首页 > 最新文献

Cryptography and Communications最新文献

英文 中文
Optimal quinary cyclic codes with three zeros 有三个零的最优二进制循环码
Pub Date : 2024-02-17 DOI: 10.1007/s12095-024-00703-4
Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li

Cyclic codes are an important subclass of linear codes, they not only have good algebraic structure, but also are easy to be encoded and decoded. At present, researchers have constructed many optimal ternary cyclic codes, but the study on quinary cyclic codes is less developed. In this paper, by analyzing the solutions of certain equations over (mathbb {F}_{5^m}), we construct some optimal quinary cyclic codes with three zeros and with parameters ([5^m-1, 5^m-2-2m, 4]), ([5^m-1, 5^m-2-frac{3m}{2}, 4]). Moreover, the weight distributions of two classes of their duals are also provided.

循环码是线性码的一个重要子类,它不仅具有良好的代数结构,而且易于编码和解码。目前,研究人员已经构造了许多最优的三元循环码,但对二元循环码的研究还较少。本文通过分析 (mathbb {F}_{5^m}) 上某些方程的解,构造了一些具有三个零点、参数为 ([5^m-1, 5^m-2-2m, 4]), ([5^m-1, 5^m-2-frac{3m}{2}, 4]) 的最优二元循环码。此外,还提供了它们对偶的两个类的权重分布。
{"title":"Optimal quinary cyclic codes with three zeros","authors":"Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li","doi":"10.1007/s12095-024-00703-4","DOIUrl":"https://doi.org/10.1007/s12095-024-00703-4","url":null,"abstract":"<p>Cyclic codes are an important subclass of linear codes, they not only have good algebraic structure, but also are easy to be encoded and decoded. At present, researchers have constructed many optimal ternary cyclic codes, but the study on quinary cyclic codes is less developed. In this paper, by analyzing the solutions of certain equations over <span>(mathbb {F}_{5^m})</span>, we construct some optimal quinary cyclic codes with three zeros and with parameters <span>([5^m-1, 5^m-2-2m, 4])</span>, <span>([5^m-1, 5^m-2-frac{3m}{2}, 4])</span>. Moreover, the weight distributions of two classes of their duals are also provided.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"138 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A direct construction of cross z-complementary sequence sets with large set size 直接构建大集规模的交叉互补序列集
Pub Date : 2024-02-05 DOI: 10.1007/s12095-024-00700-7
Praveen Kumar, Sudhan Majhi, Subhabrata Paul

This paper presents a direct construction of novel type cross Z-complementary sequence sets (CZCSSs), whose aperiodic correlation sums exhibit zero correlation zones at both the front-end and tail-end shifts. CZCSS can be regarded as an extension of the symmetrical Z-complementary code set (SZCCS). The available construction of SZCCS has a limitation on the set size, with a maximum set size of 8. The proposed generalized Boolean function-based construction can generate CZCSS/SZCCS of length in the form of a non-power-of-two with variable set size (2^{n+1}), where each code has (2^{n+1}) constituent sequences. The proposed construction also yields cross Z-complementary pairs and cross Z-complementary sets with a larger number of constituent sequences compared to the existing work.

本文提出了一种直接构建新型交叉 Z 补充序列集(CZCSS)的方法,这种序列集的非周期性相关和在前端和尾端移位时都表现出零相关区。CZCSS 可视为对称 Z 补充码集(SZCCS)的扩展。现有的 SZCCS 结构对集合大小有限制,最大集合大小为 8,而本文提出的基于布尔函数的广义结构可以生成长度为非二幂形式的 CZCSS/SZCCS,集合大小为 (2^{n+1}),其中每个编码有 (2^{n+1})个组成序列。与现有工作相比,所提出的构造还能产生具有更多组成序列的交叉 Z 互补对和交叉 Z 互补集。
{"title":"A direct construction of cross z-complementary sequence sets with large set size","authors":"Praveen Kumar, Sudhan Majhi, Subhabrata Paul","doi":"10.1007/s12095-024-00700-7","DOIUrl":"https://doi.org/10.1007/s12095-024-00700-7","url":null,"abstract":"<p>This paper presents a direct construction of novel type cross Z-complementary sequence sets (CZCSSs), whose aperiodic correlation sums exhibit zero correlation zones at both the front-end and tail-end shifts. CZCSS can be regarded as an extension of the symmetrical Z-complementary code set (SZCCS). The available construction of SZCCS has a limitation on the set size, with a maximum set size of 8. The proposed generalized Boolean function-based construction can generate CZCSS/SZCCS of length in the form of a non-power-of-two with variable set size <span>(2^{n+1})</span>, where each code has <span>(2^{n+1})</span> constituent sequences. The proposed construction also yields cross Z-complementary pairs and cross Z-complementary sets with a larger number of constituent sequences compared to the existing work.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"157 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139764284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Several constructions of optimal LCD codes over small finite fields 小有限域上最优 LCD 码的几种构造
Pub Date : 2024-02-05 DOI: 10.1007/s12095-024-00699-x
Shitao Li, Minjia Shi, Huizhou Liu

Linear complementary dual (LCD) codes are linear codes which intersect their dual codes trivially, which have been of interest and extensively studied due to their practical applications in computational complexity and information protection. In this paper, we give some methods for constructing LCD codes over small finite fields by modifying some typical methods for constructing linear codes. We show that all odd-like binary Euclidean LCD codes, ternary Euclidean LCD codes and quaternary Hermitian LCD codes can be constructed using the modified methods. Our results improve the known lower bounds on the largest minimum distances of LCD codes. Furthermore, we give two counterexamples to disprove the conjecture proposed by Bouyuklieva (Des. Codes Cryptogr. 89(11), 2445–2461 2021).

线性互补对偶码(LCD)是与其对偶码有微小交集的线性码,由于其在计算复杂性和信息保护方面的实际应用,一直受到人们的关注和广泛研究。本文通过修改一些构造线性码的典型方法,给出了一些在小有限域上构造 LCD 码的方法。我们证明,所有奇样二元欧氏液晶编码、三元欧氏液晶编码和四元赫米特液晶编码都可以用修改后的方法来构造。我们的结果改进了液晶编码最大最小距离的已知下界。此外,我们给出了两个反例,推翻了布尤克里娃提出的猜想(Des.89(11), 2445-2461 2021)提出的猜想。
{"title":"Several constructions of optimal LCD codes over small finite fields","authors":"Shitao Li, Minjia Shi, Huizhou Liu","doi":"10.1007/s12095-024-00699-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00699-x","url":null,"abstract":"<p>Linear complementary dual (LCD) codes are linear codes which intersect their dual codes trivially, which have been of interest and extensively studied due to their practical applications in computational complexity and information protection. In this paper, we give some methods for constructing LCD codes over small finite fields by modifying some typical methods for constructing linear codes. We show that all odd-like binary Euclidean LCD codes, ternary Euclidean LCD codes and quaternary Hermitian LCD codes can be constructed using the modified methods. Our results improve the known lower bounds on the largest minimum distances of LCD codes. Furthermore, we give two counterexamples to disprove the conjecture proposed by Bouyuklieva (Des. Codes Cryptogr. <b>89</b>(11), 2445–2461 2021).</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139764282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the parameters of some LCD BCH codes over $$mathbb {F}_q$$ with length $$(q^m+1)/lambda $$ 关于长度为 $$(q^m+1)/lambda $$ 的 $$mathbb {F}_q$$ 上一些 LCD BCH 编码的参数
Pub Date : 2024-01-26 DOI: 10.1007/s12095-024-00697-z

Abstract

As a particular subclass of cyclic codes, BCH codes have wide applications in storage devices, communication systems, consumer electronics and other fields. However, parameters of BCH codes are unknown in general. In this paper, we investigate parameters of BCH codes of length (frac{q^m+1}{lambda }) where (lambda mid q+1) .Some new techniques are employed to study the coset leaders. For any odd prime power q and (m=4,8) , or (mge 12) and (mequiv 4~ (textrm{mod}~ 8)) , the second, the third and the fourth largest coset leaders modulo (q^m+1) are determined, and the dimensions of some BCH codes of length (q^m+1) with large designed distances are given. For (1<lambda <q+1) , the first few largest coset leaders and the coset leaders modulo (frac{q^m+1}{lambda }) in the range 1 to ( frac{ q^{lfloor (m+1)/2rfloor }}{lambda }) are studied, and the dimensions of some BCH codes of length (frac{q^m+1}{lambda }) are given as well. The BCH codes presented in this paper are LCD codes and have a sharper lower bound on the minimum distance than the well-known BCH bound.

摘要 BCH 码作为循环码的一个特殊子类,在存储设备、通信系统、消费电子产品等领域有着广泛的应用。然而,一般情况下 BCH 码的参数是未知的。本文研究了长度为 (frac{q^m+1}{lambda }) 的 BCH 码的参数,其中 (lambda mid q+1) .采用了一些新技术来研究余集领导者。对于任何奇素数幂q和(m=4,8),或者(m≥12)和(m≥4~ (textrm{mod}~8)),第二、第三和第四幂都是奇数幂。确定了模(q^m+1)的第二、第三和第四大余弦组长,并给出了一些具有大设计距离的长度为(q^m+1)的 BCH 码的尺寸。对于 (1<lambda <;q+1) 时,研究了在 1 到 ( frac{ q^{lfloor (m+1)/2rfloor }}{lambda }) 范围内的前几个最大的子集领导者和 modulo (frac{q^m+1}{lambda }) 的子集领导者,并给出了一些长度为 (frac{q^m+1}{lambda }) 的 BCH 码的维数。本文提出的 BCH 编码是 LCD 编码,其最小距离的下界比著名的 BCH 界值更小。
{"title":"On the parameters of some LCD BCH codes over $$mathbb {F}_q$$ with length $$(q^m+1)/lambda $$","authors":"","doi":"10.1007/s12095-024-00697-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00697-z","url":null,"abstract":"<h3>Abstract</h3> <p>As a particular subclass of cyclic codes, BCH codes have wide applications in storage devices, communication systems, consumer electronics and other fields. However, parameters of BCH codes are unknown in general. In this paper, we investigate parameters of BCH codes of length <span> <span>(frac{q^m+1}{lambda })</span> </span> where <span> <span>(lambda mid q+1)</span> </span>.Some new techniques are employed to study the coset leaders. For any odd prime power <em>q</em> and <span> <span>(m=4,8)</span> </span>, or <span> <span>(mge 12)</span> </span> and <span> <span>(mequiv 4~ (textrm{mod}~ 8))</span> </span>, the second, the third and the fourth largest coset leaders modulo <span> <span>(q^m+1)</span> </span> are determined, and the dimensions of some BCH codes of length <span> <span>(q^m+1)</span> </span> with large designed distances are given. For <span> <span>(1&lt;lambda &lt;q+1)</span> </span>, the first few largest coset leaders and the coset leaders modulo <span> <span>(frac{q^m+1}{lambda })</span> </span> in the range 1 to <span> <span>( frac{ q^{lfloor (m+1)/2rfloor }}{lambda })</span> </span> are studied, and the dimensions of some BCH codes of length <span> <span>(frac{q^m+1}{lambda })</span> </span> are given as well. The BCH codes presented in this paper are LCD codes and have a sharper lower bound on the minimum distance than the well-known BCH bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139580798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue on Contemporary interactions between codes, cryptographic functions and/or sequences 密码、密码函数和/或序列之间的当代互动特刊
Pub Date : 2024-01-25 DOI: 10.1007/s12095-024-00696-0
Sihem Mesnager
{"title":"Special Issue on Contemporary interactions between codes, cryptographic functions and/or sequences","authors":"Sihem Mesnager","doi":"10.1007/s12095-024-00696-0","DOIUrl":"https://doi.org/10.1007/s12095-024-00696-0","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"53 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139598864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theoretical differential fault attacks on FLIP and FiLIP 对 FLIP 和 FiLIP 的理论差分故障攻击
Pub Date : 2024-01-25 DOI: 10.1007/s12095-024-00698-y
Pierrick Méaux, Dibyendu Roy

In this article, we examine Differential Fault Attacks (DFA) targeting two stream ciphers, FLIP and FiLIP. We explore the fault model where an adversary flips a single bit of the key at an unknown position. Our analysis involves establishing complexity bounds for these attacks, contingent upon the cryptographic parameters of the Boolean functions employed as filters and the key size. Initially, we demonstrate how the concept of sensitivity enables the detection of the fault position using only a few keystream bits. This represents an enhancement over previous DFA methodologies applied to these ciphers. Subsequently, we leverage the properties of the filter’s derivatives to execute attacks. This approach is universally applicable to any filter, and we delineate specific attack strategies for the two function families previously implemented in these ciphers.

本文研究了针对 FLIP 和 FiLIP 两种流密码的差分故障攻击(DFA)。我们探讨了对手在未知位置翻转密钥单比特的故障模型。我们的分析包括建立这些攻击的复杂度边界,取决于作为过滤器使用的布尔函数的加密参数和密钥大小。首先,我们展示了灵敏度的概念如何使我们只需使用几个密钥流比特就能检测到故障位置。这比以前应用于这些密码的 DFA 方法更先进。随后,我们利用滤波器导数的特性来实施攻击。这种方法普遍适用于任何滤波器,我们还为这些密码中先前实现的两个函数族划分了具体的攻击策略。
{"title":"Theoretical differential fault attacks on FLIP and FiLIP","authors":"Pierrick Méaux, Dibyendu Roy","doi":"10.1007/s12095-024-00698-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00698-y","url":null,"abstract":"<p>In this article, we examine Differential Fault Attacks (DFA) targeting two stream ciphers, FLIP and FiLIP. We explore the fault model where an adversary flips a single bit of the key at an unknown position. Our analysis involves establishing complexity bounds for these attacks, contingent upon the cryptographic parameters of the Boolean functions employed as filters and the key size. Initially, we demonstrate how the concept of sensitivity enables the detection of the fault position using only a few keystream bits. This represents an enhancement over previous DFA methodologies applied to these ciphers. Subsequently, we leverage the properties of the filter’s derivatives to execute attacks. This approach is universally applicable to any filter, and we delineate specific attack strategies for the two function families previously implemented in these ciphers.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GL-S-NFSR: A new NFSR structure and its period properties GL-S-NFSR:一种新的 NFSR 结构及其周期特性
Pub Date : 2024-01-17 DOI: 10.1007/s12095-024-00694-2
Xiao-Juan Wang, Tian Tian, Wen-Feng Qi

Recently nonlinear feedback shift registers (NFSRs) have frequently been used as basic building blocks for stream ciphers. A major problem concerning NFSRs is to construct NFSRs with large periods. In this paper, a new NFSR structure whose period could be theoretically analyzed is proposed and studied, called GL-S-NFSR. A GL-S-NFSR is a selective cascade connection of a primitive Galois LFSR into a standard Galois NFSR with a linear simplified feedback function, where standard Galois NFSRs with linear simplified feedback functions are very useful in stream ciphers, e.g., Trivium. It is proved that the periods of the output sequences of a GL-S-NFSR are lower bounded by the product of all the Zsigmondy primes of ( 2^n-1 ) with a probability close to 1 under a weak assumption, and particularly, if n is a prime, then (2^n-1) divides the periods of the output sequences with a high probability, where n is the stage of the Galois LFSR. Besides, it is also proved that there are several registers satisfying that the periods are multiples of Zsigmondy primes without any assumption. Note that the main building block of Kreyvium consists of a standard Galois NFSR with a linear simplified feedback function and two pure cycling registers (PCRs). Periodic results on GL-S-NFSR are applied to Kreyvium by modifying one PCR to a primitive LFSR and the modified building block of Kreyvium is called M-Kreyvium. It is shown that the sequences involved in M-Kreyvium could have large periods with high probabilities.

最近,非线性反馈移位寄存器(NFSR)经常被用作流密码的基本构件。有关 NFSR 的一个主要问题是如何构建大周期的 NFSR。本文提出并研究了一种新的 NFSR 结构,即 GL-S-NFSR,它的周期可以从理论上分析。GL-S-NFSR 是将原始伽罗瓦 LFSR 有选择地级联为具有线性简化反馈函数的标准伽罗瓦 NFSR,其中具有线性简化反馈函数的标准伽罗瓦 NFSR 在流密码(如 Trivium)中非常有用。研究证明,在弱假设条件下,GL-S-NFSR 输出序列的周期由 ( 2^n-1 )的所有 Zsigmondy 素的乘积下界,概率接近于 1,特别是,如果 n 是素数,那么 (2^n-1)以很高的概率分割输出序列的周期,其中 n 是伽罗瓦 LFSR 的级数。此外,还证明了有几个寄存器无需任何假设就能满足周期是 Zsigmondy 素的倍数的要求。请注意,Kreyvium 的主要构件包括一个具有线性简化反馈函数的标准伽罗瓦 NFSR 和两个纯循环寄存器 (PCR)。通过将一个 PCR 修改为原始 LFSR,将 GL-S-NFSR 的周期性结果应用于 Kreyvium,修改后的 Kreyvium 构建模块称为 M-Kreyvium。结果表明,M-Kreyvium 所涉及的序列可能具有高概率的大周期。
{"title":"GL-S-NFSR: A new NFSR structure and its period properties","authors":"Xiao-Juan Wang, Tian Tian, Wen-Feng Qi","doi":"10.1007/s12095-024-00694-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00694-2","url":null,"abstract":"<p>Recently nonlinear feedback shift registers (NFSRs) have frequently been used as basic building blocks for stream ciphers. A major problem concerning NFSRs is to construct NFSRs with large periods. In this paper, a new NFSR structure whose period could be theoretically analyzed is proposed and studied, called GL-S-NFSR. A GL-S-NFSR is a selective cascade connection of a primitive Galois LFSR into a standard Galois NFSR with a linear simplified feedback function, where standard Galois NFSRs with linear simplified feedback functions are very useful in stream ciphers, e.g., Trivium. It is proved that the periods of the output sequences of a GL-S-NFSR are lower bounded by the product of all the Zsigmondy primes of <span>( 2^n-1 )</span> with a probability close to 1 under a weak assumption, and particularly, if <i>n</i> is a prime, then <span>(2^n-1)</span> divides the periods of the output sequences with a high probability, where <i>n</i> is the stage of the Galois LFSR. Besides, it is also proved that there are several registers satisfying that the periods are multiples of Zsigmondy primes without any assumption. Note that the main building block of Kreyvium consists of a standard Galois NFSR with a linear simplified feedback function and two pure cycling registers (PCRs). Periodic results on GL-S-NFSR are applied to Kreyvium by modifying one PCR to a primitive LFSR and the modified building block of Kreyvium is called M-Kreyvium. It is shown that the sequences involved in M-Kreyvium could have large periods with high probabilities.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139497393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combinatorial constructions of repairable ramp schemes 可修复斜坡方案的组合构造
Pub Date : 2024-01-17 DOI: 10.1007/s12095-024-00695-1
Jinghui Zhao, Xiuling Shan, Zihong Tian

A repairable ramp scheme is a ramp scheme in which a player can securely reconstruct a lost share with the help from a subset of players. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the security of the ramp scheme. Distribution designs were introduced by Stinson and Wei (Des. Codes Cryptogr. 86, 195–210 2018) and can be used to construct repairable ramp schemes. In this paper, we first give the definitions of a (varvec{(tau _{1},tau _{2},l_{1},l_{2})})-distribution design and a repairable ramp scheme. And we use anti-Pasch Steiner triple systems as distribution designs to construct repairable ramp schemes. We determine the existence of an anti-Pasch Steiner triple system (QFSTS(varvec{(v)})) with a minimum basic repairing set for (varvec{vequiv 1,3pmod 6}), (varvec{vgeqslant 9}) and (varvec{vne 13}). Then we obtain a (varvec{(2,4,n,3)})-repairable ramp scheme containing (varvec{n}) players with (varvec{lceil frac{2v}{3}rceil leqslant nleqslant frac{v(v-1)}{6}}).

可修复斜坡计划是一种斜坡计划,在这种计划中,玩家可以在子集玩家的帮助下安全地重建丢失的份额。这将在没有设立该方案的庄家参与的情况下进行。修复协议不应损害斜坡方案的安全性。分配设计由 Stinson 和 Wei(Des. Codes Cryptogr.本文首先给出了分布设计和可修复斜坡方案的定义。我们使用反帕希-斯坦纳三重系统作为分布设计来构建可修复斜坡方案。我们确定了一个反帕施-斯坦纳三重系统(QFSTS/(varvec{(v)})的存在,它对(varvec{vequiv 1,3pmod 6})、(varvec{vgeqslant 9})和(varvec{vne 13})具有最小基本修复集。)然后我们会得到一个可修复的斜坡方案,这个方案包含了一个有(varvec{(2,4,n,3)}{6}(varvec{лceil frac{2v}{3}rceil leqslant nleqslant frac{v(v-1)}{6})的(varvec{(2,4,n,3)}{n})棋手。
{"title":"Combinatorial constructions of repairable ramp schemes","authors":"Jinghui Zhao, Xiuling Shan, Zihong Tian","doi":"10.1007/s12095-024-00695-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00695-1","url":null,"abstract":"<p>A repairable ramp scheme is a ramp scheme in which a player can securely reconstruct a lost share with the help from a subset of players. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the security of the ramp scheme. Distribution designs were introduced by Stinson and Wei (Des. Codes Cryptogr. 86, 195–210 2018) and can be used to construct repairable ramp schemes. In this paper, we first give the definitions of a <span>(varvec{(tau _{1},tau _{2},l_{1},l_{2})})</span>-distribution design and a repairable ramp scheme. And we use anti-Pasch Steiner triple systems as distribution designs to construct repairable ramp schemes. We determine the existence of an anti-Pasch Steiner triple system (QFSTS<span>(varvec{(v)})</span>) with a minimum basic repairing set for <span>(varvec{vequiv 1,3pmod 6})</span>, <span>(varvec{vgeqslant 9})</span> and <span>(varvec{vne 13})</span>. Then we obtain a <span>(varvec{(2,4,n,3)})</span>-repairable ramp scheme containing <span>(varvec{n})</span> players with <span>(varvec{lceil frac{2v}{3}rceil leqslant nleqslant frac{v(v-1)}{6}})</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139497354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Re-keying analysis in group key management of wireless sensor networks 无线传感器网络组密钥管理中的重密钥分析
Pub Date : 2024-01-05 DOI: 10.1007/s12095-023-00693-9
Prity Kumari, Karam Ratan Singh

The exclusion basis system is a combinatorial formulation of group key management that provides long-term and flexible protection for wireless sensor networks while allowing for reasonable adjustment of the number of keys per node and the number of re-key messages. In this paper, we extend the work of Karst and Wicker to near-resolvable design, symmetric balanced incomplete block designs, and balanced incomplete block designs with the repetition count of a distinct pair of elements equal to one, and it is observed that near-resolvable design provides minimal re-keying compared to symmetric balanced incomplete block designs and balanced incomplete block designs. Also, near-resolvable design and exclusion basis system have the same re-keying size when the number of keys is (n-1).

排除基础系统是分组密钥管理的一种组合形式,可为无线传感器网络提供长期、灵活的保护,同时允许合理调整每个节点的密钥数量和重新密钥信息的数量。在本文中,我们将 Karst 和 Wicker 的研究成果扩展到近可解决设计、对称平衡不完全块设计以及不同元素对的重复次数等于 1 的平衡不完全块设计,结果发现,与对称平衡不完全块设计和平衡不完全块设计相比,近可解决设计提供的重配密钥数量最少。此外,当密钥数为(n-1)时,近可解决设计和排除基础系统具有相同的重新密钥大小。
{"title":"Re-keying analysis in group key management of wireless sensor networks","authors":"Prity Kumari, Karam Ratan Singh","doi":"10.1007/s12095-023-00693-9","DOIUrl":"https://doi.org/10.1007/s12095-023-00693-9","url":null,"abstract":"<p>The exclusion basis system is a combinatorial formulation of group key management that provides long-term and flexible protection for wireless sensor networks while allowing for reasonable adjustment of the number of keys per node and the number of re-key messages. In this paper, we extend the work of Karst and Wicker to near-resolvable design, symmetric balanced incomplete block designs, and balanced incomplete block designs with the repetition count of a distinct pair of elements equal to one, and it is observed that near-resolvable design provides minimal re-keying compared to symmetric balanced incomplete block designs and balanced incomplete block designs. Also, near-resolvable design and exclusion basis system have the same re-keying size when the number of keys is <span>(n-1)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139374108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A class of balanced binary sequences with two-valued non-zero autocorrelation sum and good crosscorrelation sum 一类具有两值非零自相关和及良好交叉相关和的平衡二进制序列
Pub Date : 2024-01-03 DOI: 10.1007/s12095-023-00692-w
Shuhui Shen, Xiaojun Zhang

In this paper, we study a class of binary sequences with two-valued non-zero periodic autocorrelation sum and good periodic crosscorrelation sum as well as balanced properties. We make use of the sequences obtained in (No, J. et al., IEEE Trans. Inform. Theory 44(3), 1278-1282 2001) and adopt the extraction method similar to (Lüke, H. IEEE Trans. Inform. Theory 43(1) 1997). The new sequences are proven to be balanced or almost balanced. Based on these correlation and balanced properties, an important application is to construct Hadamard matrices of order (p+1) for (pequiv 3~()mod 4) and (2p+2) for (pequiv 1~()mod 4). Some examples are shown to verify the theoretical results.

在本文中,我们研究了一类具有两值非零周期自相关和、良好周期交叉相关和以及平衡特性的二进制序列。我们利用在(No, J. et al.Inform.Theory 44(3), 1278-1282 2001)中获得的序列,并采用与(Lüke, H. IEEE Trans.Inform.Theory 43(1) 1997)。新序列被证明是平衡或几乎平衡的。基于这些相关性和平衡性,一个重要的应用就是为 (pequiv 3~()mod 4) 构造秩为 (p+1) 的 Hadamard 矩阵,为 (pequiv 1~()mod 4) 构造秩为 (2p+2) 的 Hadamard 矩阵。通过一些例子来验证理论结果。
{"title":"A class of balanced binary sequences with two-valued non-zero autocorrelation sum and good crosscorrelation sum","authors":"Shuhui Shen, Xiaojun Zhang","doi":"10.1007/s12095-023-00692-w","DOIUrl":"https://doi.org/10.1007/s12095-023-00692-w","url":null,"abstract":"<p>In this paper, we study a class of binary sequences with two-valued non-zero periodic autocorrelation sum and good periodic crosscorrelation sum as well as balanced properties. We make use of the sequences obtained in (No, J. et al., IEEE Trans. Inform. Theory 44(3), 1278-1282 2001) and adopt the extraction method similar to (Lüke, H. IEEE Trans. Inform. Theory 43(1) 1997). The new sequences are proven to be balanced or almost balanced. Based on these correlation and balanced properties, an important application is to construct Hadamard matrices of order <span>(p+1)</span> for <span>(pequiv 3~()</span>mod 4) and <span>(2p+2)</span> for <span>(pequiv 1~()</span>mod 4). Some examples are shown to verify the theoretical results.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139093770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptography and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1