Abstract
Let \({\mathcal {F}}\) be a set of functions of \(f : X \rightarrow Y\), where \(|X|=k, \,|Y|=v\) and \(|{\mathcal {F}}|=N\). If for any \(t\)-subset \(C \subseteq X\) there exists at least one function \(f\in \mathcal {F}\) such that \(f|_{C}\) is one-to-one, then \({\mathcal {F}}\) is called a perfect hash family, denoted by PHF\((N; k, v, t)\). In this paper, we construct the simplest nontrivial PHFs of \(t=3\) and \(N=3\) using classic generalized quadrangles, quadrics in PG\((4, q)\) and Hermitian varieties in PG\((4, q^2)\). We obtained PHF\((3; q^2(q+1), q^2, 3)\) and PHF\((3; q^5, q^3, 3)\) for \(q\) a prime power. The curve \(k= v^{5/3}\) is greater than known \(k\) for \(v=q^3,\,q\) a prime power.
Similar content being viewed by others
References
Atici M., Magliveras S.S., Stinson D.R., Wei W.D.: Some recursive constructions for perfect hash families. J. Comb. Des. 4, 353–363 (1996).
Blackburn S.R.: Combinatorics and Threshold Cryptography. Combinatorial Designs and Their Applications, pp. 49–70. Chapman and Hall, Boca Raton (1999).
Blackburn S.R., Burmester M., Desmedt Y., Wild P.R.: Efficient Multiplicative Sharing Schemes. Lecture Notes in Computer Science vol. 1070, pp. 107–118. Springer, Berlin (1996).
Colbourn C.J., Martirosyan S.S., Van Trung T., Walker II R.A.: Roux-type constructions for covering arrays of strengths three and four. Des. Codes Cryptogr. 41(1), 33–57 (2006).
De Beule J., Klein A., Metsch K., Storme L.: Partial ovoids and partial spreads of clasical finite polar spaces. Serdica Math. J. 34, 689–714 (2008).
Fiat A., Naor M.: Broadcast Encryption. Lecture Notes in Computer Science. vol. 773, pp. 480–491. Springer-Verlag, Berlin (1994).
Fredman M.L., Komlos J.: On the size of separating systems and families of perfect hash functions. SIAM J. Algebraic Discret. Methods 5, 61–68 (1984).
Hirschfeld J.W.P.: Finite Projective Spaces of Three Dimensions. Oxford Mathematical Monographs, x+316 pp. Oxford Science Publications, New York. ISBN: 0-19-853536-8 (1985).
Mehlhorn K.: On the program size of perfect and universal hash functions. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp. 170–175 (1982).
Metsch K., Storme L.: Maximal partial ovoids and maximal partial spreads in Hermitian generalized quadrangles. J. Comb. Des. 16(2), 101–116 (2008).
Stinson D.R.: Cryptography Theory and Practice. Discrete Mathematics and Its Applications, 3rd edn., xviii+593 pp. Chapman & Hall, Boca Raton. ISBN: 978-1-58488-508-5; 1-58488-508-4 (2006).
Thas K.: Symmetry in Finite Generalized Quadrangles. Frontiers in Mathematics, xxii+214 pp. Birkhäuser Verlag, Basel. ISBN: 3-7643-6158-1 (2004).
Walker II R.A., Colbourn C.J.: Perfect hash families: constructions and existence. J. Math. Cryptol. 1(2), 125–150 (2007).
Author information
Authors and Affiliations
Corresponding author
Additional information
This is one of several papers published in Designs, Codes and Cryptography comprising the “Special Issue on Cryptography, Codes, Designs and Finite Fields: In Memory of Scott A. Vanstone”.
Rights and permissions
About this article
Cite this article
Fuji-Hara, R. Perfect hash families of strength three with three rows from varieties on finite projective geometries. Des. Codes Cryptogr. 77, 351–356 (2015). https://doi.org/10.1007/s10623-015-0052-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-015-0052-z