首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
A quantum-secure partial parallel MAC QPCBC 量子安全部分并行 MAC QPCBC
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01506-7
Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu

The quantum security of message authentication codes (MACs) has been gaining increasing attention in recent years, particularly with regard to proving the quantum security of classical MACs, which has emerged as a significant area of interest. In this work, we present two variants of classical MACs: QPMAC, a quantum-secure parallel version of PMAC, and QCBCMAC, a quantum-secure variant of CBCMAC and NMAC that supports variable-length input. We demonstrate that QPMAC is a parallel quantum-secure MAC, with an inverse relationship between its degree of parallelism and its level of quantum security. On the other hand, QCBCMAC provides quantum security for variable-length inputs. To achieve an optimal balance between parallelism and quantum security, we propose QPCBC, a hybrid construction that combines the strengths of QPMAC and QCBCMAC. We also provide an instantiation of QPCBC using tweakable block ciphers.

近年来,消息认证码(MAC)的量子安全性越来越受到关注,特别是在证明经典 MAC 的量子安全性方面,这已成为一个重要的兴趣领域。在这项工作中,我们提出了经典 MAC 的两种变体:QPMAC 是 PMAC 的量子安全并行版本,QCBCMAC 是 CBCMAC 和 NMAC 的量子安全变体,支持可变长度输入。我们证明 QPMAC 是一种并行量子安全 MAC,其并行程度与量子安全水平之间存在反比关系。另一方面,QCBCMAC 为可变长度输入提供量子安全。为了在并行性和量子安全性之间实现最佳平衡,我们提出了 QPCBC,一种结合了 QPMAC 和 QCBCMAC 优点的混合构造。我们还提供了使用可调整块密码的 QPCBC 实例。
{"title":"A quantum-secure partial parallel MAC QPCBC","authors":"Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu","doi":"10.1007/s10623-024-01506-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01506-7","url":null,"abstract":"<p>The quantum security of message authentication codes (MACs) has been gaining increasing attention in recent years, particularly with regard to proving the quantum security of classical MACs, which has emerged as a significant area of interest. In this work, we present two variants of classical MACs: QPMAC, a quantum-secure parallel version of PMAC, and QCBCMAC, a quantum-secure variant of CBCMAC and NMAC that supports variable-length input. We demonstrate that QPMAC is a parallel quantum-secure MAC, with an inverse relationship between its degree of parallelism and its level of quantum security. On the other hand, QCBCMAC provides quantum security for variable-length inputs. To achieve an optimal balance between parallelism and quantum security, we propose QPCBC, a hybrid construction that combines the strengths of QPMAC and QCBCMAC. We also provide an instantiation of QPCBC using tweakable block ciphers.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Association schemes arising from non-weakly regular bent functions 非弱正则弯曲函数产生的关联方案
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01495-7
Yadi Wei, Jiaxin Wang, Fang-Wei Fu

Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in Özbudak and Pelen (J Algebr Comb 56:635–658, 2022), Özbudak and Pelen constructed infinite families of symmetric association schemes of classes 5 and 6 by using ternary non-weakly regular bent functions. They also stated that “constructing 2p-class association schemes from p-ary non-weakly regular bent functions is an interesting problem", where (p>3) is an odd prime. In this paper, using non-weakly regular bent functions, we construct infinite families of symmetric association schemes of classes 2p, ((2p+1)) and (frac{3p+1}{2}) for any odd prime p. Fusing those association schemes, we obtain t-class symmetric association schemes, where (t=4,5,6,7). In addition, we give the sufficient and necessary conditions for the partitions P, D, T, U and V (defined in this paper) to induce symmetric association schemes.

关联方案在代数组合学中发挥着重要作用,并在编码理论、图论和设计理论中有着重要应用。利用弯曲函数构建关联方案的方法已被广泛研究。最近,在 Özbudak 和 Pelen(J Algebr Comb 56:635-658, 2022)一文中,Özbudak 和 Pelen 利用三元非弱正则弯曲函数构造了 5 类和 6 类对称关联方案的无限族。他们还指出,"从 p-ary 非弱正则弯曲函数构造 2p 类关联方案是一个有趣的问题",其中 (p>3) 是奇素数。在本文中,我们使用非弱正则弯曲函数,为任意奇素数 p 构建了 2p、((2p+1))和(frac{3p+1}{2})类对称关联方案的无穷族,并融合这些关联方案,得到了 t 类对称关联方案,其中 (t=4,5,6,7)。此外,我们还给出了分区 P、D、T、U 和 V(本文中定义)诱导对称关联方案的充分必要条件。
{"title":"Association schemes arising from non-weakly regular bent functions","authors":"Yadi Wei, Jiaxin Wang, Fang-Wei Fu","doi":"10.1007/s10623-024-01495-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01495-7","url":null,"abstract":"<p>Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in Özbudak and Pelen (J Algebr Comb 56:635–658, 2022), Özbudak and Pelen constructed infinite families of symmetric association schemes of classes 5 and 6 by using ternary non-weakly regular bent functions. They also stated that “constructing 2<i>p</i>-class association schemes from <i>p</i>-ary non-weakly regular bent functions is an interesting problem\", where <span>(p&gt;3)</span> is an odd prime. In this paper, using non-weakly regular bent functions, we construct infinite families of symmetric association schemes of classes 2<i>p</i>, <span>((2p+1))</span> and <span>(frac{3p+1}{2})</span> for any odd prime <i>p</i>. Fusing those association schemes, we obtain <i>t</i>-class symmetric association schemes, where <span>(t=4,5,6,7)</span>. In addition, we give the sufficient and necessary conditions for the partitions <i>P</i>, <i>D</i>, <i>T</i>, <i>U</i> and <i>V</i> (defined in this paper) to induce symmetric association schemes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"59 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transitive path decompositions of Cartesian products of complete graphs 完整图笛卡儿积的传递路径分解
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01493-9
Ajani De Vas Gunasekara, Alice Devillers

An H-decomposition of a graph (Gamma ) is a partition of its edge set into subgraphs isomorphic to H. A transitive decomposition is a special kind of H-decomposition that is highly symmetrical in the sense that the subgraphs (copies of H) are preserved and transitively permuted by a group of automorphisms of (Gamma ). This paper concerns transitive H-decompositions of the graph (K_n Box K_n) where H is a path. When n is an odd prime, we present a construction for a transitive path decomposition where the paths in the decomposition are considerably large compared to the number of vertices. Our main result supports well-known Gallai’s conjecture and an extended version of Ringel’s conjecture.

一个图 (Gamma )的 H 分解是将它的边集分割成与 H 同构的子图。反式分解是一种特殊的 H 分解,它具有高度对称性,即子图(H 的副本)通过 (Gamma )的一组自动形变得到保留和反式置换。本文关注图 (K_n Box K_n) 的传递 H 分解,其中 H 是一条路径。当 n 是奇素数时,我们提出了一种反式路径分解的构造,分解中的路径与顶点数相比相当大。我们的主要结果支持众所周知的加莱猜想和林格尔猜想的扩展版本。
{"title":"Transitive path decompositions of Cartesian products of complete graphs","authors":"Ajani De Vas Gunasekara, Alice Devillers","doi":"10.1007/s10623-024-01493-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01493-9","url":null,"abstract":"<p>An <i>H</i>-decomposition of a graph <span>(Gamma )</span> is a partition of its edge set into subgraphs isomorphic to <i>H</i>. A transitive decomposition is a special kind of <i>H</i>-decomposition that is highly symmetrical in the sense that the subgraphs (copies of <i>H</i>) are preserved and transitively permuted by a group of automorphisms of <span>(Gamma )</span>. This paper concerns transitive <i>H</i>-decompositions of the graph <span>(K_n Box K_n)</span> where <i>H</i> is a path. When <i>n</i> is an odd prime, we present a construction for a transitive path decomposition where the paths in the decomposition are considerably large compared to the number of vertices. Our main result supports well-known Gallai’s conjecture and an extended version of Ringel’s conjecture.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"5 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two classes of exceptional m-to-1 rational functions 两类特殊的 m 对 1 有理函数
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01499-3
Zhiguo Ding, Michael E. Zieve

For each odd prime power q, we present two rational functions (f(X)in mathbb {F}_q(X)) which have the unusual property that, for every odd n, the function induced by f(X) on (mathbb {F}_{q^n}setminus mathbb {F}_q) is ((q-1))-to-1.

对于每个奇素数幂 q,我们提出了两个有理函数 (f(X)in mathbb {F}_q(X)) ,它们有一个不同寻常的性质,即对于每个奇数 n,f(X) 在 (mathbb {F}_{q^n}setminus mathbb {F}_q) 上诱导的函数是 ((q-1))-to-1。
{"title":"Two classes of exceptional m-to-1 rational functions","authors":"Zhiguo Ding, Michael E. Zieve","doi":"10.1007/s10623-024-01499-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01499-3","url":null,"abstract":"<p>For each odd prime power <i>q</i>, we present two rational functions <span>(f(X)in mathbb {F}_q(X))</span> which have the unusual property that, for every odd <i>n</i>, the function induced by <i>f</i>(<i>X</i>) on <span>(mathbb {F}_{q^n}setminus mathbb {F}_q)</span> is <span>((q-1))</span>-to-1.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tactical decompositions in finite polar spaces and non-spreading classical group actions 有限极空间中的战术分解与非展开经典群作用
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01490-y
John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle

For finite classical groups acting naturally on the set of points of their ambient polar spaces, the symmetry properties of synchronising and separating are equivalent to natural and well-studied problems on the existence of certain configurations in finite geometry. The more general class of spreading permutation groups is harder to describe, and it is the purpose of this paper to explore this property for finite classical groups. In particular, we show that for most finite classical groups, their natural action on the points of its polar space is non-spreading. We develop and use a result on tactical decompositions (an AB-Lemma) that provides a useful technique for finding witnesses for non-spreading permutation groups. We also consider some of the other primitive actions of the classical groups.

对于自然作用于其周围极空间点集的有限经典群来说,同步和分离的对称性质等同于有限几何中某些构型存在性的自然问题和研究得很透彻的问题。更一般的展布置换群更难描述,本文的目的是探讨有限经典群的这一性质。我们特别指出,对于大多数有限经典群来说,它们在极空间点上的自然作用是非展开的。我们发展并使用了一个关于战术分解的结果(AB-Lemma),该结果为寻找非蔓延置换群的见证提供了有用的技术。我们还考虑了经典群的其他一些原始作用。
{"title":"Tactical decompositions in finite polar spaces and non-spreading classical group actions","authors":"John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle","doi":"10.1007/s10623-024-01490-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01490-y","url":null,"abstract":"<p>For finite classical groups acting naturally on the set of points of their ambient polar spaces, the symmetry properties of <i>synchronising</i> and <i>separating</i> are equivalent to natural and well-studied problems on the existence of certain configurations in finite geometry. The more general class of <i>spreading</i> permutation groups is harder to describe, and it is the purpose of this paper to explore this property for finite classical groups. In particular, we show that for most finite classical groups, their natural action on the points of its polar space is non-spreading. We develop and use a result on tactical decompositions (an <i>AB-Lemma</i>) that provides a useful technique for finding witnesses for non-spreading permutation groups. We also consider some of the other primitive actions of the classical groups.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized cycle joining method and its application to the construction of long-period Galois NFSRs 广义循环连接法及其在构建长周期伽罗瓦NFSR中的应用
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01500-z
Yingyin Pan, Jianghua Zhong, Dongdai Lin

Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. One security criterion for the design of a stream cipher is to assure its used NFSR has a long period. As the period of a Fibonacci NFSR is equal to its largest cycle length, a common way to get a maximum-period Fibonacci NFSR is to join the cycles of an original Fibonacci NFSR into a maximum cycle. Nevertheless, so far only the maximum-period Fibonacci NFSRs with stage numbers no greater than 33 have been found. Considering that Galois NFSRs may have higher implementation efficiency than Fibonacci NFSRs, this paper first generalizes the cycle joining method for Fibonacci NFSRs to Galois NFSRs and establishes some conditions for maximum-period Galois NFSRs. It then reveals the cycle structure of some cascade connections of two Fibonacci NFSRs. Based on both, the paper constructs some long-period Galois NFSRs including maximum-period Galois NFSRs with stage numbers up to 41. Finally, it analyzes their hardware implementation via the technology mapping obtained by synthesizing the NFSRs with Synopsys Design Compiler L(-)2016.03-Sp1 using the TSMC 90nm CMOS library, and the results show that they have good hardware performance.

非线性反馈移位寄存器(NFSR)是最近许多流密码中使用的主要构件。设计流密码的一个安全标准是确保所使用的非线性反馈移位寄存器具有较长的周期。由于斐波那契 NFSR 的周期等于其最大循环长度,因此获得最大周期斐波那契 NFSR 的常用方法是将原始斐波那契 NFSR 的循环连接成一个最大循环。然而,迄今为止,人们只找到了级数不大于 33 的最大周期斐波那契 NFSR。考虑到伽罗瓦 NFSR 的实现效率可能高于斐波那契 NFSR,本文首先将斐波那契 NFSR 的循环连接方法推广到伽罗瓦 NFSR,并建立了最大周期伽罗瓦 NFSR 的一些条件。然后,本文揭示了两个 Fibonacci NFSR 的某些级联的循环结构。在此基础上,论文构建了一些长周期伽罗瓦 NFSR,包括级数高达 41 的最大周期伽罗瓦 NFSR。最后,通过使用 Synopsys Design Compiler L(-)2016.03-Sp1 使用台积电 90nm CMOS 库综合 NFSR 得到的技术映射分析了它们的硬件实现,结果表明它们具有良好的硬件性能。
{"title":"Generalized cycle joining method and its application to the construction of long-period Galois NFSRs","authors":"Yingyin Pan, Jianghua Zhong, Dongdai Lin","doi":"10.1007/s10623-024-01500-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01500-z","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. One security criterion for the design of a stream cipher is to assure its used NFSR has a long period. As the period of a Fibonacci NFSR is equal to its largest cycle length, a common way to get a maximum-period Fibonacci NFSR is to join the cycles of an original Fibonacci NFSR into a maximum cycle. Nevertheless, so far only the maximum-period Fibonacci NFSRs with stage numbers no greater than 33 have been found. Considering that Galois NFSRs may have higher implementation efficiency than Fibonacci NFSRs, this paper first generalizes the cycle joining method for Fibonacci NFSRs to Galois NFSRs and establishes some conditions for maximum-period Galois NFSRs. It then reveals the cycle structure of some cascade connections of two Fibonacci NFSRs. Based on both, the paper constructs some long-period Galois NFSRs including maximum-period Galois NFSRs with stage numbers up to 41. Finally, it analyzes their hardware implementation via the technology mapping obtained by synthesizing the NFSRs with Synopsys Design Compiler L<span>(-)</span>2016.03-Sp1 using the TSMC 90nm CMOS library, and the results show that they have good hardware performance.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A characterization of complex Hadamard matrices appearing in families of MUB triplets MUB 三胞胎族中出现的复哈达玛矩阵的特征描述
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01503-w
Ákos K. Matszangosz, Ferenc Szöllősi

It is shown that a normalized complex Hadamard matrix of order 6 having three distinct columns each containing at least one (-1) entry, necessarily belongs to the transposed Fourier family, or to the family of 2-circulant complex Hadamard matrices. The proofs rely on solving polynomial systems of equations by Gröbner basis techniques, and make use of a structure theorem concerning regular Hadamard matrices. As a consequence, members of these two families can be easily recognized in practice. In particular, one can identify complex Hadamard matrices appearing in known triplets of pairwise mutually unbiased bases in dimension 6.

研究表明,阶数为 6 的归一化复哈达玛矩阵有三个不同的列,每个列至少包含一个 (-1) 条目,它必然属于转置傅里叶族或 2 循环复哈达玛矩阵族。证明依赖于用格罗布纳基础技术求解多项式方程组,并利用了关于正则哈达玛矩阵的结构定理。因此,在实践中可以很容易地识别这两个族的成员。特别是,我们可以识别出现在已知的维数为 6 的成对互不偏倚基三元组中的复哈达玛矩阵。
{"title":"A characterization of complex Hadamard matrices appearing in families of MUB triplets","authors":"Ákos K. Matszangosz, Ferenc Szöllősi","doi":"10.1007/s10623-024-01503-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01503-w","url":null,"abstract":"<p>It is shown that a normalized complex Hadamard matrix of order 6 having three distinct columns each containing at least one <span>(-1)</span> entry, necessarily belongs to the transposed Fourier family, or to the family of 2-circulant complex Hadamard matrices. The proofs rely on solving polynomial systems of equations by Gröbner basis techniques, and make use of a structure theorem concerning regular Hadamard matrices. As a consequence, members of these two families can be easily recognized in practice. In particular, one can identify complex Hadamard matrices appearing in known triplets of pairwise mutually unbiased bases in dimension 6.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Abelian one-dimensional hull codes in group algebras 论群代数中的阿贝尔一维船体码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01504-9
Rong Luo, Mingliang Yan, Sihem Mesnager, Dongchun Han

This paper focuses on hull dimensional codes obtained by the intersection of linear codes and their dual. These codes were introduced by Assmus and Key and have been the subject of significant theoretical and practical research over the years, gaining increased attention in recent years. Let (mathbb {F}_q) denote the finite field with q elements, and let G be a finite Abelian group of order n. The paper investigates Abelian codes defined as ideals of the group algebra (mathbb {F}_qG) with coefficients in (mathbb {F}_q). Specifically, it delves into Abelian hull dimensional codes in the group algebra (mathbb {F}_qG), where G is a finite Abelian group of order n with (gcd (n,q)=1). Specifically, we first examine general hull Abelian codes and then narrow its focus to Abelian one-dimensional hull codes. Next, we focus on Abelian one-dimensional hull codes and present some necessary and sufficient conditions for characterizing them. Consequently, we generalize a recent result on Abelian codes and show that no binary or ternary Abelian codes with one-dimensional hulls exist. Furthermore, we construct Abelian codes with one-dimensional hulls by generating idempotents, derive optimal ones with one-dimensional hulls, and establish several existing results of Abelian codes with one-dimensional hulls. Finally, we develop enumeration results through a simple formula that counts Abelian codes with one-dimensional hulls in (mathbb {F}_qG). These achievements exploit the rich algebraic structure of those Abelian codes and enhance and increase our knowledge of them by considering their hull dimensions, reducing the gap between their interests and our understanding of them.

本文重点研究由线性编码及其对偶的交集得到的全维编码。这些代码由阿斯穆斯和基提出,多年来一直是重要的理论和实践研究课题,近年来受到越来越多的关注。让 (mathbb {F}_q) 表示有 q 个元素的有限域,让 G 是一个有 n 阶的有限阿贝尔群。本文研究的阿贝尔码定义为群代数 (mathbb {F}_qG) 的理想,其系数在 (mathbb {F}_q) 中。具体来说,它深入研究了群代数 (mathbb {F}_qG) 中的阿贝尔船体维码,其中 G 是阶数为 n 的有限阿贝尔群,且 (gcd(n,q)=1)。具体来说,我们首先研究一般的船体阿贝尔码,然后把重点缩小到阿贝尔一维船体码。接下来,我们聚焦于阿贝尔一维船体码,并提出了表征它们的一些必要条件和充分条件。因此,我们概括了最近关于阿贝尔码的一个结果,并证明不存在二元或三元阿贝尔一维体码。此外,我们通过生成幂等子来构造具有一维空壳的阿贝尔码,推导出具有一维空壳的最优阿贝尔码,并建立了具有一维空壳的阿贝尔码的几个现有结果。最后,我们通过一个简单的公式发展了枚举结果,这个公式可以在 (mathbb {F}_qG) 中计算具有一维空壳的阿贝尔码。这些成果利用了这些阿贝尔码丰富的代数结构,并通过考虑它们的壳维度来加强和增加我们对它们的认识,从而缩小了它们的兴趣与我们对它们的理解之间的差距。
{"title":"On Abelian one-dimensional hull codes in group algebras","authors":"Rong Luo, Mingliang Yan, Sihem Mesnager, Dongchun Han","doi":"10.1007/s10623-024-01504-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01504-9","url":null,"abstract":"<p>This paper focuses on hull dimensional codes obtained by the intersection of linear codes and their dual. These codes were introduced by Assmus and Key and have been the subject of significant theoretical and practical research over the years, gaining increased attention in recent years. Let <span>(mathbb {F}_q)</span> denote the finite field with <i>q</i> elements, and let <i>G</i> be a finite Abelian group of order <i>n</i>. The paper investigates Abelian codes defined as ideals of the group algebra <span>(mathbb {F}_qG)</span> with coefficients in <span>(mathbb {F}_q)</span>. Specifically, it delves into Abelian hull dimensional codes in the group algebra <span>(mathbb {F}_qG)</span>, where <i>G</i> is a finite Abelian group of order <i>n</i> with <span>(gcd (n,q)=1)</span>. Specifically, we first examine general hull Abelian codes and then narrow its focus to Abelian one-dimensional hull codes. Next, we focus on Abelian one-dimensional hull codes and present some necessary and sufficient conditions for characterizing them. Consequently, we generalize a recent result on Abelian codes and show that no binary or ternary Abelian codes with one-dimensional hulls exist. Furthermore, we construct Abelian codes with one-dimensional hulls by generating idempotents, derive optimal ones with one-dimensional hulls, and establish several existing results of Abelian codes with one-dimensional hulls. Finally, we develop enumeration results through a simple formula that counts Abelian codes with one-dimensional hulls in <span>(mathbb {F}_qG)</span>. These achievements exploit the rich algebraic structure of those Abelian codes and enhance and increase our knowledge of them by considering their hull dimensions, reducing the gap between their interests and our understanding of them.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary cyclic-gap constant weight codes with low-complexity encoding and decoding 低复杂度编码和解码的二进制环隙恒权码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01494-8
Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau

In this paper, we focus on the design of binary constant weight codes that admit low-complexity encoding and decoding algorithms, and that have size (M=2^k) so that codewords can conveniently be labeled with binary vectors of length k. For every integer (ell ge 3), we construct a ((n=2^ell , M=2^{k_{ell }}, d=2)) constant weight code ({{{mathcal {C}}}}[ell ]) of weight (ell ) by encoding information in the gaps between successive 1’s of a vector, and call them as cyclic-gap constant weight codes. The code is associated with a finite integer sequence of length (ell ) satisfying a constraint defined as anchor-decodability that is pivotal to ensure low complexity for encoding and decoding. The time complexity of the encoding algorithm is linear in the input size k, and that of the decoding algorithm is poly-logarithmic in the input size n, discounting the linear time spent on parsing the input. Both the algorithms do not require expensive computation of binomial coefficients, unlike the case in many existing schemes. Among codes generated by all anchor-decodable sequences, we show that ({{{mathcal {C}}}}[ell ]) has the maximum size with (k_{ell } ge ell ^2-ell log _2ell + log _2ell - 0.279ell - 0.721). As k is upper bounded by (ell ^2-ell log _2ell +O(ell )) information-theoretically, the code ({{{mathcal {C}}}}[ell ]) is optimal in its size with respect to two higher order terms of (ell ). In particular, (k_ell ) meets the upper bound for (ell =3) and one-bit away for (ell =4). On the other hand, we show that ({{{mathcal {C}}}}[ell ]) is not unique in attaining (k_{ell }) by constructing an alternate code (mathcal{{hat{C}}}[ell ]) again parameterized by an integer (ell ge 3) with a different low-complexity decoder, yet having the same size (2^{k_{ell }}) when (3 le ell le 7). Finally, we also derive new codes by modifying ({{{mathcal {C}}}}[ell ]) that offer a wider range on blocklength and weight while retaining low complexity for encoding and decoding. For certain selected values of parameters, these modified codes too have an optimal k.

在本文中,我们将重点关注二进制恒权码的设计,这些码允许低复杂度的编码和解码算法,并且具有 (M=2^k) 的大小,从而可以方便地用长度为 k 的二进制向量来标记码字。对于每一个整数((ell ge 3)),我们通过在向量的连续 1 之间的空隙中编码信息来构造一个((n=2^ell , M=2^{k_{ell }}, d=2))权重为((ell )的恒权码({{mathcal {C}}}}[ell ] ),并称它们为循环空隙恒权码。编码与长度为 (ell ) 的有限整数序列相关联,满足定义为锚-可解码性的约束条件,这对于确保编码和解码的低复杂度至关重要。编码算法的时间复杂度与输入大小 k 呈线性关系,而解码算法的时间复杂度与输入大小 n 呈多对数关系,这还不包括解析输入所花费的线性时间。与许多现有方案不同的是,这两种算法都不需要计算昂贵的二项式系数。在所有锚可解码序列生成的代码中,我们证明了({{/mathcal {C}}}}[ell ] )的最大大小为(k_{ell } ge ell ^2-ell log _2ell + log _2ell - 0.279ell - 0.721/)。从信息理论上讲,由于k的上界是(ell ^2-ell log _2ell +O(ell ) ),所以代码({{mathcal {C}}}}[ell ] )的大小对于(ell )的两个高阶项来说是最优的。特别是,(k_ell )符合(ell =3)的上界,并且距离(ell =4)只有一个比特的距离。另一方面,我们通过用不同的低复杂度解码器构造另一种代码(mathcal{{hat{C}}[ell ]),再次用整数(ell ge 3) 作为参数,证明({{mathcal{C}}}}[ell ])在达到(k_{ell })方面并不是唯一的、当 (3 le ell le 7) 时,具有相同的大小 (2^{k_{ell}})。最后,我们还通过修改 ({{mathcal {C}}}}[ell ]) 得出了新的编码,这些编码在保留较低编码和解码复杂度的同时,提供了更宽的块长和权重范围。对于某些选定的参数值,这些修改后的编码也具有最优的 k。
{"title":"Binary cyclic-gap constant weight codes with low-complexity encoding and decoding","authors":"Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau","doi":"10.1007/s10623-024-01494-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01494-8","url":null,"abstract":"<p>In this paper, we focus on the design of binary constant weight codes that admit low-complexity encoding and decoding algorithms, and that have size <span>(M=2^k)</span> so that codewords can conveniently be labeled with binary vectors of length <i>k</i>. For every integer <span>(ell ge 3)</span>, we construct a <span>((n=2^ell , M=2^{k_{ell }}, d=2))</span> constant weight code <span>({{{mathcal {C}}}}[ell ])</span> of weight <span>(ell )</span> by encoding information in the gaps between successive 1’s of a vector, and call them as cyclic-gap constant weight codes. The code is associated with a finite integer sequence of length <span>(ell )</span> satisfying a constraint defined as <i>anchor-decodability</i> that is pivotal to ensure low complexity for encoding and decoding. The time complexity of the encoding algorithm is linear in the input size <i>k</i>, and that of the decoding algorithm is poly-logarithmic in the input size <i>n</i>, discounting the linear time spent on parsing the input. Both the algorithms do not require expensive computation of binomial coefficients, unlike the case in many existing schemes. Among codes generated by all anchor-decodable sequences, we show that <span>({{{mathcal {C}}}}[ell ])</span> has the maximum size with <span>(k_{ell } ge ell ^2-ell log _2ell + log _2ell - 0.279ell - 0.721)</span>. As <i>k</i> is upper bounded by <span>(ell ^2-ell log _2ell +O(ell ))</span> information-theoretically, the code <span>({{{mathcal {C}}}}[ell ])</span> is optimal in its size with respect to two higher order terms of <span>(ell )</span>. In particular, <span>(k_ell )</span> meets the upper bound for <span>(ell =3)</span> and one-bit away for <span>(ell =4)</span>. On the other hand, we show that <span>({{{mathcal {C}}}}[ell ])</span> is not unique in attaining <span>(k_{ell })</span> by constructing an alternate code <span>(mathcal{{hat{C}}}[ell ])</span> again parameterized by an integer <span>(ell ge 3)</span> with a different low-complexity decoder, yet having the same size <span>(2^{k_{ell }})</span> when <span>(3 le ell le 7)</span>. Finally, we also derive new codes by modifying <span>({{{mathcal {C}}}}[ell ])</span> that offer a wider range on blocklength and weight while retaining low complexity for encoding and decoding. For certain selected values of parameters, these modified codes too have an optimal <i>k</i>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"103 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions 基于扩展布尔函数的渐近最优非周期性准互补序列集
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-28 DOI: 10.1007/s10623-024-01501-y
Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang

Quasi-complementary sequence sets (QCSSs) are important in modern communication systems as they are capable of supporting more users, which is desired in applications like MC-CDMA nowadays. Although several constructions of aperiodic QCSSs have been proposed in the literature, the known optimal aperiodic QCSSs have limited length or have large alphabet. In this paper, based on extended Boolean functions, we present two constructions of aperiodic QCSSs with parameters ((q(p_0-1),q,q-t,q)) and ((q^m(p_0-1),q^m,q^m-t,q^m)), where (qge 3) is an odd integer, (p_0) is the minimum prime factor of q. The proposed constructions can generate asymptotically optimal or near-optimal aperiodic QCSSs with new parameters.

准互补序列集(QCSS)在现代通信系统中非常重要,因为它们能够支持更多用户,这正是如今 MC-CDMA 等应用所需要的。虽然文献中提出了几种非周期性 QCSS 的构造,但已知的最优非周期性 QCSS 长度有限或字母表较大。本文基于扩展布尔函数,提出了参数为((q(p_0-1),q,q-t,q))和((q^m(p_0-1),q^m,q^m-t,q^m))的两种非周期性 QCSS 结构,其中(q^m(p_0-1),q^m,q^m-t,q^m))为奇整数,(p_0)为 q 的最小质因子。所提出的构造可以生成具有新参数的渐近最优或接近最优的非周期性 QCSS。
{"title":"Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions","authors":"Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang","doi":"10.1007/s10623-024-01501-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01501-y","url":null,"abstract":"<p>Quasi-complementary sequence sets (QCSSs) are important in modern communication systems as they are capable of supporting more users, which is desired in applications like MC-CDMA nowadays. Although several constructions of aperiodic QCSSs have been proposed in the literature, the known optimal aperiodic QCSSs have limited length or have large alphabet. In this paper, based on extended Boolean functions, we present two constructions of aperiodic QCSSs with parameters <span>((q(p_0-1),q,q-t,q))</span> and <span>((q^m(p_0-1),q^m,q^m-t,q^m))</span>, where <span>(qge 3)</span> is an odd integer, <span>(p_0)</span> is the minimum prime factor of <i>q</i>. The proposed constructions can generate asymptotically optimal or near-optimal aperiodic QCSSs with new parameters.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"53 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142329172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1