首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Association schemes and orthogonality graphs on anisotropic points of polar spaces 极空间各向异性点上的关联方案和正交图谱
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-24 DOI: 10.1007/s10623-024-01514-7
Sam Adriaensen, Maarten De Boeck

In this paper, we study association schemes on the anisotropic points of classical polar spaces. Our main result concerns non-degenerate elliptic and hyperbolic quadrics in ({{,textrm{PG},}}(n,q)) with q odd. We define relations on the anisotropic points of such a quadric that depend on the type of line spanned by the points and whether or not they are of the same “quadratic type”. This yields an imprimitive 5-class association scheme. We calculate the matrices of eigenvalues and dual eigenvalues of this scheme. We also use this result, together with similar results from the literature concerning other classical polar spaces, to exactly calculate the spectrum of orthogonality graphs on the anisotropic points of non-degenerate quadrics in odd characteristic and of non-degenerate Hermitian varieties. As a byproduct, we obtain a 3-class association scheme on the anisotropic points of non-degenerate Hermitian varieties, where the relation containing two points depends on the type of line spanned by these points, and whether or not they are orthogonal.

本文研究经典极空间各向异性点上的关联方案。我们的主要结果涉及 q 为奇数的 ({{,textrm{PG},}}(n,q)) 中的非退化椭圆和双曲二次元。我们定义了关于此类二次元各向异性点的关系,这些关系取决于点所跨直线的类型以及它们是否属于相同的 "二次元类型"。这就产生了一个隐含的 5 类关联方案。我们计算了该方案的特征值矩阵和对偶特征值矩阵。我们还利用这一结果以及其他经典极坐标空间的类似结果,精确地计算了奇特征非退化四元数和非退化赫米梯形的各向异性点上的正交图谱。作为副产品,我们得到了关于非退化赫米梯形各向异性点的三类关联方案,其中包含两点的关系取决于这些点所跨直线的类型,以及它们是否正交。
{"title":"Association schemes and orthogonality graphs on anisotropic points of polar spaces","authors":"Sam Adriaensen, Maarten De Boeck","doi":"10.1007/s10623-024-01514-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01514-7","url":null,"abstract":"<p>In this paper, we study association schemes on the anisotropic points of classical polar spaces. Our main result concerns non-degenerate elliptic and hyperbolic quadrics in <span>({{,textrm{PG},}}(n,q))</span> with <i>q</i> odd. We define relations on the anisotropic points of such a quadric that depend on the type of line spanned by the points and whether or not they are of the same “quadratic type”. This yields an imprimitive 5-class association scheme. We calculate the matrices of eigenvalues and dual eigenvalues of this scheme. We also use this result, together with similar results from the literature concerning other classical polar spaces, to exactly calculate the spectrum of orthogonality graphs on the anisotropic points of non-degenerate quadrics in odd characteristic and of non-degenerate Hermitian varieties. As a byproduct, we obtain a 3-class association scheme on the anisotropic points of non-degenerate Hermitian varieties, where the relation containing two points depends on the type of line spanned by these points, and whether or not they are orthogonal.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"48 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algebraic hierarchical locally recoverable codes with nested affine subspace recovery 具有嵌套仿射子空间恢复功能的代数分层局部可恢复编码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-24 DOI: 10.1007/s10623-024-01510-x
Kathryn Haymaker, Beth Malmskog, Gretchen Matthews

Codes with locality, also known as locally recoverable codes, allow for recovery of erasures using proper subsets of other coordinates. These subsets are typically of small cardinality to promote recovery using limited network traffic and other resources. Hierarchical locally recoverable codes allow for recovery of erasures using sets of other symbols whose sizes increase as needed to allow for recovery of more symbols. In this paper, we describe a hierarchical recovery structure arising from geometry in Reed–Muller codes and codes with availability from fiber products of curves. We demonstrate how the fiber product hierarchical codes can be viewed as punctured subcodes of Reed–Muller codes, uniting the two constructions. This point of view provides natural structures for local recovery with availability at each level in the hierarchy.

具有局部性的代码,也称为局部可恢复代码,允许使用其他坐标的适当子集来恢复擦除。这些子集通常具有较小的卡度,以促进利用有限的网络流量和其他资源进行恢复。分层局部可恢复代码允许使用其他符号集恢复擦除,这些符号集的大小会根据需要增加,以便恢复更多符号。在本文中,我们描述了一种分层恢复结构,这种结构源于里德-穆勒编码中的几何结构,以及由曲线的纤维乘积产生的可用性编码。我们演示了如何将纤维积分层码视为里德-穆勒码的穿刺子码,从而将这两种结构结合起来。这种观点为在层次结构中的每一级提供了具有可用性的局部恢复的自然结构。
{"title":"Algebraic hierarchical locally recoverable codes with nested affine subspace recovery","authors":"Kathryn Haymaker, Beth Malmskog, Gretchen Matthews","doi":"10.1007/s10623-024-01510-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01510-x","url":null,"abstract":"<p>Codes with locality, also known as locally recoverable codes, allow for recovery of erasures using proper subsets of other coordinates. These subsets are typically of small cardinality to promote recovery using limited network traffic and other resources. Hierarchical locally recoverable codes allow for recovery of erasures using sets of other symbols whose sizes increase as needed to allow for recovery of more symbols. In this paper, we describe a hierarchical recovery structure arising from geometry in Reed–Muller codes and codes with availability from fiber products of curves. We demonstrate how the fiber product hierarchical codes can be viewed as punctured subcodes of Reed–Muller codes, uniting the two constructions. This point of view provides natural structures for local recovery with availability at each level in the hierarchy.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"92 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNA codes over groups 组上的 DNA 编码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-23 DOI: 10.1007/s10623-024-01515-6
Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui, Andriy Kryvko

The purpose of this paper is to establish a one-to-one correspondence between k-tuples of DNA codewords and the elements of a finite group to simulate the reverse and the complement operations of codewords by an automorphism and a translation of the group, respectively, in order to determine the structure of DNA codes. Finally, the case of vector spaces is characterized.

本文的目的是在 DNA 密码的 k 元组和有限群的元素之间建立一一对应关系,分别通过群的自动变形和平移来模拟密码的反向和补码运算,从而确定 DNA 密码的结构。最后,对向量空间的情况进行了描述。
{"title":"DNA codes over groups","authors":"Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui, Andriy Kryvko","doi":"10.1007/s10623-024-01515-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01515-6","url":null,"abstract":"<p>The purpose of this paper is to establish a one-to-one correspondence between <i>k</i>-tuples of DNA codewords and the elements of a finite group to simulate the reverse and the complement operations of codewords by an automorphism and a translation of the group, respectively, in order to determine the structure of DNA codes. Finally, the case of vector spaces is characterized.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142487530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Equivalence of constacyclic codes with shift constants of different orders 具有不同阶移位常量的常环码的等价性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-18 DOI: 10.1007/s10623-024-01512-9
Reza Dastbasteh, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi

Let a and b be two non-zero elements of a finite field (mathbb {F}_q), where (q>2). It has been shown that if a and b have the same multiplicative order in (mathbb {F}_q), then the families of a-constacyclic and b-constacyclic codes over (mathbb {F}_q) are monomially equivalent. In this paper, we investigate the monomial equivalence of a-constacyclic and b-constacyclic codes when a and b have distinct multiplicative orders. We present novel conditions for establishing monomial equivalence in such constacyclic codes, surpassing previous methods of determining monomially equivalent constacyclic and cyclic codes. As an application, we use these results to search for new linear codes more systematically. In particular, we present more than 70 new record-breaking linear codes over various finite fields, as well as new binary quantum codes.

让 a 和 b 是有限域 (mathbb {F}_q) 的两个非零元素,其中 (q>2)。已有研究表明,如果 a 和 b 在 (mathbb {F}_q) 中具有相同的乘阶,那么在 (mathbb {F}_q) 上的 a-constacyclic 和 b-constacyclic 编码族在单域上是等价的。在本文中,我们研究了当 a 和 b 具有不同的乘阶时,a-constacyclic 码和 b-constacyclic 码的单项式等价性。我们提出了在这类constacyclic码中建立单项式等价的新条件,超越了以前确定单项式等价的constacyclic码和循环码的方法。在应用中,我们利用这些结果更系统地寻找新的线性编码。特别是,我们提出了 70 多种在各种有限域上破纪录的新线性编码,以及新的二进制量子编码。
{"title":"Equivalence of constacyclic codes with shift constants of different orders","authors":"Reza Dastbasteh, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi","doi":"10.1007/s10623-024-01512-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01512-9","url":null,"abstract":"<p>Let <i>a</i> and <i>b</i> be two non-zero elements of a finite field <span>(mathbb {F}_q)</span>, where <span>(q&gt;2)</span>. It has been shown that if <i>a</i> and <i>b</i> have the same multiplicative order in <span>(mathbb {F}_q)</span>, then the families of <i>a</i>-constacyclic and <i>b</i>-constacyclic codes over <span>(mathbb {F}_q)</span> are monomially equivalent. In this paper, we investigate the monomial equivalence of <i>a</i>-constacyclic and <i>b</i>-constacyclic codes when <i>a</i> and <i>b</i> have distinct multiplicative orders. We present novel conditions for establishing monomial equivalence in such constacyclic codes, surpassing previous methods of determining monomially equivalent constacyclic and cyclic codes. As an application, we use these results to search for new linear codes more systematically. In particular, we present more than 70 new record-breaking linear codes over various finite fields, as well as new binary quantum codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142448823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64 截断差分密码分析:QARMAv1-n 和 QARMAv2-64 的新见解和应用
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-18 DOI: 10.1007/s10623-024-01486-8
Zahra Ahmadian, Akram Khalesi, Dounia M’foukh, Hossein Moghimi, María Naya-Plasencia

Truncated differential cryptanalyses were introduced by Knudsen in 1994. They are a well-known family of attacks that has arguably received less attention than some other variants of differential attacks. This paper gives some new insights into the theory of truncated differential attacks, specifically the conditions of provable security of SPN ciphers with MDS diffusion matrices against this type of attack. Furthermore, our study extends to various versions within the QARMA family of block ciphers, unveiling the only valid instances of single-tweak attacks on 10-round QARMAv1-64, 10-round QARMAv1-128, and 10- and 11-round QARMAv2-64. These attacks benefit from the optimal truncated differential distinguishers as well as some evolved key-recovery techniques.

截断差分密码分析由克努森于 1994 年提出。与差分攻击的其他一些变体相比,截断差分密码分析受到的关注可以说是较少的。本文给出了截断差分攻击理论的一些新见解,特别是具有 MDS 扩散矩阵的 SPN 密码针对这类攻击的可证明安全性条件。此外,我们的研究还扩展到了QARMA系列块密码的各种版本,揭示了对10轮QARMAv1-64、10轮QARMAv1-128以及10轮和11轮QARMAv2-64的单调整攻击的唯一有效实例。这些攻击得益于最优截断差分区分器和一些进化的密钥恢复技术。
{"title":"Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64","authors":"Zahra Ahmadian, Akram Khalesi, Dounia M’foukh, Hossein Moghimi, María Naya-Plasencia","doi":"10.1007/s10623-024-01486-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01486-8","url":null,"abstract":"<p>Truncated differential cryptanalyses were introduced by Knudsen in 1994. They are a well-known family of attacks that has arguably received less attention than some other variants of differential attacks. This paper gives some new insights into the theory of truncated differential attacks, specifically the conditions of provable security of SPN ciphers with MDS diffusion matrices against this type of attack. Furthermore, our study extends to various versions within the <span>QARMA</span> family of block ciphers, unveiling the only valid instances of single-tweak attacks on 10-round <span>QARMAv1</span>-64, 10-round <span>QARMAv1</span>-128, and 10- and 11-round <span>QARMAv2</span>-64. These attacks benefit from the optimal truncated differential distinguishers as well as some evolved key-recovery techniques.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"124 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142448824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conjunctive hierarchical secret sharing by finite geometry 通过有限几何实现连接式分层秘密共享
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01496-6
Máté Gyarmati, Péter Ligeti, Peter Sziklai, Marcella Takáts

Secret sharing is a general method for distributing sensitive data among the participants of a system such that only a collection of predefined qualified coalitions can recover the secret data. One of the most widely used special cases is threshold secret sharing, where every subset of participants of size above a given number is qualified. In this short note, we propose a general construction for a generalized threshold scheme, called conjunctive hierarchical secret sharing, where the participants are divided into disjoint levels of hierarchy, and there are different thresholds for all levels, all of which must be satisfied by qualified sets. The construction is the first method for arbitrary parameters based on finite geometry arguments and yields an improvement in the size of the underlying finite field in contrast with the existing results using polynomials.

秘密共享是一种在系统参与者之间分配敏感数据的通用方法,只有预先定义的合格联盟才能恢复秘密数据。阈值秘密共享是应用最广泛的特例之一,在阈值秘密共享中,每个规模超过给定数量的参与者子集都是合格的。在这篇短文中,我们提出了一种广义阈值方案的一般构造,称为结合分层秘密共享,其中参与者被划分为互不相关的分层,所有分层都有不同的阈值,所有阈值都必须由合格的集合来满足。与使用多项式的现有结果相比,这种构造是第一种基于有限几何参数的任意参数方法,并能改善底层有限域的大小。
{"title":"Conjunctive hierarchical secret sharing by finite geometry","authors":"Máté Gyarmati, Péter Ligeti, Peter Sziklai, Marcella Takáts","doi":"10.1007/s10623-024-01496-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01496-6","url":null,"abstract":"<p>Secret sharing is a general method for distributing sensitive data among the participants of a system such that only a collection of predefined qualified coalitions can recover the secret data. One of the most widely used special cases is threshold secret sharing, where every subset of participants of size above a given number is qualified. In this short note, we propose a general construction for a generalized threshold scheme, called conjunctive hierarchical secret sharing, where the participants are divided into disjoint levels of hierarchy, and there are different thresholds for all levels, all of which must be satisfied by qualified sets. The construction is the first method for arbitrary parameters based on finite geometry arguments and yields an improvement in the size of the underlying finite field in contrast with the existing results using polynomials.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting products of the form X times a linearized polynomial L(X) 重温形式为 X 乘以线性化多项式 L(X) 的乘积
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01511-w
Christof Beierle

For a q-polynomial L over a finite field (mathbb {F}_{q^n}), we characterize the differential spectrum of the function (f_L:mathbb {F}_{q^n} rightarrow mathbb {F}_{q^n}, x mapsto x cdot L(x)) and show that, for (n le 5), it is completely determined by the image of the rational function (r_L :mathbb {F}_{q^n}^* rightarrow mathbb {F}_{q^n}, x mapsto L(x)/x). This result follows from the classification of the pairs (LM) of q-polynomials in (mathbb {F}_{q^n}[X]), (n le 5), for which (r_L) and (r_M) have the same image, obtained in Csajbók et al. (Ars Math Contemp 16(2):585–608, 2019). For the case of (n>5), we pose an open question on the dimensions of the kernels of (x mapsto L(x) - ax) for (a in mathbb {F}_{q^n}). We further present a link between functions (f_L) of differential uniformity bounded above by q and scattered q-polynomials and show that, for odd values of q, we can construct CCZ-inequivalent functions (f_M) with bounded differential uniformity from a given function (f_L) fulfilling certain properties.

对于有限域 (mathbb {F}_{q^n}) 上的 q 多项式 L,我们描述了函数 (f_L:mathbb {F}_{q^n}, x mapsto x cdot L(x)) 的微分谱的特征,并证明对于 (n)mathbb {F}_{q^n}, x mapsto x cdot L(x))并证明,对于(n (le 5)),它完全由有理函数 (r_L :mathbb {F}_{q^n}^* rightarrow mathbb {F}_{q^n}, x mapsto x cdot L(x)/x)的图像决定。这一结果源于 Csajbók 等人 (Ars Math Contemp 16(2):585-608, 2019) 中得到的关于 (mathbb {F}_{q^n}[X]), (n le 5) 中 q 多项式对 (L, M) 的分类,其中 (r_L) 和 (r_M) 具有相同的图像。对于(n>5)的情况,我们提出了一个关于(a in mathbb {F}_{q^n}) 的(x mapsto L(x) - ax) 的核的维数的开放问题。我们进一步提出了上面由 q 定界的微分均匀性函数 (f_L) 与散点 q 多项式之间的联系,并证明了对于奇数 q 值,我们可以从满足某些性质的给定函数 (f_L) 构造出具有有界微分均匀性的 CCZ-inequivalent 函数 (f_M)。
{"title":"Revisiting products of the form X times a linearized polynomial L(X)","authors":"Christof Beierle","doi":"10.1007/s10623-024-01511-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01511-w","url":null,"abstract":"<p>For a <i>q</i>-polynomial <i>L</i> over a finite field <span>(mathbb {F}_{q^n})</span>, we characterize the differential spectrum of the function <span>(f_L:mathbb {F}_{q^n} rightarrow mathbb {F}_{q^n}, x mapsto x cdot L(x))</span> and show that, for <span>(n le 5)</span>, it is completely determined by the image of the rational function <span>(r_L :mathbb {F}_{q^n}^* rightarrow mathbb {F}_{q^n}, x mapsto L(x)/x)</span>. This result follows from the classification of the pairs (<i>L</i>, <i>M</i>) of <i>q</i>-polynomials in <span>(mathbb {F}_{q^n}[X])</span>, <span>(n le 5)</span>, for which <span>(r_L)</span> and <span>(r_M)</span> have the same image, obtained in Csajbók et al. (Ars Math Contemp 16(2):585–608, 2019). For the case of <span>(n&gt;5)</span>, we pose an open question on the dimensions of the kernels of <span>(x mapsto L(x) - ax)</span> for <span>(a in mathbb {F}_{q^n})</span>. We further present a link between functions <span>(f_L)</span> of differential uniformity bounded above by <i>q</i> and scattered <i>q</i>-polynomials and show that, for odd values of <i>q</i>, we can construct CCZ-inequivalent functions <span>(f_M)</span> with bounded differential uniformity from a given function <span>(f_L)</span> fulfilling certain properties.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142440633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decoding error probability of random parity-check matrix ensemble over the erasure channel 擦除信道上随机奇偶校验矩阵集合的解码误差概率
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01516-5
Chin Hei Chan, Fang-Wei Fu, Maosheng Xiong

In this paper we carry out an in-depth study on the average decoding error probability of the random parity-check matrix ensemble over the erasure channel under three decoding principles, namely unambiguous decoding, maximum likelihood decoding and list decoding. We obtain explicit formulas for the average decoding error probabilities of the random parity-check matrix ensemble under these three decoding principles and compute the error exponents. Moreover, for unambiguous decoding, we compute the variance of the decoding error probability of the random parity-check matrix ensemble and the error exponent of the variance, which implies a strong concentration result, that is, roughly speaking, the ratio of the decoding error probability of a random linear code in the ensemble and the average decoding error probability of the ensemble converges to 1 with high probability when the code length goes to infinity.

本文深入研究了擦除信道上随机奇偶校验矩阵集合在三种解码原则(即无歧义解码、最大似然解码和列表解码)下的平均解码误差概率。我们获得了这三种解码原理下随机奇偶校验矩阵集合的平均解码误差概率的明确公式,并计算了误差指数。此外,对于不明确解码,我们计算了随机奇偶校验矩阵集合的解码误差概率方差和方差的误差指数,这意味着一个强集中结果,即大致上当码长为无穷大时,集合中随机线性码的解码误差概率与集合平均解码误差概率之比大概率收敛于 1。
{"title":"Decoding error probability of random parity-check matrix ensemble over the erasure channel","authors":"Chin Hei Chan, Fang-Wei Fu, Maosheng Xiong","doi":"10.1007/s10623-024-01516-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01516-5","url":null,"abstract":"<p>In this paper we carry out an in-depth study on the average decoding error probability of the random parity-check matrix ensemble over the erasure channel under three decoding principles, namely unambiguous decoding, maximum likelihood decoding and list decoding. We obtain explicit formulas for the average decoding error probabilities of the random parity-check matrix ensemble under these three decoding principles and compute the error exponents. Moreover, for unambiguous decoding, we compute the variance of the decoding error probability of the random parity-check matrix ensemble and the error exponent of the variance, which implies a strong concentration result, that is, roughly speaking, the ratio of the decoding error probability of a random linear code in the ensemble and the average decoding error probability of the ensemble converges to 1 with high probability when the code length goes to infinity.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"231 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142440632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The sequence reconstruction of permutations with Hamming metric 含汉明度量的排列序列重构
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01509-4
Xiang Wang, Fang-Wei Fu, Elena V. Konstantinova

In the combinatorial context, one of the key problems in sequence reconstruction is to find the largest intersection of two metric balls of radius r. In this paper we study this problem for permutations of length n distorted by Hamming errors and determine the size of the largest intersection of two metric balls with radius r whose centers are at distance (d=2,3,4). Moreover, it is shown that for any (ngeqslant 3) an arbitrary permutation is uniquely reconstructible from four distinct permutations at Hamming distance at most two from the given one, and it is proved that for any (ngeqslant 4) an arbitrary permutation is uniquely reconstructible from (4n-5) distinct permutations at Hamming distance at most three from the permutation. It is also proved that for any (ngeqslant 5) an arbitrary permutation is uniquely reconstructible from (7n^2-31n+37) distinct permutations at Hamming distance at most four from the permutation. Finally, in the case of at most r Hamming errors and sufficiently large n, it is shown that at least ({varTheta }(n^{r-2})) distinct erroneous patterns are required in order to reconstruct an arbitrary permutation.

在组合背景下,序列重构的关键问题之一是找到两个半径为 r 的度量球的最大交集。在本文中,我们研究了长度为 n 的被汉明误差扭曲的排列组合的这一问题,并确定了两个半径为 r 的度量球的最大交集的大小,这两个球的中心距离为 (d=2,3,4)。此外,我们还证明了对于任意的(n/geqslant 3)任意的排列组合都可以从与给定排列组合的汉明距离最多为2的4个不同的排列组合中唯一地重构出来,并且证明了对于任意的(n/geqslant 4)任意的排列组合都可以从与排列组合的汉明距离最多为3的(4n-5)不同的排列组合中唯一地重构出来。我们还证明了,对于任意的(n/geqslant 5)任意的排列组合都可以从(7n^2-31n+37)不同的排列组合中唯一地重构出来,这些排列组合与排列组合之间的汉明距离最多为4。最后,在汉明误差最多为 r 且 n 足够大的情况下,研究表明至少需要 ({varTheta }(n^{r-2})) 个不同的错误模式才能重构一个任意排列组合。
{"title":"The sequence reconstruction of permutations with Hamming metric","authors":"Xiang Wang, Fang-Wei Fu, Elena V. Konstantinova","doi":"10.1007/s10623-024-01509-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01509-4","url":null,"abstract":"<p>In the combinatorial context, one of the key problems in sequence reconstruction is to find the largest intersection of two metric balls of radius <i>r</i>. In this paper we study this problem for permutations of length <i>n</i> distorted by Hamming errors and determine the size of the largest intersection of two metric balls with radius <i>r</i> whose centers are at distance <span>(d=2,3,4)</span>. Moreover, it is shown that for any <span>(ngeqslant 3)</span> an arbitrary permutation is uniquely reconstructible from four distinct permutations at Hamming distance at most two from the given one, and it is proved that for any <span>(ngeqslant 4)</span> an arbitrary permutation is uniquely reconstructible from <span>(4n-5)</span> distinct permutations at Hamming distance at most three from the permutation. It is also proved that for any <span>(ngeqslant 5)</span> an arbitrary permutation is uniquely reconstructible from <span>(7n^2-31n+37)</span> distinct permutations at Hamming distance at most four from the permutation. Finally, in the case of at most <i>r</i> Hamming errors and sufficiently large <i>n</i>, it is shown that at least <span>({varTheta }(n^{r-2}))</span> distinct erroneous patterns are required in order to reconstruct an arbitrary permutation.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"14 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique 通过沃尔什谱中和技术构建具有高校正阶和良好非线性的高原校正器
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01497-5
Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song

A corrector is a critical component of True Random Number Generators (TRNGs), serving as a post-processing function to reduce statistical weaknesses in raw random sequences. It is important to note that a (textit{t})-resilient Boolean function is a (textit{t})-corrector, while the converse is not necessarily true. Building upon the pioneering method introduced by Zhang in 2023 for constructing nonlinear correctors with correction order one greater than resiliency order, this paper presents for the first time two approaches for constructing nonlinear plateaued correctors with correction order at least two greater than resiliency order via Walsh spectral neutralization technique, and the resulting correctors have algebraic degree at least (text {2}). The first approach yields (textit{n})-variable plateaued correctors with correction order (textit{n}-text {2}) and resiliency order approximately (textit{n}- text {log}_text {2} textit{n}). The nonlinearity and algebraic degree of the resulting correctors are also analyzed, demonstrating that they meet both Siegenthaler’s and Sarkar-Maitra’s bounds. Another approach based on Walsh spectral neutralization technique for constructing (textit{n})-variable plateaued correctors is proposed. This approach facilitates the design of semi-bent correctors with algebraic degree (lceil frac{textit{n}}{text {2}} rceil ), correction order (lfloor frac{textit{n}}{text {2}} rfloor -text {1}) and resiliency order approximately ( frac{textit{n}}{text {4}} ).

校正器是真随机数生成器(TRNGs)的重要组成部分,它作为一种后处理功能,可以减少原始随机序列中的统计缺陷。需要注意的是,一个有弹性的布尔函数就是一个校正器,反之则不一定。本文在张建国于 2023 年提出的构建修正阶数大于弹性阶数一的非线性修正器的开创性方法的基础上,首次提出了通过沃尔什谱中和技术构建修正阶数至少大于弹性阶数二的非线性高原修正器的两种方法,所得到的修正器的代数阶数至少为 (text{2})。第一种方法得到了 (textit{n})-variable plateaued correctors,其修正阶为 (textit{n}-text {2}),弹性阶约为(textit{n}- text {log}_text {2} textit{n})。我们还分析了所得到的校正器的非线性和代数度,证明它们符合 Siegenthaler 和 Sarkar-Maitra 的约束。研究还提出了另一种基于沃尔什谱中和技术的方法,用于构建 (textit{n})-variable plateaued correctors。这种方法有助于设计具有代数度(lceil frac{textit{n}}{text {2}} rceil )、修正阶(lfloor frac{textit{n}}{text {2}} rfloor -text {1})和近似弹性阶(frac{textit{n}}{text {4}})的半弯曲修正器。
{"title":"Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique","authors":"Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song","doi":"10.1007/s10623-024-01497-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01497-5","url":null,"abstract":"<p>A corrector is a critical component of True Random Number Generators (TRNGs), serving as a post-processing function to reduce statistical weaknesses in raw random sequences. It is important to note that a <span>(textit{t})</span>-resilient Boolean function is a <span>(textit{t})</span>-corrector, while the converse is not necessarily true. Building upon the pioneering method introduced by Zhang in 2023 for constructing nonlinear correctors with correction order one greater than resiliency order, this paper presents for the first time two approaches for constructing nonlinear plateaued correctors with correction order at least two greater than resiliency order via Walsh spectral neutralization technique, and the resulting correctors have algebraic degree at least <span>(text {2})</span>. The first approach yields <span>(textit{n})</span>-variable plateaued correctors with correction order <span>(textit{n}-text {2})</span> and resiliency order approximately <span>(textit{n}- text {log}_text {2} textit{n})</span>. The nonlinearity and algebraic degree of the resulting correctors are also analyzed, demonstrating that they meet both Siegenthaler’s and Sarkar-Maitra’s bounds. Another approach based on Walsh spectral neutralization technique for constructing <span>(textit{n})</span>-variable plateaued correctors is proposed. This approach facilitates the design of semi-bent correctors with algebraic degree <span>(lceil frac{textit{n}}{text {2}} rceil )</span>, correction order <span>(lfloor frac{textit{n}}{text {2}} rfloor -text {1})</span> and resiliency order approximately <span>( frac{textit{n}}{text {4}} )</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"2 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1