Pub Date : 2024-10-24DOI: 10.1007/s10623-024-01514-7
Sam Adriaensen, Maarten De Boeck
In this paper, we study association schemes on the anisotropic points of classical polar spaces. Our main result concerns non-degenerate elliptic and hyperbolic quadrics in ({{,textrm{PG},}}(n,q)) with q odd. We define relations on the anisotropic points of such a quadric that depend on the type of line spanned by the points and whether or not they are of the same “quadratic type”. This yields an imprimitive 5-class association scheme. We calculate the matrices of eigenvalues and dual eigenvalues of this scheme. We also use this result, together with similar results from the literature concerning other classical polar spaces, to exactly calculate the spectrum of orthogonality graphs on the anisotropic points of non-degenerate quadrics in odd characteristic and of non-degenerate Hermitian varieties. As a byproduct, we obtain a 3-class association scheme on the anisotropic points of non-degenerate Hermitian varieties, where the relation containing two points depends on the type of line spanned by these points, and whether or not they are orthogonal.
{"title":"Association schemes and orthogonality graphs on anisotropic points of polar spaces","authors":"Sam Adriaensen, Maarten De Boeck","doi":"10.1007/s10623-024-01514-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01514-7","url":null,"abstract":"<p>In this paper, we study association schemes on the anisotropic points of classical polar spaces. Our main result concerns non-degenerate elliptic and hyperbolic quadrics in <span>({{,textrm{PG},}}(n,q))</span> with <i>q</i> odd. We define relations on the anisotropic points of such a quadric that depend on the type of line spanned by the points and whether or not they are of the same “quadratic type”. This yields an imprimitive 5-class association scheme. We calculate the matrices of eigenvalues and dual eigenvalues of this scheme. We also use this result, together with similar results from the literature concerning other classical polar spaces, to exactly calculate the spectrum of orthogonality graphs on the anisotropic points of non-degenerate quadrics in odd characteristic and of non-degenerate Hermitian varieties. As a byproduct, we obtain a 3-class association scheme on the anisotropic points of non-degenerate Hermitian varieties, where the relation containing two points depends on the type of line spanned by these points, and whether or not they are orthogonal.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"48 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Codes with locality, also known as locally recoverable codes, allow for recovery of erasures using proper subsets of other coordinates. These subsets are typically of small cardinality to promote recovery using limited network traffic and other resources. Hierarchical locally recoverable codes allow for recovery of erasures using sets of other symbols whose sizes increase as needed to allow for recovery of more symbols. In this paper, we describe a hierarchical recovery structure arising from geometry in Reed–Muller codes and codes with availability from fiber products of curves. We demonstrate how the fiber product hierarchical codes can be viewed as punctured subcodes of Reed–Muller codes, uniting the two constructions. This point of view provides natural structures for local recovery with availability at each level in the hierarchy.
{"title":"Algebraic hierarchical locally recoverable codes with nested affine subspace recovery","authors":"Kathryn Haymaker, Beth Malmskog, Gretchen Matthews","doi":"10.1007/s10623-024-01510-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01510-x","url":null,"abstract":"<p>Codes with locality, also known as locally recoverable codes, allow for recovery of erasures using proper subsets of other coordinates. These subsets are typically of small cardinality to promote recovery using limited network traffic and other resources. Hierarchical locally recoverable codes allow for recovery of erasures using sets of other symbols whose sizes increase as needed to allow for recovery of more symbols. In this paper, we describe a hierarchical recovery structure arising from geometry in Reed–Muller codes and codes with availability from fiber products of curves. We demonstrate how the fiber product hierarchical codes can be viewed as punctured subcodes of Reed–Muller codes, uniting the two constructions. This point of view provides natural structures for local recovery with availability at each level in the hierarchy.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"92 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-23DOI: 10.1007/s10623-024-01515-6
Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui, Andriy Kryvko
The purpose of this paper is to establish a one-to-one correspondence between k-tuples of DNA codewords and the elements of a finite group to simulate the reverse and the complement operations of codewords by an automorphism and a translation of the group, respectively, in order to determine the structure of DNA codes. Finally, the case of vector spaces is characterized.
本文的目的是在 DNA 密码的 k 元组和有限群的元素之间建立一一对应关系,分别通过群的自动变形和平移来模拟密码的反向和补码运算,从而确定 DNA 密码的结构。最后,对向量空间的情况进行了描述。
{"title":"DNA codes over groups","authors":"Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui, Andriy Kryvko","doi":"10.1007/s10623-024-01515-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01515-6","url":null,"abstract":"<p>The purpose of this paper is to establish a one-to-one correspondence between <i>k</i>-tuples of DNA codewords and the elements of a finite group to simulate the reverse and the complement operations of codewords by an automorphism and a translation of the group, respectively, in order to determine the structure of DNA codes. Finally, the case of vector spaces is characterized.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142487530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-18DOI: 10.1007/s10623-024-01512-9
Reza Dastbasteh, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi
Let a and b be two non-zero elements of a finite field (mathbb {F}_q), where (q>2). It has been shown that if a and b have the same multiplicative order in (mathbb {F}_q), then the families of a-constacyclic and b-constacyclic codes over (mathbb {F}_q) are monomially equivalent. In this paper, we investigate the monomial equivalence of a-constacyclic and b-constacyclic codes when a and b have distinct multiplicative orders. We present novel conditions for establishing monomial equivalence in such constacyclic codes, surpassing previous methods of determining monomially equivalent constacyclic and cyclic codes. As an application, we use these results to search for new linear codes more systematically. In particular, we present more than 70 new record-breaking linear codes over various finite fields, as well as new binary quantum codes.
让 a 和 b 是有限域 (mathbb {F}_q) 的两个非零元素,其中 (q>2)。已有研究表明,如果 a 和 b 在 (mathbb {F}_q) 中具有相同的乘阶,那么在 (mathbb {F}_q) 上的 a-constacyclic 和 b-constacyclic 编码族在单域上是等价的。在本文中,我们研究了当 a 和 b 具有不同的乘阶时,a-constacyclic 码和 b-constacyclic 码的单项式等价性。我们提出了在这类constacyclic码中建立单项式等价的新条件,超越了以前确定单项式等价的constacyclic码和循环码的方法。在应用中,我们利用这些结果更系统地寻找新的线性编码。特别是,我们提出了 70 多种在各种有限域上破纪录的新线性编码,以及新的二进制量子编码。
{"title":"Equivalence of constacyclic codes with shift constants of different orders","authors":"Reza Dastbasteh, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi","doi":"10.1007/s10623-024-01512-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01512-9","url":null,"abstract":"<p>Let <i>a</i> and <i>b</i> be two non-zero elements of a finite field <span>(mathbb {F}_q)</span>, where <span>(q>2)</span>. It has been shown that if <i>a</i> and <i>b</i> have the same multiplicative order in <span>(mathbb {F}_q)</span>, then the families of <i>a</i>-constacyclic and <i>b</i>-constacyclic codes over <span>(mathbb {F}_q)</span> are monomially equivalent. In this paper, we investigate the monomial equivalence of <i>a</i>-constacyclic and <i>b</i>-constacyclic codes when <i>a</i> and <i>b</i> have distinct multiplicative orders. We present novel conditions for establishing monomial equivalence in such constacyclic codes, surpassing previous methods of determining monomially equivalent constacyclic and cyclic codes. As an application, we use these results to search for new linear codes more systematically. In particular, we present more than 70 new record-breaking linear codes over various finite fields, as well as new binary quantum codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142448823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-18DOI: 10.1007/s10623-024-01486-8
Zahra Ahmadian, Akram Khalesi, Dounia M’foukh, Hossein Moghimi, María Naya-Plasencia
Truncated differential cryptanalyses were introduced by Knudsen in 1994. They are a well-known family of attacks that has arguably received less attention than some other variants of differential attacks. This paper gives some new insights into the theory of truncated differential attacks, specifically the conditions of provable security of SPN ciphers with MDS diffusion matrices against this type of attack. Furthermore, our study extends to various versions within the QARMA family of block ciphers, unveiling the only valid instances of single-tweak attacks on 10-round QARMAv1-64, 10-round QARMAv1-128, and 10- and 11-round QARMAv2-64. These attacks benefit from the optimal truncated differential distinguishers as well as some evolved key-recovery techniques.
{"title":"Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64","authors":"Zahra Ahmadian, Akram Khalesi, Dounia M’foukh, Hossein Moghimi, María Naya-Plasencia","doi":"10.1007/s10623-024-01486-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01486-8","url":null,"abstract":"<p>Truncated differential cryptanalyses were introduced by Knudsen in 1994. They are a well-known family of attacks that has arguably received less attention than some other variants of differential attacks. This paper gives some new insights into the theory of truncated differential attacks, specifically the conditions of provable security of SPN ciphers with MDS diffusion matrices against this type of attack. Furthermore, our study extends to various versions within the <span>QARMA</span> family of block ciphers, unveiling the only valid instances of single-tweak attacks on 10-round <span>QARMAv1</span>-64, 10-round <span>QARMAv1</span>-128, and 10- and 11-round <span>QARMAv2</span>-64. These attacks benefit from the optimal truncated differential distinguishers as well as some evolved key-recovery techniques.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"124 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142448824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-16DOI: 10.1007/s10623-024-01496-6
Máté Gyarmati, Péter Ligeti, Peter Sziklai, Marcella Takáts
Secret sharing is a general method for distributing sensitive data among the participants of a system such that only a collection of predefined qualified coalitions can recover the secret data. One of the most widely used special cases is threshold secret sharing, where every subset of participants of size above a given number is qualified. In this short note, we propose a general construction for a generalized threshold scheme, called conjunctive hierarchical secret sharing, where the participants are divided into disjoint levels of hierarchy, and there are different thresholds for all levels, all of which must be satisfied by qualified sets. The construction is the first method for arbitrary parameters based on finite geometry arguments and yields an improvement in the size of the underlying finite field in contrast with the existing results using polynomials.
{"title":"Conjunctive hierarchical secret sharing by finite geometry","authors":"Máté Gyarmati, Péter Ligeti, Peter Sziklai, Marcella Takáts","doi":"10.1007/s10623-024-01496-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01496-6","url":null,"abstract":"<p>Secret sharing is a general method for distributing sensitive data among the participants of a system such that only a collection of predefined qualified coalitions can recover the secret data. One of the most widely used special cases is threshold secret sharing, where every subset of participants of size above a given number is qualified. In this short note, we propose a general construction for a generalized threshold scheme, called conjunctive hierarchical secret sharing, where the participants are divided into disjoint levels of hierarchy, and there are different thresholds for all levels, all of which must be satisfied by qualified sets. The construction is the first method for arbitrary parameters based on finite geometry arguments and yields an improvement in the size of the underlying finite field in contrast with the existing results using polynomials.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-16DOI: 10.1007/s10623-024-01511-w
Christof Beierle
For a q-polynomial L over a finite field (mathbb {F}_{q^n}), we characterize the differential spectrum of the function (f_L:mathbb {F}_{q^n} rightarrow mathbb {F}_{q^n}, x mapsto x cdot L(x)) and show that, for (n le 5), it is completely determined by the image of the rational function (r_L :mathbb {F}_{q^n}^* rightarrow mathbb {F}_{q^n}, x mapsto L(x)/x). This result follows from the classification of the pairs (L, M) of q-polynomials in (mathbb {F}_{q^n}[X]), (n le 5), for which (r_L) and (r_M) have the same image, obtained in Csajbók et al. (Ars Math Contemp 16(2):585–608, 2019). For the case of (n>5), we pose an open question on the dimensions of the kernels of (x mapsto L(x) - ax) for (a in mathbb {F}_{q^n}). We further present a link between functions (f_L) of differential uniformity bounded above by q and scattered q-polynomials and show that, for odd values of q, we can construct CCZ-inequivalent functions (f_M) with bounded differential uniformity from a given function (f_L) fulfilling certain properties.
对于有限域 (mathbb {F}_{q^n}) 上的 q 多项式 L,我们描述了函数 (f_L:mathbb {F}_{q^n}, x mapsto x cdot L(x)) 的微分谱的特征,并证明对于 (n)mathbb {F}_{q^n}, x mapsto x cdot L(x))并证明,对于(n (le 5)),它完全由有理函数 (r_L :mathbb {F}_{q^n}^* rightarrow mathbb {F}_{q^n}, x mapsto x cdot L(x)/x)的图像决定。这一结果源于 Csajbók 等人 (Ars Math Contemp 16(2):585-608, 2019) 中得到的关于 (mathbb {F}_{q^n}[X]), (n le 5) 中 q 多项式对 (L, M) 的分类,其中 (r_L) 和 (r_M) 具有相同的图像。对于(n>5)的情况,我们提出了一个关于(a in mathbb {F}_{q^n}) 的(x mapsto L(x) - ax) 的核的维数的开放问题。我们进一步提出了上面由 q 定界的微分均匀性函数 (f_L) 与散点 q 多项式之间的联系,并证明了对于奇数 q 值,我们可以从满足某些性质的给定函数 (f_L) 构造出具有有界微分均匀性的 CCZ-inequivalent 函数 (f_M)。
{"title":"Revisiting products of the form X times a linearized polynomial L(X)","authors":"Christof Beierle","doi":"10.1007/s10623-024-01511-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01511-w","url":null,"abstract":"<p>For a <i>q</i>-polynomial <i>L</i> over a finite field <span>(mathbb {F}_{q^n})</span>, we characterize the differential spectrum of the function <span>(f_L:mathbb {F}_{q^n} rightarrow mathbb {F}_{q^n}, x mapsto x cdot L(x))</span> and show that, for <span>(n le 5)</span>, it is completely determined by the image of the rational function <span>(r_L :mathbb {F}_{q^n}^* rightarrow mathbb {F}_{q^n}, x mapsto L(x)/x)</span>. This result follows from the classification of the pairs (<i>L</i>, <i>M</i>) of <i>q</i>-polynomials in <span>(mathbb {F}_{q^n}[X])</span>, <span>(n le 5)</span>, for which <span>(r_L)</span> and <span>(r_M)</span> have the same image, obtained in Csajbók et al. (Ars Math Contemp 16(2):585–608, 2019). For the case of <span>(n>5)</span>, we pose an open question on the dimensions of the kernels of <span>(x mapsto L(x) - ax)</span> for <span>(a in mathbb {F}_{q^n})</span>. We further present a link between functions <span>(f_L)</span> of differential uniformity bounded above by <i>q</i> and scattered <i>q</i>-polynomials and show that, for odd values of <i>q</i>, we can construct CCZ-inequivalent functions <span>(f_M)</span> with bounded differential uniformity from a given function <span>(f_L)</span> fulfilling certain properties.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142440633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-16DOI: 10.1007/s10623-024-01516-5
Chin Hei Chan, Fang-Wei Fu, Maosheng Xiong
In this paper we carry out an in-depth study on the average decoding error probability of the random parity-check matrix ensemble over the erasure channel under three decoding principles, namely unambiguous decoding, maximum likelihood decoding and list decoding. We obtain explicit formulas for the average decoding error probabilities of the random parity-check matrix ensemble under these three decoding principles and compute the error exponents. Moreover, for unambiguous decoding, we compute the variance of the decoding error probability of the random parity-check matrix ensemble and the error exponent of the variance, which implies a strong concentration result, that is, roughly speaking, the ratio of the decoding error probability of a random linear code in the ensemble and the average decoding error probability of the ensemble converges to 1 with high probability when the code length goes to infinity.
{"title":"Decoding error probability of random parity-check matrix ensemble over the erasure channel","authors":"Chin Hei Chan, Fang-Wei Fu, Maosheng Xiong","doi":"10.1007/s10623-024-01516-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01516-5","url":null,"abstract":"<p>In this paper we carry out an in-depth study on the average decoding error probability of the random parity-check matrix ensemble over the erasure channel under three decoding principles, namely unambiguous decoding, maximum likelihood decoding and list decoding. We obtain explicit formulas for the average decoding error probabilities of the random parity-check matrix ensemble under these three decoding principles and compute the error exponents. Moreover, for unambiguous decoding, we compute the variance of the decoding error probability of the random parity-check matrix ensemble and the error exponent of the variance, which implies a strong concentration result, that is, roughly speaking, the ratio of the decoding error probability of a random linear code in the ensemble and the average decoding error probability of the ensemble converges to 1 with high probability when the code length goes to infinity.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"231 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142440632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-16DOI: 10.1007/s10623-024-01509-4
Xiang Wang, Fang-Wei Fu, Elena V. Konstantinova
In the combinatorial context, one of the key problems in sequence reconstruction is to find the largest intersection of two metric balls of radius r. In this paper we study this problem for permutations of length n distorted by Hamming errors and determine the size of the largest intersection of two metric balls with radius r whose centers are at distance (d=2,3,4). Moreover, it is shown that for any (ngeqslant 3) an arbitrary permutation is uniquely reconstructible from four distinct permutations at Hamming distance at most two from the given one, and it is proved that for any (ngeqslant 4) an arbitrary permutation is uniquely reconstructible from (4n-5) distinct permutations at Hamming distance at most three from the permutation. It is also proved that for any (ngeqslant 5) an arbitrary permutation is uniquely reconstructible from (7n^2-31n+37) distinct permutations at Hamming distance at most four from the permutation. Finally, in the case of at most r Hamming errors and sufficiently large n, it is shown that at least ({varTheta }(n^{r-2})) distinct erroneous patterns are required in order to reconstruct an arbitrary permutation.
在组合背景下,序列重构的关键问题之一是找到两个半径为 r 的度量球的最大交集。在本文中,我们研究了长度为 n 的被汉明误差扭曲的排列组合的这一问题,并确定了两个半径为 r 的度量球的最大交集的大小,这两个球的中心距离为 (d=2,3,4)。此外,我们还证明了对于任意的(n/geqslant 3)任意的排列组合都可以从与给定排列组合的汉明距离最多为2的4个不同的排列组合中唯一地重构出来,并且证明了对于任意的(n/geqslant 4)任意的排列组合都可以从与排列组合的汉明距离最多为3的(4n-5)不同的排列组合中唯一地重构出来。我们还证明了,对于任意的(n/geqslant 5)任意的排列组合都可以从(7n^2-31n+37)不同的排列组合中唯一地重构出来,这些排列组合与排列组合之间的汉明距离最多为4。最后,在汉明误差最多为 r 且 n 足够大的情况下,研究表明至少需要 ({varTheta }(n^{r-2})) 个不同的错误模式才能重构一个任意排列组合。
{"title":"The sequence reconstruction of permutations with Hamming metric","authors":"Xiang Wang, Fang-Wei Fu, Elena V. Konstantinova","doi":"10.1007/s10623-024-01509-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01509-4","url":null,"abstract":"<p>In the combinatorial context, one of the key problems in sequence reconstruction is to find the largest intersection of two metric balls of radius <i>r</i>. In this paper we study this problem for permutations of length <i>n</i> distorted by Hamming errors and determine the size of the largest intersection of two metric balls with radius <i>r</i> whose centers are at distance <span>(d=2,3,4)</span>. Moreover, it is shown that for any <span>(ngeqslant 3)</span> an arbitrary permutation is uniquely reconstructible from four distinct permutations at Hamming distance at most two from the given one, and it is proved that for any <span>(ngeqslant 4)</span> an arbitrary permutation is uniquely reconstructible from <span>(4n-5)</span> distinct permutations at Hamming distance at most three from the permutation. It is also proved that for any <span>(ngeqslant 5)</span> an arbitrary permutation is uniquely reconstructible from <span>(7n^2-31n+37)</span> distinct permutations at Hamming distance at most four from the permutation. Finally, in the case of at most <i>r</i> Hamming errors and sufficiently large <i>n</i>, it is shown that at least <span>({varTheta }(n^{r-2}))</span> distinct erroneous patterns are required in order to reconstruct an arbitrary permutation.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"14 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-16DOI: 10.1007/s10623-024-01497-5
Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song
A corrector is a critical component of True Random Number Generators (TRNGs), serving as a post-processing function to reduce statistical weaknesses in raw random sequences. It is important to note that a (textit{t})-resilient Boolean function is a (textit{t})-corrector, while the converse is not necessarily true. Building upon the pioneering method introduced by Zhang in 2023 for constructing nonlinear correctors with correction order one greater than resiliency order, this paper presents for the first time two approaches for constructing nonlinear plateaued correctors with correction order at least two greater than resiliency order via Walsh spectral neutralization technique, and the resulting correctors have algebraic degree at least (text {2}). The first approach yields (textit{n})-variable plateaued correctors with correction order (textit{n}-text {2}) and resiliency order approximately (textit{n}- text {log}_text {2} textit{n}). The nonlinearity and algebraic degree of the resulting correctors are also analyzed, demonstrating that they meet both Siegenthaler’s and Sarkar-Maitra’s bounds. Another approach based on Walsh spectral neutralization technique for constructing (textit{n})-variable plateaued correctors is proposed. This approach facilitates the design of semi-bent correctors with algebraic degree (lceil frac{textit{n}}{text {2}} rceil ), correction order (lfloor frac{textit{n}}{text {2}} rfloor -text {1}) and resiliency order approximately ( frac{textit{n}}{text {4}} ).
{"title":"Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique","authors":"Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song","doi":"10.1007/s10623-024-01497-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01497-5","url":null,"abstract":"<p>A corrector is a critical component of True Random Number Generators (TRNGs), serving as a post-processing function to reduce statistical weaknesses in raw random sequences. It is important to note that a <span>(textit{t})</span>-resilient Boolean function is a <span>(textit{t})</span>-corrector, while the converse is not necessarily true. Building upon the pioneering method introduced by Zhang in 2023 for constructing nonlinear correctors with correction order one greater than resiliency order, this paper presents for the first time two approaches for constructing nonlinear plateaued correctors with correction order at least two greater than resiliency order via Walsh spectral neutralization technique, and the resulting correctors have algebraic degree at least <span>(text {2})</span>. The first approach yields <span>(textit{n})</span>-variable plateaued correctors with correction order <span>(textit{n}-text {2})</span> and resiliency order approximately <span>(textit{n}- text {log}_text {2} textit{n})</span>. The nonlinearity and algebraic degree of the resulting correctors are also analyzed, demonstrating that they meet both Siegenthaler’s and Sarkar-Maitra’s bounds. Another approach based on Walsh spectral neutralization technique for constructing <span>(textit{n})</span>-variable plateaued correctors is proposed. This approach facilitates the design of semi-bent correctors with algebraic degree <span>(lceil frac{textit{n}}{text {2}} rceil )</span>, correction order <span>(lfloor frac{textit{n}}{text {2}} rfloor -text {1})</span> and resiliency order approximately <span>( frac{textit{n}}{text {4}} )</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"2 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}