Pub Date : 2025-05-24DOI: 10.1007/s10623-025-01651-7
Javier Herranz, Germán Sáez
We consider access structures over a set of n participants, defined by a parameter k with (1 le k le n) in the following way: a subset is authorized if it contains at least k consecutive participants. Depending on whether we consider the participants placed in a line (that is, participant 1 is not next to participant n) or in a circle, we obtain two different families, that we call (k, n)-line-consecutive and (k, n)-circle-consecutive access structures, respectively. Such access structures can appear in real-life situations involving distributed cryptography, which makes it more interesting to look for the best secret sharing schemes that can realize them. For both families, we characterize which are the configurations (k, n) that admit ideal secret sharing schemes. For the non-ideal (k, n)-consecutive access structures, we give both upper and lower bounds on the information ratio of the best secret sharing schemes that can realize them. Some of these bounds are obtained after proving relations between the information ratios of access structures in the two considered families.
我们考虑由参数k用(1 le k le n)定义的n个参与者集合上的访问结构:如果一个子集包含至少k个连续的参与者,则该子集被授权。根据我们考虑的参与者是放在一条直线上(即参与者1不在参与者n旁边)还是放在一个圆上,我们得到了两个不同的族,我们分别称之为(k, n)-线连续访问结构和(k, n)-圆连续访问结构。这种访问结构可能出现在涉及分布式加密的实际情况中,这使得寻找能够实现它们的最佳秘密共享方案变得更加有趣。对于这两个族,我们描述了哪些构型(k, n)允许理想的秘密共享方案。对于非理想(k, n)连续访问结构,给出了实现它们的最佳秘密共享方案的信息比的上界和下界。在证明了两个考虑族的访问结构的信息比率之间的关系之后,得到了其中的一些界限。
{"title":"(k, n)-Consecutive access structures","authors":"Javier Herranz, Germán Sáez","doi":"10.1007/s10623-025-01651-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01651-7","url":null,"abstract":"<p>We consider access structures over a set of <i>n</i> participants, defined by a parameter <i>k</i> with <span>(1 le k le n)</span> in the following way: a subset is authorized if it contains at least <i>k</i> consecutive participants. Depending on whether we consider the participants placed in a line (that is, participant 1 is not next to participant <i>n</i>) or in a circle, we obtain two different families, that we call (<i>k</i>, <i>n</i>)-line-consecutive and (<i>k</i>, <i>n</i>)-circle-consecutive access structures, respectively. Such access structures can appear in real-life situations involving distributed cryptography, which makes it more interesting to look for the best secret sharing schemes that can realize them. For both families, we characterize which are the configurations (<i>k</i>, <i>n</i>) that admit ideal secret sharing schemes. For the non-ideal (<i>k</i>, <i>n</i>)-consecutive access structures, we give both upper and lower bounds on the information ratio of the best secret sharing schemes that can realize them. Some of these bounds are obtained after proving relations between the information ratios of access structures in the two considered families.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"56 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144130293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-24DOI: 10.1007/s10623-025-01644-6
Antonio Corbo Esposito, Rosa Fera, Francesco Romeo
In this paper, we analyze the algebraic invariants for two classes of multivariate quadratic systems: systems made by oil and vinegar quadratic polynomials and systems made by both oil and vinegar polynomials and fully-quadratic ones. For such systems, we explicitly compute the Hilbert series in the homogeneous case, and we also give bounds on the degree of regularity, solving degree and first fall degree. Such degrees can be relevant to compute the complexity of solving those systems and to estimate their cryptographic security.
{"title":"Hilbert series and degrees of regularity of Oil & Vinegar and mixed quadratic systems","authors":"Antonio Corbo Esposito, Rosa Fera, Francesco Romeo","doi":"10.1007/s10623-025-01644-6","DOIUrl":"https://doi.org/10.1007/s10623-025-01644-6","url":null,"abstract":"<p>In this paper, we analyze the algebraic invariants for two classes of multivariate quadratic systems: systems made by oil and vinegar quadratic polynomials and systems made by both oil and vinegar polynomials and fully-quadratic ones. For such systems, we explicitly compute the Hilbert series in the homogeneous case, and we also give bounds on the degree of regularity, solving degree and first fall degree. Such degrees can be relevant to compute the complexity of solving those systems and to estimate their cryptographic security.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"134 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144130235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-23DOI: 10.1007/s10623-025-01648-2
Sergey Bezzateev, Natalia Shekhunova
We consider a subclass of p-ary self-reversible generalized (L, G) codes with a locator set (L={ frac{2x-alpha }{x^2-alpha x +1},alpha in mathbb {F}_q setminus {0}, q=p^m } cup {frac{1}{x+1}}), where p is a prime number. The numerator (2x-alpha ) of a rational function is the formal derivative of the denominator (x^2-alpha x +1). The Goppa polynomial (G(x) in mathbb {F}_q[x]) of degree 2t, t being odd, is either an irreducible self-reversible polynomial of degree 2t, or a non-irreducible self-reversible polynomial of degree 2t of the form (G_1^{-1}(0)cdot G_1(x)cdot x^tcdot G_1(x^{-1})), where (G_1(x)in mathbb {F}_q[x]) is any irreducible non self-reversible polynomial of degree t. Estimates for minimum distance and redundancy are obtained for codes from this subclass. It is shown that among these codes, there are codes lying on the Gilbert–Varshamov bound. As a special case, binary codes from this subclass that contains codes lying also on Gilbert–Varshamov bound are considered.
考虑一类具有定位集(L={ frac{2x-alpha }{x^2-alpha x +1},alpha in mathbb {F}_q setminus {0}, q=p^m } cup {frac{1}{x+1}})的p元自可逆广义(L, G)码,其中p为素数。有理函数的分子(2x-alpha )是分母(x^2-alpha x +1)的形式导数。2t次的Goppa多项式(G(x) in mathbb {F}_q[x]), t为奇数,要么是2t次的不可约自可逆多项式,要么是形式为(G_1^{-1}(0)cdot G_1(x)cdot x^tcdot G_1(x^{-1}))的不可约自可逆多项式,其中(G_1(x)in mathbb {F}_q[x])为任意t次的不可约非自可逆多项式。得到了该子类码的最小距离和冗余估计。证明了在这些码中,有一些码位于吉尔伯特-瓦尔沙莫夫界上。作为一种特殊情况,考虑这个子类中包含同样位于Gilbert-Varshamov界上的码的二进制码。
{"title":"Self-reversible generalized (L,G)-codes","authors":"Sergey Bezzateev, Natalia Shekhunova","doi":"10.1007/s10623-025-01648-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01648-2","url":null,"abstract":"<p>We consider a subclass of <i>p</i>-ary self-reversible generalized (<i>L</i>, <i>G</i>) codes with a locator set <span>(L={ frac{2x-alpha }{x^2-alpha x +1},alpha in mathbb {F}_q setminus {0}, q=p^m } cup {frac{1}{x+1}})</span>, where <i>p</i> is a prime number. The numerator <span>(2x-alpha )</span> of a rational function is the formal derivative of the denominator <span>(x^2-alpha x +1)</span>. The Goppa polynomial <span>(G(x) in mathbb {F}_q[x])</span> of degree 2<i>t</i>, <i>t</i> being odd, is either an irreducible self-reversible polynomial of degree 2<i>t</i>, or a non-irreducible self-reversible polynomial of degree 2<i>t</i> of the form <span>(G_1^{-1}(0)cdot G_1(x)cdot x^tcdot G_1(x^{-1}))</span>, where <span>(G_1(x)in mathbb {F}_q[x])</span> is any irreducible non self-reversible polynomial of degree <i>t</i>. Estimates for minimum distance and redundancy are obtained for codes from this subclass. It is shown that among these codes, there are codes lying on the Gilbert–Varshamov bound. As a special case, binary codes from this subclass that contains codes lying also on Gilbert–Varshamov bound are considered.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"45 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144123081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-20DOI: 10.1007/s10623-025-01647-3
B. G. Rodrigues, Patrick Solé
Let G be a primitive rank 3 permutation group acting on a set of size v. Binary codes of length v globally invariant under G are well-known to hold PBIBDs in their (A_w) codewords of weight w. The parameters of these designs are (bigg (A_w,v,w,frac{wA_w}{v},lambda _1,lambda _2bigg ).) When (lambda _1=lambda _2=lambda ,) the PBIBD becomes a 2-((v,w,lambda )) design. We obtain computationally 111 such designs when G ranges over (textrm{L}_2(8){:}3, textrm{U}_{4}(2), textrm{U}_{3}(3){:}2, textrm{A}_8, textrm{S}_6(2),)(textrm{S}_{4}(4), textrm{U}_{5}(2), textrm{M}_{11}, textrm{M}_{22}, textrm{HS}, textrm{G}_2(4), textrm{S}_{8}(2),textrm{O}^{+}_{10}(2),) and (textrm{O}^{-}_{10}(2)) in the notation of the Atlas. Included in the counting are 2-designs which are held by nonzero weight codewords of the binary adjacency codes of the triangular and square lattice graphs, respectively. The 2-designs in this paper can be obtained neither from Assmus–Mattson theorem, nor by the classical 2-tra nsitivity (or 2-homogeneity) argument of the automorphism group of the code. Further, the extensions of the codes that hold 2-designs sometimes hold 3-designs. We thus obtain nine self-complementary 3-designs on 16 (4), (28,, 36) (2), (,56,, 176) points respectively. The design on 176 points is invariant under the Higman–Sims group.
{"title":"Primitive rank 3 groups, binary codes, and 3-designs","authors":"B. G. Rodrigues, Patrick Solé","doi":"10.1007/s10623-025-01647-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01647-3","url":null,"abstract":"<p>Let <i>G</i> be a primitive rank 3 permutation group acting on a set of size <i>v</i>. Binary codes of length <i>v</i> globally invariant under <i>G</i> are well-known to hold PBIBDs in their <span>(A_w)</span> codewords of weight <i>w</i>. The parameters of these designs are <span>(bigg (A_w,v,w,frac{wA_w}{v},lambda _1,lambda _2bigg ).)</span> When <span>(lambda _1=lambda _2=lambda ,)</span> the PBIBD becomes a 2-<span>((v,w,lambda ))</span> design. We obtain computationally 111 such designs when <i>G</i> ranges over <span>(textrm{L}_2(8){:}3, textrm{U}_{4}(2), textrm{U}_{3}(3){:}2, textrm{A}_8, textrm{S}_6(2),)</span> <span>(textrm{S}_{4}(4), textrm{U}_{5}(2), textrm{M}_{11}, textrm{M}_{22}, textrm{HS}, textrm{G}_2(4), textrm{S}_{8}(2),textrm{O}^{+}_{10}(2),)</span> and <span>(textrm{O}^{-}_{10}(2))</span> in the notation of the Atlas. Included in the counting are 2-designs which are held by nonzero weight codewords of the binary adjacency codes of the triangular and square lattice graphs, respectively. The 2-designs in this paper can be obtained neither from Assmus–Mattson theorem, nor by the classical 2-tra nsitivity (or 2-homogeneity) argument of the automorphism group of the code. Further, the extensions of the codes that hold 2-designs sometimes hold 3-designs. We thus obtain nine self-complementary 3-designs on 16 (4), <span>(28,, 36)</span> (2), <span>(,56,, 176)</span> points respectively. The design on 176 points is invariant under the Higman–Sims group.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"40 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144097130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-20DOI: 10.1007/s10623-025-01649-1
Niklas Gassner, Julia Lieb, Abhinaba Mazumder, Michael Schaller
In this paper, we present a framework for generic decoding of convolutional codes, which allows us to do cryptanalysis of code-based systems that use convolutional codes as public keys. We then apply this framework to information set decoding, study success probabilities and give tools to choose variables. Finally, we use this to attack two cryptosystems based on convolutional codes. In the case of Bolkema et al. (Variations of the McEliece cryptosystem. In: Algebraic geometry for coding theory and cryptography: IPAM, Los Angeles, CA, Feb 2016. Springer, Cham, pp 129-150, 2017. https://doi.org/10.1007/978-3-319-63931-4_5), our code recovered about 74% of errors in less than 10 h each, and in the case of Almeida et al. (Smaller keys for code-based cryptography: McEliece cryptosystems with convolutional encoders. CoRR abs/2104.06809, 2021. arXiv: https://arxiv.org/abs/2104.06809v1), we give experimental evidence that 80% of the errors can be recovered in times corresponding to about 70 bits of operational security, with some instances being significantly lower.
{"title":"Information-set decoding for convolutional codes","authors":"Niklas Gassner, Julia Lieb, Abhinaba Mazumder, Michael Schaller","doi":"10.1007/s10623-025-01649-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01649-1","url":null,"abstract":"<p>In this paper, we present a framework for generic decoding of convolutional codes, which allows us to do cryptanalysis of code-based systems that use convolutional codes as public keys. We then apply this framework to information set decoding, study success probabilities and give tools to choose variables. Finally, we use this to attack two cryptosystems based on convolutional codes. In the case of Bolkema et al. (Variations of the McEliece cryptosystem. In: Algebraic geometry for coding theory and cryptography: IPAM, Los Angeles, CA, Feb 2016. Springer, Cham, pp 129-150, 2017. https://doi.org/10.1007/978-3-319-63931-4_5), our code recovered about 74% of errors in less than 10 h each, and in the case of Almeida et al. (Smaller keys for code-based cryptography: McEliece cryptosystems with convolutional encoders. CoRR abs/2104.06809, 2021. arXiv: https://arxiv.org/abs/2104.06809v1), we give experimental evidence that 80% of the errors can be recovered in times corresponding to about 70 bits of operational security, with some instances being significantly lower.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"4 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144097131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-15DOI: 10.1007/s10623-025-01634-8
Zuo Ye, Omer Sabary, Ryan Gabrys, Eitan Yaakobi, Ohad Elishco
In this paper, we focus on constructing unique-decodable and list-decodable codes for the recently studied (t, e)-composite-asymmetric error-correcting codes ((t, e)-CAECCs). Let (mathcal {X}) be an (m times n) binary matrix in which each row has Hamming weight w. If at most t rows of (mathcal {X}) contain errors, and in each erroneous row, there are at most e occurrences of (1 rightarrow 0) errors, we say that a (t, e)-composite-asymmetric error occurs in (mathcal {X}). For general values of m, n, w, t, and e, we propose new constructions of (t, e)-CAECCs with redundancy at most ((t-1)log (m) + O(1)), where O(1) is independent of the code length m. In particular, this yields a class of (2, e)-CAECCs that are optimal in terms of redundancy. When m is a prime power, the redundancy can be further reduced to ((t-1)log (m) - O(log (m))). To further increase the code size, we introduce a combinatorial object called a weak (B_e)-set. When (e = w), we present an efficient encoding and decoding method for our codes. Finally, we explore potential improvements by relaxing the requirement of unique decoding to list-decoding. We show that when the list size is t! or an exponential function of t, there exist list-decodable (t, e)-CAECCs with constant redundancy. When the list size is two, we construct list-decodable (3, 2)-CAECCs with redundancy (log (m) + O(1)).
{"title":"More on codes for combinatorial composite DNA","authors":"Zuo Ye, Omer Sabary, Ryan Gabrys, Eitan Yaakobi, Ohad Elishco","doi":"10.1007/s10623-025-01634-8","DOIUrl":"https://doi.org/10.1007/s10623-025-01634-8","url":null,"abstract":"<p>In this paper, we focus on constructing unique-decodable and list-decodable codes for the recently studied (<i>t</i>, <i>e</i>)-composite-asymmetric error-correcting codes ((<i>t</i>, <i>e</i>)-CAECCs). Let <span>(mathcal {X})</span> be an <span>(m times n)</span> binary matrix in which each row has Hamming weight <i>w</i>. If at most <i>t</i> rows of <span>(mathcal {X})</span> contain errors, and in each erroneous row, there are at most <i>e</i> occurrences of <span>(1 rightarrow 0)</span> errors, we say that a (<i>t</i>, <i>e</i>)-composite-asymmetric error occurs in <span>(mathcal {X})</span>. For general values of <i>m</i>, <i>n</i>, <i>w</i>, <i>t</i>, and <i>e</i>, we propose new constructions of (<i>t</i>, <i>e</i>)-CAECCs with redundancy at most <span>((t-1)log (m) + O(1))</span>, where <i>O</i>(1) is independent of the code length <i>m</i>. In particular, this yields a class of (2, <i>e</i>)-CAECCs that are optimal in terms of redundancy. When <i>m</i> is a prime power, the redundancy can be further reduced to <span>((t-1)log (m) - O(log (m)))</span>. To further increase the code size, we introduce a combinatorial object called a weak <span>(B_e)</span>-set. When <span>(e = w)</span>, we present an efficient encoding and decoding method for our codes. Finally, we explore potential improvements by relaxing the requirement of unique decoding to list-decoding. We show that when the list size is <i>t</i>! or an exponential function of <i>t</i>, there exist list-decodable (<i>t</i>, <i>e</i>)-CAECCs with constant redundancy. When the list size is two, we construct list-decodable (3, 2)-CAECCs with redundancy <span>(log (m) + O(1))</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144066263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-14DOI: 10.1007/s10623-025-01643-7
Gretchen L. Matthews, Emily McMillon
Bit Flipping Key Encapsulation (BIKE) is a code-based cryptosystem that was considered in Round 4 of the NIST Post-Quantum Cryptography Standardization process. It is based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes paired with an iterative decoder. While (low-density) parity-check codes have been shown to perform well in practice, their capabilities are governed by the code’s graphical representation and the choice of decoder rather than the traditional code parameters, making it difficult to determine the decoder failure rate (DFR). Moreover, decoding failures have been demonstrated to lead to attacks that recover the BIKE private key. In this paper, we demonstrate a strong correlation between weak keys and 4-cycles in their associated Tanner graphs. We give concrete ways to enumerate the number of 4-cycles in a BIKE key and use these results to present a filtering algorithm that will filter BIKE keys with large numbers of 4-cycles. These results also apply to more general parity check codes.
{"title":"A combinatorial approach to avoiding weak keys in the BIKE cryptosystem","authors":"Gretchen L. Matthews, Emily McMillon","doi":"10.1007/s10623-025-01643-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01643-7","url":null,"abstract":"<p>Bit Flipping Key Encapsulation (BIKE) is a code-based cryptosystem that was considered in Round 4 of the NIST Post-Quantum Cryptography Standardization process. It is based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes paired with an iterative decoder. While (low-density) parity-check codes have been shown to perform well in practice, their capabilities are governed by the code’s graphical representation and the choice of decoder rather than the traditional code parameters, making it difficult to determine the decoder failure rate (DFR). Moreover, decoding failures have been demonstrated to lead to attacks that recover the BIKE private key. In this paper, we demonstrate a strong correlation between weak keys and 4-cycles in their associated Tanner graphs. We give concrete ways to enumerate the number of 4-cycles in a BIKE key and use these results to present a filtering algorithm that will filter BIKE keys with large numbers of 4-cycles. These results also apply to more general parity check codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"52 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143945973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-12DOI: 10.1007/s10623-025-01637-5
Barbara Gatti, Gábor Korchmáros, Gábor P. Nagy, Vincenzo Pallozzi Lavorante, Gioia Schulte
Datta and Johnsen (Des Codes Cryptogr 91:747–761, 2023) introduced a new family of evaluation codes in an affine space of dimension (ge 2) over a finite field ({mathbb {F}}_q) where linear combinations of elementary symmetric polynomials are evaluated on the set of all points with pairwise distinct coordinates. In this paper, we propose a generalization by taking low dimensional linear systems of symmetric polynomials. Computation for small values of (q=7,9) shows that carefully chosen generalized Datta–Johnsen codes (left[ frac{1}{2}q(q-1),3,dright] ) have minimum distance d equal to the optimal value minus 1.
{"title":"Evaluation codes arising from symmetric polynomials","authors":"Barbara Gatti, Gábor Korchmáros, Gábor P. Nagy, Vincenzo Pallozzi Lavorante, Gioia Schulte","doi":"10.1007/s10623-025-01637-5","DOIUrl":"https://doi.org/10.1007/s10623-025-01637-5","url":null,"abstract":"<p>Datta and Johnsen (Des Codes Cryptogr 91:747–761, 2023) introduced a new family of evaluation codes in an affine space of dimension <span>(ge 2)</span> over a finite field <span>({mathbb {F}}_q)</span> where linear combinations of elementary symmetric polynomials are evaluated on the set of all points with pairwise distinct coordinates. In this paper, we propose a generalization by taking low dimensional linear systems of symmetric polynomials. Computation for small values of <span>(q=7,9)</span> shows that carefully chosen generalized Datta–Johnsen codes <span>(left[ frac{1}{2}q(q-1),3,dright] )</span> have minimum distance <i>d</i> equal to the optimal value minus 1.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"41 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143940084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-05-12DOI: 10.1007/s10623-025-01641-9
Chun Guo, Xiao Wang, Kang Yang, Yu Yu
We continue the study of blockcipher-based (tweakable) correlation robust hash functions, which are central building blocks of circuit garbling and oblivious-transfer extension schemes. Motivated by Roy (CRYPTO 2022), we first enhance the multi-user tweakable correlation robust notion of Guo et al. (CRYPTO 2020) with a key leaking oracle that tells the adversary whether a certain user key satisfies adversarially-chosen predicates. We then investigate the state-of-the-art hash construction of Guo et al. with respect to our new security definition, providing security proof as well as attacks in relevant settings. As an application, we exhibit an OT extension protocol with non-trivial multi-user security.
{"title":"On tweakable correlation robust hashing against key leakages","authors":"Chun Guo, Xiao Wang, Kang Yang, Yu Yu","doi":"10.1007/s10623-025-01641-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01641-9","url":null,"abstract":"<p>We continue the study of blockcipher-based (tweakable) correlation robust hash functions, which are central building blocks of circuit garbling and oblivious-transfer extension schemes. Motivated by Roy (CRYPTO 2022), we first enhance the multi-user tweakable correlation robust notion of Guo et al. (CRYPTO 2020) with a <i>key leaking oracle</i> that tells the adversary whether a certain user key satisfies adversarially-chosen predicates. We then investigate the state-of-the-art hash construction of Guo et al. with respect to our new security definition, providing security proof as well as attacks in relevant settings. As an application, we exhibit an OT extension protocol with non-trivial multi-user security.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"3 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143933568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}