Pub Date : 2024-10-04DOI: 10.1007/s10623-024-01506-7
Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu
The quantum security of message authentication codes (MACs) has been gaining increasing attention in recent years, particularly with regard to proving the quantum security of classical MACs, which has emerged as a significant area of interest. In this work, we present two variants of classical MACs: QPMAC, a quantum-secure parallel version of PMAC, and QCBCMAC, a quantum-secure variant of CBCMAC and NMAC that supports variable-length input. We demonstrate that QPMAC is a parallel quantum-secure MAC, with an inverse relationship between its degree of parallelism and its level of quantum security. On the other hand, QCBCMAC provides quantum security for variable-length inputs. To achieve an optimal balance between parallelism and quantum security, we propose QPCBC, a hybrid construction that combines the strengths of QPMAC and QCBCMAC. We also provide an instantiation of QPCBC using tweakable block ciphers.
{"title":"A quantum-secure partial parallel MAC QPCBC","authors":"Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu","doi":"10.1007/s10623-024-01506-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01506-7","url":null,"abstract":"<p>The quantum security of message authentication codes (MACs) has been gaining increasing attention in recent years, particularly with regard to proving the quantum security of classical MACs, which has emerged as a significant area of interest. In this work, we present two variants of classical MACs: QPMAC, a quantum-secure parallel version of PMAC, and QCBCMAC, a quantum-secure variant of CBCMAC and NMAC that supports variable-length input. We demonstrate that QPMAC is a parallel quantum-secure MAC, with an inverse relationship between its degree of parallelism and its level of quantum security. On the other hand, QCBCMAC provides quantum security for variable-length inputs. To achieve an optimal balance between parallelism and quantum security, we propose QPCBC, a hybrid construction that combines the strengths of QPMAC and QCBCMAC. We also provide an instantiation of QPCBC using tweakable block ciphers.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-04DOI: 10.1007/s10623-024-01495-7
Yadi Wei, Jiaxin Wang, Fang-Wei Fu
Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in Özbudak and Pelen (J Algebr Comb 56:635–658, 2022), Özbudak and Pelen constructed infinite families of symmetric association schemes of classes 5 and 6 by using ternary non-weakly regular bent functions. They also stated that “constructing 2p-class association schemes from p-ary non-weakly regular bent functions is an interesting problem", where (p>3) is an odd prime. In this paper, using non-weakly regular bent functions, we construct infinite families of symmetric association schemes of classes 2p, ((2p+1)) and (frac{3p+1}{2}) for any odd prime p. Fusing those association schemes, we obtain t-class symmetric association schemes, where (t=4,5,6,7). In addition, we give the sufficient and necessary conditions for the partitions P, D, T, U and V (defined in this paper) to induce symmetric association schemes.
{"title":"Association schemes arising from non-weakly regular bent functions","authors":"Yadi Wei, Jiaxin Wang, Fang-Wei Fu","doi":"10.1007/s10623-024-01495-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01495-7","url":null,"abstract":"<p>Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in Özbudak and Pelen (J Algebr Comb 56:635–658, 2022), Özbudak and Pelen constructed infinite families of symmetric association schemes of classes 5 and 6 by using ternary non-weakly regular bent functions. They also stated that “constructing 2<i>p</i>-class association schemes from <i>p</i>-ary non-weakly regular bent functions is an interesting problem\", where <span>(p>3)</span> is an odd prime. In this paper, using non-weakly regular bent functions, we construct infinite families of symmetric association schemes of classes 2<i>p</i>, <span>((2p+1))</span> and <span>(frac{3p+1}{2})</span> for any odd prime <i>p</i>. Fusing those association schemes, we obtain <i>t</i>-class symmetric association schemes, where <span>(t=4,5,6,7)</span>. In addition, we give the sufficient and necessary conditions for the partitions <i>P</i>, <i>D</i>, <i>T</i>, <i>U</i> and <i>V</i> (defined in this paper) to induce symmetric association schemes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"59 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01493-9
Ajani De Vas Gunasekara, Alice Devillers
An H-decomposition of a graph (Gamma ) is a partition of its edge set into subgraphs isomorphic to H. A transitive decomposition is a special kind of H-decomposition that is highly symmetrical in the sense that the subgraphs (copies of H) are preserved and transitively permuted by a group of automorphisms of (Gamma ). This paper concerns transitive H-decompositions of the graph (K_n Box K_n) where H is a path. When n is an odd prime, we present a construction for a transitive path decomposition where the paths in the decomposition are considerably large compared to the number of vertices. Our main result supports well-known Gallai’s conjecture and an extended version of Ringel’s conjecture.
一个图 (Gamma )的 H 分解是将它的边集分割成与 H 同构的子图。反式分解是一种特殊的 H 分解,它具有高度对称性,即子图(H 的副本)通过 (Gamma )的一组自动形变得到保留和反式置换。本文关注图 (K_n Box K_n) 的传递 H 分解,其中 H 是一条路径。当 n 是奇素数时,我们提出了一种反式路径分解的构造,分解中的路径与顶点数相比相当大。我们的主要结果支持众所周知的加莱猜想和林格尔猜想的扩展版本。
{"title":"Transitive path decompositions of Cartesian products of complete graphs","authors":"Ajani De Vas Gunasekara, Alice Devillers","doi":"10.1007/s10623-024-01493-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01493-9","url":null,"abstract":"<p>An <i>H</i>-decomposition of a graph <span>(Gamma )</span> is a partition of its edge set into subgraphs isomorphic to <i>H</i>. A transitive decomposition is a special kind of <i>H</i>-decomposition that is highly symmetrical in the sense that the subgraphs (copies of <i>H</i>) are preserved and transitively permuted by a group of automorphisms of <span>(Gamma )</span>. This paper concerns transitive <i>H</i>-decompositions of the graph <span>(K_n Box K_n)</span> where <i>H</i> is a path. When <i>n</i> is an odd prime, we present a construction for a transitive path decomposition where the paths in the decomposition are considerably large compared to the number of vertices. Our main result supports well-known Gallai’s conjecture and an extended version of Ringel’s conjecture.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"5 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01499-3
Zhiguo Ding, Michael E. Zieve
For each odd prime power q, we present two rational functions (f(X)in mathbb {F}_q(X)) which have the unusual property that, for every odd n, the function induced by f(X) on (mathbb {F}_{q^n}setminus mathbb {F}_q) is ((q-1))-to-1.
{"title":"Two classes of exceptional m-to-1 rational functions","authors":"Zhiguo Ding, Michael E. Zieve","doi":"10.1007/s10623-024-01499-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01499-3","url":null,"abstract":"<p>For each odd prime power <i>q</i>, we present two rational functions <span>(f(X)in mathbb {F}_q(X))</span> which have the unusual property that, for every odd <i>n</i>, the function induced by <i>f</i>(<i>X</i>) on <span>(mathbb {F}_{q^n}setminus mathbb {F}_q)</span> is <span>((q-1))</span>-to-1.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01490-y
John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle
For finite classical groups acting naturally on the set of points of their ambient polar spaces, the symmetry properties of synchronising and separating are equivalent to natural and well-studied problems on the existence of certain configurations in finite geometry. The more general class of spreading permutation groups is harder to describe, and it is the purpose of this paper to explore this property for finite classical groups. In particular, we show that for most finite classical groups, their natural action on the points of its polar space is non-spreading. We develop and use a result on tactical decompositions (an AB-Lemma) that provides a useful technique for finding witnesses for non-spreading permutation groups. We also consider some of the other primitive actions of the classical groups.
{"title":"Tactical decompositions in finite polar spaces and non-spreading classical group actions","authors":"John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle","doi":"10.1007/s10623-024-01490-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01490-y","url":null,"abstract":"<p>For finite classical groups acting naturally on the set of points of their ambient polar spaces, the symmetry properties of <i>synchronising</i> and <i>separating</i> are equivalent to natural and well-studied problems on the existence of certain configurations in finite geometry. The more general class of <i>spreading</i> permutation groups is harder to describe, and it is the purpose of this paper to explore this property for finite classical groups. In particular, we show that for most finite classical groups, their natural action on the points of its polar space is non-spreading. We develop and use a result on tactical decompositions (an <i>AB-Lemma</i>) that provides a useful technique for finding witnesses for non-spreading permutation groups. We also consider some of the other primitive actions of the classical groups.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01500-z
Yingyin Pan, Jianghua Zhong, Dongdai Lin
Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. One security criterion for the design of a stream cipher is to assure its used NFSR has a long period. As the period of a Fibonacci NFSR is equal to its largest cycle length, a common way to get a maximum-period Fibonacci NFSR is to join the cycles of an original Fibonacci NFSR into a maximum cycle. Nevertheless, so far only the maximum-period Fibonacci NFSRs with stage numbers no greater than 33 have been found. Considering that Galois NFSRs may have higher implementation efficiency than Fibonacci NFSRs, this paper first generalizes the cycle joining method for Fibonacci NFSRs to Galois NFSRs and establishes some conditions for maximum-period Galois NFSRs. It then reveals the cycle structure of some cascade connections of two Fibonacci NFSRs. Based on both, the paper constructs some long-period Galois NFSRs including maximum-period Galois NFSRs with stage numbers up to 41. Finally, it analyzes their hardware implementation via the technology mapping obtained by synthesizing the NFSRs with Synopsys Design Compiler L(-)2016.03-Sp1 using the TSMC 90nm CMOS library, and the results show that they have good hardware performance.
{"title":"Generalized cycle joining method and its application to the construction of long-period Galois NFSRs","authors":"Yingyin Pan, Jianghua Zhong, Dongdai Lin","doi":"10.1007/s10623-024-01500-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01500-z","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. One security criterion for the design of a stream cipher is to assure its used NFSR has a long period. As the period of a Fibonacci NFSR is equal to its largest cycle length, a common way to get a maximum-period Fibonacci NFSR is to join the cycles of an original Fibonacci NFSR into a maximum cycle. Nevertheless, so far only the maximum-period Fibonacci NFSRs with stage numbers no greater than 33 have been found. Considering that Galois NFSRs may have higher implementation efficiency than Fibonacci NFSRs, this paper first generalizes the cycle joining method for Fibonacci NFSRs to Galois NFSRs and establishes some conditions for maximum-period Galois NFSRs. It then reveals the cycle structure of some cascade connections of two Fibonacci NFSRs. Based on both, the paper constructs some long-period Galois NFSRs including maximum-period Galois NFSRs with stage numbers up to 41. Finally, it analyzes their hardware implementation via the technology mapping obtained by synthesizing the NFSRs with Synopsys Design Compiler L<span>(-)</span>2016.03-Sp1 using the TSMC 90nm CMOS library, and the results show that they have good hardware performance.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01503-w
Ákos K. Matszangosz, Ferenc Szöllősi
It is shown that a normalized complex Hadamard matrix of order 6 having three distinct columns each containing at least one (-1) entry, necessarily belongs to the transposed Fourier family, or to the family of 2-circulant complex Hadamard matrices. The proofs rely on solving polynomial systems of equations by Gröbner basis techniques, and make use of a structure theorem concerning regular Hadamard matrices. As a consequence, members of these two families can be easily recognized in practice. In particular, one can identify complex Hadamard matrices appearing in known triplets of pairwise mutually unbiased bases in dimension 6.
{"title":"A characterization of complex Hadamard matrices appearing in families of MUB triplets","authors":"Ákos K. Matszangosz, Ferenc Szöllősi","doi":"10.1007/s10623-024-01503-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01503-w","url":null,"abstract":"<p>It is shown that a normalized complex Hadamard matrix of order 6 having three distinct columns each containing at least one <span>(-1)</span> entry, necessarily belongs to the transposed Fourier family, or to the family of 2-circulant complex Hadamard matrices. The proofs rely on solving polynomial systems of equations by Gröbner basis techniques, and make use of a structure theorem concerning regular Hadamard matrices. As a consequence, members of these two families can be easily recognized in practice. In particular, one can identify complex Hadamard matrices appearing in known triplets of pairwise mutually unbiased bases in dimension 6.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01504-9
Rong Luo, Mingliang Yan, Sihem Mesnager, Dongchun Han
This paper focuses on hull dimensional codes obtained by the intersection of linear codes and their dual. These codes were introduced by Assmus and Key and have been the subject of significant theoretical and practical research over the years, gaining increased attention in recent years. Let (mathbb {F}_q) denote the finite field with q elements, and let G be a finite Abelian group of order n. The paper investigates Abelian codes defined as ideals of the group algebra (mathbb {F}_qG) with coefficients in (mathbb {F}_q). Specifically, it delves into Abelian hull dimensional codes in the group algebra (mathbb {F}_qG), where G is a finite Abelian group of order n with (gcd (n,q)=1). Specifically, we first examine general hull Abelian codes and then narrow its focus to Abelian one-dimensional hull codes. Next, we focus on Abelian one-dimensional hull codes and present some necessary and sufficient conditions for characterizing them. Consequently, we generalize a recent result on Abelian codes and show that no binary or ternary Abelian codes with one-dimensional hulls exist. Furthermore, we construct Abelian codes with one-dimensional hulls by generating idempotents, derive optimal ones with one-dimensional hulls, and establish several existing results of Abelian codes with one-dimensional hulls. Finally, we develop enumeration results through a simple formula that counts Abelian codes with one-dimensional hulls in (mathbb {F}_qG). These achievements exploit the rich algebraic structure of those Abelian codes and enhance and increase our knowledge of them by considering their hull dimensions, reducing the gap between their interests and our understanding of them.
本文重点研究由线性编码及其对偶的交集得到的全维编码。这些代码由阿斯穆斯和基提出,多年来一直是重要的理论和实践研究课题,近年来受到越来越多的关注。让 (mathbb {F}_q) 表示有 q 个元素的有限域,让 G 是一个有 n 阶的有限阿贝尔群。本文研究的阿贝尔码定义为群代数 (mathbb {F}_qG) 的理想,其系数在 (mathbb {F}_q) 中。具体来说,它深入研究了群代数 (mathbb {F}_qG) 中的阿贝尔船体维码,其中 G 是阶数为 n 的有限阿贝尔群,且 (gcd(n,q)=1)。具体来说,我们首先研究一般的船体阿贝尔码,然后把重点缩小到阿贝尔一维船体码。接下来,我们聚焦于阿贝尔一维船体码,并提出了表征它们的一些必要条件和充分条件。因此,我们概括了最近关于阿贝尔码的一个结果,并证明不存在二元或三元阿贝尔一维体码。此外,我们通过生成幂等子来构造具有一维空壳的阿贝尔码,推导出具有一维空壳的最优阿贝尔码,并建立了具有一维空壳的阿贝尔码的几个现有结果。最后,我们通过一个简单的公式发展了枚举结果,这个公式可以在 (mathbb {F}_qG) 中计算具有一维空壳的阿贝尔码。这些成果利用了这些阿贝尔码丰富的代数结构,并通过考虑它们的壳维度来加强和增加我们对它们的认识,从而缩小了它们的兴趣与我们对它们的理解之间的差距。
{"title":"On Abelian one-dimensional hull codes in group algebras","authors":"Rong Luo, Mingliang Yan, Sihem Mesnager, Dongchun Han","doi":"10.1007/s10623-024-01504-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01504-9","url":null,"abstract":"<p>This paper focuses on hull dimensional codes obtained by the intersection of linear codes and their dual. These codes were introduced by Assmus and Key and have been the subject of significant theoretical and practical research over the years, gaining increased attention in recent years. Let <span>(mathbb {F}_q)</span> denote the finite field with <i>q</i> elements, and let <i>G</i> be a finite Abelian group of order <i>n</i>. The paper investigates Abelian codes defined as ideals of the group algebra <span>(mathbb {F}_qG)</span> with coefficients in <span>(mathbb {F}_q)</span>. Specifically, it delves into Abelian hull dimensional codes in the group algebra <span>(mathbb {F}_qG)</span>, where <i>G</i> is a finite Abelian group of order <i>n</i> with <span>(gcd (n,q)=1)</span>. Specifically, we first examine general hull Abelian codes and then narrow its focus to Abelian one-dimensional hull codes. Next, we focus on Abelian one-dimensional hull codes and present some necessary and sufficient conditions for characterizing them. Consequently, we generalize a recent result on Abelian codes and show that no binary or ternary Abelian codes with one-dimensional hulls exist. Furthermore, we construct Abelian codes with one-dimensional hulls by generating idempotents, derive optimal ones with one-dimensional hulls, and establish several existing results of Abelian codes with one-dimensional hulls. Finally, we develop enumeration results through a simple formula that counts Abelian codes with one-dimensional hulls in <span>(mathbb {F}_qG)</span>. These achievements exploit the rich algebraic structure of those Abelian codes and enhance and increase our knowledge of them by considering their hull dimensions, reducing the gap between their interests and our understanding of them.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-03DOI: 10.1007/s10623-024-01494-8
Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau
In this paper, we focus on the design of binary constant weight codes that admit low-complexity encoding and decoding algorithms, and that have size (M=2^k) so that codewords can conveniently be labeled with binary vectors of length k. For every integer (ell ge 3), we construct a ((n=2^ell , M=2^{k_{ell }}, d=2)) constant weight code ({{{mathcal {C}}}}[ell ]) of weight (ell ) by encoding information in the gaps between successive 1’s of a vector, and call them as cyclic-gap constant weight codes. The code is associated with a finite integer sequence of length (ell ) satisfying a constraint defined as anchor-decodability that is pivotal to ensure low complexity for encoding and decoding. The time complexity of the encoding algorithm is linear in the input size k, and that of the decoding algorithm is poly-logarithmic in the input size n, discounting the linear time spent on parsing the input. Both the algorithms do not require expensive computation of binomial coefficients, unlike the case in many existing schemes. Among codes generated by all anchor-decodable sequences, we show that ({{{mathcal {C}}}}[ell ]) has the maximum size with (k_{ell } ge ell ^2-ell log _2ell + log _2ell - 0.279ell - 0.721). As k is upper bounded by (ell ^2-ell log _2ell +O(ell )) information-theoretically, the code ({{{mathcal {C}}}}[ell ]) is optimal in its size with respect to two higher order terms of (ell ). In particular, (k_ell ) meets the upper bound for (ell =3) and one-bit away for (ell =4). On the other hand, we show that ({{{mathcal {C}}}}[ell ]) is not unique in attaining (k_{ell }) by constructing an alternate code (mathcal{{hat{C}}}[ell ]) again parameterized by an integer (ell ge 3) with a different low-complexity decoder, yet having the same size (2^{k_{ell }}) when (3 le ell le 7). Finally, we also derive new codes by modifying ({{{mathcal {C}}}}[ell ]) that offer a wider range on blocklength and weight while retaining low complexity for encoding and decoding. For certain selected values of parameters, these modified codes too have an optimal k.
在本文中,我们将重点关注二进制恒权码的设计,这些码允许低复杂度的编码和解码算法,并且具有 (M=2^k) 的大小,从而可以方便地用长度为 k 的二进制向量来标记码字。对于每一个整数((ell ge 3)),我们通过在向量的连续 1 之间的空隙中编码信息来构造一个((n=2^ell , M=2^{k_{ell }}, d=2))权重为((ell )的恒权码({{mathcal {C}}}}[ell ] ),并称它们为循环空隙恒权码。编码与长度为 (ell ) 的有限整数序列相关联,满足定义为锚-可解码性的约束条件,这对于确保编码和解码的低复杂度至关重要。编码算法的时间复杂度与输入大小 k 呈线性关系,而解码算法的时间复杂度与输入大小 n 呈多对数关系,这还不包括解析输入所花费的线性时间。与许多现有方案不同的是,这两种算法都不需要计算昂贵的二项式系数。在所有锚可解码序列生成的代码中,我们证明了({{/mathcal {C}}}}[ell ] )的最大大小为(k_{ell } ge ell ^2-ell log _2ell + log _2ell - 0.279ell - 0.721/)。从信息理论上讲,由于k的上界是(ell ^2-ell log _2ell +O(ell ) ),所以代码({{mathcal {C}}}}[ell ] )的大小对于(ell )的两个高阶项来说是最优的。特别是,(k_ell )符合(ell =3)的上界,并且距离(ell =4)只有一个比特的距离。另一方面,我们通过用不同的低复杂度解码器构造另一种代码(mathcal{{hat{C}}[ell ]),再次用整数(ell ge 3) 作为参数,证明({{mathcal{C}}}}[ell ])在达到(k_{ell })方面并不是唯一的、当 (3 le ell le 7) 时,具有相同的大小 (2^{k_{ell}})。最后,我们还通过修改 ({{mathcal {C}}}}[ell ]) 得出了新的编码,这些编码在保留较低编码和解码复杂度的同时,提供了更宽的块长和权重范围。对于某些选定的参数值,这些修改后的编码也具有最优的 k。
{"title":"Binary cyclic-gap constant weight codes with low-complexity encoding and decoding","authors":"Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau","doi":"10.1007/s10623-024-01494-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01494-8","url":null,"abstract":"<p>In this paper, we focus on the design of binary constant weight codes that admit low-complexity encoding and decoding algorithms, and that have size <span>(M=2^k)</span> so that codewords can conveniently be labeled with binary vectors of length <i>k</i>. For every integer <span>(ell ge 3)</span>, we construct a <span>((n=2^ell , M=2^{k_{ell }}, d=2))</span> constant weight code <span>({{{mathcal {C}}}}[ell ])</span> of weight <span>(ell )</span> by encoding information in the gaps between successive 1’s of a vector, and call them as cyclic-gap constant weight codes. The code is associated with a finite integer sequence of length <span>(ell )</span> satisfying a constraint defined as <i>anchor-decodability</i> that is pivotal to ensure low complexity for encoding and decoding. The time complexity of the encoding algorithm is linear in the input size <i>k</i>, and that of the decoding algorithm is poly-logarithmic in the input size <i>n</i>, discounting the linear time spent on parsing the input. Both the algorithms do not require expensive computation of binomial coefficients, unlike the case in many existing schemes. Among codes generated by all anchor-decodable sequences, we show that <span>({{{mathcal {C}}}}[ell ])</span> has the maximum size with <span>(k_{ell } ge ell ^2-ell log _2ell + log _2ell - 0.279ell - 0.721)</span>. As <i>k</i> is upper bounded by <span>(ell ^2-ell log _2ell +O(ell ))</span> information-theoretically, the code <span>({{{mathcal {C}}}}[ell ])</span> is optimal in its size with respect to two higher order terms of <span>(ell )</span>. In particular, <span>(k_ell )</span> meets the upper bound for <span>(ell =3)</span> and one-bit away for <span>(ell =4)</span>. On the other hand, we show that <span>({{{mathcal {C}}}}[ell ])</span> is not unique in attaining <span>(k_{ell })</span> by constructing an alternate code <span>(mathcal{{hat{C}}}[ell ])</span> again parameterized by an integer <span>(ell ge 3)</span> with a different low-complexity decoder, yet having the same size <span>(2^{k_{ell }})</span> when <span>(3 le ell le 7)</span>. Finally, we also derive new codes by modifying <span>({{{mathcal {C}}}}[ell ])</span> that offer a wider range on blocklength and weight while retaining low complexity for encoding and decoding. For certain selected values of parameters, these modified codes too have an optimal <i>k</i>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"103 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-28DOI: 10.1007/s10623-024-01501-y
Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang
Quasi-complementary sequence sets (QCSSs) are important in modern communication systems as they are capable of supporting more users, which is desired in applications like MC-CDMA nowadays. Although several constructions of aperiodic QCSSs have been proposed in the literature, the known optimal aperiodic QCSSs have limited length or have large alphabet. In this paper, based on extended Boolean functions, we present two constructions of aperiodic QCSSs with parameters ((q(p_0-1),q,q-t,q)) and ((q^m(p_0-1),q^m,q^m-t,q^m)), where (qge 3) is an odd integer, (p_0) is the minimum prime factor of q. The proposed constructions can generate asymptotically optimal or near-optimal aperiodic QCSSs with new parameters.
{"title":"Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions","authors":"Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang","doi":"10.1007/s10623-024-01501-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01501-y","url":null,"abstract":"<p>Quasi-complementary sequence sets (QCSSs) are important in modern communication systems as they are capable of supporting more users, which is desired in applications like MC-CDMA nowadays. Although several constructions of aperiodic QCSSs have been proposed in the literature, the known optimal aperiodic QCSSs have limited length or have large alphabet. In this paper, based on extended Boolean functions, we present two constructions of aperiodic QCSSs with parameters <span>((q(p_0-1),q,q-t,q))</span> and <span>((q^m(p_0-1),q^m,q^m-t,q^m))</span>, where <span>(qge 3)</span> is an odd integer, <span>(p_0)</span> is the minimum prime factor of <i>q</i>. The proposed constructions can generate asymptotically optimal or near-optimal aperiodic QCSSs with new parameters.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"53 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142329172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}