## Annals of Applied Probability

### Collision times in multicolor urn models and sequential graph coloring with applications to discrete logarithms

Bhaswar B. Bhattacharya

#### Abstract

Consider an urn model where at each step one of $q$ colors is sampled according to some probability distribution and a ball of that color is placed in an urn. The distribution of assigning balls to urns may depend on the color of the ball. Collisions occur when a ball is placed in an urn which already contains a ball of different color. Equivalently, this can be viewed as sequentially coloring a complete $q$-partite graph wherein a collision corresponds to the appearance of a monochromatic edge. Using a Poisson embedding technique, the limiting distribution of the first collision time is determined and the possible limits are explicitly described. Joint distribution of successive collision times and multi-fold collision times are also derived. The results can be used to obtain the limiting distributions of running times in various birthday problem based algorithms for solving the discrete logarithm problem, generalizing previous results which only consider expected running times. Asymptotic distributions of the time of appearance of a monochromatic edge are also obtained for other graphs.

#### Article information

Source
Ann. Appl. Probab., Volume 26, Number 6 (2016), 3286-3318.

Dates
Revised: January 2016
First available in Project Euclid: 15 December 2016

https://projecteuclid.org/euclid.aoap/1481792586

Digital Object Identifier
doi:10.1214/16-AAP1176

Mathematical Reviews number (MathSciNet)
MR3582804

Zentralblatt MATH identifier
1356.05045

#### Citation

Bhattacharya, Bhaswar B. Collision times in multicolor urn models and sequential graph coloring with applications to discrete logarithms. Ann. Appl. Probab. 26 (2016), no. 6, 3286--3318. doi:10.1214/16-AAP1176. https://projecteuclid.org/euclid.aoap/1481792586

#### References

• [1] Aldous, D. (1989). Probability Approximations Via the Poisson Clumping Heuristic. Applied Mathematical Sciences 77. Springer, New York.
• [2] Arratia, R., Garibaldi, S. and Kilian, J. (2016). Asymptotic distribution for the birthday problem with multiple coincidences, via an embedding of the collision process. Random Structures Algorithms 48 408–502.
• [3] Athreya, K. B. and Karlin, S. (1968). Embedding of urn schemes into continuous time Markov branching processes and related limit theorems. Ann. Math. Statist. 39 1801–1817.
• [4] Barabási, A.-L. and Albert, R. (1999). Emergence of scaling in random networks. Science 286 509–512.
• [5] Barbour, A. D. and Gnedin, A. V. (2009). Small counts in the infinite occupancy scheme. Electron. J. Probab. 14 365–384.
• [6] Barbour, A. D., Holst, L. and Janson, S. (1992). Poisson Approximation. Oxford Studies in Probability 2. Oxford Univ. Press, New York.
• [7] Batu, T., Fortnow, L., Rubinfeld, R., Smith, W. D. and White, P. (2013). Testing closeness of discrete distributions. J. ACM 60 Art. 4, 25.
• [8] Bhattacharya, B. B., Diaconis, P. and Mukherjee, S. (2014). Universal Poisson and Normal limit theorems in graph coloring problems with connections to extremal combinatorics. Available at arXiv:1310.2336.
• [9] Billingsley, P. (1995). Probability and Measure, 3rd ed. Wiley, New York.
• [10] Bollobás, B. and Riordan, O. (2004). The diameter of a scale-free random graph. Combinatorica 24 5–34.
• [11] Bollobás, B. and Riordan, O. M. (2003). Mathematical results on scale-free random graphs. In Handbook of Graphs and Networks 1–34. Wiley-VCH, Weinheim.
• [12] Camarri, M. and Pitman, J. (2000). Limit distributions and random trees derived from the birthday problem with unequal probabilities. Electron. J. Probab. 5 no. 2, 18 pp. (electronic).
• [13] Chatterjee, S., Diaconis, P. and Meckes, E. (2005). Exchangeable pairs and Poisson approximation. Probab. Surv. 2 64–106.
• [14] Daley, D. J. and Vere-Jones, D. (1988). An Introduction to the Theory of Point Processes. Springer, New York.
• [15] DasGupta, A. (2005). The matching, birthday and the strong birthday problem: A contemporary review. J. Statist. Plann. Inference 130 377–389.
• [16] Diaconis, P. and Holmes, S. (2002). A Bayesian peek into Feller volume I. Sankhyā Ser. A 64 820–841.
• [17] Diaconis, P. and Mosteller, F. (1989). Methods for studying coincidences. J. Amer. Statist. Assoc. 84 853–861.
• [18] Dong, F. M., Koh, K. M. and Teo, K. L. (2005). Chromatic Polynomials and Chromaticity of Graphs. World Scientific, Hackensack, NJ.
• [19] Fadnavis, S. (2015). A note on the shameful conjecture. European J. Combin. 47 115–122.
• [20] Flajolet, P. and Sedgewick, R. (2009). Analytic Combinatorics. Cambridge Univ. Press, Cambridge.
• [21] Galbraith, S. and Ruprai, R. S. (2009). An improvement to the Gaudry-Schost algorithm for multidimensional discrete logarithm problems. In Cryptography and Coding. Lecture Notes in Computer Science 5921 368–382. Springer, Berlin.
• [22] Galbraith, S. D. and Holmes, M. (2012). A non-uniform birthday problem with applications to discrete logarithms. Discrete Appl. Math. 160 1547–1560.
• [23] Galbraith, S. D., Pollard, J. M. and Ruprai, R. S. (2013). Computing discrete logarithms in an interval. Math. Comp. 82 1181–1195.
• [24] Galbraith, S. D. and Ruprai, R. S. (2010). Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval. In Public Key Cryptography—PKC 2010. Lecture Notes in Computer Science 6056 368–383. Springer, Berlin.
• [25] Gaudry, P. and Schost, É. (2004). A low-memory parallel version of Matsuo, Chao, and Tsujii’s algorithm. In Algorithmic Number Theory. Lecture Notes in Computer Science 3076 208–222. Springer, Berlin.
• [26] Gnedin, A., Hansen, B. and Pitman, J. (2007). Notes on the occupancy problem with infinitely many boxes: General asymptotics and power laws. Probab. Surv. 4 146–171.
• [27] Holst, L. (1986). On birthday, collectors’, occupancy and other classical urn problems. Internat. Statist. Rev. 54 15–27.
• [28] Holst, L. (1995). The general birthday problem. In Proceedings of the Sixth International Seminar on Random Graphs and Probabilistic Methods in Combinatorics and Computer Science, “Random Graphs ’93 (Poznań, 1993) 6 201–208.
• [29] Holst, L. (2001). Extreme value distributions for random coupon collector and birthday problems. Extremes 4 129–145 (2002).
• [30] Jensen, T. R. and Toft, B. (1995). Graph Coloring Problems. Wiley, New York.
• [31] Joag-Dev, K. and Proschan, F. (1992). Birthday Problem with Unlike Probabilities. Amer. Math. Monthly 99 10–12.
• [32] Johnson, N. L. and Kotz, S. (1977). Urn Models and Their Application: An Approach to Modern Discrete Probability Theory. Wiley, New York.
• [33] Kim, J. H., Montenegro, R., Peres, Y. and Tetali, P. (2010). A birthday paradox for Markov chains with an optimal bound for collision in the Pollard rho algorithm for discrete logarithm. Ann. Appl. Probab. 20 495–521.
• [34] Kingman, J. F. C. (1993). Poisson Processes. Oxford Studies in Probability 3. Oxford Univ. Press, New York.
• [35] Mahmoud, H. M. (2009). Pólya Urn Models. CRC Press, Boca Raton, FL.
• [36] Montenegro, R. and Tetali, P. (2009). How long does it take to catch a wild kangaroo? In STOC’09—Proceedings of the 2009 ACM International Symposium on Theory of Computing 553–559. ACM, New York.
• [37] Nakata, T. (2008). A Poisson approximation for an occupancy problem with collisions. J. Appl. Probab. 45 430–439.
• [38] Neal, P. (2008). The generalised coupon collector problem. J. Appl. Probab. 45 621–629.
• [39] Paninski, L. (2008). A coincidence-based test for uniformity given very sparsely sampled discrete data. IEEE Trans. Inform. Theory 54 4750–4755.
• [40] Pollard, J. M. (1978). Monte Carlo methods for index computation $(\mathrm{mod}\ p)$. Math. Comp. 32 918–924.
• [41] Pollard, J. M. (2000). Kangaroos, Monopoly and discrete logarithms. J. Cryptology 13 437–447.
• [42] Selivanov, B. I. (1995). On the waiting time in a scheme for the random allocation of colored particles. Discrete Math. Appl. 5 73–82.
• [43] Stanley, R. P. (1995). A symmetric function generalization of the chromatic polynomial of a graph. Adv. Math. 111 166–194.
• [44] Wendl, M. (2005). Probabilistic assessment of clone overlaps in DNA fingerprint mapping via a priori models. J. Comput. Biol. 12 283–297.