首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
On two non-existence results for Cameron–Liebler k-sets in $${{,mathrm{textrm{PG}},}}(n,q)$$ 论 $${{,mathrm{textrm{PG}},}}(n,q)$$ 中卡梅隆-利勃勒 k 集的两个不存在结果
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-10 DOI: 10.1007/s10623-024-01505-8
Jan De Beule, Jonathan Mannaert, Leo Storme

This paper focuses on non-existence results for Cameron–Liebler k-sets. A Cameron–Liebler k-set is a collection of k-spaces in ({{,mathrm{textrm{PG}},}}(n,q)) or ({{,mathrm{textrm{AG}},}}(n,q)) admitting a certain parameter x, which is dependent on the size of this collection. One of the main research questions remains the (non-)existence of Cameron–Liebler k-sets with parameter x. This paper improves two non-existence results. First we show that the parameter of a non-trivial Cameron–Liebler k-set in ({{,mathrm{textrm{PG}},}}(n,q)) should be larger than (q^{n-frac{5k}{2}-1}), which is an improvement of an earlier known lower bound. Secondly, we prove a modular equality on the parameter x of Cameron–Liebler k-sets in ({{,mathrm{textrm{PG}},}}(n,q)) with (x<frac{q^{n-k}-1}{q^{k+1}-1}), (nge 2k+1), (n-k+1ge 7) and (n-k) even. In the affine case we show a similar result for (n-k+1ge 3) and (n-k) even. This is a generalization of earlier known modular equalities in the projective and affine case.

本文主要研究卡梅隆-利伯勒 k 集的不存在结果。Cameron-Liebler k 集是 ({{,mathrmtextrm{PG}},}}(n,q)) 或 ({{,mathrmtextrm{AG}},}}(n,q)) 中的 k 空间集合,它允许一定的参数 x,而这个参数取决于这个集合的大小。本文改进了两个不存在结果。首先,我们证明了在({{,mathrm{textrm{PG}},}(n,q))中的非难卡梅隆-利勃勒 k 集的参数应该大于(q^{n-frac{5k}{2}-1}),这是对早期已知下限的改进。其次,我们证明了在({{,mathrm{textrm{PG}},}}(n,q))中卡梅隆-利伯勒 k 集的参数 x 上的模相等,其中 (x<frac{q^{n-k}-1}{q^{k+1}-1})、(n/ge 2k+1)、(n-k+1/ge 7) 和(n-k) 偶数。在仿射情况下,我们对(n-k+1ge 3)和(n-k)偶数证明了类似的结果。这是对早先已知的投影和仿射情况下的模等式的推广。
{"title":"On two non-existence results for Cameron–Liebler k-sets in $${{,mathrm{textrm{PG}},}}(n,q)$$","authors":"Jan De Beule, Jonathan Mannaert, Leo Storme","doi":"10.1007/s10623-024-01505-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01505-8","url":null,"abstract":"<p>This paper focuses on non-existence results for Cameron–Liebler <i>k</i>-sets. A Cameron–Liebler <i>k</i>-set is a collection of <i>k</i>-spaces in <span>({{,mathrm{textrm{PG}},}}(n,q))</span> or <span>({{,mathrm{textrm{AG}},}}(n,q))</span> admitting a certain parameter <i>x</i>, which is dependent on the size of this collection. One of the main research questions remains the (non-)existence of Cameron–Liebler <i>k</i>-sets with parameter <i>x</i>. This paper improves two non-existence results. First we show that the parameter of a non-trivial Cameron–Liebler <i>k</i>-set in <span>({{,mathrm{textrm{PG}},}}(n,q))</span> should be larger than <span>(q^{n-frac{5k}{2}-1})</span>, which is an improvement of an earlier known lower bound. Secondly, we prove a modular equality on the parameter <i>x</i> of Cameron–Liebler <i>k</i>-sets in <span>({{,mathrm{textrm{PG}},}}(n,q))</span> with <span>(x&lt;frac{q^{n-k}-1}{q^{k+1}-1})</span>, <span>(nge 2k+1)</span>, <span>(n-k+1ge 7)</span> and <span>(n-k)</span> even. In the affine case we show a similar result for <span>(n-k+1ge 3)</span> and <span>(n-k)</span> even. This is a generalization of earlier known modular equalities in the projective and affine case.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"13 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142405484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient error-correcting codes for the HQC post-quantum cryptosystem HQC 后量子密码系统的高效纠错码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-09 DOI: 10.1007/s10623-024-01507-6
Carlos Aguilar-Melchor, Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit, Jérôme Lacan, Gilles Zémor

The HQC post-quantum cryptosystem enables two parties to share noisy versions of a common secret binary string, and an error-correcting code is required to deal with the mismatch between both versions. This code is required to deal with binary symmetric channels with as large a transition parameter as possible, while guaranteeing, for cryptographic reasons, a decoding error probability of provably not more than 2-128. This requirement is non-standard for digital communications, and modern coding techniques are not amenable to this setting. This paper explains how this issue is addressed in the last version of HQC: precisely, we introduce a coding scheme that consists of concatenating a Reed–Solomon code with the tensor product of a Reed–Muller code and a repetition code. We analyze its behavior in detail and show that it significantly improves upon the previous proposition for HQC, which consisted of tensoring a BCH and a repetition code. As additional results, we also provide a better approximation of the weight distribution for HQC error vectors, and we remark that the size of the exchanged secret in HQC can be reduced to match the protocol security which also significantly improves performance.

HQC 后量子密码系统使双方能够共享一个共同秘密二进制字符串的噪声版本,并且需要一个纠错码来处理两个版本之间的不匹配。这种纠错码需要处理具有尽可能大过渡参数的二进制对称信道,同时出于密码学原因,保证解码错误概率不超过 2-128。这一要求对于数字通信来说是非标准的,现代编码技术也无法满足这一要求。本文解释了 HQC 最后一个版本是如何解决这一问题的:确切地说,我们引入了一种编码方案,它由里德-所罗门码与里德-穆勒码和重复码的张量乘积组成。我们详细分析了它的行为,并证明它大大改进了之前的 HQC 提议,后者包括对 BCH 和重复码进行张量乘积。作为附加结果,我们还为 HQC 错误向量的权重分布提供了一个更好的近似值,并指出 HQC 中交换秘密的大小可以减小以匹配协议安全性,这也大大提高了性能。
{"title":"Efficient error-correcting codes for the HQC post-quantum cryptosystem","authors":"Carlos Aguilar-Melchor, Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit, Jérôme Lacan, Gilles Zémor","doi":"10.1007/s10623-024-01507-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01507-6","url":null,"abstract":"<p>The HQC post-quantum cryptosystem enables two parties to share noisy versions of a common secret binary string, and an error-correcting code is required to deal with the mismatch between both versions. This code is required to deal with binary symmetric channels with as large a transition parameter as possible, while guaranteeing, for cryptographic reasons, a decoding error probability of provably not more than 2<sup>-128</sup>. This requirement is non-standard for digital communications, and modern coding techniques are not amenable to this setting. This paper explains how this issue is addressed in the last version of HQC: precisely, we introduce a coding scheme that consists of concatenating a Reed–Solomon code with the tensor product of a Reed–Muller code and a repetition code. We analyze its behavior in detail and show that it significantly improves upon the previous proposition for HQC, which consisted of tensoring a BCH and a repetition code. As additional results, we also provide a better approximation of the weight distribution for HQC error vectors, and we remark that the size of the exchanged secret in HQC can be reduced to match the protocol security which also significantly improves performance.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infinite families of 3-designs from special symmetric polynomials 来自特殊对称多项式的无穷 3 设计族
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-05 DOI: 10.1007/s10623-024-01508-5
Guangkui Xu, Xiwang Cao, Gaojun Luo, Huawei Wu

Tang and Ding (IEEE Trans Inf Theory 67(1):244–254, 2021) opened a new direction of searching for t-designs from elementary symmetric polynomials, which are used to construct the first infinite family of linear codes supporting 4-designs. In this paper, we first study the properties of elementary symmetric polynomials with 6 or 7 variables over (textrm{GF}(3^{m})). Based on them, we present more infinite families of 3-designs that contain some 3-designs with new parameters as checked by Magma for small numbers m. We also construct an infinite family of cyclic codes over (textrm{GF}(q^2)) and prove that the codewords of any nonzero weight support a 3-design. In particular, we present an infinite family of 6-dimensional AMDS codes over (textrm{GF}(3^{2m})) holding an infinite family of 3-designs and an infinite family of 7-dimensional NMDS codes over (textrm{GF}(3^{2m})) holding an infinite family of 3-designs.

Tang 和 Ding(IEEE Trans Inf Theory 67(1):244-254, 2021)开辟了从基本对称多项式中寻找 t-设计的新方向,并以此构建了第一个支持 4-设计的线性编码无限族。本文首先研究了 (textrm{GF}(3^{m})) 上 6 或 7 变量的基本对称多项式的性质。在此基础上,我们提出了更多无穷的 3 设计族,其中包含一些由 Magma 检验过的具有新参数的小数 m 的 3 设计。我们还在(textrm{GF}(q^2))上构造了一个无穷的循环码族,并证明任何非零权重的码字都支持一个 3 设计。特别地,我们提出了一个在 (textrm{GF}(3^{2m})) 上的 6 维 AMDS 码的无穷族,它持有一个 3 设计的无穷族,以及一个在 (textrm{GF}(3^{2m})) 上的 7 维 NMDS 码的无穷族,它持有一个 3 设计的无穷族。
{"title":"Infinite families of 3-designs from special symmetric polynomials","authors":"Guangkui Xu, Xiwang Cao, Gaojun Luo, Huawei Wu","doi":"10.1007/s10623-024-01508-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01508-5","url":null,"abstract":"<p>Tang and Ding (IEEE Trans Inf Theory 67(1):244–254, 2021) opened a new direction of searching for <i>t</i>-designs from elementary symmetric polynomials, which are used to construct the first infinite family of linear codes supporting 4-designs. In this paper, we first study the properties of elementary symmetric polynomials with 6 or 7 variables over <span>(textrm{GF}(3^{m}))</span>. Based on them, we present more infinite families of 3-designs that contain some 3-designs with new parameters as checked by Magma for small numbers <i>m</i>. We also construct an infinite family of cyclic codes over <span>(textrm{GF}(q^2))</span> and prove that the codewords of any nonzero weight support a 3-design. In particular, we present an infinite family of 6-dimensional AMDS codes over <span>(textrm{GF}(3^{2m}))</span> holding an infinite family of 3-designs and an infinite family of 7-dimensional NMDS codes over <span>(textrm{GF}(3^{2m}))</span> holding an infinite family of 3-designs.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"7 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142377701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing 配备自适应小组测试检测功能的交互式汇总信息验证
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01498-4
Kazuhiko Minematsu, Shingo Sato, Junji Shikata

In this paper, we propose a formal security model and a construction methodology of interactive aggregate message authentication codes with detecting functionality (IAMDs). The IAMD is an interactive aggregate MAC protocol which can identify invalid messages with a small amount of tag-size. Several aggregate MAC schemes that can detect invalid messages have been proposed so far by using non-adaptive group testing in the prior work. In this paper, we utilize adaptive group testing to construct IAMD scheme, and we show that the resulting IAMD scheme can identify invalid messages with a small amount of tag-size compared to the previous schemes. To this end, we give the formalization of adaptive group testing and IAMD, and propose a generic construction starting from any aggregate MAC and any adaptive group testing method. In addition, we compare instantiations of our generic constructions, in terms of total tag-size and several properties. Furthermore, we show advantages of IAMD by implementing constructions of (non-)adaptive aggregate message authentication with detecting functionality and comparing these ones in terms of the data-size and running time of verification algorithms.

本文提出了具有检测功能的交互式聚合消息验证码(IAMD)的正式安全模型和构建方法。IAMD 是一种交互式聚合 MAC 协议,只需少量标签大小就能识别无效信息。迄今为止,已有几种聚合 MAC 方案通过使用非适应性分组测试来检测无效信息。本文利用自适应分组测试构建了 IAMD 方案,并证明与之前的方案相比,IAMD 方案能以较小的标签大小识别无效信息。为此,我们给出了自适应分组测试和 IAMD 的形式化,并提出了一种从任意聚合 MAC 和任意自适应分组测试方法出发的通用构造。此外,我们还从总标签大小和几个属性方面比较了通用结构的实例。此外,我们还通过实现具有检测功能的(非)自适应聚合消息验证结构,并从数据大小和验证算法的运行时间方面对这些结构进行比较,从而展示了 IAMD 的优势。
{"title":"Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing","authors":"Kazuhiko Minematsu, Shingo Sato, Junji Shikata","doi":"10.1007/s10623-024-01498-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01498-4","url":null,"abstract":"<p>In this paper, we propose a formal security model and a construction methodology of interactive aggregate message authentication codes with detecting functionality (IAMDs). The IAMD is an interactive aggregate MAC protocol which can identify invalid messages with a small amount of tag-size. Several aggregate MAC schemes that can detect invalid messages have been proposed so far by using non-adaptive group testing in the prior work. In this paper, we utilize adaptive group testing to construct IAMD scheme, and we show that the resulting IAMD scheme can identify invalid messages with a small amount of tag-size compared to the previous schemes. To this end, we give the formalization of adaptive group testing and IAMD, and propose a generic construction starting from any aggregate MAC and any adaptive group testing method. In addition, we compare instantiations of our generic constructions, in terms of total tag-size and several properties. Furthermore, we show advantages of IAMD by implementing constructions of (non-)adaptive aggregate message authentication with detecting functionality and comparing these ones in terms of the data-size and running time of verification algorithms.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"12 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142377699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intersection distribution of degree four polynomials over finite fields 有限域上四度多项式的交集分布
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01488-6
Shuxing Li, Maosheng Xiong

Given a polynomial f over the finite field (mathbb {F}_q), its intersection distribution provides fruitful information on how lines in the affine plane intersect the graph of f over (mathbb {F}_q). The intersection distribution in its simplest cases gives rise to oval polynomials in finite geometry and Steiner triple systems in design theory. Previously, the intersection distribution of degree two and degree three polynomials has been computed. In this paper, we determine the intersection distribution of all degree four polynomials over finite fields. As an application, we present a direct construction of Steiner systems using polynomials with prescribed intersection distribution.

给定有限域 (mathbb {F}_q)上的多项式 f,它的交点分布提供了关于仿射平面上的线如何与 (mathbb {F}_q)上的 f 的图相交的有用信息。在最简单的情况下,交点分布产生了有限几何中的椭圆多项式和设计理论中的斯坦纳三重系统。在此之前,人们已经计算了二度和三度多项式的交集分布。在本文中,我们确定了有限域上所有四度多项式的交集分布。作为应用,我们提出了一种使用具有规定交集分布的多项式直接构建斯坦纳系统的方法。
{"title":"Intersection distribution of degree four polynomials over finite fields","authors":"Shuxing Li, Maosheng Xiong","doi":"10.1007/s10623-024-01488-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01488-6","url":null,"abstract":"<p>Given a polynomial <i>f</i> over the finite field <span>(mathbb {F}_q)</span>, its intersection distribution provides fruitful information on how lines in the affine plane intersect the graph of <i>f</i> over <span>(mathbb {F}_q)</span>. The intersection distribution in its simplest cases gives rise to oval polynomials in finite geometry and Steiner triple systems in design theory. Previously, the intersection distribution of degree two and degree three polynomials has been computed. In this paper, we determine the intersection distribution of all degree four polynomials over finite fields. As an application, we present a direct construction of Steiner systems using polynomials with prescribed intersection distribution.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantum-secure partial parallel MAC QPCBC 量子安全部分并行 MAC QPCBC
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01506-7
Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu

The quantum security of message authentication codes (MACs) has been gaining increasing attention in recent years, particularly with regard to proving the quantum security of classical MACs, which has emerged as a significant area of interest. In this work, we present two variants of classical MACs: QPMAC, a quantum-secure parallel version of PMAC, and QCBCMAC, a quantum-secure variant of CBCMAC and NMAC that supports variable-length input. We demonstrate that QPMAC is a parallel quantum-secure MAC, with an inverse relationship between its degree of parallelism and its level of quantum security. On the other hand, QCBCMAC provides quantum security for variable-length inputs. To achieve an optimal balance between parallelism and quantum security, we propose QPCBC, a hybrid construction that combines the strengths of QPMAC and QCBCMAC. We also provide an instantiation of QPCBC using tweakable block ciphers.

近年来,消息认证码(MAC)的量子安全性越来越受到关注,特别是在证明经典 MAC 的量子安全性方面,这已成为一个重要的兴趣领域。在这项工作中,我们提出了经典 MAC 的两种变体:QPMAC 是 PMAC 的量子安全并行版本,QCBCMAC 是 CBCMAC 和 NMAC 的量子安全变体,支持可变长度输入。我们证明 QPMAC 是一种并行量子安全 MAC,其并行程度与量子安全水平之间存在反比关系。另一方面,QCBCMAC 为可变长度输入提供量子安全。为了在并行性和量子安全性之间实现最佳平衡,我们提出了 QPCBC,一种结合了 QPMAC 和 QCBCMAC 优点的混合构造。我们还提供了使用可调整块密码的 QPCBC 实例。
{"title":"A quantum-secure partial parallel MAC QPCBC","authors":"Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu","doi":"10.1007/s10623-024-01506-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01506-7","url":null,"abstract":"<p>The quantum security of message authentication codes (MACs) has been gaining increasing attention in recent years, particularly with regard to proving the quantum security of classical MACs, which has emerged as a significant area of interest. In this work, we present two variants of classical MACs: QPMAC, a quantum-secure parallel version of PMAC, and QCBCMAC, a quantum-secure variant of CBCMAC and NMAC that supports variable-length input. We demonstrate that QPMAC is a parallel quantum-secure MAC, with an inverse relationship between its degree of parallelism and its level of quantum security. On the other hand, QCBCMAC provides quantum security for variable-length inputs. To achieve an optimal balance between parallelism and quantum security, we propose QPCBC, a hybrid construction that combines the strengths of QPMAC and QCBCMAC. We also provide an instantiation of QPCBC using tweakable block ciphers.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Association schemes arising from non-weakly regular bent functions 非弱正则弯曲函数产生的关联方案
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01495-7
Yadi Wei, Jiaxin Wang, Fang-Wei Fu

Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in Özbudak and Pelen (J Algebr Comb 56:635–658, 2022), Özbudak and Pelen constructed infinite families of symmetric association schemes of classes 5 and 6 by using ternary non-weakly regular bent functions. They also stated that “constructing 2p-class association schemes from p-ary non-weakly regular bent functions is an interesting problem", where (p>3) is an odd prime. In this paper, using non-weakly regular bent functions, we construct infinite families of symmetric association schemes of classes 2p, ((2p+1)) and (frac{3p+1}{2}) for any odd prime p. Fusing those association schemes, we obtain t-class symmetric association schemes, where (t=4,5,6,7). In addition, we give the sufficient and necessary conditions for the partitions P, D, T, U and V (defined in this paper) to induce symmetric association schemes.

关联方案在代数组合学中发挥着重要作用,并在编码理论、图论和设计理论中有着重要应用。利用弯曲函数构建关联方案的方法已被广泛研究。最近,在 Özbudak 和 Pelen(J Algebr Comb 56:635-658, 2022)一文中,Özbudak 和 Pelen 利用三元非弱正则弯曲函数构造了 5 类和 6 类对称关联方案的无限族。他们还指出,"从 p-ary 非弱正则弯曲函数构造 2p 类关联方案是一个有趣的问题",其中 (p>3) 是奇素数。在本文中,我们使用非弱正则弯曲函数,为任意奇素数 p 构建了 2p、((2p+1))和(frac{3p+1}{2})类对称关联方案的无穷族,并融合这些关联方案,得到了 t 类对称关联方案,其中 (t=4,5,6,7)。此外,我们还给出了分区 P、D、T、U 和 V(本文中定义)诱导对称关联方案的充分必要条件。
{"title":"Association schemes arising from non-weakly regular bent functions","authors":"Yadi Wei, Jiaxin Wang, Fang-Wei Fu","doi":"10.1007/s10623-024-01495-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01495-7","url":null,"abstract":"<p>Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in Özbudak and Pelen (J Algebr Comb 56:635–658, 2022), Özbudak and Pelen constructed infinite families of symmetric association schemes of classes 5 and 6 by using ternary non-weakly regular bent functions. They also stated that “constructing 2<i>p</i>-class association schemes from <i>p</i>-ary non-weakly regular bent functions is an interesting problem\", where <span>(p&gt;3)</span> is an odd prime. In this paper, using non-weakly regular bent functions, we construct infinite families of symmetric association schemes of classes 2<i>p</i>, <span>((2p+1))</span> and <span>(frac{3p+1}{2})</span> for any odd prime <i>p</i>. Fusing those association schemes, we obtain <i>t</i>-class symmetric association schemes, where <span>(t=4,5,6,7)</span>. In addition, we give the sufficient and necessary conditions for the partitions <i>P</i>, <i>D</i>, <i>T</i>, <i>U</i> and <i>V</i> (defined in this paper) to induce symmetric association schemes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"59 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transitive path decompositions of Cartesian products of complete graphs 完整图笛卡儿积的传递路径分解
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01493-9
Ajani De Vas Gunasekara, Alice Devillers

An H-decomposition of a graph (Gamma ) is a partition of its edge set into subgraphs isomorphic to H. A transitive decomposition is a special kind of H-decomposition that is highly symmetrical in the sense that the subgraphs (copies of H) are preserved and transitively permuted by a group of automorphisms of (Gamma ). This paper concerns transitive H-decompositions of the graph (K_n Box K_n) where H is a path. When n is an odd prime, we present a construction for a transitive path decomposition where the paths in the decomposition are considerably large compared to the number of vertices. Our main result supports well-known Gallai’s conjecture and an extended version of Ringel’s conjecture.

一个图 (Gamma )的 H 分解是将它的边集分割成与 H 同构的子图。反式分解是一种特殊的 H 分解,它具有高度对称性,即子图(H 的副本)通过 (Gamma )的一组自动形变得到保留和反式置换。本文关注图 (K_n Box K_n) 的传递 H 分解,其中 H 是一条路径。当 n 是奇素数时,我们提出了一种反式路径分解的构造,分解中的路径与顶点数相比相当大。我们的主要结果支持众所周知的加莱猜想和林格尔猜想的扩展版本。
{"title":"Transitive path decompositions of Cartesian products of complete graphs","authors":"Ajani De Vas Gunasekara, Alice Devillers","doi":"10.1007/s10623-024-01493-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01493-9","url":null,"abstract":"<p>An <i>H</i>-decomposition of a graph <span>(Gamma )</span> is a partition of its edge set into subgraphs isomorphic to <i>H</i>. A transitive decomposition is a special kind of <i>H</i>-decomposition that is highly symmetrical in the sense that the subgraphs (copies of <i>H</i>) are preserved and transitively permuted by a group of automorphisms of <span>(Gamma )</span>. This paper concerns transitive <i>H</i>-decompositions of the graph <span>(K_n Box K_n)</span> where <i>H</i> is a path. When <i>n</i> is an odd prime, we present a construction for a transitive path decomposition where the paths in the decomposition are considerably large compared to the number of vertices. Our main result supports well-known Gallai’s conjecture and an extended version of Ringel’s conjecture.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"5 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two classes of exceptional m-to-1 rational functions 两类特殊的 m 对 1 有理函数
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01499-3
Zhiguo Ding, Michael E. Zieve

For each odd prime power q, we present two rational functions (f(X)in mathbb {F}_q(X)) which have the unusual property that, for every odd n, the function induced by f(X) on (mathbb {F}_{q^n}setminus mathbb {F}_q) is ((q-1))-to-1.

对于每个奇素数幂 q,我们提出了两个有理函数 (f(X)in mathbb {F}_q(X)) ,它们有一个不同寻常的性质,即对于每个奇数 n,f(X) 在 (mathbb {F}_{q^n}setminus mathbb {F}_q) 上诱导的函数是 ((q-1))-to-1。
{"title":"Two classes of exceptional m-to-1 rational functions","authors":"Zhiguo Ding, Michael E. Zieve","doi":"10.1007/s10623-024-01499-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01499-3","url":null,"abstract":"<p>For each odd prime power <i>q</i>, we present two rational functions <span>(f(X)in mathbb {F}_q(X))</span> which have the unusual property that, for every odd <i>n</i>, the function induced by <i>f</i>(<i>X</i>) on <span>(mathbb {F}_{q^n}setminus mathbb {F}_q)</span> is <span>((q-1))</span>-to-1.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tactical decompositions in finite polar spaces and non-spreading classical group actions 有限极空间中的战术分解与非展开经典群作用
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01490-y
John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle

For finite classical groups acting naturally on the set of points of their ambient polar spaces, the symmetry properties of synchronising and separating are equivalent to natural and well-studied problems on the existence of certain configurations in finite geometry. The more general class of spreading permutation groups is harder to describe, and it is the purpose of this paper to explore this property for finite classical groups. In particular, we show that for most finite classical groups, their natural action on the points of its polar space is non-spreading. We develop and use a result on tactical decompositions (an AB-Lemma) that provides a useful technique for finding witnesses for non-spreading permutation groups. We also consider some of the other primitive actions of the classical groups.

对于自然作用于其周围极空间点集的有限经典群来说,同步和分离的对称性质等同于有限几何中某些构型存在性的自然问题和研究得很透彻的问题。更一般的展布置换群更难描述,本文的目的是探讨有限经典群的这一性质。我们特别指出,对于大多数有限经典群来说,它们在极空间点上的自然作用是非展开的。我们发展并使用了一个关于战术分解的结果(AB-Lemma),该结果为寻找非蔓延置换群的见证提供了有用的技术。我们还考虑了经典群的其他一些原始作用。
{"title":"Tactical decompositions in finite polar spaces and non-spreading classical group actions","authors":"John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle","doi":"10.1007/s10623-024-01490-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01490-y","url":null,"abstract":"<p>For finite classical groups acting naturally on the set of points of their ambient polar spaces, the symmetry properties of <i>synchronising</i> and <i>separating</i> are equivalent to natural and well-studied problems on the existence of certain configurations in finite geometry. The more general class of <i>spreading</i> permutation groups is harder to describe, and it is the purpose of this paper to explore this property for finite classical groups. In particular, we show that for most finite classical groups, their natural action on the points of its polar space is non-spreading. We develop and use a result on tactical decompositions (an <i>AB-Lemma</i>) that provides a useful technique for finding witnesses for non-spreading permutation groups. We also consider some of the other primitive actions of the classical groups.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1