The query complexity of finding a hidden permutation

  • Peyman Afshani
  • , Manindra Agrawal
  • , Benjamin Doerr
  • , Carola Doerr
  • , Kasper Green Larsen
  • , Kurt Mehlhorn

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We study the query complexity of determining a hidden permutation. More specifically, we study the problem of learning a secret (z, π) consisting of a binary string z of length n and a permutation π of [n]. The secret must be unveiled by asking queries x ∈ {0, 1}n, and for each query asked, we are returned the score fz,π (x) defined as f z,π (x) := max{i ∈ [0..n] | ∀j ≤ i : z π (j) = xπ (j)} ; i.e., the length of the longest common prefix of x and z with respect to π. The goal is to minimize the number of queries asked. We prove matching upper and lower bounds for the deterministic and randomized query complexity of Θ (n log n) and Θ (n log log n), respectively.

Original languageEnglish
Title of host publicationSpace-Efficient Data Structures, Streams, and Algorithms - Papers in Honor of J. Ian Munro on the Occasion of His 66th Birthday
PublisherSpringer Verlag
Pages1-11
Number of pages11
ISBN (Print)9783642402722
DOIs
Publication statusPublished - 1 Jan 2013
Externally publishedYes
EventConference on Space-Efficient Data Structures, Streams, and Algorithms - Waterloo, ON, Canada
Duration: 15 Aug 201316 Aug 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8066 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceConference on Space-Efficient Data Structures, Streams, and Algorithms
Country/TerritoryCanada
CityWaterloo, ON
Period15/08/1316/08/13

Fingerprint

Dive into the research topics of 'The query complexity of finding a hidden permutation'. Together they form a unique fingerprint.

Cite this