Pub Date : 2024-12-04DOI: 10.1007/s10623-024-01536-1
Li Xu, Cuiling Fan, Chunming Tang, Zhengchun Zhou
Cyclic codes, as a special type of constacyclic codes, have been extensively studied due to their favorable theoretical and mathematical properties. Very recently, by using the derivative of the Mattson-Solomon polynomials, Huang and Zhang (IEEE Trans Inf Theor 70(4):2395–2410, 2024) studied the cyclic derivative descendants (DDs) and linear DDs of binary extended cyclic codes and proposed the corresponding derivative decoding methods. One objective of this paper is to generalize these conclusions to q-ary extended cyclic codes with group algebra theory. It demonstrates that the cyclic DDs of a q-ary extended cyclic code are the same codes and its linear DDs are equivalent codes. In addition, we show that the relevant results can be generalized to q-ary constacyclic codes and the linear codes generated by Plotkin construction. Our conclusions reveal that the soft-decision decoding method proposed by Huang and Zhang for binary cyclic codes is also applicable to q-ary cyclic codes, q-ary constacyclic codes and the linear codes generated by Plotkin construction.
循环码作为一种特殊的常循环码,由于其良好的理论和数学性质而得到了广泛的研究。最近,Huang和Zhang (IEEE Trans Inf theory 70(4):2395 - 2410,2024)利用Mattson-Solomon多项式的导数研究了二进制扩展循环码的循环导数子代(DDs)和线性DDs,并提出了相应的导数译码方法。本文的目的之一是利用群代数理论将这些结论推广到q元扩展循环码。证明了q元扩展循环码的循环离散码是相同码,其线性离散码是等价码。此外,我们还证明了相关结果可以推广到q元常环码和由Plotkin构造生成的线性码。研究结果表明,Huang和Zhang提出的二进制循环码的软判决译码方法同样适用于q元循环码、q元常循环码和Plotkin构造生成的线性码。
{"title":"Derivative descendants of cyclic codes and constacyclic codes","authors":"Li Xu, Cuiling Fan, Chunming Tang, Zhengchun Zhou","doi":"10.1007/s10623-024-01536-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01536-1","url":null,"abstract":"<p>Cyclic codes, as a special type of constacyclic codes, have been extensively studied due to their favorable theoretical and mathematical properties. Very recently, by using the derivative of the Mattson-Solomon polynomials, Huang and Zhang (IEEE Trans Inf Theor 70(4):2395–2410, 2024) studied the cyclic derivative descendants (DDs) and linear DDs of binary extended cyclic codes and proposed the corresponding derivative decoding methods. One objective of this paper is to generalize these conclusions to <i>q</i>-ary extended cyclic codes with group algebra theory. It demonstrates that the cyclic DDs of a <i>q</i>-ary extended cyclic code are the same codes and its linear DDs are equivalent codes. In addition, we show that the relevant results can be generalized to <i>q</i>-ary constacyclic codes and the linear codes generated by Plotkin construction. Our conclusions reveal that the soft-decision decoding method proposed by Huang and Zhang for binary cyclic codes is also applicable to <i>q</i>-ary cyclic codes, <i>q</i>-ary constacyclic codes and the linear codes generated by Plotkin construction.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"67 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-04DOI: 10.1007/s10623-024-01537-0
Josline Freed
Using codes defined over (mathbb {F}_4) and (mathbb {F}_2 times mathbb {F}_2), we simultaneously define the theta series of corresponding lattices for both real and imaginary quadratic fields (mathbb {Q}(sqrt{d})) with (d equiv 1mod 4) a square-free integer. For such a code, we use its weight enumerator to prove which term in the code’s corresponding theta series is the first to depend on the choice of d. For a given choice of real or imaginary quadratic field, we find conditions on the length of the code relative to the choice of quadratic field. When these conditions are satisfied, the generated theta series is unique to the code’s symmetric weight enumerator. We show that whilst these conditions ensure all non-equivalent codes will produce distinct theta series, for other codes that do not satisfy this condition, the length of the code and choice of quadratic field is not always enough to determine if the corresponding theta series will be unique.
使用在(mathbb {F}_4)和(mathbb {F}_2 times mathbb {F}_2)上定义的代码,我们同时定义了实二次域和虚二次域(mathbb {Q}(sqrt{d}))对应格的theta级数,其中(d equiv 1mod 4)是一个无平方整数。对于这样的码,我们使用它的权数枚举器来证明码对应的θ级数中哪一项首先依赖于d的选择。对于给定的实或虚二次域的选择,我们找到了相对于二次域选择的码的长度的条件。当满足这些条件时,生成的theta级数对于代码的对称权重枚举数是唯一的。我们表明,虽然这些条件确保所有非等效码将产生不同的θ级数,但对于不满足此条件的其他码,码的长度和二次域的选择并不总是足以确定相应的θ级数是否唯一。
{"title":"Codes over $$mathbb {F}_4$$ and $$mathbb {F}_2 times mathbb {F}_2$$ and theta series of the corresponding lattices in quadratic fields","authors":"Josline Freed","doi":"10.1007/s10623-024-01537-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01537-0","url":null,"abstract":"<p>Using codes defined over <span>(mathbb {F}_4)</span> and <span>(mathbb {F}_2 times mathbb {F}_2)</span>, we simultaneously define the theta series of corresponding lattices for both real and imaginary quadratic fields <span>(mathbb {Q}(sqrt{d}))</span> with <span>(d equiv 1mod 4)</span> a square-free integer. For such a code, we use its weight enumerator to prove which term in the code’s corresponding theta series is the first to depend on the choice of <i>d</i>. For a given choice of real or imaginary quadratic field, we find conditions on the length of the code relative to the choice of quadratic field. When these conditions are satisfied, the generated theta series is unique to the code’s symmetric weight enumerator. We show that whilst these conditions ensure all non-equivalent codes will produce distinct theta series, for other codes that do not satisfy this condition, the length of the code and choice of quadratic field is not always enough to determine if the corresponding theta series will be unique.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"29 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-04DOI: 10.1007/s10623-024-01540-5
Shikang Yu, Tao Feng, Menglong Zhang
A bijection (theta :Grightarrow G) of a finite group G is an orthomorphism of G if the mapping (xmapsto x^{-1}theta (x)) is also a bijection. Two orthomorphisms (theta ) and (phi ) of a finite group G are orthogonal if the mapping (xmapsto theta (x)^{-1}phi (x)) is also bijective. We show that there is a pair of orthogonal orthomorphisms of a finite nilpotent group G if and only if the Sylow 2-subgroup of G is either trivial or noncyclic with the definite exceptions of (Gcong G') where (G'in {D_8,Q_8,{mathbb {Z}}_3,{mathbb {Z}}_9}) and except possibly for (Gcong Q_8times {mathbb {Z}}_9) or (Gcong SD_{2^n}times {mathbb {Z}}_3) for any (ngeqslant 4). This result yields the existence of difference matrices over finite nilpotent groups with four rows.
{"title":"A pair of orthogonal orthomorphisms of finite nilpotent groups","authors":"Shikang Yu, Tao Feng, Menglong Zhang","doi":"10.1007/s10623-024-01540-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01540-5","url":null,"abstract":"<p>A bijection <span>(theta :Grightarrow G)</span> of a finite group <i>G</i> is an orthomorphism of <i>G</i> if the mapping <span>(xmapsto x^{-1}theta (x))</span> is also a bijection. Two orthomorphisms <span>(theta )</span> and <span>(phi )</span> of a finite group <i>G</i> are orthogonal if the mapping <span>(xmapsto theta (x)^{-1}phi (x))</span> is also bijective. We show that there is a pair of orthogonal orthomorphisms of a finite nilpotent group <i>G</i> if and only if the Sylow 2-subgroup of <i>G</i> is either trivial or noncyclic with the definite exceptions of <span>(Gcong G')</span> where <span>(G'in {D_8,Q_8,{mathbb {Z}}_3,{mathbb {Z}}_9})</span> and except possibly for <span>(Gcong Q_8times {mathbb {Z}}_9)</span> or <span>(Gcong SD_{2^n}times {mathbb {Z}}_3)</span> for any <span>(ngeqslant 4)</span>. This result yields the existence of difference matrices over finite nilpotent groups with four rows.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"9 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-04DOI: 10.1007/s10623-024-01529-0
Lukas Kölsch, Lucas Krompholz, Gohar Kyureghyan
Brawley and Carlitz introduced diamond products of elements of finite fields and associated composed products of polynomials in 1987. Composed products yield a method to construct irreducible polynomials of large composite degrees from irreducible polynomials of lower degrees. We show that the composed product of two irreducible polynomials of degrees m and n is again irreducible if and only if m and n are coprime and the involved diamond product satisfies a special cancellation property, the so-called conjugate cancellation. This completes the characterization of irreducible composed products, considered in several previous papers. More generally, we give precise criteria when a diamond product satisfies conjugate cancellation. For diamond products defined via bivariate polynomials, we prove simple criteria that characterize when conjugate cancellation holds. We also provide efficient algorithms to check these criteria. We achieve stronger results as well as more efficient algorithms in the case that the polynomials are bilinear. Lastly, we consider possible constructions of normal elements using composed products and the methods we developed.
{"title":"Factorization and irreducibility of composed products","authors":"Lukas Kölsch, Lucas Krompholz, Gohar Kyureghyan","doi":"10.1007/s10623-024-01529-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01529-0","url":null,"abstract":"<p>Brawley and Carlitz introduced diamond products of elements of finite fields and associated composed products of polynomials in 1987. Composed products yield a method to construct irreducible polynomials of large composite degrees from irreducible polynomials of lower degrees. We show that the composed product of two irreducible polynomials of degrees <i>m</i> and <i>n</i> is again irreducible if and only if <i>m</i> and <i>n</i> are coprime and the involved diamond product satisfies a special cancellation property, the so-called conjugate cancellation. This completes the characterization of irreducible composed products, considered in several previous papers. More generally, we give precise criteria when a diamond product satisfies conjugate cancellation. For diamond products defined via bivariate polynomials, we prove simple criteria that characterize when conjugate cancellation holds. We also provide efficient algorithms to check these criteria. We achieve stronger results as well as more efficient algorithms in the case that the polynomials are bilinear. Lastly, we consider possible constructions of normal elements using composed products and the methods we developed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"3 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-04DOI: 10.1007/s10623-024-01533-4
Kevin Allen, John Sheekey
In this paper we demonstrate the first example of a finite translation plane which does not contain a translation hyperoval, disproving a conjecture of Cherowitzo. The counterexample is a semifield plane, specifically a Generalised Twisted Field plane, of order 64. We also relate this non-existence to the covering radius of two associated rank-metric codes, and the non-existence of scattered subspaces of maximum dimension with respect to the associated spread.
{"title":"On translation hyperovals in semifield planes","authors":"Kevin Allen, John Sheekey","doi":"10.1007/s10623-024-01533-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01533-4","url":null,"abstract":"<p>In this paper we demonstrate the first example of a finite translation plane which does not contain a translation hyperoval, disproving a conjecture of Cherowitzo. The counterexample is a semifield plane, specifically a Generalised Twisted Field plane, of order 64. We also relate this non-existence to the covering radius of two associated rank-metric codes, and the non-existence of scattered subspaces of maximum dimension with respect to the associated spread.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"83 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, it has become a popular trend to propose quantum versions of classical attacks. The rectangle attack as a differential attack is widely used in symmetric cryptanalysis and applied on many block ciphers. To improve its efficiency, we propose a new quantum rectangle attack firstly. In rectangle attack, it counts the number of valid quartets for each guessed subkeys and filters out subkey candidates according to the counter. To speed up this procedure, we propose a quantum key counting algorithm based on parallel amplitude estimation algorithm and amplitude amplification algorithm. Then, we complete with the remaining key bits and search the right full key by nested Grover search. Besides, we give a strategy to find a more suitable distinguisher to make the complexity lower. Finally, to evaluate post-quantum security of the tweakable block cipher Deoxys-BC, we perform automatic search for good distinguishers of Deoxys-BC according to the strategy, and then apply our attack on 9/10-round Deoxys-BC-256 and 12/13/14-round Deoxys-BC-384. The results show that our attack has some improvements than classical attacks and Grover search.
{"title":"Quantum rectangle attack and its application on Deoxys-BC","authors":"Yin-Song Xu, Yi-Bo Luo, Zheng Yuan, Xuan Zhou, Qi-di You, Fei Gao, Xiao-Yang Dong","doi":"10.1007/s10623-024-01526-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01526-3","url":null,"abstract":"<p>In recent years, it has become a popular trend to propose quantum versions of classical attacks. The rectangle attack as a differential attack is widely used in symmetric cryptanalysis and applied on many block ciphers. To improve its efficiency, we propose a new quantum rectangle attack firstly. In rectangle attack, it counts the number of valid quartets for each guessed subkeys and filters out subkey candidates according to the counter. To speed up this procedure, we propose a quantum key counting algorithm based on parallel amplitude estimation algorithm and amplitude amplification algorithm. Then, we complete with the remaining key bits and search the right full key by nested Grover search. Besides, we give a strategy to find a more suitable distinguisher to make the complexity lower. Finally, to evaluate post-quantum security of the tweakable block cipher Deoxys-BC, we perform automatic search for good distinguishers of Deoxys-BC according to the strategy, and then apply our attack on 9/10-round Deoxys-BC-256 and 12/13/14-round Deoxys-BC-384. The results show that our attack has some improvements than classical attacks and Grover search.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"15 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142684484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-19DOI: 10.1007/s10623-024-01523-6
Zhedong Wang, Qiqi Lai, Feng-Hao Liu
Achieving tight security is a fundamental task in cryptography. While one of the most important purposes of this task is to improve the overall efficiency of a construction (by allowing smaller security parameters), many current lattice-based instantiations do not completely achieve the goal. Particularly, a super-polynomial modulus seems to be necessary in all prior work for (almost) tight schemes that allow the adversary to conduct queries, such as PRF, IBE, and Signatures. As the super-polynomial modulus would affect the noise-to-modulus ratio and thus increase the parameters, this might cancel out the advantages (in efficiency) brought from the tighter analysis. To determine the full power of tight security/analysis in lattices, it is necessary to determine whether the super-polynomial modulus restriction is inherent. In this work, we remove the super-polynomial modulus restriction for many important primitives—PRF, IBE, all-but-many Lossy Trapdoor Functions, and Signatures. The crux relies on an improvement over the framework of Boyen and Li (Asiacrypt 16), and an almost tight reduction from LWE to LWR, which improves prior work by Alwen et al. (Eurocrypt 13), Bogdanov et al. (TCC 16), and Bai et al. (Asiacrypt 15). By combining these two advances, we are able to derive these almost tight schemes under LWE with a polynomial modulus.
{"title":"Almost tight security in lattices with polynomial moduli—PRF, IBE, all-but-many LTF, and more","authors":"Zhedong Wang, Qiqi Lai, Feng-Hao Liu","doi":"10.1007/s10623-024-01523-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01523-6","url":null,"abstract":"<p>Achieving tight security is a fundamental task in cryptography. While one of the most important purposes of this task is to improve the overall efficiency of a construction (by allowing smaller security parameters), many current lattice-based instantiations do not completely achieve the goal. Particularly, a super-polynomial modulus seems to be necessary in all prior work for (almost) tight schemes that allow the adversary to conduct queries, such as PRF, IBE, and Signatures. As the super-polynomial modulus would affect the noise-to-modulus ratio and thus increase the parameters, this might cancel out the advantages (in efficiency) brought from the tighter analysis. To determine the full power of tight security/analysis in lattices, it is necessary to determine whether the super-polynomial modulus restriction is inherent. In this work, we remove the super-polynomial modulus restriction for many important primitives—PRF, IBE, all-but-many Lossy Trapdoor Functions, and Signatures. The crux relies on an improvement over the framework of Boyen and Li (Asiacrypt 16), and an almost tight reduction from LWE to LWR, which improves prior work by Alwen et al. (Eurocrypt 13), Bogdanov et al. (TCC 16), and Bai et al. (Asiacrypt 15). By combining these two advances, we are able to derive these almost tight schemes under LWE with a polynomial modulus.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142671014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-15DOI: 10.1007/s10623-024-01524-5
Andrea Di Giusto, Chiara Marcolla
The Brakerski–Gentry–Vaikuntanathan (BGV) scheme is a Fully Homomorphic Encryption (FHE) cryptosystem based on the Ring Learning With Error (RLWE) problem. Ciphertexts in this scheme contain an error term that grows with operations and causes decryption failure when it surpasses a certain threshold. Consequently, the parameters of BGV need to be estimated carefully, with a trade-off between security and error margin. The ciphertext space of BGV is the ring (mathcal {R}_q=mathbb {Z}_q[x]/(Phi _m(x))), where usually the degree n of the cyclotomic polynomial (Phi _m(x)) is chosen as a power of two for efficiency reasons. However, the jump between two consecutive powers-of-two polynomials also causes a jump in security, resulting in parameters that are much bigger than what is needed. In this work, we explore the non-power-of-two instantiations of BGV. Although our theoretical research encompasses results applicable to any cyclotomic ring, the focus of our investigation is the case of ({m=2^scdot 3^t}) where (s,tge 1), i.e., cyclotomic polynomials with degree ({n=phi (m)=2^scdot 3^{t-1}}). We provide a thorough analysis of the noise growth in this new setting using the canonical norm and compare our results with the power-of-two case considering practical aspects like NTT algorithms. We find that in many instances, the parameter estimation process yields better results for the non-power-of-two setting.
{"title":"Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings","authors":"Andrea Di Giusto, Chiara Marcolla","doi":"10.1007/s10623-024-01524-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01524-5","url":null,"abstract":"<p>The Brakerski–Gentry–Vaikuntanathan (BGV) scheme is a Fully Homomorphic Encryption (FHE) cryptosystem based on the Ring Learning With Error (RLWE) problem. Ciphertexts in this scheme contain an error term that grows with operations and causes decryption failure when it surpasses a certain threshold. Consequently, the parameters of BGV need to be estimated carefully, with a trade-off between security and error margin. The ciphertext space of BGV is the ring <span>(mathcal {R}_q=mathbb {Z}_q[x]/(Phi _m(x)))</span>, where usually the degree <i>n</i> of the cyclotomic polynomial <span>(Phi _m(x))</span> is chosen as a power of two for efficiency reasons. However, the jump between two consecutive powers-of-two polynomials also causes a jump in security, resulting in parameters that are much bigger than what is needed. In this work, we explore the non-power-of-two instantiations of BGV. Although our theoretical research encompasses results applicable to any cyclotomic ring, the focus of our investigation is the case of <span>({m=2^scdot 3^t})</span> where <span>(s,tge 1)</span>, i.e., cyclotomic polynomials with degree <span>({n=phi (m)=2^scdot 3^{t-1}})</span>. We provide a thorough analysis of the noise growth in this new setting using the canonical norm and compare our results with the power-of-two case considering practical aspects like NTT algorithms. We find that in many instances, the parameter estimation process yields better results for the non-power-of-two setting.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"38 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142637521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-13DOI: 10.1007/s10623-024-01520-9
Sihong Su, Xiaoyan Chen
It is important to study the new construction methods of bent functions. In this paper, we first propose a secondary construction method of ((k+s))-variable bent function g through a family of s-plateaued functions (f_0,f_1,ldots ,f_{2^s-1}) on k variables with disjoint Walsh supports, which can be obtained through any given ((k-s))-variable bent function f by selecting (2^s) disjoint affine subspaces (S_0,S_1,ldots ,S_{2^s-1}) of ({mathbb {F}}_2^k) with dimension (k-s) to specify the Walsh support of these s-plateaued functions respectively, where s is a positive integer and (k-s) is a positive even integer. The dual functions of these newly constructed bent functions are determined. This secondary construction method of bent functions has a great improvement in counting. As a generalization, we find that the one initial ((k-s))-variable bent function f can be replaced by several different ((k-s))-variable bent functions. Compared to the first construction method, the latter one gives much more bent functions. It is worth mentioning that it can give all the 896 bent functions on 4 variables.
研究弯曲函数的新构造方法非常重要。在本文中,我们首先提出了一种通过 k 个变量上具有互不相交的 Walsh 支持的 s-plateaued 函数族 (f_0,f_1,ldots ,f_{2^s-1}) 来二次构造 ((k+s))-变量弯曲函数 g 的方法、可以通过任何给定的((k-s))变量弯曲函数 f,选择 (2^s)个不相邻的仿射子空间 (S_0,S_1,ldots 、维度为 (k-s) 的 ({mathbb {F}}_2^k) 的 S_{2^s-1} 子空间来分别指定这些 s 有板函数的沃尔什支持,其中 s 是正整数,(k-s) 是正偶数。这些新构建的弯曲函数的对偶函数被确定下来。这种二次构造弯曲函数的方法在计数方面有很大的改进。作为推广,我们发现一个初始的((k-s))可变弯曲函数 f 可以被多个不同的((k-s))可变弯曲函数代替。与第一种构造方法相比,后一种构造方法得到的弯曲函数要多得多。值得一提的是,它可以给出所有 896 个 4 变量弯曲函数。
{"title":"A new method of constructing $$(k+s)$$ -variable bent functions based on a family of s-plateaued functions on k variables","authors":"Sihong Su, Xiaoyan Chen","doi":"10.1007/s10623-024-01520-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01520-9","url":null,"abstract":"<p>It is important to study the new construction methods of bent functions. In this paper, we first propose a secondary construction method of <span>((k+s))</span>-variable bent function <i>g</i> through a family of <i>s</i>-plateaued functions <span>(f_0,f_1,ldots ,f_{2^s-1})</span> on <i>k</i> variables with disjoint Walsh supports, which can be obtained through any given <span>((k-s))</span>-variable bent function <i>f</i> by selecting <span>(2^s)</span> disjoint affine subspaces <span>(S_0,S_1,ldots ,S_{2^s-1})</span> of <span>({mathbb {F}}_2^k)</span> with dimension <span>(k-s)</span> to specify the Walsh support of these <i>s</i>-plateaued functions respectively, where <i>s</i> is a positive integer and <span>(k-s)</span> is a positive even integer. The dual functions of these newly constructed bent functions are determined. This secondary construction method of bent functions has a great improvement in counting. As a generalization, we find that the one initial <span>((k-s))</span>-variable bent function <i>f</i> can be replaced by several different <span>((k-s))</span>-variable bent functions. Compared to the first construction method, the latter one gives much more bent functions. It is worth mentioning that it can give all the 896 bent functions on 4 variables.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"9 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142600906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-10DOI: 10.1007/s10623-024-01525-4
Yongbo Xia, Chunlei Li, Furong Bao, Shaoping Chen, Tor Helleseth
Let n be an odd positive integer, p be an odd prime with (pequiv 3pmod 4), (d_{1} = {{p^{n}-1}over {2}} -1 ) and (d_{2} =p^{n}-2). The function defined by (f_u(x)=ux^{d_{1}}+x^{d_{2}}) is called the generalized Ness–Helleseth function over (mathbb {F}_{p^n}), where (uin mathbb {F}_{p^n}). It was initially studied by Ness and Helleseth in the ternary case. In this paper, for (p^n equiv 3 pmod 4) and (p^n ge 7), we provide the necessary and sufficient condition for (f_u(x)) to be an APN function. In addition, for each u satisfying (chi (u+1) = chi (u-1)), the differential spectrum of (f_u(x)) is investigated, and it is expressed in terms of some quadratic character sums of cubic polynomials, where (chi (cdot )) denotes the quadratic character of ({mathbb {F}}_{p^n}).
{"title":"Further investigation on differential properties of the generalized Ness–Helleseth function","authors":"Yongbo Xia, Chunlei Li, Furong Bao, Shaoping Chen, Tor Helleseth","doi":"10.1007/s10623-024-01525-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01525-4","url":null,"abstract":"<p>Let <i>n</i> be an odd positive integer, <i>p</i> be an odd prime with <span>(pequiv 3pmod 4)</span>, <span>(d_{1} = {{p^{n}-1}over {2}} -1 )</span> and <span>(d_{2} =p^{n}-2)</span>. The function defined by <span>(f_u(x)=ux^{d_{1}}+x^{d_{2}})</span> is called the generalized Ness–Helleseth function over <span>(mathbb {F}_{p^n})</span>, where <span>(uin mathbb {F}_{p^n})</span>. It was initially studied by Ness and Helleseth in the ternary case. In this paper, for <span>(p^n equiv 3 pmod 4)</span> and <span>(p^n ge 7)</span>, we provide the necessary and sufficient condition for <span>(f_u(x))</span> to be an APN function. In addition, for each <i>u</i> satisfying <span>(chi (u+1) = chi (u-1))</span>, the differential spectrum of <span>(f_u(x))</span> is investigated, and it is expressed in terms of some quadratic character sums of cubic polynomials, where <span>(chi (cdot ))</span> denotes the quadratic character of <span>({mathbb {F}}_{p^n})</span>.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"9 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142597482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}