Designs in Product Association Schemes

نویسنده

  • William J. Martin
چکیده

Let (Y; A) be an association scheme with primitive idempotents E 0 ; E 1 ;. .. ; E d. For T f1;. .. ; dg, a Delsarte T-design in (Y; A) is a subset D of Y whose characteristic vector is annihilated by the idempotents E j (j 2 T). The case most studied is that in which (Y; A) is Q-polynomial and T = f1;. .. ; tg. For many such examples, a combina-torial characterization is known, giving an equivalence between Delsarte T-designs and poset t-designs in what we call here \Q-posets". For example, combinatorial t-designs (i.e., block designs) can be described via the truncated Boolean lattice while orthogonal arrays can be described via the Hamming lattice. For 1 i m, let (Y i ; A i) be a Q-polynomial association scheme. Assume that Delsarte t-designs in each (Y i ; A i) are characterised as poset t-designs in a Q-poset P i attached to that scheme. With these assumptions, we consider the product association scheme (Y i ; A). The primitive idempotents for this scheme naturally inherit the partial order structure of a product of chains. Our main result, Theorem 2.3, characterises Delsarte T-designs in (Y i ; A) as poset designs in the product poset P i where T is any downset in the product of chains. Using this characterisation, we immediately obtain linear programming bounds for a wide variety of combinatorial objects. On the other hand, if we assume each component scheme is Q-polynomial, we obtain bounds on the size and degree of such a T-design analogous to Delsarte's bounds for t-designs in Q-polynomial association schemes. 1 Overview and Background We are interested in applications of the theory of association schemes to problems in coding theory and design theory. This investigation is motivated by two applications. In 10],

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

On Relative $t$-Designs in Polynomial Association Schemes

Motivated by the similarities between the theory of spherical t-designs and that of t-designs in Q-polynomial association schemes, we study two versions of relative t-designs, the counterparts of Euclidean t-designs for P and/or Q-polynomial association schemes. We develop the theory based on the Terwilliger algebra, which is a noncommutative associative semisimple C-algebra associated with eac...

متن کامل

Linking systems in nonelementary abelian groups

Linked systems of symmetric designs are equivalent to 3-class Q-antipodal association schemes. Only one infinite family of examples is known, and this family has interesting origins and is connected to important applications. In this paper, we define linking systems, collections of difference sets that correspond to systems of linked designs, and we construct linking systems in a variety of non...

متن کامل

Semidirect Products of Association Schemes

In his 1996 work developing the theory of association schemes as a ‘generalized’ group theory, Zieschang introduced the concept of the semidirect product as a possible product operation of certain association schemes. In this paper we extend the semidirect product operation into the entire set of association schemes. We then derive a way to decompose certain association schemes into smaller ass...

متن کامل

Algebraic Combinatorics: Spectral Graph Theory, Erdös-Ko-Rado Theorems and Quantum Information Theory

László Babai Symmetry versus regularity Abstract: Symmetry is usually defined in terms of automorphisms; regularity in terms of numerical parameters. Symmetry conditions imply various regularity constraints, but not conversely. We shall discuss two areas of this relationship. First we review some old results by Peter Frankl on how symmetry and regularity constraints affect extremal set systems....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 16  شماره 

صفحات  -

تاریخ انتشار 1999