Abstract
Levenshtein first put forward the sequence reconstruction problem in 2001. This problem sets a model in which a sequence from some set is transmitted over multiple channels, and the decoder receives the different outputs. In this model, the sequence reconstruction problem is to find the minimum number of channels required to exactly recover the transmitted sequence. In the combinatorial context, the problem is equivalent to determining the maximum intersection between two balls of radius r, where the distance between their centers is at least d. The sequence reconstruction problem was studied for strings, permutations and so on. In this paper, we extend the study by Konstantinova et al. for reconstruction of permutations distorted by single Kendall τ-errors. While they solved the case where the transmitted permutation can be arbitrary and the erroneous patterns are distorted by at most two Kendall τ-errors, we study the setup where the transmitted permutation belongs to a permutation code of length n and the erroneous patterns are distorted by at most three Kendall τ-errors. In this scenario, it is shown that n2 − n + 1 erroneous patterns are required in order to reconstruct an unknown permutation from some permutation code of minimum Kendall τ-distance 2 or an arbitrary unknown permutation for any n ≥ 3.
Similar content being viewed by others
References
Haeupler, B., Mitzenmacher, M.: Repeated deletion channels. In: Proc. IEEE Inf. Theory Workshop, pp. 152–156 (2014)
Holenstein, T., Mitzenmacher, M., Panigrahy, R., Wieder, U.: Trace reconstruction with constant deletion probability and related results. In: Proc. of the Nineteenth Annual ACM-SIAM Symp. on Discrete Algorithms, pp. 389–398 (2008)
Jiang, A., Schwartz, M., Bruck, J.: Correcting charge-constrained errors in the rank-modulation scheme. IEEE Trans. Inf. Theory 56, 2112–2120 (2010)
Konstantinova, E.: Reconstruction of permutations distorted by single reversal errors. Discrete Applied Math. 155, 2426–2434 (2007)
Konstantinova, E.: On reconstruction of signed permutations distorted by reversal errors. Discret. Math. 308, 974–984 (2008)
Konstantinova, E., Levenshtein V., Siemons J.: Reconstruction of permutations distorted by single transposition errors. math/0702191v1 (2007)
Levenshtein, V.: Efficient reconstruction of sequences. IEEE Trans. on Inf. Theory 47, 2–22 (2001)
Levenshtein, V.: Efficient reconstruction of sequences from their subsequences or supersequences. Journal of Combin. Theory, Ser. A 93, 310–332 (2001)
Levenshtein, V., Konstantinova, E., Konstantinov, E., Molodtsov, S.: Reconstruction of a graph from 2-vicinities of its vertices. Discret. Appl. Math. 156, 1399–1406 (2008)
Levenshtein, V., Siemons, J.: Error graphs and the reconstruction of elements in groups. Journal of Combin. Theory, Ser. A 116, 795–815 (2009)
Sala, F., Gabrys, R., Schoeny, C., Dolecek, L.: Exact reconstruction from insertions in synchronization codes. IEEE Trans. Inf. Theory 63, 2428–2445 (2017)
Yaakobi, E., Schwartz, M., Langberg, M., Bruck, J.: Sequence reconstruction for Grassmann graphs and permutations. In: Proc. Int. Symp. Inf. Theory, pp. 874–878 (2013)
Yaakobi, E., Bruck, J.: On the uncertainty of information retrieval in associative memories. In: Proc. Int. Symp. Inf. Theory, pp. 106–110 (2012)
Wang, X., Wang, Y., Yin, W., Fu, F.-W.: Nonexistence of perfect permutation codes under the Kendall τ-metric. Des. Codes Cryptogr. 89, 2511–2531 (2021)
Deza, M, Huang, H.: Metrics on permutations, a survey. J. Comb. Inf. Sys. Sci. 23, 173–185 (1988)
Wang, X., Zhang, Y.W., Yang, Y.T., Ge, G.N.: New bounds of permutation codes under Hamming metric and Kendall’s τ-metric. Des. Codes Cryptogr. 85, 533–545 (2017)
Acknowledgements
The authors would like to express their sincere gratefulness to the editor and the two anonymous reviewers for their valuable suggestions and comments which have greatly improved this paper. This work is supported in part by the National Natural Science Foundation of China (Grant No. 12001134) and the National Natural Science Foundation of China - Join Fund of Basic Research of General Technology (Grant U1836111).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
In this appendix, we will discuss the size of N(n,d, 3) for all 3 ≤ n ≤ 5 and d = 1, 2 as follows. Assume that there exists some permutation \(\upbeta \in \mathcal {S}_{n}\) such that \(I(n,d,3)=|{B_{K}^{n}}(\upbeta ,3)\cap {B_{K}^{n}}(\epsilon _{n},3)|\) and wK(β) = d for any 3 ≤ n ≤ 5 and d = 3, 4.
When n = 3, we can easily obtain I(3, 1, 3) = I(3, 2, 3) = I(3, 3, 3) = 6. Hence we have N(3, 1, 3) = N(3, 2, 3) = 6.
When n = 4, we have I(4, 1, 3) = I(4, 2, 3) = 12. By Lemma 4, we have \({S_{K}^{4}}(0)=1,{S_{K}^{4}}(1)=3,{S_{K}^{4}}(2)=5,~\text {and}~{S_{K}^{4}}(3)=6\). If (i,i + 1) ∈ Iv(β) for each i ∈ [3], then β = [4, 3, 2, 1] and wK(β) = 6. Since \({S_{K}^{4}}(1)=3\), then |{γ|wK(γ) = 1,dK(γ,β ) ≤ 3}|≤ 2 for wK(β) = 3 or 4. First, we estimate the value of I(4, 4, 3) for wK(β) = 4. Suppose Iv(ei) = I1 such that I1∉Iv(β) for some i ∈ [3]. Then, there exists a permutation α such that Iv(α) = {I1,I2}. Hence, |Iv(β) ∩ Iv(α)|≤ 1 and dK(β,α) ≥ 4. Since \({S_{K}^{4}}(2)=5\), then we have |{γ|wK(γ) = 2,dK(γ,β ) ≤ 3}|≤ 4 for wK(β) = 4. Therefore, we have
Second, we estimate the value of I(4, 3, 3) for wK(β) = 3. When wK(γ) = 3, we have that |{γ|wK(γ) = 3,dK(γ,β ) ≤ 3}|≤ 4. Therefore, we have
So, we can obtain that N(4, 1, 3) = N(4, 2, 3) = 12.
When n = 5, we have I(5, 1, 3) = I(5, 2, 3) = 20. By Lemma 4, we have \({S_{K}^{5}}(0)=1,{S_{K}^{5}}(1)=4,{S_{K}^{5}}(2)=9,~\text {and}~{S_{K}^{5}}(3)=15\). First, we estimate the value of I(5, 4, 3) for wK(β) = 4. The inversions of all the elements of \({S_{K}^{5}}(\epsilon _{5},1)\) are (1, 2), (2, 3), (3, 4), (4, 5). Suppose (i0,j0) ∈ Iv(β) is an inversion with the maximum value of |i0 − j0|. It is easily verified that j0 − i0 = 2, 3, or 4. When j0 − i0 = 4, then (1, 5) ∈ Iv(β). Since wK(β) = 4 and (1, 5) ∈ Iv(β), it follows that β = [5, 1, 2, 3, 4] or [2, 3, 4, 5, 1]. Without loss of generality, let β = [5, 1, 2, 3, 4]. Thus, Iv(β) = {(1, 5), (2, 5), (3, 5), (4, 5)}. let γ ∈{γ|wK(γ) = 1,dK(γ,β ) ≤ 3}. Since wK(β) = 4, wK(γ) = 1, and dK(γ,β ) ≤ 3, by Lemma 8, then Iv(γ) ⊂ Iv(β). Hence, |{γ|wK(γ) = 1,dK(γ,β ) ≤ 3}| = 1. Similarly, let γ ∈{γ|wK(γ) = 2,dK(γ,β ) ≤ 3}, then Iv(γ) ⊂ Iv(β) and |{γ|wK(γ) = 2,dK(γ,β ) ≤ 3}| = 1. Since \({S_{K}^{5}}(3)=15\), then |{γ|wK(γ) = 2,dK(γ,β ) ≤ 3}|≤ 15. So, we have
When j0 − i0 = 3, then (1, 4) or (2, 5) ∈ Iv(β). Without loss of generality, let (1, 4) ∈ Iv(β). Since wK(β) = 4 and (1, 4) ∈ Iv(β), it follows that {(1, 4), (2, 4), (3, 4)} or {(1, 4), (1, 2), (1, 3)}⊂ Iv(β). Consider {(1, 4), (2, 4),(3, 4)}⊂ Iv(β), we easily have that |{γ|wK(γ) = 1,dK(γ,β ) ≤ 3}|≤ 2 and |{γ|wK(γ) = 2,dK(γ,β ) ≤ 3}|≤ 3. So, we have
When j0 − i0 = 2, then (1, 3), (2, 4), or (3, 5) ∈ Iv(β). If Iv(β) has at least two elements of {(1, 3), (2, 4), (3, 5)}, then (1, 3), (2, 4) ∈ Iv(β) or (2, 4), (3, 5) ∈ Iv(β). Without loss of generality, consider (1, 3), (2, 4) ∈ Iv(β), it follows that |{γ|wK(γ) = 1,dK(γ,β ) ≤ 3}|≤ 2 and |{γ|wK(γ) = 2,dK(γ,β ) ≤ 3}|≤ 3. So, we have
If Iv(β) has only an element of (1, 3), (2, 4), (3, 5), it is easily verified that β = [3, 2, 1, 5, 4] or [2, 1, 5, 4, 3]. Without loss of generality, let β = [3, 2, 1, 5, 4]. Then we have that |{γ|wK(γ) = 1,dK(γ,β ) ≤ 3}| = 3 and |{γ|wK(γ) = 2,dK(γ,β ) ≤ 3}| = 4. Obviously, when γ = [4, 1, 2, 3, 5] or [1, 5, 2, 3, 4], we have dK(β,γ) ≥ 4. Since \({S_{K}^{5}}(3)=15\), then |{γ|wK(γ) = 2,dK(γ,β ) ≤ 3}|≤ 13. So, we have
By the above discussion, we have that
Second, we estimate the size of I(5, 3, 3) and wK(β) = 3. If Iv(β) contains all the inversions of any three distinct elements of \({S_{K}^{5}}(\epsilon _{5},1)\), then |Iv(β)|≥ 4. Hence, |{γ|wK(γ) = 1,dK(γ,β ) ≤ 3}|≤ 2. Since \({S_{K}^{5}}(2)=9\), then |{γ|wK(γ) = 2,dK(γ,β ) ≤ 3}|≤ 9. Therefore, by (23), we have
So, we can get N(5, 1, 3) = N(5, 2, 3) = 20.
Rights and permissions
About this article
Cite this article
Wang, X. Reconstruction of permutations distorted by single Kendall τ-errors. Cryptogr. Commun. 15, 131–144 (2023). https://doi.org/10.1007/s12095-022-00595-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-022-00595-2