Pub Date : 2024-05-24DOI: 10.1007/s10623-024-01423-9
Jing Qiu, Fang-Wei Fu
In distributed storage systems, an r-Locally Repairable Code (r-LRC) ensures that a failed symbol can be recovered by accessing at most r other symbols. Prakash et al. in (Proceedings of IEEE International Symposium on Information Theory, pp. 2776–2780, 2012) further introduced the concept of ((r, delta ))-LRC, where (delta ge 2), which can deal with the symbol failure in the presence of extra (delta -2) symbol failures still by accessing at most r other symbols. In particular, an r-LRC is just an (r, 2)-LRC. Luo and Ling in (Des Codes Cryptogr 90:1271–1287, 2022) obtained some alphabet-optimal r-LRCs concerning the Cadambe–Mazumdar bound from optimal linear codes constructed by special projective spaces. In this paper, we generalize the results of Luo and Ling in (Des Codes Cryptogr 90:1271–1287, 2022). Firstly, we generalize the result of constructing optimal linear codes to larger code length. In particular, we present the conditions for the constructed linear codes to qualify as Griesmer codes or distance-optimal codes. Secondly, we explore the locality of the constructed codes. The novelty of our work lies in establishing the locality as ((r,delta ))-locality and ((r,delta ))-locality with availability, in contrast to the previous literature that only considered r-locality. In addition, through the analysis combining the code parameters and the Cadambe–Mazumdar-like bound for ((r,delta ))-LRCs, we obtained some alphabet-optimal ((r, delta ))-LRCs and alphabet-optimal ((r, delta ))-LRCs with availability.
在分布式存储系统中,r-局部可修复代码(r-LRC)可确保通过访问至多 r 个其他符号来恢复故障符号。Prakash 等人在(Proceedings of IEEE International Symposium on Information Theory, pp.特别地,r-LRC 只是一个(r, 2)-LRC。罗和凌在(Des Codes Cryptogr 90:1271-1287,2022)中从特殊投影空间构造的最优线性编码中得到了一些字母表最优的 r-LRC ,涉及 Cadambe-Mazumdar 约束。在本文中,我们概括了罗和凌在(Des Codes Cryptogr 90:1271-1287, 2022)中的结果。首先,我们将构造最优线性码的结果推广到更大的码长。特别是,我们提出了所构造的线性编码符合格里斯梅尔编码或距离最优编码的条件。其次,我们探讨了所构造代码的局部性。我们工作的新颖之处在于将位置性确定为((r,delta ))-位置性和具有可用性的((r,delta ))-位置性,而以往的文献只考虑了r-位置性。此外,通过结合代码参数和 Cadambe-Mazumdar-like bound 对于 ((r,delta ))-LRCs 的分析,我们得到了一些字母最优的 ((r, delta ))-LRCs 和字母最优的 ((r, delta ))-LRCs with availability。
{"title":"Some new constructions of optimal linear codes and alphabet-optimal $$(r,delta )$$ -locally repairable codes","authors":"Jing Qiu, Fang-Wei Fu","doi":"10.1007/s10623-024-01423-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01423-9","url":null,"abstract":"<p>In distributed storage systems, an <i>r</i>-Locally Repairable Code (<i>r</i>-LRC) ensures that a failed symbol can be recovered by accessing at most <i>r</i> other symbols. Prakash et al. in (Proceedings of IEEE International Symposium on Information Theory, pp. 2776–2780, 2012) further introduced the concept of <span>((r, delta ))</span>-LRC, where <span>(delta ge 2)</span>, which can deal with the symbol failure in the presence of extra <span>(delta -2)</span> symbol failures still by accessing at most <i>r</i> other symbols. In particular, an <i>r</i>-LRC is just an (<i>r</i>, 2)-LRC. Luo and Ling in (Des Codes Cryptogr 90:1271–1287, 2022) obtained some alphabet-optimal <i>r</i>-LRCs concerning the Cadambe–Mazumdar bound from optimal linear codes constructed by special projective spaces. In this paper, we generalize the results of Luo and Ling in (Des Codes Cryptogr 90:1271–1287, 2022). Firstly, we generalize the result of constructing optimal linear codes to larger code length. In particular, we present the conditions for the constructed linear codes to qualify as Griesmer codes or distance-optimal codes. Secondly, we explore the locality of the constructed codes. The novelty of our work lies in establishing the locality as <span>((r,delta ))</span>-locality and <span>((r,delta ))</span>-locality with availability, in contrast to the previous literature that only considered <i>r</i>-locality. In addition, through the analysis combining the code parameters and the Cadambe–Mazumdar-like bound for <span>((r,delta ))</span>-LRCs, we obtained some alphabet-optimal <span>((r, delta ))</span>-LRCs and alphabet-optimal <span>((r, delta ))</span>-LRCs with availability.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141096529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-24DOI: 10.1007/s10623-024-01415-9
Elena Berardini, Alessio Caminata, Alberto Ravagnani
We investigate CSS and CSS-T quantum error-correcting codes from the point of view of their existence, rarity, and performance. We give a lower bound on the number of pairs of linear codes that give rise to a CSS code with good correction capability, showing that such pairs are easy to produce with a randomized construction. We then prove that CSS-T codes exhibit the opposite behaviour, showing also that, under very natural assumptions, their rate and relative distance cannot be simultaneously large. This partially answers an open question on the feasible parameters of CSS-T codes. We conclude with a simple construction of CSS-T codes from Hermitian curves. The paper also offers a concise introduction to CSS and CSS-T codes from the point of view of classical coding theory.
{"title":"Structure of CSS and CSS-T quantum codes","authors":"Elena Berardini, Alessio Caminata, Alberto Ravagnani","doi":"10.1007/s10623-024-01415-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01415-9","url":null,"abstract":"<p>We investigate CSS and CSS-T quantum error-correcting codes from the point of view of their existence, rarity, and performance. We give a lower bound on the number of pairs of linear codes that give rise to a CSS code with good correction capability, showing that such pairs are easy to produce with a randomized construction. We then prove that CSS-T codes exhibit the opposite behaviour, showing also that, under very natural assumptions, their rate and relative distance cannot be simultaneously large. This partially answers an open question on the feasible parameters of CSS-T codes. We conclude with a simple construction of CSS-T codes from Hermitian curves. The paper also offers a concise introduction to CSS and CSS-T codes from the point of view of classical coding theory.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141096554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-23DOI: 10.1007/s10623-024-01418-6
Joanne Hall, Daniel Horsley, Douglas R. Stinson
In situations where every item in a data set must be compared with every other item in the set, it may be desirable to store the data across a number of machines in such a way that any two data items are stored together on at least one machine. One way to evaluate the efficiency of such a distribution is by the largest fraction of the data it requires to be allocated to any one machine. The all-to-all comparison (ATAC) data limit formmachines is a measure of the minimum of this value across all possible such distributions. In this paper we further the study of ATAC data limits. We begin by investigating the data limits achievable using various classes of combinatorial designs. In particular, we examine the cases of transversal designs and projective Hjelmslev planes. We then observe relationships between data limits and the previously studied combinatorial parameters of fractional matching numbers and covering numbers. Finally, we prove a lower bound on the ATAC data limit that improves on one of Hall, Kelly and Tian, and examine the special cases where equality in this bound is possible.
{"title":"Bounds on data limits for all-to-all comparison from combinatorial designs","authors":"Joanne Hall, Daniel Horsley, Douglas R. Stinson","doi":"10.1007/s10623-024-01418-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01418-6","url":null,"abstract":"<p>In situations where every item in a data set must be compared with every other item in the set, it may be desirable to store the data across a number of machines in such a way that any two data items are stored together on at least one machine. One way to evaluate the efficiency of such a distribution is by the largest fraction of the data it requires to be allocated to any one machine. The <i>all-to-all comparison (ATAC) data limit for</i> <i>m</i> <i>machines</i> is a measure of the minimum of this value across all possible such distributions. In this paper we further the study of ATAC data limits. We begin by investigating the data limits achievable using various classes of combinatorial designs. In particular, we examine the cases of transversal designs and projective Hjelmslev planes. We then observe relationships between data limits and the previously studied combinatorial parameters of <i>fractional matching numbers</i> and <i>covering numbers</i>. Finally, we prove a lower bound on the ATAC data limit that improves on one of Hall, Kelly and Tian, and examine the special cases where equality in this bound is possible.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141085453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-21DOI: 10.1007/s10623-024-01417-7
Wenjun Yu, Moshe Schwartz
Motivated by applications in DNA storage, we study a setting in which strings are affected by tandem-duplication errors. In particular, we look at two settings: disjoint tandem-duplication errors, and equal-length tandem-duplication errors. We construct codes, with positive asymptotic rate, for the two settings, as well as for their combination. Our constructions are duplication-free codes, comprising codewords that do not contain tandem duplications of specific lengths. Additionally, our codes generalize previous constructions, containing them as special cases.
受 DNA 存储应用的启发,我们研究了字符串受串联重复错误影响的情况。我们特别研究了两种情况:不相连的串联重复错误和等长串联重复错误。我们为这两种情况以及它们的组合构建了具有正渐近率的编码。我们构建的是无重复编码,包括不包含特定长度串联重复的码字。此外,我们的编码还概括了以前的构造,将它们作为特例。
{"title":"On duplication-free codes for disjoint or equal-length errors","authors":"Wenjun Yu, Moshe Schwartz","doi":"10.1007/s10623-024-01417-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01417-7","url":null,"abstract":"<p>Motivated by applications in DNA storage, we study a setting in which strings are affected by tandem-duplication errors. In particular, we look at two settings: disjoint tandem-duplication errors, and equal-length tandem-duplication errors. We construct codes, with positive asymptotic rate, for the two settings, as well as for their combination. Our constructions are duplication-free codes, comprising codewords that do not contain tandem duplications of specific lengths. Additionally, our codes generalize previous constructions, containing them as special cases.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141074124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-21DOI: 10.1007/s10623-024-01416-8
Muhammad Imran, Gábor Ivanyos
The semidirect discrete logarithm problem (SDLP) is the following analogue of the standard discrete logarithm problem in the semidirect product semigroup (Grtimes {{,textrm{End},}}(G)) for a finite semigroup G. Given (gin G, sigma in {{,textrm{End},}}(G)), and (h=prod _{i=0}^{t-1}sigma ^i(g)) for some integer t, the SDLP((G,sigma )), for g and h, asks to determine t. As Shor’s algorithm crucially depends on commutativity, it is believed not to be applicable to the SDLP. For generic semigroups, the best known algorithm for the SDLP is based on Kuperberg’s subexponential time quantum algorithm. Still, the problem plays a central role in the security of certain proposed cryptosystems in the family of semidirect product key exchange. This includes a recently proposed signature protocol called SPDH-Sign. In this paper, we show that the SDLP is even easier in some important special cases. Specifically, for a finite group G, we describe quantum algorithms for the SDLP in (Grtimes {textrm{Aut}}(G)) for the following two classes of instances: the first one is when G is solvable and the second is when G is a matrix group and a power of (sigma ) with a polynomially small exponent is an inner automorphism of G. We further extend the results to groups composed of factors from these classes. A consequence is that SPDH-Sign and similar cryptosystems whose security assumption is based on the presumed hardness of the SDLP in the cases described above are insecure against quantum attacks. The quantum ingredients we rely on are not new: these are Shor’s factoring and discrete logarithm algorithms and well-known generalizations.
半直接离散对数问题(SDLP)是有限半群 G 的半直接积半群 (Grtimes {{,textrm{End},}}(G)) 中的标准离散对数问题的以下类比。给定 (gin G, sigma in {{,textrm{End},}}(G)), and (h=prod _{i=0}^{t-1}sigma ^i(g)) for some integer t, SDLP((G,sigma )), for g and h, asks to determine t.由于 Shor 算法在很大程度上取决于交换性,人们认为它不适用于 SDLP。对于一般的半群,SDLP 最著名的算法是基于 Kuperberg 的亚指数时间量子算法。不过,这个问题在半直接乘积密钥交换系列中的某些拟议密码系统的安全性方面仍起着核心作用。其中包括最近提出的一种名为 SPDH-Sign 的签名协议。在本文中,我们证明了在一些重要的特殊情况下,SDLP 甚至更加简单。具体来说,对于有限群 G,我们描述了以下两类情况下 (Grtimes {textrm{Aut}}(G)) 中 SDLP 的量子算法:第一类情况是 G 是可解的,第二类情况是 G 是矩阵群,且具有极小指数的 (sigma ) 的幂是 G 的内自动形。其结果是,SPDH-Sign 和类似的密码系统(其安全假设基于上述情况下 SDLP 的假定硬度)对量子攻击是不安全的。我们所依赖的量子成分并不新鲜:它们是肖尔因式分解算法和离散对数算法以及众所周知的广义算法。
{"title":"Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem","authors":"Muhammad Imran, Gábor Ivanyos","doi":"10.1007/s10623-024-01416-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01416-8","url":null,"abstract":"<p>The semidirect discrete logarithm problem (SDLP) is the following analogue of the standard discrete logarithm problem in the semidirect product semigroup <span>(Grtimes {{,textrm{End},}}(G))</span> for a finite semigroup <i>G</i>. Given <span>(gin G, sigma in {{,textrm{End},}}(G))</span>, and <span>(h=prod _{i=0}^{t-1}sigma ^i(g))</span> for some integer <i>t</i>, the SDLP<span>((G,sigma ))</span>, for <i>g</i> and <i>h</i>, asks to determine <i>t</i>. As Shor’s algorithm crucially depends on commutativity, it is believed not to be applicable to the SDLP. For generic semigroups, the best known algorithm for the SDLP is based on Kuperberg’s subexponential time quantum algorithm. Still, the problem plays a central role in the security of certain proposed cryptosystems in the family of <i>semidirect product key exchange</i>. This includes a recently proposed signature protocol called SPDH-Sign. In this paper, we show that the SDLP is even easier in some important special cases. Specifically, for a finite group <i>G</i>, we describe quantum algorithms for the SDLP in <span>(Grtimes {textrm{Aut}}(G))</span> for the following two classes of instances: the first one is when <i>G</i> is solvable and the second is when <i>G</i> is a matrix group and a power of <span>(sigma )</span> with a polynomially small exponent is an inner automorphism of <i>G</i>. We further extend the results to groups composed of factors from these classes. A consequence is that SPDH-Sign and similar cryptosystems whose security assumption is based on the presumed hardness of the SDLP in the cases described above are insecure against quantum attacks. The quantum ingredients we rely on are not new: these are Shor’s factoring and discrete logarithm algorithms and well-known generalizations.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141074250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-21DOI: 10.1007/s10623-024-01421-x
Masaaki Harada
We introduce quaternary modified four (mu )-circulant codes as a modification of four circulant codes. We give basic properties of quaternary modified four (mu )-circulant Hermitian self-dual codes. We also construct quaternary modified four (mu )-circulant Hermitian self-dual codes having large minimum weights. Two quaternary Hermitian self-dual [56, 28, 16] codes are constructed for the first time. These codes improve the previously known lower bound on the largest minimum weight among all quaternary (linear) [56, 28] codes. In addition, these codes imply the existence of a quantum [[56, 0, 16]] code.
{"title":"A method for constructing quaternary Hermitian self-dual codes and an application to quantum codes","authors":"Masaaki Harada","doi":"10.1007/s10623-024-01421-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01421-x","url":null,"abstract":"<p>We introduce quaternary modified four <span>(mu )</span>-circulant codes as a modification of four circulant codes. We give basic properties of quaternary modified four <span>(mu )</span>-circulant Hermitian self-dual codes. We also construct quaternary modified four <span>(mu )</span>-circulant Hermitian self-dual codes having large minimum weights. Two quaternary Hermitian self-dual [56, 28, 16] codes are constructed for the first time. These codes improve the previously known lower bound on the largest minimum weight among all quaternary (linear) [56, 28] codes. In addition, these codes imply the existence of a quantum [[56, 0, 16]] code.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141074271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work, we propose two new types of codes with locality, namely, locally maximal recoverable (LMR) codes and (lambda )-maximally recoverable ((lambda )-MR) codes. The LMR codes are a subclass of codes with ((r, delta ))-locality such that they can correct h additional erasures in any one local set, in addition to having ((r, delta ))-locality. These codes are a restricted case of maximally recoverable (MR) codes, which enable recovery from all information-theoretically correctable erasure patterns in a local set. The (lambda )-MR codes are a subclass of LMR codes which can also handle (lambda ) erasures from any coordinate positions. We give constructions for both of these families of codes. We also study the LMR codes that satisfy the complementary dual property. It is well known that codes with this property are capable of safeguarding communication systems against fault injection attacks. We give a construction of distance-optimal cyclic LMR codes that satisfy the complementary dual property.
{"title":"Locally maximal recoverable codes and LMR-LCD codes","authors":"Rajendra Prasad Rajpurohit, Maheshanand Bhaintwal, Charul Rajput","doi":"10.1007/s10623-024-01419-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01419-5","url":null,"abstract":"<p>In this work, we propose two new types of codes with locality, namely, locally maximal recoverable (LMR) codes and <span>(lambda )</span>-maximally recoverable (<span>(lambda )</span>-MR) codes. The LMR codes are a subclass of codes with <span>((r, delta ))</span>-locality such that they can correct <i>h</i> additional erasures in any one local set, in addition to having <span>((r, delta ))</span>-locality. These codes are a restricted case of maximally recoverable (MR) codes, which enable recovery from all information-theoretically correctable erasure patterns in a local set. The <span>(lambda )</span>-MR codes are a subclass of LMR codes which can also handle <span>(lambda )</span> erasures from any coordinate positions. We give constructions for both of these families of codes. We also study the LMR codes that satisfy the complementary dual property. It is well known that codes with this property are capable of safeguarding communication systems against fault injection attacks. We give a construction of distance-optimal cyclic LMR codes that satisfy the complementary dual property.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140953269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.1007/s10623-024-01420-y
Xinran Wang, Ziling Heng, Fengwei Li, Qin Yue
LCD codes and (almost) optimally extendable codes can be used to safeguard against fault injection attacks (FIA) and side-channel attacks (SCA) in the implementations of block ciphers. The first objective of this paper is to use a family of binary self-orthogonal codes given by Ding and Tang (Cryptogr Commun 12:1011–1033, 2020) to construct a family of binary LCD codes with new parameters. The parameters of the binary LCD codes and their duals are explicitly determined. It turns out that the codes by Ding and Tang are almost optimally extendable codes. The second objective is to prove that two families of known q-ary linear codes given by Heng et al. (IEEE Trans Inf Theory 66(11):6872–6883, 2020) are self-orthogonal. Using these two families of self-orthogonal codes, we construct another two families of q-ary LCD codes. The parameters of the LCD codes are determined and many optimal codes are produced. Besides, the two known families of q-ary linear codes are also proved to be almost optimally extendable codes.
液晶编码和(几乎)可优化扩展的编码可用于防范块密码实现中的故障注入攻击(FIA)和侧信道攻击(SCA)。本文的第一个目标是利用丁和唐(Cryptogr Commun 12:1011-1033, 2020)给出的二进制自正交码族构建具有新参数的二进制 LCD 码族。二进制 LCD 码及其对偶码的参数是明确确定的。结果表明,丁和唐的编码几乎是可优化扩展的编码。第二个目标是证明恒等人(IEEE Trans Inf Theory 66(11):6872-6883, 2020)给出的两个已知 q-ary 线性编码族是自正交的。利用这两个自正交码族,我们构建了另外两个 q-ary LCD 码族。我们确定了液晶编码的参数,并产生了许多最优编码。此外,我们还证明了已知的两个 q-ary 线性码族几乎是可优化扩展的码。
{"title":"LCD codes and almost optimally extendable codes from self-orthogonal codes","authors":"Xinran Wang, Ziling Heng, Fengwei Li, Qin Yue","doi":"10.1007/s10623-024-01420-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01420-y","url":null,"abstract":"<p>LCD codes and (almost) optimally extendable codes can be used to safeguard against fault injection attacks (FIA) and side-channel attacks (SCA) in the implementations of block ciphers. The first objective of this paper is to use a family of binary self-orthogonal codes given by Ding and Tang (Cryptogr Commun 12:1011–1033, 2020) to construct a family of binary LCD codes with new parameters. The parameters of the binary LCD codes and their duals are explicitly determined. It turns out that the codes by Ding and Tang are almost optimally extendable codes. The second objective is to prove that two families of known <i>q</i>-ary linear codes given by Heng et al. (IEEE Trans Inf Theory 66(11):6872–6883, 2020) are self-orthogonal. Using these two families of self-orthogonal codes, we construct another two families of <i>q</i>-ary LCD codes. The parameters of the LCD codes are determined and many optimal codes are produced. Besides, the two known families of <i>q</i>-ary linear codes are also proved to be almost optimally extendable codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140953276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-14DOI: 10.1007/s10623-024-01414-w
Hadi Kharaghani, Thomas Pender, Vladimir Tonchev
Balanced generalized weight matrices are used to construct optimal constant weight codes that are monomially inequivalent to codes derived from the classical simplex codes. What’s more, these codes can be assumed to be generated entirely by (omega )-shifts of a single codeword where (omega ) is a primitive element of a Galois field. Additional constant weight codes are derived by projecting onto subgroups of the alphabet sets. These too are shown to be optimal.
{"title":"On optimal constant weight codes derived from $$omega $$ -circulant balanced generalized weighing matrices","authors":"Hadi Kharaghani, Thomas Pender, Vladimir Tonchev","doi":"10.1007/s10623-024-01414-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01414-w","url":null,"abstract":"<p>Balanced generalized weight matrices are used to construct optimal constant weight codes that are monomially inequivalent to codes derived from the classical simplex codes. What’s more, these codes can be assumed to be generated entirely by <span>(omega )</span>-shifts of a single codeword where <span>(omega )</span> is a primitive element of a Galois field. Additional constant weight codes are derived by projecting onto subgroups of the alphabet sets. These too are shown to be optimal.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140940432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.1007/s10623-024-01412-y
María Chara, Ricardo Podestá, Luciane Quoos, Ricardo Toledano
In this work we investigate the problem of producing iso-dual algebraic geometry (AG) codes over a finite field (mathbb {F}_{q}) with q elements. Given a finite separable extension (mathcal {M}/mathcal {F}) of function fields and an iso-dual AG-code (mathcal {C}) defined over (mathcal {F}), we provide a general method to lift the code (mathcal {C}) to another iso-dual AG-code (tilde{mathcal {C}}) defined over (mathcal {M}) under some assumptions on the parity of the involved different exponents. We apply this method to lift iso-dual AG-codes over the rational function field to elementary abelian p-extensions, like the maximal function fields defined by the Hermitian, Suzuki, and one covered by the GGS function field. We also obtain long binary and ternary iso-dual AG-codes defined over cyclotomic extensions.
在这项工作中,我们研究了在具有 q 个元素的有限域 (mathbb {F}_{q}) 上生成等双代数几何(AG)代码的问题。给定函数域的有限可分离扩展 (mathcal {M}/mathcal {F}) 和定义在 (mathcal {F}) 上的等双 AG 代码 (mathcal {C})、我们提供了一种一般方法,在对所涉及的不同指数的奇偶性做一些假设的情况下,将代码 (mathcal {C}) 提升到定义在 (mathcal {M}) 上的另一个等双 AG 代码 (tilde/{mathcal {C}) 。我们应用这种方法把有理函数域上的等双 AG 代码提升到基本无住民 p 扩展,比如由赫尔墨斯、铃木和一个由 GGS 函数域覆盖的最大函数域定义的等双 AG 代码。我们还获得了定义在环函扩展上的长二元和三元等双 AG 代码。
{"title":"Lifting iso-dual algebraic geometry codes","authors":"María Chara, Ricardo Podestá, Luciane Quoos, Ricardo Toledano","doi":"10.1007/s10623-024-01412-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01412-y","url":null,"abstract":"<p>In this work we investigate the problem of producing iso-dual algebraic geometry (AG) codes over a finite field <span>(mathbb {F}_{q})</span> with <i>q</i> elements. Given a finite separable extension <span>(mathcal {M}/mathcal {F})</span> of function fields and an iso-dual AG-code <span>(mathcal {C})</span> defined over <span>(mathcal {F})</span>, we provide a general method to lift the code <span>(mathcal {C})</span> to another iso-dual AG-code <span>(tilde{mathcal {C}})</span> defined over <span>(mathcal {M})</span> under some assumptions on the parity of the involved different exponents. We apply this method to lift iso-dual AG-codes over the rational function field to elementary abelian <i>p</i>-extensions, like the maximal function fields defined by the Hermitian, Suzuki, and one covered by the <i>GGS</i> function field. We also obtain long binary and ternary iso-dual AG-codes defined over cyclotomic extensions.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140890382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}