首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
On the maximum size of ultrametric orthogonal sets over discrete valued fields 论离散值域上超对称正交集的最大尺寸
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-16 DOI: 10.1007/s10623-024-01480-0
Noy Soffer Aranov, Angelot Behajaina

Let ({mathcal {K}}) be a discrete valued field with finite residue field. In analogy with orthogonality in the Euclidean space ({mathbb {R}}^n), there is a well-studied notion of “ultrametric orthogonality” in ({mathcal {K}}^n). In this paper, motivated by a question of Erdős in the real case, given integers (k ge ell ge 2), we investigate the maximum size of a subset (S subseteq {mathcal {K}}^n {setminus }{textbf{0}}) satisfying the following property: for any (E subseteq S) of size k, there exists (F subseteq E) of size (ell ) such that any two distinct vectors in F are orthogonal. Other variants of this property are also studied.

让 ({mathcal {K}}) 是一个具有有限残差域的离散值域。与欧几里得空间 ({mathbb {R}}^n) 中的正交性类似,在 ({mathcal {K}}^n) 中存在一个研究得很透彻的 "超对称正交性 "概念。在本文中,受厄多(Erdős)在实数情况下提出的一个问题的启发,在给定整数 (k ge ell ge 2 )的情况下,我们研究了满足以下性质的子集 (S subseteq {mathcal {K}}^n {setminus }{textbf{0}} )的最大大小:对于任何大小为k的E子集,都存在大小为(ell)的F子集,这样F中任何两个不同的向量都是正交的。我们还研究了这一性质的其他变体。
{"title":"On the maximum size of ultrametric orthogonal sets over discrete valued fields","authors":"Noy Soffer Aranov, Angelot Behajaina","doi":"10.1007/s10623-024-01480-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01480-0","url":null,"abstract":"<p>Let <span>({mathcal {K}})</span> be a discrete valued field with finite residue field. In analogy with orthogonality in the Euclidean space <span>({mathbb {R}}^n)</span>, there is a well-studied notion of “ultrametric orthogonality” in <span>({mathcal {K}}^n)</span>. In this paper, motivated by a question of Erdős in the real case, given integers <span>(k ge ell ge 2)</span>, we investigate the maximum size of a subset <span>(S subseteq {mathcal {K}}^n {setminus }{textbf{0}})</span> satisfying the following property: for any <span>(E subseteq S)</span> of size <i>k</i>, there exists <span>(F subseteq E)</span> of size <span>(ell )</span> such that any two distinct vectors in <i>F</i> are orthogonal. Other variants of this property are also studied.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"58 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141992048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New distance bounds for quasi-cyclic codes 准循环码的新距离界限
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-14 DOI: 10.1007/s10623-024-01464-0
Ferruh Özbudak, Buket Özkaya

We consider the minimum weight of codewords in a quasi-cyclic code and characterize the estimate in its most general setup using their concatenated structure. The new bound we derive generalizes the Jensen and Güneri–Özbudak bounds and it holds for the more general class of multilevel concatenated codes.

我们考虑了准循环码中码字的最小权重,并利用它们的串联结构描述了最一般情况下的估计值。我们推导出的新界限概括了詹森界限和居内利-厄兹布达克界限,它适用于更一般的多级连接码。
{"title":"New distance bounds for quasi-cyclic codes","authors":"Ferruh Özbudak, Buket Özkaya","doi":"10.1007/s10623-024-01464-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01464-0","url":null,"abstract":"<p>We consider the minimum weight of codewords in a quasi-cyclic code and characterize the estimate in its most general setup using their concatenated structure. The new bound we derive generalizes the Jensen and Güneri–Özbudak bounds and it holds for the more general class of multilevel concatenated codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"18 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141980986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal $$(2,delta )$$ locally repairable codes via punctured simplex codes 通过穿刺单纯形码实现最优 $$(2,delta )$$ 本地可修复码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-12 DOI: 10.1007/s10623-024-01470-2
Yuan Gao, Weijun Fang, Jingke Xu, Dong Wang, Sihuang Hu

Locally repairable codes (LRCs) have attracted a lot of attention due to their applications in distributed storage systems. In this paper, we provide new constructions of optimal ((2, delta ))-LRCs over (mathbb {F}_q) with flexible parameters. Firstly, employing techniques from finite geometry, we introduce a simple yet useful condition to ensure that a punctured simplex code becomes a ((2, delta ))-LRC. It is worth noting that this condition only imposes a requirement on the size of the puncturing set. Secondly, utilizing character sums over finite fields and Krawtchouk polynomials, we determine the parameters of more punctured simplex codes with puncturing sets of new structures. Several infinite families of LRCs with new parameters are derived. All of our new LRCs are optimal with respect to the generalized Cadambe–Mazumdar bound and some of them are also Griesmer codes or distance-optimal codes.

局部可修复代码(LRC)因其在分布式存储系统中的应用而备受关注。在本文中,我们提供了具有灵活参数的最优((2, delta ))-LRCs的新构造。首先,利用有限几何的技术,我们引入了一个简单而有用的条件,以确保一个点状简并码成为一个((2, delta)-LRC。值得注意的是,这个条件只对穿刺集的大小提出了要求。其次,我们利用有限域上的特征和以及 Krawtchouk 多项式,确定了具有新结构的穿刺集的更多穿刺简并码的参数。我们推导出了几个具有新参数的无穷序列 LRC。我们的所有新 LRC 都是广义卡当贝-马祖姆达尔约束的最优码,其中一些还是格里斯梅尔码或距离最优码。
{"title":"Optimal $$(2,delta )$$ locally repairable codes via punctured simplex codes","authors":"Yuan Gao, Weijun Fang, Jingke Xu, Dong Wang, Sihuang Hu","doi":"10.1007/s10623-024-01470-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01470-2","url":null,"abstract":"<p>Locally repairable codes (LRCs) have attracted a lot of attention due to their applications in distributed storage systems. In this paper, we provide new constructions of optimal <span>((2, delta ))</span>-LRCs over <span>(mathbb {F}_q)</span> with flexible parameters. Firstly, employing techniques from finite geometry, we introduce a simple yet useful condition to ensure that a punctured simplex code becomes a <span>((2, delta ))</span>-LRC. It is worth noting that this condition only imposes a requirement on the size of the puncturing set. Secondly, utilizing character sums over finite fields and Krawtchouk polynomials, we determine the parameters of more punctured simplex codes with puncturing sets of new structures. Several infinite families of LRCs with new parameters are derived. All of our new LRCs are optimal with respect to the generalized Cadambe–Mazumdar bound and some of them are also Griesmer codes or distance-optimal codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"191 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141918770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional commitments for arbitrary circuits of bounded sizes 大小有界的任意电路的功能承诺
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-12 DOI: 10.1007/s10623-024-01468-w
Jinrui Sha, Shengli Liu, Shuai Han

A functional commitment (FC) scheme enables committing to a vector ({textbf{x}}) and later producing an opening proof (pi ) for a function value (y=f({textbf{x}})) with function f in some function set ({mathcal {F}}). Everyone can verify the validity of the opening proof (pi ) w.r.t. the function f and the function value y. Up to now, the largest function set is the bounded-depth circuits and achieved by FC schemes in [Peikeit et al. TCC 2021, De Castro et al. TCC 2023, Wee et al. Eurocrypt 2023, Wee et al. Asiacrypt 2023] with the help of the homomorphic encoding and evaluation techniques from lattices. In fact, these FC schemes can hardly support circuits of large depth, due to the fast accumulation of noises in the homomorphic evaluations. For example, if the depth of the circuit is linear to the security parameter (lambda ), then the underlying (textsf {GapSVP}_{gamma }) problem will be accompanied with a super-exponentially large parameter (gamma >(lambda log lambda )^{Theta (lambda )}) and can be easily solved by the LLL algorithm. In this work, we propose a new FC scheme supporting arbitrary circuits of bounded sizes. We make use of homomorphic encoding and evaluation as well, but we disassemble the circuit gate by gate, process the gates, and reassemble the processed gates to a flattened circuit of logarithm depth (O(log lambda )). This makes possible for our FC scheme to support arbitrary polynomial-size circuits. Our FC scheme has the common reference string (CRS) growing linear to the size of the circuit. So CRSs of different sizes allow our FC scheme to support circuits of different (bounded) sizes. Just like the recent work on FC schemes [Wee et al. Eurocrypt 2023, Asiacrypt 2023], our FC scheme achieves private opening and target binding based on a falsifiable family of “basis-augmented” SIS assumptions. Our FC scheme has succinct commitment but not succinct opening proof which of course does not support fast verification. To improve the running time of verification, we resort to the non-interactive GKR protocol to outsource the main computation in verification to the proof generation algorithm. As a result, we obtain an improved FC scheme which decreases the computational complexity of verification with a factor (O(lambda )).

功能承诺(FC)方案能够承诺一个向量({textbf{x}}),之后为函数值(y=f({textbf{x}}))生成一个开局证明(pi ),函数f在某个函数集({mathcal {F}})中。到目前为止,最大的函数集是有界深度电路,并且是在[Peikeit et al. TCC 2021, De Castro et al. TCC 2023, Wee et al. Eurocrypt 2023, Wee et al. Asiacrypt 2023]的 FC 方案中借助同态编码和网格评估技术实现的。事实上,这些 FC 方案很难支持大深度电路,因为同态评估中的噪声会快速积累。例如,如果电路的深度与安全参数(lambda )呈线性关系,那么底层的(textsf {GapSVP}_{gamma } )问题将伴随着一个超指数大参数(gamma >(lambda log lambda )^{Theta(lambda )}),并且可以通过 LLL 算法轻松解决。在这项工作中,我们提出了一种新的 FC 方案,支持大小有界的任意电路。我们也使用了同态编码和评估,但我们逐个门拆解电路,处理门,并将处理过的门重新组装成对数深度为 (O(log lambda )) 的扁平化电路。这使得我们的 FC 方案可以支持任意多项式大小的电路。我们的 FC 方案的公共参考字符串(CRS)与电路的大小呈线性增长。因此,不同大小的 CRS 可以让我们的 FC 方案支持不同(有界)大小的电路。就像最近关于 FC 方案的研究一样[Wee 等人,Eurocrypt 2023,Asiacrypt 2023],我们的 FC 方案基于可证伪的 "基础增强 "SIS 假设系列,实现了私人开启和目标绑定。我们的 FC 方案有简洁的承诺,但没有简洁的开启证明,这当然不支持快速验证。为了改进验证的运行时间,我们采用了非交互式 GKR 协议,将验证中的主要计算外包给证明生成算法。因此,我们得到了一种改进的 FC 方案,它将验证的计算复杂度降低了 (O(lambda )) 倍。
{"title":"Functional commitments for arbitrary circuits of bounded sizes","authors":"Jinrui Sha, Shengli Liu, Shuai Han","doi":"10.1007/s10623-024-01468-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01468-w","url":null,"abstract":"<p>A functional commitment (FC) scheme enables committing to a vector <span>({textbf{x}})</span> and later producing an opening proof <span>(pi )</span> for a function value <span>(y=f({textbf{x}}))</span> with function <i>f</i> in some function set <span>({mathcal {F}})</span>. Everyone can verify the validity of the opening proof <span>(pi )</span> w.r.t. the function <i>f</i> and the function value <i>y</i>. Up to now, the largest function set is the bounded-depth circuits and achieved by FC schemes in [Peikeit et al. TCC 2021, De Castro et al. TCC 2023, Wee et al. Eurocrypt 2023, Wee et al. Asiacrypt 2023] with the help of the homomorphic encoding and evaluation techniques from lattices. In fact, these FC schemes can hardly support circuits of large depth, due to the fast accumulation of noises in the homomorphic evaluations. For example, if the depth of the circuit is linear to the security parameter <span>(lambda )</span>, then the underlying <span>(textsf {GapSVP}_{gamma })</span> problem will be accompanied with a super-exponentially large parameter <span>(gamma &gt;(lambda log lambda )^{Theta (lambda )})</span> and can be easily solved by the LLL algorithm. In this work, we propose a new FC scheme supporting arbitrary circuits of bounded sizes. We make use of homomorphic encoding and evaluation as well, but we disassemble the circuit gate by gate, process the gates, and reassemble the processed gates to a flattened circuit of logarithm depth <span>(O(log lambda ))</span>. This makes possible for our FC scheme to support arbitrary polynomial-size circuits. Our FC scheme has the common reference string (CRS) growing linear to the size of the circuit. So CRSs of different sizes allow our FC scheme to support circuits of different (bounded) sizes. Just like the recent work on FC schemes [Wee et al. Eurocrypt 2023, Asiacrypt 2023], our FC scheme achieves private opening and target binding based on a falsifiable family of “basis-augmented” SIS assumptions. Our FC scheme has succinct commitment but not succinct opening proof which of course does not support fast verification. To improve the running time of verification, we resort to the non-interactive GKR protocol to outsource the main computation in verification to the proof generation algorithm. As a result, we obtain an improved FC scheme which decreases the computational complexity of verification with a factor <span>(O(lambda ))</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"43 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141918778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Involutions of finite abelian groups with explicit constructions on finite fields 有限无边群的卷积与有限域上的显式构造
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-12 DOI: 10.1007/s10623-024-01474-y
Ruikai Chen, Sihem Mesnager

In this paper, we study properties and constructions of a general family of involutions of finite abelian groups, especially those of finite fields. The involutions we are interested in have the form (lambda +gcirc tau ), where (lambda ) and (tau ) are endomorphisms of a finite abelian group and g is an arbitrary map on this group. We present some involutions explicitly written as polynomials for the special cases of multiplicative and additive groups of finite fields.

在本文中,我们将研究有限无边群,尤其是有限域的无边群的一般渐开线族的性质和构造。我们感兴趣的渐开线具有 (lambda +gcirc tau )的形式,其中 (lambda )和 (tau )是有限无边际群的内变形,g是这个群上的任意映射。对于有限域的乘法群和加法群的特殊情况,我们提出了一些明确写成多项式的渐开线。
{"title":"Involutions of finite abelian groups with explicit constructions on finite fields","authors":"Ruikai Chen, Sihem Mesnager","doi":"10.1007/s10623-024-01474-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01474-y","url":null,"abstract":"<p>In this paper, we study properties and constructions of a general family of involutions of finite abelian groups, especially those of finite fields. The involutions we are interested in have the form <span>(lambda +gcirc tau )</span>, where <span>(lambda )</span> and <span>(tau )</span> are endomorphisms of a finite abelian group and <i>g</i> is an arbitrary map on this group. We present some involutions explicitly written as polynomials for the special cases of multiplicative and additive groups of finite fields.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"5 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141973838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An algebraic algorithm for breaking NTRU with multiple keys 破解多密钥 NTRU 的代数算法
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-10 DOI: 10.1007/s10623-024-01473-z
Shi Bai, Hansraj Jangir, Tran Ngo, William Youmans

We describe a heuristic polynomial-time algorithm for breaking the NTRU problem with multiple keys when given a sufficient number of ring samples. Following the linearization approach of the Arora-Ge algorithm (ICALP ’11), our algorithm constructs a system of linear equations using the public keys. Our main contribution is a kernel reduction technique that extracts the secret vector from a linear space of rank n, where n is the degree of the ring in which NTRU is defined. Compared to the algorithm of Kim-Lee (Designs, Codes and Cryptography, ’23), our algorithm does not require prior knowledge of the Hamming weight of the secret keys. Our algorithm is based on some plausible heuristics. We demonstrate experiments and show that the algorithm works quite well in practice, with close to cryptographic parameters.

我们描述了一种启发式多项式时间算法,用于在给定足够数量的环样本时破解多密钥 NTRU 问题。按照 Arora-Ge 算法(ICALP '11)的线性化方法,我们的算法使用公开密钥构建了一个线性方程组。我们的主要贡献在于内核缩减技术,它能从秩为 n 的线性空间中提取秘密向量,其中 n 是定义 NTRU 的环的阶数。与 Kim-Lee 的算法(《设计、编码和密码学》,'23)相比,我们的算法不需要事先知道秘钥的汉明权重。我们的算法基于一些可信的启发式方法。我们演示了实验,结果表明该算法在实际应用中效果很好,与加密参数接近。
{"title":"An algebraic algorithm for breaking NTRU with multiple keys","authors":"Shi Bai, Hansraj Jangir, Tran Ngo, William Youmans","doi":"10.1007/s10623-024-01473-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01473-z","url":null,"abstract":"<p>We describe a heuristic polynomial-time algorithm for breaking the NTRU problem with multiple keys when given a sufficient number of ring samples. Following the linearization approach of the Arora-Ge algorithm (<i>ICALP ’11</i>), our algorithm constructs a system of linear equations using the public keys. Our main contribution is a kernel reduction technique that extracts the secret vector from a linear space of rank <i>n</i>, where <i>n</i> is the degree of the ring in which NTRU is defined. Compared to the algorithm of Kim-Lee (<i>Designs, Codes and Cryptography, ’23</i>), our algorithm does not require prior knowledge of the Hamming weight of the secret keys. Our algorithm is based on some plausible heuristics. We demonstrate experiments and show that the algorithm works quite well in practice, with close to cryptographic parameters.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"303 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141915205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a classification of permutation binomials of the form $$x^i+ax$$ over $${mathbb {F}}_{2^n}$$ 对 $${mathbb {F}}_{2^n}$ 上 $$x^i+ax$ 形式的置换二项式进行分类
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-09 DOI: 10.1007/s10623-024-01462-2
Yi Li, Xiutao Feng, Qiang Wang

Permutation polynomials with few terms (especially permutation binomials) attract many people due to their simple algebraic structure. Despite the great interests in the study of permutation binomials, a complete characterization of permutation binomials is still unknown. Let (q=2^n) for a positive integer n. In this paper, we start classifying permutation binomials of the form (x^i+ax) over ({mathbb {F}}_{q}) in terms of their indices. After carrying out an exhaustive search of these permutation binomials over ({mathbb {F}}_{2^n}) for n up to 12, we gave three new infinite classes of permutation binomials over ({mathbb {F}}_{q^2}), ({mathbb {F}}_{q^3}), and ({mathbb {F}}_{q^4}) respectively, for (q=2^n) with arbitrary positive integer n. In particular, these binomials over ({mathbb {F}}_{q^3}) have relatively large index (frac{q^2+q+1}{3}). As an application, we can completely explain all the permutation binomials of the form (x^i+ax) over ({mathbb {F}}_{2^n}) for (nle 8). Moreover, we prove that there does not exist permutation binomials of the form (x^{2q^3+2q^2+2q+3}+ax) over ({mathbb {F}}_{q^4}) such that (ain {mathbb {F}}_{q^4}^*) and (n=2,m) with (mge 2).

少项的置换多项式(尤其是置换二项式)因其简单的代数结构吸引着许多人。尽管人们对置换二项式的研究兴趣浓厚,但置换二项式的完整表征仍然是未知的。让 (q=2^n) 为一个正整数 n。在本文中,我们开始从指数的角度对 ({mathbb {F}}_{q}) 上的 (x^i+ax) 形式的置换二项式进行分类。在对({mathbb {F}}_{2^n}) 上的这些置换二项式进行了 n 至 12 的穷举搜索之后,我们给出了三个新的无穷置换二项式类、对于任意正整数 n 的 (q=2^n) ,我们分别给出了 ({mathbb {F}_{q^2}), ({mathbb {F}_{q^3}) 和 ({mathbb {F}_{q^4}) 上的三个新的无穷类置换二项式。特别是,这些在 ({mathbb {F}}_{q^3}) 上的二项式具有相对较大的索引 (frac{q^2+q+1}{3})。作为应用,我们可以完全解释 (nle 8) 的 ({mathbb {F}}_{2^n}) 上所有形式为 (x^i+ax) 的置换二项式。此外,我们证明不存在形式为(x^{2q^3+2q^2+2q+3}+ax) over({mathbb {F}}_{q^4}) such that (ain {mathbb {F}}_{q^4}^*) and(n=2,m) with (mge 2) 的置换二项式。
{"title":"Towards a classification of permutation binomials of the form $$x^i+ax$$ over $${mathbb {F}}_{2^n}$$","authors":"Yi Li, Xiutao Feng, Qiang Wang","doi":"10.1007/s10623-024-01462-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01462-2","url":null,"abstract":"<p>Permutation polynomials with few terms (especially permutation binomials) attract many people due to their simple algebraic structure. Despite the great interests in the study of permutation binomials, a complete characterization of permutation binomials is still unknown. Let <span>(q=2^n)</span> for a positive integer <i>n</i>. In this paper, we start classifying permutation binomials of the form <span>(x^i+ax)</span> over <span>({mathbb {F}}_{q})</span> in terms of their indices. After carrying out an exhaustive search of these permutation binomials over <span>({mathbb {F}}_{2^n})</span> for <i>n</i> up to 12, we gave three new infinite classes of permutation binomials over <span>({mathbb {F}}_{q^2})</span>, <span>({mathbb {F}}_{q^3})</span>, and <span>({mathbb {F}}_{q^4})</span> respectively, for <span>(q=2^n)</span> with arbitrary positive integer <i>n</i>. In particular, these binomials over <span>({mathbb {F}}_{q^3})</span> have relatively large index <span>(frac{q^2+q+1}{3})</span>. As an application, we can completely explain all the permutation binomials of the form <span>(x^i+ax)</span> over <span>({mathbb {F}}_{2^n})</span> for <span>(nle 8)</span>. Moreover, we prove that there does not exist permutation binomials of the form <span>(x^{2q^3+2q^2+2q+3}+ax)</span> over <span>({mathbb {F}}_{q^4})</span> such that <span>(ain {mathbb {F}}_{q^4}^*)</span> and <span>(n=2,m)</span> with <span>(mge 2)</span>.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"72 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141909300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduction for block-transitive t- $$(k^2,k,lambda )$$ designs 块传递 t- $$(k^2,k,lambda )$$ 设计的还原
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-09 DOI: 10.1007/s10623-024-01477-9
Haiyan Guan, Shenglin Zhou

In this paper, we study block-transitive automorphism groups of t-((k^2,k,lambda )) designs. We prove that a block-transitive automorphism group G of a t-((k^2,k,lambda )) design must be point-primitive, and G is either an affine group or an almost simple group. Moreover, the nontrivial t-((k^2,k,lambda )) designs admitting block-transitive automorphism groups of almost simple type with sporadic socle and alternating socle are classified.

在本文中,我们研究了 t-((k^2,k,lambda ) 设计的块变换自变群。我们证明了 t-((k^2,k,lambda ) 设计的块变换自变群 G 必须是点原始的,并且 G 要么是仿射群,要么是近似简单群。此外,我们还对容许具有零星社会群和交替社会群的几乎简单类型的块传递自变群的非难t-((k^2,k,lambda )设计进行了分类。
{"title":"Reduction for block-transitive t- $$(k^2,k,lambda )$$ designs","authors":"Haiyan Guan, Shenglin Zhou","doi":"10.1007/s10623-024-01477-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01477-9","url":null,"abstract":"<p>In this paper, we study block-transitive automorphism groups of <i>t</i>-<span>((k^2,k,lambda ))</span> designs. We prove that a block-transitive automorphism group <i>G</i> of a <i>t</i>-<span>((k^2,k,lambda ))</span> design must be point-primitive, and <i>G</i> is either an affine group or an almost simple group. Moreover, the nontrivial <i>t</i>-<span>((k^2,k,lambda ))</span> designs admitting block-transitive automorphism groups of almost simple type with sporadic socle and alternating socle are classified.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"103 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141909308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nontrivial t-designs in polar spaces exist for all t 对于所有 t
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-07 DOI: 10.1007/s10623-024-01471-1
Charlene Weiß

A finite classical polar space of rank n consists of the totally isotropic subspaces of a finite vector space over (mathbb {F}_q) equipped with a nondegenerate form such that n is the maximal dimension of such a subspace. A t-((n,k,lambda )) design in a finite classical polar space of rank n is a collection Y of totally isotropic k-spaces such that each totally isotropic t-space is contained in exactly (lambda ) members of Y. Nontrivial examples are currently only known for (tle 2). We show that t-((n,k,lambda )) designs in polar spaces exist for all t and q provided that (k>frac{21}{2}t) and n is sufficiently large enough. The proof is based on a probabilistic method by Kuperberg, Lovett, and Peled, and it is thus nonconstructive.

秩为 n 的有限经典极空间由 (mathbb {F}_q) 上的有限向量空间的完全各向同性子空间组成,该子空间具有非enerate 形式,且 n 是该子空间的最大维数。秩为 n 的有限经典极空间中的 t-((n,k,lambda )) 设计是完全各向同性 k 空间的集合 Y,使得每个完全各向同性的 t 空间都包含在 Y 的精确 (lambda ) 成员中。我们证明了极空间中的 t- ((n,k,lambda))设计对于所有的 t 和 q 都是存在的,条件是 (k>frac{21}{2}t) 和 n 足够大。证明基于库珀伯格、洛维特和佩莱德的概率方法,因此是非结构性的。
{"title":"Nontrivial t-designs in polar spaces exist for all t","authors":"Charlene Weiß","doi":"10.1007/s10623-024-01471-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01471-1","url":null,"abstract":"<p>A finite classical polar space of rank <i>n</i> consists of the totally isotropic subspaces of a finite vector space over <span>(mathbb {F}_q)</span> equipped with a nondegenerate form such that <i>n</i> is the maximal dimension of such a subspace. A <i>t</i>-<span>((n,k,lambda ))</span> design in a finite classical polar space of rank <i>n</i> is a collection <i>Y</i> of totally isotropic <i>k</i>-spaces such that each totally isotropic <i>t</i>-space is contained in exactly <span>(lambda )</span> members of <i>Y</i>. Nontrivial examples are currently only known for <span>(tle 2)</span>. We show that <i>t</i>-<span>((n,k,lambda ))</span> designs in polar spaces exist for all <i>t</i> and <i>q</i> provided that <span>(k&gt;frac{21}{2}t)</span> and <i>n</i> is sufficiently large enough. The proof is based on a probabilistic method by Kuperberg, Lovett, and Peled, and it is thus nonconstructive.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"152 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141904645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of a key exchange protocol based on a modified tropical structure 基于改进热带结构的密钥交换协议的密码分析
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-03 DOI: 10.1007/s10623-024-01469-9
Huawei Huang, Changgen Peng, Lunzhi Deng

This article analyzes a key exchange protocol based on a modified tropical structure proposed by Ahmed et al. in 2023. It is shown that the modified tropical semiring is isomorphic to the (2times 2) tropical circular matrix semiring. Therefore, matrices in this modified tropical semiring can be represented as tropical matrices, and the key exchange protocol is actually based on the tropical matrix semiring. Tropical irreducible matrices exhibit almost linear periodic property. Efficient algorithms for calculating the linear period and defect of irreducible matrices are designed. Based on the public information of the protocol, the equivalent private key can be computed and then the shared key is easily obtained. The analysis shows that the key exchange protocol based on this modified tropical structure is not secure.

本文分析了 Ahmed 等人在 2023 年提出的基于修正热带结构的密钥交换协议。结果表明,修正的热带结构与热带圆矩阵结构同构。因此,该修正热带配系中的矩阵可以表示为热带矩阵,而密钥交换协议实际上是基于热带矩阵配系的。热带不可还原矩阵表现出几乎线性的周期特性。本文设计了计算不可还原矩阵线性周期和缺陷的高效算法。根据协议的公开信息,可以计算出等价私钥,然后很容易得到共享密钥。分析表明,基于这种改进的热带结构的密钥交换协议并不安全。
{"title":"Cryptanalysis of a key exchange protocol based on a modified tropical structure","authors":"Huawei Huang, Changgen Peng, Lunzhi Deng","doi":"10.1007/s10623-024-01469-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01469-9","url":null,"abstract":"<p>This article analyzes a key exchange protocol based on a modified tropical structure proposed by Ahmed et al. in 2023. It is shown that the modified tropical semiring is isomorphic to the <span>(2times 2)</span> tropical circular matrix semiring. Therefore, matrices in this modified tropical semiring can be represented as tropical matrices, and the key exchange protocol is actually based on the tropical matrix semiring. Tropical irreducible matrices exhibit almost linear periodic property. Efficient algorithms for calculating the linear period and defect of irreducible matrices are designed. Based on the public information of the protocol, the equivalent private key can be computed and then the shared key is easily obtained. The analysis shows that the key exchange protocol based on this modified tropical structure is not secure.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"335 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141880329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1