首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
New and improved formally self-dual codes with small hulls from polynomial four Toeplitz codes 从多项式四托普利兹码出发的新的和改进的形式上自偶的小壳码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-20 DOI: 10.1007/s10623-024-01460-4
Yang Li, Shitao Li, Shixin Zhu

Formally self-dual (FSD) codes and linear codes with small Euclidean (resp. Hermitian) hulls have recently attracted a lot of attention due to their theoretical and practical importance. However, there has been not much attention on FSD codes with small hulls. In this paper, we introduce two kinds of polynomial four Toeplitz codes and prove that they must be FSD. We characterize the linear complementary dual (LCD) properties and one-dimensional hull properties of such codes with respect to the Euclidean and Hermitian inner products. Using these characterizations, we find some improved binary, ternary Euclidean and quaternary Hermitian FSD LCD codes, as well as many non-equivalent ones that perform equally well with respect to best-known (FSD) LCD codes in the literature. Furthermore, some (near) maximum distance separable FSD codes with both one-dimensional Euclidean hull and one-dimensional Hermitian hull are also given as examples.

具有小欧几里得(或赫米特)空格的形式上自偶(FSD)编码和线性编码由于其理论和实践上的重要性,最近引起了广泛关注。然而,人们对具有小体的 FSD 码的关注却不多。本文介绍了两种多项式四 Toeplitz 码,并证明它们一定是 FSD 码。我们描述了这些编码的线性互补对偶(LCD)特性和一维空壳特性,以及欧氏和赫米特内积。利用这些特性,我们发现了一些改进的二元、三元欧氏和四元赫米特 FSD LCD 代码,以及许多与文献中最著名的(FSD)LCD 代码性能相当的非等价代码。此外,还举例说明了一些具有一维欧氏壳和一维赫米特壳的(接近)最大距离可分离 FSD 码。
{"title":"New and improved formally self-dual codes with small hulls from polynomial four Toeplitz codes","authors":"Yang Li, Shitao Li, Shixin Zhu","doi":"10.1007/s10623-024-01460-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01460-4","url":null,"abstract":"<p>Formally self-dual (FSD) codes and linear codes with small Euclidean (resp. Hermitian) hulls have recently attracted a lot of attention due to their theoretical and practical importance. However, there has been not much attention on FSD codes with small hulls. In this paper, we introduce two kinds of polynomial four Toeplitz codes and prove that they must be FSD. We characterize the linear complementary dual (LCD) properties and one-dimensional hull properties of such codes with respect to the Euclidean and Hermitian inner products. Using these characterizations, we find some improved binary, ternary Euclidean and quaternary Hermitian FSD LCD codes, as well as many non-equivalent ones that perform equally well with respect to best-known (FSD) LCD codes in the literature. Furthermore, some (near) maximum distance separable FSD codes with both one-dimensional Euclidean hull and one-dimensional Hermitian hull are also given as examples.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"64 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141730629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-canonical maximum cliques without a design structure in the block graphs of 2-designs 2-设计块图中无设计结构的非正则最大簇
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-18 DOI: 10.1007/s10623-024-01459-x
Sergey Goryainov, Elena V. Konstantinova

In this note we answer positively a question of Chris Godsil and Karen Meagher on the existence of a 2-design whose block graph has a non-canonical maximum clique without a design structure.

在本论文中,我们正面回答了克里斯-戈德希尔(Chris Godsil)和凯伦-米格尔(Karen Meagher)提出的一个问题,即是否存在一个块图具有非经典最大簇而没有设计结构的 2 设计。
{"title":"Non-canonical maximum cliques without a design structure in the block graphs of 2-designs","authors":"Sergey Goryainov, Elena V. Konstantinova","doi":"10.1007/s10623-024-01459-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01459-x","url":null,"abstract":"<p>In this note we answer positively a question of Chris Godsil and Karen Meagher on the existence of a 2-design whose block graph has a non-canonical maximum clique without a design structure.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"7 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141725937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist CSI-Otter:基于同源性的(部分)类组行动盲签名,别出心裁
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-17 DOI: 10.1007/s10623-024-01441-7
Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin

In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. While at a high level the scheme resembles the Schnorr blind signature, our work does not directly follow from that construction, since isogenies do not offer as rich an algebraic structure. Specifically, our protocol does not fit into the linear identification protocol abstraction introduced by Hauck, Kiltz, and Loss (EUROCYRPT’19), which was used to generically construct Schnorr-like blind signatures based on modules such as classical groups and lattices. Consequently, our scheme is provably secure in the random oracle model (ROM) against poly-logarithmically-many concurrent sessions assuming the subexponential hardness of the group action inverse problem. In more detail, our blind signature exploits the quadratic twist of an elliptic curve in an essential way to endow isogenies with a strictly richer structure than abstract group actions (but still more restrictive than modules). The basic scheme has public key size 128 B and signature size 8 KB under the CSIDH-512 parameter sets—these are the smallest among all provably secure post-quantum secure blind signatures. Relying on a new ring variant of the group action inverse problem ((textsf{rGAIP})), we can halve the signature size to 4 KB while increasing the public key size to 512 B. We provide preliminary cryptanalysis of ({textsf{rGAIP}} ) and show that for certain parameter settings, it is essentially as secure as the standard (textsf{GAIP}). Finally, we show a novel way to turn our blind signature into a partially blind signature, where we deviate from prior methods since they require hashing into the set of public keys while hiding the corresponding secret key—constructing such a hash function in the isogeny setting remains an open problem.

在本文中,我们构建了第一个可证明安全的基于同源的(部分)盲签名方案。虽然在高层次上,该方案类似于施诺尔盲签名,但我们的工作并不直接沿用该构建,因为同源并不提供如此丰富的代数结构。具体来说,我们的协议并不符合 Hauck、Kiltz 和 Loss(EUROCYRPT'19)提出的线性识别协议抽象,该抽象被用于基于经典群和网格等模块通用地构建类似施诺尔的盲签名。因此,假设群作用逆问题具有亚指数硬度,我们的方案在随机甲骨文模型(ROM)中对多对数多并发会话是安全的。更详细地说,我们的盲签名利用了椭圆曲线的二次扭曲,以一种重要的方式赋予同源以严格意义上比抽象群作用更丰富的结构(但仍然比模块更严格)。在 CSIDH-512 参数集下,基本方案的公钥大小为 128 B,签名大小为 8 KB,是所有可证明安全的后量子安全盲签名中最小的。我们提供了对({textsf{rGAIP}} )的初步密码分析,并证明在某些参数设置下,它基本上与标准(textsf{GAIP})一样安全。最后,我们展示了一种将我们的盲签名变成部分盲签名的新方法,我们的方法与之前的方法不同,因为它们需要对公钥集进行散列,同时隐藏相应的秘钥--在同源设置中构建这样的散列函数仍然是一个未决问题。
{"title":"CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist","authors":"Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin","doi":"10.1007/s10623-024-01441-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01441-7","url":null,"abstract":"<p>In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. While at a high level the scheme resembles the Schnorr blind signature, our work does not directly follow from that construction, since isogenies do not offer as rich an algebraic structure. Specifically, our protocol does not fit into the <i>linear identification protocol</i> abstraction introduced by Hauck, Kiltz, and Loss (EUROCYRPT’19), which was used to generically construct Schnorr-like blind signatures based on modules such as classical groups and lattices. Consequently, our scheme is provably secure in the random oracle model (ROM) against poly-logarithmically-many concurrent sessions assuming the subexponential hardness of the group action inverse problem. In more detail, our blind signature exploits the <i>quadratic twist</i> of an elliptic curve in an essential way to endow isogenies with a strictly richer structure than abstract group actions (but still more restrictive than modules). The basic scheme has public key size 128 B and signature size 8 KB under the CSIDH-512 parameter sets—these are the smallest among all provably secure post-quantum secure blind signatures. Relying on a new <i>ring</i> variant of the group action inverse problem (<span>(textsf{rGAIP})</span>), we can halve the signature size to 4 KB while increasing the public key size to 512 B. We provide preliminary cryptanalysis of <span>({textsf{rGAIP}} )</span> and show that for certain parameter settings, it is essentially as secure as the standard <span>(textsf{GAIP})</span>. Finally, we show a novel way to turn our blind signature into a partially blind signature, where we deviate from prior methods since they require hashing into the set of public keys while hiding the corresponding secret key—constructing such a hash function in the isogeny setting remains an open problem.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"32 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141725936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Curve-lifted codes for local recovery using lines 利用线路进行局部恢复的曲线提升代码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-17 DOI: 10.1007/s10623-024-01456-0
Gretchen L. Matthews, Travis Morrison, Aidan W. Murphy

In this paper, we introduce curve-lifted codes over fields of arbitrary characteristic, inspired by Hermitian-lifted codes over (mathbb {F}_{2^r}). These codes are designed for locality and availability, and their particular parameters depend on the choice of curve and its properties. Due to the construction, the numbers of rational points of intersection between curves and lines play a key role. To demonstrate that and generate new families of locally recoverable codes (LRCs) with high availabilty, we focus on norm-trace-lifted codes.

在本文中,我们受到在 (mathbb {F}_{2^r}) 上的赫米提码的启发,介绍了任意特征域上的曲线提码。这些代码是为本地性和可用性而设计的,它们的特定参数取决于曲线的选择及其特性。由于构造的原因,曲线与直线之间的有理交点的数量起着关键作用。为了证明这一点并生成具有高可用性的本地可恢复编码(LRCs)的新系列,我们将重点放在规范轨迹提升编码上。
{"title":"Curve-lifted codes for local recovery using lines","authors":"Gretchen L. Matthews, Travis Morrison, Aidan W. Murphy","doi":"10.1007/s10623-024-01456-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01456-0","url":null,"abstract":"<p>In this paper, we introduce curve-lifted codes over fields of arbitrary characteristic, inspired by Hermitian-lifted codes over <span>(mathbb {F}_{2^r})</span>. These codes are designed for locality and availability, and their particular parameters depend on the choice of curve and its properties. Due to the construction, the numbers of rational points of intersection between curves and lines play a key role. To demonstrate that and generate new families of locally recoverable codes (LRCs) with high availabilty, we focus on norm-trace-lifted codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141631347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hulls of cyclic codes with respect to the regular permutation inner product 与正则置换内积有关的循环码的赫尔
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-15 DOI: 10.1007/s10623-024-01428-4
Xiaoshan Quan, Qin Yue, Fuqing Sun

In this paper, we introduce regular permutation inner products which contain the Euclidean inner product. And we generalize some properties of the Euclidean inner product to regular permutation inner products. As application, we construct a lot of cyclic codes with specific regular permutation hulls and also obtain the dimensions and distances of some BCH codes.

本文介绍了包含欧几里得内积的正则置换内积。我们将欧几里得内积的一些性质推广到正则置换内积。作为应用,我们用特定的正则置换空壳构造了许多循环码,还得到了一些 BCH 码的维数和距离。
{"title":"Hulls of cyclic codes with respect to the regular permutation inner product","authors":"Xiaoshan Quan, Qin Yue, Fuqing Sun","doi":"10.1007/s10623-024-01428-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01428-4","url":null,"abstract":"<p>In this paper, we introduce regular permutation inner products which contain the Euclidean inner product. And we generalize some properties of the Euclidean inner product to regular permutation inner products. As application, we construct a lot of cyclic codes with specific regular permutation hulls and also obtain the dimensions and distances of some BCH codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"27 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141625057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explicit constructions of NMDS self-dual codes NMDS 自偶码的显式构造
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-12 DOI: 10.1007/s10623-024-01450-6
Dongchun Han, Hanbin Zhang

Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to combinatorics, lattice theory, and have important application in cryptography. In this paper, we construct a class of q-ary linear codes and prove that they are either MDS or NMDS which depends on certain zero-sum condition. In the NMDS case, we provide an effective approach to construct NMDS self-dual codes which largely extend known parameters of such codes. In particular, we proved that for square q, almost q/8 NMDS self-dual q-ary codes can be constructed.

近最大距离可分离(NMDS)码在有限几何和编码理论中非常重要。自偶码与组合学、网格理论密切相关,在密码学中也有重要应用。本文构建了一类 qary 线性码,并证明它们要么是 MDS,要么是 NMDS,这取决于某些零和条件。在 NMDS 情况下,我们提供了一种构建 NMDS 自双码的有效方法,在很大程度上扩展了这类码的已知参数。特别是,我们证明了对于平方 q,几乎可以构造出 q/8 NMDS 自双 qary 码。
{"title":"Explicit constructions of NMDS self-dual codes","authors":"Dongchun Han, Hanbin Zhang","doi":"10.1007/s10623-024-01450-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01450-6","url":null,"abstract":"<p>Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to combinatorics, lattice theory, and have important application in cryptography. In this paper, we construct a class of <i>q</i>-ary linear codes and prove that they are either MDS or NMDS which depends on certain zero-sum condition. In the NMDS case, we provide an effective approach to construct NMDS self-dual codes which largely extend known parameters of such codes. In particular, we proved that for square <i>q</i>, almost <i>q</i>/8 NMDS self-dual <i>q</i>-ary codes can be constructed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"24 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141597506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New spence difference sets 新的斯彭斯差异套装
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-10 DOI: 10.1007/s10623-024-01446-2
James A. Davis, John Polhill, Ken Smith, Eric Swartz, Jordan Webster

Spence [9] constructed (left( frac{3^{d+1}(3^{d+1}-1)}{2}, frac{3^d(3^{d+1}+1)}{2}, frac{3^d(3^d+1)}{2}right) )-difference sets in groups (K times C_3^{d+1}) for d any positive integer and K any group of order (frac{3^{d+1}-1}{2}). Smith and Webster [8] have exhaustively studied the (d=1) case without requiring that the group have the form listed above and found many constructions. Among these, one intriguing example constructs Spence difference sets in (A_4 times C_3) by using (3, 3, 3, 1)-relative difference sets in a non-normal subgroup isomorphic to (C_3^2). Drisko [3] has a note implying that his techniques allow constructions of Spence difference sets in groups with a noncentral normal subgroup isomorphic to (C_3^{d+1}) as long as (frac{3^{d+1}-1}{2}) is a prime power. We generalize this result by constructing Spence difference sets in similar families of groups, but we drop the requirement that (frac{3^{d+1}-1}{2}) is a prime power. We conjecture that any group of order (frac{3^{d+1}(3^{d+1}-1)}{2}) with a normal subgroup isomorphic to (C_3^{d+1}) will have a Spence difference set (this is analogous to Dillon’s conjecture in 2-groups, and that result was proved in Drisko’s work). Finally, we present the first known example of a Spence difference set in a group where the Sylow 3-subgroup is nonabelian and has exponent bigger than 3. This new construction, found by computing the full automorphism group (textrm{Aut}(mathcal {D})) of a symmetric design associated to a known Spence difference set and identifying a regular subgroup of (textrm{Aut}(mathcal {D})), uses (3, 3, 3, 1)-relative difference sets to describe the difference set.

Spence [9]构建了(left( (frac{3^{d+1}(3^{d+1}-1)}{2}, (frac{3^d(3^{d+1}+1)}{2}、对于 d 为任意正整数,K 为任意阶为 (frac{3^{d+1}-1}{2})的群(K times C_3^{d+1})中的差集。史密斯和韦伯斯特[8]详尽地研究了 (d=1) 的情况,而不要求群具有上述形式,并发现了许多构造。其中,一个有趣的例子是通过在与(C_3^2)同构的非正态子群中使用(3, 3, 3, 1)相关差集来构造(A_4 times C_3)中的斯宾塞差集。Drisko [3] 有一个注释暗示,只要 (frac{3^{d+1}-1}{2}) 是一个素幂,他的技术就可以在具有与 (C_3^{d+1}) 同构的非中心正态子群的群中构造斯宾塞差集。我们通过在类似的群族中构造斯宾塞差集来推广这一结果,但我们放弃了 (frac{3^{d+1}-1}{2}) 是素幂的要求。我们猜想,任何阶为 (frac{3^{d+1}(3^{d+1}-1)}{2})的群,其正常子群与 (C_3^{d+1})同构,都会有一个斯宾塞差集(这类似于 2 群中狄龙的猜想,该结果在德里斯科的著作中得到了证明)。最后,我们提出了第一个已知的斯宾塞差集的例子,在这个群中,Sylow 3 子群是非阿贝尔的,并且指数大于 3。这种新构造是通过计算与已知斯彭斯差集相关的对称设计的全自形群(textrm{Aut}(mathcal {D})),并识别出(textrm{Aut}(mathcal {D})的一个正则子群而发现的,它使用(3, 3, 3, 1)相关差集来描述差集。
{"title":"New spence difference sets","authors":"James A. Davis, John Polhill, Ken Smith, Eric Swartz, Jordan Webster","doi":"10.1007/s10623-024-01446-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01446-2","url":null,"abstract":"<p>Spence [9] constructed <span>(left( frac{3^{d+1}(3^{d+1}-1)}{2}, frac{3^d(3^{d+1}+1)}{2}, frac{3^d(3^d+1)}{2}right) )</span>-difference sets in groups <span>(K times C_3^{d+1})</span> for <i>d</i> any positive integer and <i>K</i> any group of order <span>(frac{3^{d+1}-1}{2})</span>. Smith and Webster [8] have exhaustively studied the <span>(d=1)</span> case without requiring that the group have the form listed above and found many constructions. Among these, one intriguing example constructs Spence difference sets in <span>(A_4 times C_3)</span> by using (3, 3, 3, 1)-relative difference sets in a non-normal subgroup isomorphic to <span>(C_3^2)</span>. Drisko [3] has a note implying that his techniques allow constructions of Spence difference sets in groups with a noncentral normal subgroup isomorphic to <span>(C_3^{d+1})</span> as long as <span>(frac{3^{d+1}-1}{2})</span> is a prime power. We generalize this result by constructing Spence difference sets in similar families of groups, but we drop the requirement that <span>(frac{3^{d+1}-1}{2})</span> is a prime power. We conjecture that any group of order <span>(frac{3^{d+1}(3^{d+1}-1)}{2})</span> with a normal subgroup isomorphic to <span>(C_3^{d+1})</span> will have a Spence difference set (this is analogous to Dillon’s conjecture in 2-groups, and that result was proved in Drisko’s work). Finally, we present the first known example of a Spence difference set in a group where the Sylow 3-subgroup is nonabelian and has exponent bigger than 3. This new construction, found by computing the full automorphism group <span>(textrm{Aut}(mathcal {D}))</span> of a symmetric design associated to a known Spence difference set and identifying a regular subgroup of <span>(textrm{Aut}(mathcal {D}))</span>, uses (3, 3, 3, 1)-relative difference sets to describe the difference set.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141577898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vectorial negabent concepts: similarities, differences, and generalizations 矢量否定概念:相似性、差异性和概括性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-05 DOI: 10.1007/s10623-024-01454-2
Nurdagül Anbar, Sadmir Kudin, Wilfried Meidl, Enes Pasalic, Alexandr Polujan

In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial negabent and vectorial bent-negabent concepts are introduced, which leads to seemingly contradictory results. One of the main motivations for this article is to clarify the differences and similarities between these two concepts. Moreover, the negabent concept is extended to generalized Boolean functions from ({mathbb {F}}_2^n) to the cyclic group ({mathbb {Z}}_{2^k}). It is shown how to obtain nega-({mathbb {Z}}_{2^k})-bent functions from ({mathbb {Z}}_{2^k})-bent functions, or equivalently, corresponding non-splitting relative difference sets from the splitting relative difference sets. This generalizes the shifting results for Boolean bent and negabent functions. We finally point to constructions of ({mathbb {Z}}_8)-bent functions employing permutations with the (({mathcal {A}}_m)) property, and more generally we show that the inverse permutation gives rise to ({mathbb {Z}}_{2^k})-bent functions.

在 Pasalic 等人(IEEE Trans Inf Theory 69:2702-2712, 2023)以及 Anbar 和 Meidl(Cryptogr Commun 10:235-249, 2018)的文章中,引入了两个不同的矢量否定和矢量弯曲否定概念,这导致了看似矛盾的结果。本文的主要动机之一是澄清这两个概念之间的异同。此外,本文将否定概念扩展到从({mathbb {F}}_2^n) 到循环群({mathbb {Z}}_{2^k}) 的广义布尔函数。这说明了如何从 ({mathbb {Z}_{2^k})-bent 函数得到否定-({mathbb {Z}_{2^k})-bent 函数,或者等价地,从分裂相对差集得到相应的非分裂相对差集。这推广了布尔弯曲函数和负弯曲函数的移位结果。最后,我们指出了使用具有 (({mathcal {A}}_m))性质的置换来构造 ({mathbb {Z}_8)- 本特函数,更一般地说,我们证明了逆置换会产生 ({mathbb {Z}_{2^k})- 本特函数。
{"title":"Vectorial negabent concepts: similarities, differences, and generalizations","authors":"Nurdagül Anbar, Sadmir Kudin, Wilfried Meidl, Enes Pasalic, Alexandr Polujan","doi":"10.1007/s10623-024-01454-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01454-2","url":null,"abstract":"<p>In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial negabent and vectorial bent-negabent concepts are introduced, which leads to seemingly contradictory results. One of the main motivations for this article is to clarify the differences and similarities between these two concepts. Moreover, the negabent concept is extended to generalized Boolean functions from <span>({mathbb {F}}_2^n)</span> to the cyclic group <span>({mathbb {Z}}_{2^k})</span>. It is shown how to obtain nega-<span>({mathbb {Z}}_{2^k})</span>-bent functions from <span>({mathbb {Z}}_{2^k})</span>-bent functions, or equivalently, corresponding non-splitting relative difference sets from the splitting relative difference sets. This generalizes the shifting results for Boolean bent and negabent functions. We finally point to constructions of <span>({mathbb {Z}}_8)</span>-bent functions employing permutations with the <span>(({mathcal {A}}_m))</span> property, and more generally we show that the inverse permutation gives rise to <span>({mathbb {Z}}_{2^k})</span>-bent functions.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"35 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141545935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Additivity of symmetric and subspace 2-designs 对称和子空间 2 设计的可加性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-05 DOI: 10.1007/s10623-024-01452-4
Marco Buratti, Anamari Nakić

A 2-((v,k,lambda )) design is additive (or strongly additive) if it is possible to embed it in a suitable abelian group G in such a way that its block set is contained in (or coincides with) the set of all zero-sum k-subsets of its point set. Explicit results on the additivity or strong additivity of symmetric designs and subspace 2-designs are presented. In particular, the strong additivity of PG(_d(n,q)), which was known to be additive only for (q=2) or (d=n-1), is always established.

如果可以将一个 2-((v,k,lambda ))设计嵌入到一个合适的无方群 G 中,使得其块集包含在(或重合于)其点集的所有零和 k 子集的集合中,那么这个设计就是可加的(或强可加的)。本文给出了对称设计和子空间 2 设计的可加性或强可加性的明确结果。特别是,PG(_d(n,q))的强可加性总是成立的,而已知的可加性只适用于(q=2)或(d=n-1)。
{"title":"Additivity of symmetric and subspace 2-designs","authors":"Marco Buratti, Anamari Nakić","doi":"10.1007/s10623-024-01452-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01452-4","url":null,"abstract":"<p>A 2-<span>((v,k,lambda ))</span> design is additive (or strongly additive) if it is possible to embed it in a suitable abelian group <i>G</i> in such a way that its block set is contained in (or coincides with) the set of all zero-sum <i>k</i>-subsets of its point set. Explicit results on the additivity or strong additivity of symmetric designs and subspace 2-designs are presented. In particular, the strong additivity of PG<span>(_d(n,q))</span>, which was known to be additive only for <span>(q=2)</span> or <span>(d=n-1)</span>, is always established.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"67 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141545934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Around LCD group codes 围绕 LCD 组代码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-05 DOI: 10.1007/s10623-024-01451-5
Javier de la Cruz, Wolfgang Willems

In this note we answer some questions on (text{ LCD }) group codes posed in de la Cruz and Willems (Des Codes Cryptogr 86:2065–2073, 2018) and (Vietnam J Math 51:721–729, 2023). Furthermore, over prime fields we determine completely the p-part of the divisor of an (text{ LCD }) group code. In addition we present a natural construction of nearly (text{ LCD }) codes.

在这篇笔记中,我们回答了德拉克鲁兹和维尔姆斯(Des Codes Cryptogr 86:2065-2073, 2018)和(Vietnam J Math 51:721-729, 2023)中提出的一些关于(text{ LCD } )群码的问题。此外,在素域上,我们完全确定了一个 (text{ LCD }) 群码的除数的 p 部分。此外,我们还提出了一种近(text{ LCD } )码的自然构造。
{"title":"Around LCD group codes","authors":"Javier de la Cruz, Wolfgang Willems","doi":"10.1007/s10623-024-01451-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01451-5","url":null,"abstract":"<p>In this note we answer some questions on <span>(text{ LCD })</span> group codes posed in de la Cruz and Willems (Des Codes Cryptogr 86:2065–2073, 2018) and (Vietnam J Math 51:721–729, 2023). Furthermore, over prime fields we determine completely the <i>p</i>-part of the divisor of an <span>(text{ LCD })</span> group code. In addition we present a natural construction of nearly <span>(text{ LCD })</span> codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"38 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141545936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1