(푢푣) = 푓(푢) + 푓(푣). The function 푓∗ is a bijection and 푓 is said to be odd harmonious labeling of 퐺(푝, 푞). In this paper we prove that pleated of the (푘) Dutch windmill graphs 퐶4 (푟) with 푘 ≥ 1 and 푟 ≥ 1 are odd harmonious graph. Moreover, we also give odd (푘) (푘) harmonious labeling construction for the union pleated of the Dutch windmill graph 퐶4 (푟) ∪ 퐶4 (푟) with 푘 ≥ 1 and 푟 ≥ 1. Keywords: odd harmonious labeling, pleated graph, the Dutch windmill graph INTRODUCTION In this paper we consider simple, finite, connected and undirected graph. A graph 퐺(푝, 푞) with 푝 = |푉(퐺)| vertices and 푞 = |퐸(퐺)| edges. A graph labeling which has often been motivated by practical problems is one of fascinating areas of research. Labeled graphs serves as useful mathematical models for many applications in coding theory, communication networks, and mobile telecommunication system.
    [Show full text]
  • Strong Edge Graceful Labeling of Windmill Graphs ∑
    International Journal of Mathematics Research. ISSN 0976-5840 Volume 5, Number 1 (2013), pp. 19-26 © International Research Publication House http://www.irphouse.com Strong Edge Graceful Labeling of Windmill Graphs Dr. M. Subbiah VKS College Of Engineering& Technology Desiyamangalam, Karur - 639120 [email protected]. Abstract A (p, q) graph G is said to have strong edge graceful labeling if there 3q exists an injection f from the edge set to 1,2, ... so that the 2 induced mapping f+ defined on the vertex set given by f x fxy xy EG mod 2p are distinct. A graph G is said to be strong edge graceful if it admits a strong edge graceful labeling. In this paper we investigate strong edge graceful labeling of Windmill graph. (n) Definition: The windmill graphs Km (n >3) to be the family of graphs consisting of n copies of Km with a vertex in common. (n) Theorem: 1. The windmill graph K4 is strong edge graceful for all n 3 when n is even. (n) Proof: Let {v1, v2, v3, ..., v3n, } be the vertices of K4 and {e1, e2, e3, ...,e3n- (n) 1, e3n, , f1, ,f2, ,f3, . .f3n-1, f3n. } be the edges of K4 which are denoted as in the following Fig. 1. 20 Dr. M. Subbiah . v e 3 3 n n -1 . -1 . v . 3 n f . 3 n -2 f 3 e n . 3 -1 n e 3 2 n n -2 f v v 3 3n 0 2 v 3 . n-2 f v 1 . 2 f 2 f 3 f .
    [Show full text]
  • 5Th Lecture : Modular Decomposition MPRI 2013–2014 Schedule A
    5th Lecture : Modular decomposition MPRI 2013–2014 5th Lecture : Modular decomposition MPRI 2013–2014 Schedule 5th Lecture : Modular decomposition Introduction MPRI 2013–2014 Graph searches Michel Habib Applications of LBFS on structured graph classes [email protected] http://www.liafa.univ-Paris-Diderot.fr/~habib Chordal graphs Cograph recognition Sophie Germain, 22 octobre 2013 A nice conjecture 5th Lecture : Modular decomposition MPRI 2013–2014 5th Lecture : Modular decomposition MPRI 2013–2014 Introduction A hierarchy of graph models 1. Undirected graphs (graphes non orient´es) 2. Tournaments (Tournois), sometimes 2-circuits are allowed. 3. Signed graphs (Graphes sign´es) each edge is labelled + or - (for example friend or enemy) Examen le mardi 26 novembre de 9h `a12h 4. Oriented graphs (Graphes orient´es), each edge is given a Salle habituelle unique direction (no 2-circuits) An interesting subclass are the DAG Directed Acyclic Graphs (graphes sans circuit), for which the transitive closure is a partial order (ordre partiel) 5. Partial orders and comparability graphs an intersting particular case. Duality comparability – cocomparability (graphes de comparabilit´e– graphes d’incomparabilit´e) 6. Directed graphs or digraphs (Graphes dirig´es) 5th Lecture : Modular decomposition MPRI 2013–2014 5th Lecture : Modular decomposition MPRI 2013–2014 Introduction Introduction The problem has to be defined in each model and sometimes it could be hard. ◮ What is the right notion for a coloration in a directed graph ? For partial orders, comparability graphs or uncomparability graphs ◮ No directed cycle unicolored, seems to be the good one. the independant set and maximum clique problems are polynomial. ◮ It took 20 years to find the right notion of oriented matro¨ıd ◮ What is the right notion of treewidth for directed graphs ? ◮ Still an open question.
    [Show full text]
  • Math.RA] 25 Sep 2013 Previous Paper [3], Also Relying in Conceptually Separated Tools from Them, Such As Graphs and Digraphs
    Certain particular families of graphicable algebras Juan Núñez, María Luisa Rodríguez-Arévalo and María Trinidad Villar Dpto. Geometría y Topología. Facultad de Matemáticas. Universidad de Sevilla. Apdo. 1160. 41080-Sevilla, Spain. [email protected] [email protected] [email protected] Abstract In this paper, we introduce some particular families of graphicable algebras obtained by following a relatively new line of research, ini- tiated previously by some of the authors. It consists of the use of certain objects of Discrete Mathematics, mainly graphs and digraphs, to facilitate the study of graphicable algebras, which are a subset of evolution algebras. 2010 Mathematics Subject Classification: 17D99; 05C20; 05C50. Keywords: Graphicable algebras; evolution algebras; graphs. Introduction The main goal of this paper is to advance in the research of a novel mathematical topic emerged not long ago, the evolution algebras in general, and the graphicable algebras (a subset of them) in particular, in order to obtain new results starting from those by Tian (see [4, 5]) and others already obtained by some of us in a arXiv:1309.6469v1 [math.RA] 25 Sep 2013 previous paper [3], also relying in conceptually separated tools from them, such as graphs and digraphs. Concretely, our goal is to find some particular types of graphicable algebras associated with well-known types of graphs. The motivation to deal with evolution algebras in general and graphicable al- gebras in particular is due to the fact that at present, the study of these algebras is very booming, due to the numerous connections between them and many other branches of Mathematics, such as Graph Theory, Group Theory, Markov pro- cesses, dynamic systems and the Theory of Knots, among others.
    [Show full text]
  • Algorithms for Generating Star and Path of Graphs Using BFS Dr
    Web Site: www.ijettcs.org Email: [email protected], [email protected] Volume 1, Issue 3, September – October 2012 ISSN 2278-6856 Algorithms for Generating Star and Path of Graphs using BFS Dr. H. B. Walikar2, Ravikumar H. Roogi1, Shreedevi V. Shindhe3, Ishwar. B4 2,4Prof. Dept of Computer Science, Karnatak University, Dharwad, 1,3Research Scholars, Dept of Computer Science, Karnatak University, Dharwad Abstract: In this paper we deal with BFS algorithm by 1.8 Diamond Graph: modifying it with some conditions and proper labeling of The diamond graph is the simple graph on nodes and vertices which results edges illustrated Fig.7. [2] and on applying it to some small basic 1.9 Paw Graph: class of graphs. The BFS algorithm has to modify The paw graph is the -pan graph, which is also accordingly. Some graphs will result in and by direct application of BFS where some need modifications isomorphic to the -tadpole graph. Fig.8 [2] in the algorithm. The BFS algorithm starts with a root vertex 1.10 Gem Graph: called start vertex. The resulted output tree structure will be The gem graph is the fan graph illustrated Fig.9 [2] in the form of Structure or in Structure. 1.11 Dart Graph: Keywords: BFS, Graph, Star, Path. The dart graph is the -vertex graph illustrated Fig.10.[2] 1.12 Tetrahedral Graph: 1. INTRODUCTION The tetrahedral graph is the Platonic graph that is the 1.1 Graph: unique polyhedral graph on four nodes which is also the A graph is a finite collection of objects called vertices complete graph and therefore also the wheel graph .
    [Show full text]
  • Interlace Polynomials of Friendship Graphs
    Electronic Journal of Graph Theory and Applications 6 (2) (2018), 269–281 Interlace polynomials of friendship graphs Christina Eubanks-Turnera, Aihua Lib aDepartment of Mathematics, Loyola Marymount University, 90045 bDepartment of Mathematical Sciences, Montclair State University, 07043 [email protected], [email protected] Abstract In this paper, we study the interlace polynomials of friendship graphs, that is, graphs that satisfy the Friendship Theorem given by Erdos,¨ Renyi´ and Sos. Explicit formulas, special values, and behaviour of coefficients of these polynomials are provided. We also give the interlace polynomials of other similar graphs, such as, the butterfly graph. Keywords: graph polynomial, interlace polynomial, friendship graph, butterfly graph Mathematics Subject Classification : 05C31, 05C50 DOI: 10.5614/ejgta.2018.6.2.7 1. Introduction Sequencing by hybridization is a method of reconstructing a long DNA string from its nu- cleotide sequence. Since gaining a unique reconstruction from the substrings is not always possi- ble, a major question that arises in this study is “For a random string, how many reconstructions are possible?” In [2], Arratia, Bollobas,´ Coppersmith, and Sorkin answer an important question related to DNA sequencing by converting this to a question about Euler circuits in a 2-in, 2-out graph that have been “toggled” (interlaced). The previously mentioned authors introduced the in- terlace polynomial of a graph, a polynomial that represents the information gained from doing the toggling process on the graph, see [2]. Interlace polynomials are similar to other graph polynomi- als, such as, Tutte and Martin polynomials, see [5]. Some researchers have studied different types of graph polynomials, such as genus polynomials, [7].
    [Show full text]
  • On the Chromatic Number of (P {5},Windmill)-Free Graphs
    Opuscula Math. 37, no. 4 (2017), 609–615 http://dx.doi.org/10.7494/OpMath.2017.37.4.609 Opuscula Mathematica ON THE CHROMATIC NUMBER OF (P5, windmill)-FREE GRAPHS Ingo Schiermeyer Communicated by Hao Li Abstract. In this paper we study the chromatic number of (P5, windmill)-free graphs. For p integers r, p 2 the windmill graph W = K pKr is the graph obtained by joining a single ≥ r+1 1 ∨ vertex (the center) to the vertices of p disjoint copies of a complete graph Kr. Our main result is that every (P5, windmill)-free graph G admits a polynomial χ-binding function. Moreover, we will present polynomial χ-binding functions for several other subclasses of P5-free graphs. Keywords: vertex colouring, perfect graphs, χ-binding function, forbidden induced subgraph. Mathematics Subject Classification: 05C15, 05C17. 1. INTRODUCTION We consider finite, simple, and undirected graphs, and use standard terminology and notation. Let G be a graph. An induced subgraph of G is a graph H such that V (H) V (G), ⊆ and uv E(H) if and only if uv E(G) for all u, v V (H). Given graphs G and F ∈ ∈ ∈ we say that G contains F if F is isomorphic to an induced subgraph of G. We say that a graph G is F -free, if it does not contain F. For two graphs G, H we denote by G + H the disjoint union and by G H the join of G and H, respectively. ∨ A graph G is called k-colourable, if its vertices can be coloured with k colours so that adjacent vertices obtain distinct colours.
    [Show full text]
  • Regular and Biregular Planar Cages
    REGULAR AND BIREGULAR PLANAR CAGES GABRIELA ARAUJO-PARDO 1, FIDEL BARRERA-CRUZ 2, AND NATALIA GARC´IA-COL´IN 3 Abstract. We study the Cage Problem for regular and biregular planar graphs. A (k; g)-graph is a k-regular graph with girth g.A(k; g)-cage is a (k; g)-graph of minimum order. It is not difficult to conclude that the regu- lar planar cages are the Platonic Solids.A(fr; mg; g)-graph is a graph of girth g whose vertices have degrees r and m: A(fr; mg; g)-cage is a (fr; mg; g)-graph of minimum order. In this case we determine the triplets of values (fr; mg; g) for which there exist planar (fr; mg; g){graphs, for all those values we construct examples. Furthermore, for many triplets (fr; mg; g) we build the (fr; mg; g)- cages. Keywords: Cages, Planar Graphs. MSC2010: 05C35, 05C10. 1. Introduction We only consider finite simple graphs. The girth of a graph is the length of a smallest cycle. A (k; g)-graph is a k-regular graph with girth g.A(k; g)-cage is a (k; g)-graph of minimum order, n(k; g): These graphs were introduced by Tutte in 1947 (see [14]). The Cage Problem consists of finding the (k; g)-cages for any pair integers k ≥ 2 and g ≥ 3: However, this challenge has proven to be very difficult even though the existence of (k; g)-graphs was proved by Erd¨osand Sachs in 1963 (see [10]). There is a known natural lower bound for the order of a cage, called Moore's lower bound and denoted by n0(r; g): It is obtained by counting the vertices of a rooted tree, T(g−1)=2 with radius (g − 1)=2, if g is odd; or the vertices of a \double-tree" rooted at an edge (that is, two different rooted trees T(g−3)=2 with the root vertices incident to an edge) if g is even (see [9, 11]).
    [Show full text]
  • The Friendship Theorem
    THE FRIENDSHIP THEOREM ELIZABETH WALKER Abstract. In this paper we explore the friendship theorem, which in graph theory is stated as if we have a finite graph in which any two nodes have exactly one common neighbor, then Then there is a node which is adjacent to all other nodes. We provide a com- mon proof of the friendship theorem, followed by two extensions. The first extension relates to the number of common neighbors a node must have. The second relaxes the friendship condition such that any two nodes can have no common neighbor or one common neighbor. 1. Introduction The Friendship Theorem has long been explored through graph the- ory, and its origins are not known. The Friendship Theorem can be stated as follows: Theorem 1.1. Suppose in a group of people we have the situation that any pair of persons has precisely one common friend. Then there is always a person (the \politician") who is everybody's friend. In such a situation, there is always one person who is everyone's friend. We will see throughout this paper that the Friendship Theorem can be explored with graph theory in order to provide valuable insights to a variety of graphs of different diameter. We will summarize a simple proof of the friendship theorem as well as a purely combinatorial proof proposed by Mertzios and Unger in 2008, and a relaxation of the problem and further conclusions discussed by Skala in 1972. The friendship theorem is commonly translated into a theorem in graph theory: Theorem 1.2. Suppose that G is a finite graph in which any two ver- tices have precisely one common neighbor.
    [Show full text]
  • Peg Solitaire on the Windmill and the Double Star Graphs
    AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 52 (2012), Pages 127–134 Peg solitaire on the windmill and the double star graphs Robert A. Beeler D. Paul Hoilman Department of Mathematics and Statistics East Tennessee State University Johnson City, TN 37614-1700 U.S.A. [email protected] [email protected] Abstract In a recent work by Beeler and Hoilman, the game of peg solitaire is gen- eralized to arbitrary boards. These boards are treated as graphs in the combinatorial sense. In this paper, we extend this study by considering the windmill and the double star. Simple necessary and sufficient condi- tions are given for the solvability of each graph. We also discuss an open problem concerning the range of values for which a graph has a terminal state with k pegs. 1 Introduction Peg solitaire is a table game which traditionally begins with “pegs” in every space except for one which is left empty (i.e., a “hole”). If in some row or column two adjacent pegs are next to a hole (as in Figure 1), then the peg in x canjumpover the peg in y into the hole in z. The peg in y is then removed. The goal is to remove every peg but one. If this is achieved, then the board is considered solved [1, 6]. For more information on traditional peg solitaire, refer to [1, 5, 6, 7]. Figure 1: A Typical Jump in Peg Solitaire 1 2 3 x y z x y z x y z In [3], peg solitaire is generalized to graphs. A graph, G =(V,E), is a set of vertices, V , and a set of edges, E.
    [Show full text]
  • C -Antimagicness of Windmill Graphs
    ISSN: 2455-2631 © February 2018 IJSDR | Volume 3, Issue 2 Super (a,d) -Cn -antimagicness of Windmill Graphs W(n,r) 1Muhammad Awais Umar, 2Mujtaba Hussain 1Abdus Salam School of Mathematical Sciences, G C University, Lahore, Pakistan. 2Department of Mathematics, COMSATS Institute of Information & technology, Lahore, Pakistan. Let G = (V, E) be a finite simple graph with |V (G) | vertices and | E(G) | edges. An edge-covering of G is a family of subgraphs H1, H2 ,, Ht such that each edge of E(G) belongs to at least one of the subgraphs H i , i =1,2,,t . If every subgraph H i is isomorphic to a given graph H , then the graph G admits an H -covering. A graph G admitting H covering is called an (a,d) - H -antimagic if there is a bijection f :V E {1,2,,|V(G) | | E(G) |} such that for each subgraph H of G isomorphic to H , the sum of labels of all the edges and vertices belonged to H constitutes an arithmetic progression with the initial term a and the common difference d . For f (V) ={1,2,3,,|V(G) |} , the graph G is said to be super (a,d) - H -antimagic and for d = 0 it is called H -supermagic. In this paper, we investigate the existence of super (a,d) - Cn -antimagic labeling of Windmill graphs, Friendship graphs and subdivided friendship graphs for difference d = 0,1,,5 and n 3 . Keywords: Windmill graph W(n,r) , Friendship graph W(3,r) , Subdivided friendship graph W(3,r)(m) , super (a,d) - Cn -antimagic, super (a,d) - C3(m1) -antimagic.
    [Show full text]
  • Embeddings of Configurations by Garret Flowers B.A., Oberlin College, 2009 M.Sc., University of Victoria, 2011 a Dissertation Su
    Embeddings of Configurations by Garret Flowers B.A., Oberlin College, 2009 M.Sc., University of Victoria, 2011 A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY in the Department of Mathematics c Garret Flowers, 2015 University of Victoria All rights reserved. This dissertation may not be reproduced in whole or in part, by photocopying or other means, without the permission of the author. ii Embeddings of Configurations by Garret Flowers B.A., Oberlin College, 2009 M.Sc., University of Victoria, 2011 Supervisory Committee Dr. P. Dukes, Supervisor (Department of Mathematics) Dr. J. Huang, Departmental Member (Department of Mathematics) Dr. V. Srinivasan, Outside Member (Department of Computer Science) iii Supervisory Committee Dr. P. Dukes, Supervisor (Department of Mathematics) Dr. J. Huang, Departmental Member (Department of Mathematics) Dr. V. Srinivasan, Outside Member (Department of Computer Science) ABSTRACT In this dissertation, we examine the nature of embeddings with regard to both combinatorial and geometric configurations. A combinatorial [r; k]-configuration is a collection of abstract points and sets (referred to as blocks) such that each point is a member of r blocks, each block is of size k, and these objects satisfy a linearity criterion: no two blocks intersect in more than one point. A geometric configuration requires that the points and blocks be realized as points and lines within the Euclidean plane. We provide improvements on the current bounds for the asymptotic existence of both combinatorial and geometric configurations. In addition, we examine the largely new problem of embedding configurations within larger configurations possessing regularity properties.
    [Show full text]