首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Constructions of locally recoverable codes with large availability 具有大可用性的局部可恢复代码的构造
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-05 DOI: 10.1007/s10623-025-01624-w
Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith

Let p be a prime number, m be a positive integer, and (q=p^m). For any fixed locality r such that (pnot mid r(r+1)), we construct infinite families of locally recoverable codes with availabilty of nodes lower bounded by (q/r!+O(sqrt{q})) and number of locality sets equal to (q^2/(r+1)!+O(q^{3/2})).

设p是质数,m是正整数,(q=p^m)。对于任意满足(pnot mid r(r+1))的固定局部性r,我们构造了无限的局部性可恢复码族,节点的可用性下界为(q/r!+O(sqrt{q})),局部性集的个数等于(q^2/(r+1)!+O(q^{3/2}))。
{"title":"Constructions of locally recoverable codes with large availability","authors":"Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith","doi":"10.1007/s10623-025-01624-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01624-w","url":null,"abstract":"<p>Let <i>p</i> be a prime number, <i>m</i> be a positive integer, and <span>(q=p^m)</span>. For any fixed locality <i>r</i> such that <span>(pnot mid r(r+1))</span>, we construct infinite families of locally recoverable codes with availabilty of nodes lower bounded by <span>(q/r!+O(sqrt{q}))</span> and number of locality sets equal to <span>(q^2/(r+1)!+O(q^{3/2}))</span>.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"34 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143784812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new method for erasure decoding of convolutional codes 一种新的卷积码擦除译码方法
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-03 DOI: 10.1007/s10623-025-01623-x
Julia Lieb, Raquel Pinto, Carlos Vela

In this paper, we propose a new erasure decoding algorithm for convolutional codes using the generator matrix. This implies that our decoding method also applies to catastrophic convolutional codes in opposite to the classic approach using the parity-check matrix. We compare the performance of both decoding algorithms. Moreover, we enlarge the family of optimal convolutional codes (complete-MDP) based on the generator matrix.

本文提出了一种基于生成矩阵的卷积码擦除译码算法。这意味着我们的解码方法也适用于灾难性卷积码,而不是使用奇偶校验矩阵的经典方法。我们比较了两种解码算法的性能。此外,我们还扩大了基于生成器矩阵的最优卷积码族(complete-MDP)。
{"title":"A new method for erasure decoding of convolutional codes","authors":"Julia Lieb, Raquel Pinto, Carlos Vela","doi":"10.1007/s10623-025-01623-x","DOIUrl":"https://doi.org/10.1007/s10623-025-01623-x","url":null,"abstract":"<p>In this paper, we propose a new erasure decoding algorithm for convolutional codes using the generator matrix. This implies that our decoding method also applies to catastrophic convolutional codes in opposite to the classic approach using the parity-check matrix. We compare the performance of both decoding algorithms. Moreover, we enlarge the family of optimal convolutional codes (complete-MDP) based on the generator matrix.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"17 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143766850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The weight hierarchy of decreasing norm-trace codes 递减规范跟踪代码的权重层次结构
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-01 DOI: 10.1007/s10623-025-01619-7
Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José

The Generalized Hamming weights and their relative version, which generalize the minimum distance of a linear code, are relevant to numerous applications, including coding on the wire-tap channel of type II, t-resilient functions, bounding the cardinality of the output in list decoding algorithms, ramp secret sharing schemes, and quantum error correction. The generalized Hamming weights have been determined for some families of codes, including Cartesian codes and Hermitian one-point codes. In this paper, we determine the generalized Hamming weights of decreasing norm-trace codes, which are linear codes defined by evaluating sets of monomials that are closed under divisibility on the rational points of the extended norm-trace curve given by (x^{u} = y^{q^{s - 1}} + y^{q^{s - 2}} + cdots + y) over the finite field of cardinality (q^s), where u is a positive divisor of (frac{q^s - 1}{q - 1}). As a particular case, we obtain the weight hierarchy of one-point norm-trace codes and recover the result of Barbero and Munuera (2001) giving the weight hierarchy of one-point Hermitian codes. We also study the relative generalized Hamming weights for these codes and use them to construct impure quantum codes with excellent parameters.

广义汉明权重及其相关版本概括了线性码的最小距离,与许多应用相关,包括在II型有线监听信道上编码、t弹性函数、在列表解码算法中限制输出的基数、斜坡秘密共享方案和量子纠错。本文确定了一些码族的广义汉明权值,包括笛卡儿码和厄米点码。在本文中,我们确定了递减范迹码的广义Hamming权值,递减范迹码是线性码,它是由在基数(q^s)有限域上的扩展范迹曲线((x^{u} = y^{q^{s - 1}} + y^{q^{s - 2}} + cdots + y))的有理点上可除闭的单项式集定义的,其中u是(frac{q^s - 1}{q - 1})的正因子。作为一个特例,我们得到了一点范迹码的权层次,并恢复了Barbero和Munuera(2001)给出的一点厄米码的权层次的结果。我们还研究了这些码的相对广义汉明权值,并用它们构造具有优良参数的非纯量子码。
{"title":"The weight hierarchy of decreasing norm-trace codes","authors":"Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José","doi":"10.1007/s10623-025-01619-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01619-7","url":null,"abstract":"<p>The Generalized Hamming weights and their relative version, which generalize the minimum distance of a linear code, are relevant to numerous applications, including coding on the wire-tap channel of type II, <i>t</i>-resilient functions, bounding the cardinality of the output in list decoding algorithms, ramp secret sharing schemes, and quantum error correction. The generalized Hamming weights have been determined for some families of codes, including Cartesian codes and Hermitian one-point codes. In this paper, we determine the generalized Hamming weights of decreasing norm-trace codes, which are linear codes defined by evaluating sets of monomials that are closed under divisibility on the rational points of the extended norm-trace curve given by <span>(x^{u} = y^{q^{s - 1}} + y^{q^{s - 2}} + cdots + y)</span> over the finite field of cardinality <span>(q^s)</span>, where <i>u</i> is a positive divisor of <span>(frac{q^s - 1}{q - 1})</span>. As a particular case, we obtain the weight hierarchy of one-point norm-trace codes and recover the result of Barbero and Munuera (2001) giving the weight hierarchy of one-point Hermitian codes. We also study the relative generalized Hamming weights for these codes and use them to construct impure quantum codes with excellent parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"22 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143745305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods 一类伽罗瓦NFSRs的循环结构:具有相同周期的分量序列
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-29 DOI: 10.1007/s10623-025-01616-w
Xiao-juan Wang, Tian Tian, Wen-feng Qi

Nonlinear feedback shift registers (NFSRs) are widely used in the design of stream ciphers and the cycle structure of an NFSR is a fundamental problem still open. In this paper, a new configuration of Galois NFSRs, called F-Ring NFSRs, is proposed. It is shown that an n-bit F-Ring NFSR generates n sequences with the same period simultaneously, that is, sequences from all bit registers have the same period. Recall that the ring-like cascade connection proposed by Zhao et al. (Des Codes Cryptogr 86:2775–2790, 2018) also has such period property. But it is abnormal that if every component shift register is nonsingular, then the ring-like cascade connection is singular. F-Ring NFSRs proposed in this paper could fix this weakness. Moreover, it is proved that when an n-stage m-sequence is input to the internal state of an F-Ring NFSR by xor, the periods of its internal state are multiples of (2^n-1). At last, two toy examples are given to illustrate the new configuration.

非线性反馈移位寄存器(NFSRs)在流密码设计中得到了广泛的应用,而非线性反馈移位寄存器的周期结构是一个尚未解决的基本问题。本文提出了一种新的伽罗瓦NFSRs构型,称为f -环NFSRs。结果表明,一个n位的F-Ring NFSR同时产生n个具有相同周期的序列,即来自所有位寄存器的序列具有相同的周期。回想一下,Zhao等人(Des Codes Cryptogr 86:2775-2790, 2018)提出的环状级联连接也具有这样的周期性质。但如果每个分量移位寄存器都是非奇异的,那么环形级联连接就是奇异的,这是不正常的。本文提出的f环NFSRs可以弥补这一弱点。进一步证明了当n阶m序列以xor输入到f环NFSR的内部状态时,其内部状态周期为(2^n-1)的倍数。最后,给出了两个示例来说明新的结构。
{"title":"On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods","authors":"Xiao-juan Wang, Tian Tian, Wen-feng Qi","doi":"10.1007/s10623-025-01616-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01616-w","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are widely used in the design of stream ciphers and the cycle structure of an NFSR is a fundamental problem still open. In this paper, a new configuration of Galois NFSRs, called F-Ring NFSRs, is proposed. It is shown that an <i>n</i>-bit F-Ring NFSR generates <i>n</i> sequences with the same period simultaneously, that is, sequences from all bit registers have the same period. Recall that the ring-like cascade connection proposed by Zhao et al. (Des Codes Cryptogr 86:2775–2790, 2018) also has such period property. But it is abnormal that if every component shift register is nonsingular, then the ring-like cascade connection is <i>singular</i>. F-Ring NFSRs proposed in this paper could fix this weakness. Moreover, it is proved that when an <i>n</i>-stage <i>m</i>-sequence is input to the internal state of an F-Ring NFSR by xor, the periods of its internal state are multiples of <span>(2^n-1)</span>. At last, two toy examples are given to illustrate the new configuration.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"216 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Universal partial tori 泛偏环面
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-27 DOI: 10.1007/s10623-025-01609-9
William D. Carey, Matthew David Kearney, Rachel Kirsch, Stefan Popescu

A De Bruijn cycle is a cyclic sequence in which every word of length n over an alphabet (mathcal {A}) appears exactly once. De Bruijn tori are a two-dimensional analogue. Motivated by recent progress on universal partial cycles and words, which shorten De Bruijn cycles using a wildcard character, we introduce universal partial tori and matrices. We find them computationally and construct infinitely many of them using one-dimensional variants of universal cycles, including a new variant called a universal partial family.

德布鲁因循环是一个循环序列,在这个循环序列中,字母表中长度为n的每个单词(mathcal {A})只出现一次。De Bruijn tori是二维的类似物。受通用偏环和使用通配符缩短德布鲁因循环的词的最新进展的激励,我们引入了通用偏环面和矩阵。我们通过计算找到它们,并使用泛环的一维变体,包括一种称为泛部分族的新变体,构造出无限多个泛环。
{"title":"Universal partial tori","authors":"William D. Carey, Matthew David Kearney, Rachel Kirsch, Stefan Popescu","doi":"10.1007/s10623-025-01609-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01609-9","url":null,"abstract":"<p>A De Bruijn cycle is a cyclic sequence in which every word of length <i>n</i> over an alphabet <span>(mathcal {A})</span> appears exactly once. De Bruijn tori are a two-dimensional analogue. Motivated by recent progress on universal partial cycles and words, which shorten De Bruijn cycles using a wildcard character, we introduce universal partial tori and matrices. We find them computationally and construct infinitely many of them using one-dimensional variants of universal cycles, including a new variant called a universal partial family.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying the isomorphism of NFSRs via a general framework of bijections 用双射的一般框架研究nfsr的同构性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-27 DOI: 10.1007/s10623-025-01622-y
Jingtao Xiong, Jianghua Zhong, Dongdai Lin

Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic, and to be equivalent if their sets of output sequences are equal. So far, numerous work has been done on the equivalence of NFSRs with same bit number, but much less has been done on their isomorphism. Actually, the equivalence problem of NFSRs with same bit number can be transformed to their isomorphism problem. The latter can be solved if the bijection between their states and its inverse can be explicitly expressed, which are quite hard to get in general. This paper studies the isomorphism of NFSRs by building a general framework for bijections. It first gives basic bijections. It then presents a unified formula for bijections, and discloses that any bijection can be expressed as a composite of finite basic bijections, setting up a general framework for bijections. Based on the general framework, the paper discloses in theory how to obtain all Galois NFSRs that are isomorphic to a given NFSR, and then reveals the bijections between the states of the previous types of Galois NFSRs and their own equivalent Fibonacci NFSRs. Finally, it proposes a new type of Galois NFSRs that are isomorphic and further equivalent to Fibonacci NFSRs, covering and improving most previous types of Galois NFSRs known to be equivalent to Fibonacci NFSRs.

非线性反馈移位寄存器(NFSRs)是当前许多流密码中使用的主要模块。如果两个nfsr的状态图是同构的,则称它们是同构的;如果它们的输出序列集合相等,则称它们是等价的。到目前为止,关于相同位元数的nfsr的等价性研究已经很多了,但是关于它们的同构性研究却很少。实际上,具有相同位元数的nfsr的等价问题可以转化为它们的同构问题。后者通常很难得到,但如果能显式地表示出它们的状态和逆射之间的反射,则可以求解。本文通过建立双射的一般框架来研究nfsr的同构性。它首先给出基本的双音。然后给出了双射的统一公式,并揭示了任何双射都可以表示为有限个基本双射的复合,建立了双射的一般框架。在一般框架的基础上,从理论上揭示了如何获得与给定的伽罗瓦NFSR同构的所有伽罗瓦NFSR,然后揭示了先前类型的伽罗瓦NFSR与它们自己等效的Fibonacci NFSR之间的状态对偶。最后,提出了一种新的伽罗瓦NFSRs,它是同构的,并进一步等效于斐波那契NFSRs,覆盖和改进了大多数已知的等效于斐波那契NFSRs的伽罗瓦NFSRs类型。
{"title":"Studying the isomorphism of NFSRs via a general framework of bijections","authors":"Jingtao Xiong, Jianghua Zhong, Dongdai Lin","doi":"10.1007/s10623-025-01622-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01622-y","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic, and to be equivalent if their sets of output sequences are equal. So far, numerous work has been done on the equivalence of NFSRs with same bit number, but much less has been done on their isomorphism. Actually, the equivalence problem of NFSRs with same bit number can be transformed to their isomorphism problem. The latter can be solved if the bijection between their states and its inverse can be explicitly expressed, which are quite hard to get in general. This paper studies the isomorphism of NFSRs by building a general framework for bijections. It first gives basic bijections. It then presents a unified formula for bijections, and discloses that any bijection can be expressed as a composite of finite basic bijections, setting up a general framework for bijections. Based on the general framework, the paper discloses in theory how to obtain all Galois NFSRs that are isomorphic to a given NFSR, and then reveals the bijections between the states of the previous types of Galois NFSRs and their own equivalent Fibonacci NFSRs. Finally, it proposes a new type of Galois NFSRs that are isomorphic and further equivalent to Fibonacci NFSRs, covering and improving most previous types of Galois NFSRs known to be equivalent to Fibonacci NFSRs.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"183 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The complete weight enumerator of the square of one-weight irreducible cyclic codes 一权不可约循环码平方的完全权枚举数
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-22 DOI: 10.1007/s10623-025-01620-0
Canze Zhu

In this paper, for an odd prime power q and an integer (mge 2), let (mathcal {C}(q,m)) be a one-weight irreducible cyclic code with parameters ([q^m-1,m,(q-1)q^{m-1}]), we consider the complete weight enumerator and the weight distribution of the square (big (mathcal {C}(q,m)big )^2), whose dual has (lfloor frac{m}{2}rfloor +1) zeros. Using the character sums method and the known result of counting (mtimes m) symmetric matrices over (mathbb {F}_q) with given rank, we explicitly determine the complete weight enumerator of (left( mathcal {C}(q,m)right) ^2) and show that (left( mathcal {C}(q,m)right) ^2) is a ((2lfloor frac{m}{2}rfloor +1))-weight cyclic code with parameters ([q^{m}-1,frac{m(m+1)}{2},(q-1)(q^{m-1}-q^{m-2})]). Moreover, we get the weight distribution of the square of the simplex code by puncturing the last (frac{(q-2)(q^m-1)}{q-1}) coordinates of (left( mathcal {C}(q,m)right) ^2).

对于奇数素数幂q和整数(mge 2),设(mathcal {C}(q,m))是一个参数为([q^m-1,m,(q-1)q^{m-1}])的单权不可约循环码,考虑其对偶为(lfloor frac{m}{2}rfloor +1)零的平方(big (mathcal {C}(q,m)big )^2)的完全权枚举数和权分布。利用字符和方法和已知的对给定秩的(mathbb {F}_q)上的(mtimes m)对称矩阵计数的结果,明确地确定了(left( mathcal {C}(q,m)right) ^2)的完全权数枚举数,并证明了(left( mathcal {C}(q,m)right) ^2)是一个参数为([q^{m}-1,frac{m(m+1)}{2},(q-1)(q^{m-1}-q^{m-2})])的((2lfloor frac{m}{2}rfloor +1)) -权循环码。此外,通过对(left( mathcal {C}(q,m)right) ^2)的最后一个(frac{(q-2)(q^m-1)}{q-1})坐标进行穿刺,得到了单纯形码的平方权重分布。
{"title":"The complete weight enumerator of the square of one-weight irreducible cyclic codes","authors":"Canze Zhu","doi":"10.1007/s10623-025-01620-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01620-0","url":null,"abstract":"<p>In this paper, for an odd prime power <i>q</i> and an integer <span>(mge 2)</span>, let <span>(mathcal {C}(q,m))</span> be a one-weight irreducible cyclic code with parameters <span>([q^m-1,m,(q-1)q^{m-1}])</span>, we consider the complete weight enumerator and the weight distribution of the square <span>(big (mathcal {C}(q,m)big )^2)</span>, whose dual has <span>(lfloor frac{m}{2}rfloor +1)</span> zeros. Using the character sums method and the known result of counting <span>(mtimes m)</span> symmetric matrices over <span>(mathbb {F}_q)</span> with given rank, we explicitly determine the complete weight enumerator of <span>(left( mathcal {C}(q,m)right) ^2)</span> and show that <span>(left( mathcal {C}(q,m)right) ^2)</span> is a <span>((2lfloor frac{m}{2}rfloor +1))</span>-weight cyclic code with parameters <span>([q^{m}-1,frac{m(m+1)}{2},(q-1)(q^{m-1}-q^{m-2})])</span>. Moreover, we get the weight distribution of the square of the simplex code by puncturing the last <span>(frac{(q-2)(q^m-1)}{q-1})</span> coordinates of <span>(left( mathcal {C}(q,m)right) ^2)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"56 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143672621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Limitations of the decoding-to-LPN reduction via code smoothing 通过代码平滑降低解码到lpn的局限性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-22 DOI: 10.1007/s10623-025-01617-9
Madhura Pathegama, Alexander Barg

The learning parity with noise (LPN) problem underlines several classic cryptographic primitives. Researchers have attempted to show the algorithmic difficulty of this problem by finding a reduction from the decoding problem of linear codes, for which several hardness results exist. Earlier studies used code smoothing as a technical tool to achieve such reductions for codes with vanishing rate. This has left open the question of attaining a reduction with positive-rate codes. Addressing this case, we characterize the efficiency of the reduction in terms of the parameters of the decoding and LPN problems. As a conclusion, we isolate the parameter regimes for which a meaningful reduction is possible and the regimes for which its existence is unlikely.

噪声学习奇偶性(LPN)问题强调了几个经典的密码学原语。研究人员试图通过从线性码的解码问题中找到一个约简来显示这个问题的算法难度,其中存在几个硬度结果。早期的研究使用代码平滑作为技术工具来实现具有消失率的代码的这种减少。这就留下了用正码实现还原的问题。针对这种情况,我们根据解码和LPN问题的参数来表征约简的效率。作为结论,我们隔离了有意义的缩减是可能的和不太可能存在的参数区域。
{"title":"Limitations of the decoding-to-LPN reduction via code smoothing","authors":"Madhura Pathegama, Alexander Barg","doi":"10.1007/s10623-025-01617-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01617-9","url":null,"abstract":"<p>The learning parity with noise (LPN) problem underlines several classic cryptographic primitives. Researchers have attempted to show the algorithmic difficulty of this problem by finding a reduction from the decoding problem of linear codes, for which several hardness results exist. Earlier studies used code smoothing as a technical tool to achieve such reductions for codes with vanishing rate. This has left open the question of attaining a reduction with positive-rate codes. Addressing this case, we characterize the efficiency of the reduction in terms of the parameters of the decoding and LPN problems. As a conclusion, we isolate the parameter regimes for which a meaningful reduction is possible and the regimes for which its existence is unlikely.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143672619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary stretch embedding of weighted graphs 加权图的二元拉伸嵌入
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-21 DOI: 10.1007/s10623-025-01608-w
Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab

In this paper, we introduce and study the problem of binary stretch embedding of edge-weighted graphs in both integer and fractional settings. Roughly speaking, the binary stretch embedding problem for a weighted graph G is to find a mapping from the vertex set of G, to the vertices of a hypercube graph such that the distance between every pair of the vertices is not reduced under the mapping, hence the name binary stretch embedding. The minimum dimension of a hypercube for which such a stretch embedding exists is called the binary addressing number of G. We show that the binary addressing number of weighted graphs is the optimum value of an integer program. The optimum value for the corresponding linear relaxation problem is called the fractional binary addressing number of G. This embedding type problem is closely related to the well-known addressing problem of Graham and Pollak and isometric hypercube embedding problem of Firsov. Using tools and techniques such as Hadamard codes and the linear programming theory help us to find upper and lower bounds, approximations, or exact values of the binary addressing number and the fractional variant of graphs. As an application of our results, we derive improved upper bounds or exact values of the maximum size of Lee metric codes of certain parameters.

本文介绍并研究了边权图在整数和分数两种情况下的二值拉伸嵌入问题。粗略地说,加权图G的二值拉伸嵌入问题就是找到一个从G的顶点集到超立方图的顶点的映射,使得每对顶点之间的距离在映射下不减小,因此称为二值拉伸嵌入。存在这种伸缩嵌入的超立方体的最小维称为g的二进制寻址数。我们证明了加权图的二进制寻址数是整数规划的最优值。相应的线性松弛问题的最优值称为g的分数二进制寻址数。这种嵌入型问题与著名的Graham和Pollak寻址问题以及Firsov的等距超立方体嵌入问题密切相关。使用工具和技术,如Hadamard编码和线性规划理论,帮助我们找到上和下界,近似值,或精确值的二进制寻址数和图的分数变体。作为我们的结果的一个应用,我们导出了某些参数的李度量码的最大尺寸的改进上界或精确值。
{"title":"Binary stretch embedding of weighted graphs","authors":"Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab","doi":"10.1007/s10623-025-01608-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01608-w","url":null,"abstract":"<p>In this paper, we introduce and study the problem of <i>binary stretch embedding</i> of edge-weighted graphs in both integer and fractional settings. Roughly speaking, the binary stretch embedding problem for a weighted graph <i>G</i> is to find a mapping from the vertex set of <i>G</i>, to the vertices of a hypercube graph such that the distance between every pair of the vertices is not reduced under the mapping, hence the name binary stretch embedding. The minimum dimension of a hypercube for which such a stretch embedding exists is called the binary addressing number of <i>G</i>. We show that the binary addressing number of weighted graphs is the optimum value of an integer program. The optimum value for the corresponding linear relaxation problem is called the fractional binary addressing number of <i>G</i>. This embedding type problem is closely related to the well-known <i>addressing problem</i> of Graham and Pollak and <i>isometric hypercube embedding problem</i> of Firsov. Using tools and techniques such as Hadamard codes and the linear programming theory help us to find upper and lower bounds, approximations, or exact values of the binary addressing number and the fractional variant of graphs. As an application of our results, we derive improved upper bounds or exact values of the maximum size of Lee metric codes of certain parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"41 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143666542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Additive combinatorial designs 加性组合设计
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-20 DOI: 10.1007/s10623-025-01594-z
Marco Buratti, Francesca Merola, Anamari Nakić

A (2-(v, k, lambda )) design is additive if, up to isomorphism, the point set is a subset of an abelian group G and every block is zero-sum. This definition was introduced in Caggegi et al. (J Algebr Comb 45:271-294, 2017) and was the starting point of an interesting new theory. Although many additive designs have been constructed and known designs have been shown to be additive, these structures seem quite hard to construct in general, particularly when we look for additive Steiner 2-designs. One might generalize additive Steiner 2-designs in a natural way to graph decompositions as follows: given a simple graph (Gamma ), an additive ((K_v,Gamma ))-design is a decomposition of the graph (K_v) into subgraphs (blocks) (B_1,dots ,B_t) all isomorphic to (Gamma ), such that the vertex set (V(K_v)) is a subset of an abelian group G, and the sets (V(B_1), dots , V(B_t)) are zero-sum in G. In this work we begin the study of additive ((K_v,Gamma ))-designs: we develop different tools instrumental in constructing these structures, and apply them to obtain some infinite classes of designs and many sporadic examples. We will consider decompositions into various graphs (Gamma ), for instance cycles, paths, and k-matchings. Similar ideas will also allow us to present here a sporadic additive 2-(124, 4, 1) design.

(2-(v, k, lambda ))设计是可加性的,如果点集是一个阿贝尔群G的子集,并且每个块都是零和的。这个定义在Caggegi et al. (J Algebr Comb 45:271-294, 2017)中被引入,并且是一个有趣的新理论的起点。虽然已经构建了许多附加设计,并且已知的设计已被证明是附加的,但这些结构似乎很难构建,特别是当我们寻找附加的斯坦纳2设计时。我们可以用一种自然的方式将加性Steiner 2-设计推广到图分解:给定一个简单图(Gamma ),一个可加性((K_v,Gamma )) -设计是将图(K_v)分解成与(Gamma )同构的子图(块)(B_1,dots ,B_t),使得顶点集(V(K_v))是一个阿贝尔群G的子集,集合(V(B_1), dots , V(B_t))在G中是零和的。在这项工作中,我们开始研究可加性((K_v,Gamma )) -设计:我们开发了不同的工具来构建这些结构,并应用它们来获得一些无限类的设计和许多零星的例子。我们将考虑分解成各种图(Gamma ),例如循环、路径和k匹配。类似的想法也将允许我们在这里提出一个零星的加法2-(124,4,1)设计。
{"title":"Additive combinatorial designs","authors":"Marco Buratti, Francesca Merola, Anamari Nakić","doi":"10.1007/s10623-025-01594-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01594-z","url":null,"abstract":"<p>A <span>(2-(v, k, lambda ))</span> design is additive if, up to isomorphism, the point set is a subset of an abelian group <i>G</i> and every block is zero-sum. This definition was introduced in Caggegi et al. (J Algebr Comb 45:271-294, 2017) and was the starting point of an interesting new theory. Although many additive designs have been constructed and known designs have been shown to be additive, these structures seem quite hard to construct in general, particularly when we look for additive Steiner 2-designs. One might generalize additive Steiner 2-designs in a natural way to graph decompositions as follows: given a simple graph <span>(Gamma )</span>, an <i>additive </i><span>((K_v,Gamma ))</span><i>-design</i> is a decomposition of the graph <span>(K_v)</span> into subgraphs (<i>blocks</i>) <span>(B_1,dots ,B_t)</span> all isomorphic to <span>(Gamma )</span>, such that the vertex set <span>(V(K_v))</span> is a subset of an abelian group <i>G</i>, and the sets <span>(V(B_1), dots , V(B_t))</span> are zero-sum in <i>G</i>. In this work we begin the study of additive <span>((K_v,Gamma ))</span>-designs: we develop different tools instrumental in constructing these structures, and apply them to obtain some infinite classes of designs and many sporadic examples. We will consider decompositions into various graphs <span>(Gamma )</span>, for instance cycles, paths, and <i>k</i>-matchings. Similar ideas will also allow us to present here a sporadic additive 2-(124, 4, 1) design.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"34 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143661406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1