Separating Hash Families: A Johnson-type bound and New Constructions

Separating hash families are useful combinatorial structures which are generalizations of many well-studied objects in combinatorics, cryptography and coding theory. In this paper, using tools from graph theory and additive number theory, we solve several open problems and conjectures concerning bounds and constructions for separating hash families. Firstly, we discover that the cardinality of a separating hash family satisfies a Johnson-type inequality. As a result, we obtain a new upper bound, which is superior to all previous ones. Secondly, we present a construction for an infinite class of perfect hash families. It is based on the Hamming graphs in coding theory and generalizes many constructions that appeared before. It provides an affirmative answer to both Bazrafshan-Trung's open problem on separating hash families and Alon-Stav's conjecture on parent-identifying codes. Thirdly, let $p_t(N,q)$ denote the maximal cardinality of a $t$-perfect hash family of length $N$ over an alphabet of size $q$. Walker II and Colbourn conjectured that $p_3(3,q)=o(q^2)$. We verify this conjecture by proving $q^{2-o(1)}<p_3(3,q)=o(q^2)$. Our proof can be viewed as an application of Ruzsa-Szemer{\'e}di's (6,3)-theorem. We also prove $q^{2-o(1)}<p_4(4,q)=o(q^2)$. Two new notions in graph theory and additive number theory, namely rainbow cycles and $R$-sum-free sets, are introduced to prove this result. These two bounds support a question of Blackburn, Etzion, Stinson and Zaverucha. Finally, we establish a bridge between perfect hash families and hypergraph Tur{\'a}n problems. This connection has not been noticed before. As a consequence, many new results and problems arise.

[1]  Noga Alon,et al.  New Bounds on Parent-Identifying Codes: The Case of Multiple Parents , 2004, Combinatorics, Probability and Computing.

[2]  Vojtech Rödl,et al.  The Algorithmic Aspects of the Regularity Lemma , 1994, J. Algorithms.

[3]  Tran van Trung,et al.  Explicit constructions for perfect hash families , 2008, Des. Codes Cryptogr..

[4]  Simon R. Blackburn Surveys in Combinatorics 2003: Combinatorial schemes for protecting digital content , 2003 .

[5]  John Beidler,et al.  Data Structures and Algorithms , 1996, Wiley Encyclopedia of Computer Science and Engineering.

[6]  Ryoh Fuji-Hara Perfect hash families of strength three with three rows from varieties on finite projective geometries , 2015, Des. Codes Cryptogr..

[7]  Tran van Trung,et al.  Bounds for separating hash families , 2011, J. Comb. Theory, Ser. A.

[8]  A. Nilli Perfect Hashing and Probability , 1994, Combinatorics, Probability and Computing.

[9]  Imre Z. Ruzsa,et al.  Solving a linear equation in a set of integers I , 1993 .

[10]  Gérard D. Cohen,et al.  Generalized hashing and parent-identifying codes , 2003, J. Comb. Theory, Ser. A.

[11]  Simon R. Blackburn,et al.  An upper bound on the size of a code with the k-identifiable parent property , 2003, J. Comb. Theory, Ser. A.

[12]  János Körner,et al.  New Bounds for Perfect Hashing via Information Theory , 1988, Eur. J. Comb..

[13]  Noga Alon,et al.  On An Extremal Hypergraph Problem Of Brown, Erdős And Sós , 2006, Comb..

[14]  Vojtech Rödl,et al.  The asymptotic number of graphs not containing a fixed subgraph and a problem for hypergraphs having no exponent , 1986, Graphs Comb..

[15]  Simon R. Blackburn Frameproof Codes , 2003, SIAM J. Discret. Math..

[16]  Noga Alon,et al.  Parent-Identifying Codes , 2001, J. Comb. Theory, Ser. A.

[17]  Z. Furedi,et al.  Uniform hypergraphs containing no grids , 2011, 1103.1691.

[18]  Noga Alon,et al.  Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions , 1994, Algorithmica.

[19]  Avi Wigderson,et al.  Lower Bounds on Formula Size of Boolean Functions Using Hypergraph Entropy , 1995, SIAM J. Discret. Math..

[20]  Douglas R. Stinson,et al.  A bound on the size of separating hash families , 2008, J. Comb. Theory, Ser. A.

[21]  S. Wei Secure Frameproof Codes, Key Distribution Patterns, Group Testing Algorithms and Related Structures , 1997 .

[22]  P. Erdös,et al.  On coloring graphs to maximize the proportion of multicolored k-edges , 1968 .

[23]  F. Behrend On Sets of Integers Which Contain No Three Terms in Arithmetical Progression. , 1946, Proceedings of the National Academy of Sciences of the United States of America.

[24]  Simon R. Blackburn,et al.  Perfect Hash Families: Probabilistic Methods and Explicit Constructions , 2000, J. Comb. Theory, Ser. A.

[25]  P. Erdijs ON SOME EXTREMAL PROBLEMS ON r-GRAPHS , 1971 .

[26]  Jessica Staddon,et al.  Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.

[27]  Charles J. Colbourn,et al.  Perfect Hash Families: Constructions and Existence , 2007, J. Math. Cryptol..

[28]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[29]  Douglas R. Stinson,et al.  Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..

[30]  Kurt Mehlhorn,et al.  Data Structures and Algorithms 1: Sorting and Searching , 2011, EATCS Monographs on Theoretical Computer Science.

[31]  Simon R. Blackburn Perfect Hash Families with Few Functions , 2003, IACR Cryptol. ePrint Arch..

[32]  Yvo Desmedt,et al.  Efficient Multiplicative Sharing Schemes , 1996, EUROCRYPT.

[33]  Chris D. Godsil,et al.  ALGEBRAIC COMBINATORICS , 2013 .

[34]  W. G. Brown,et al.  On the existence of triangulated spheres in 3-graphs, and related problems , 1973 .

[35]  Tran van Trung,et al.  Improved bounds for separating hash families , 2013, Des. Codes Cryptogr..

[36]  Douglas R. Stinson,et al.  On generalized separating hash families , 2008, J. Comb. Theory, Ser. A.

[37]  Jean-Paul M. G. Linnartz,et al.  On Codes with the Identifiable Parent Property , 1998, J. Comb. Theory, Ser. A.