首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Knot theory and error-correcting codes 结理论与纠错码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-18 DOI: 10.1007/s10623-025-01615-x
Altan B. Kılıç, Anne Nijsten, Ruud Pellikaan, Alberto Ravagnani

This paper builds a novel bridge between algebraic coding theory and mathematical knot theory, with applications in both directions. We give methods to construct error-correcting codes starting from the colorings of a knot, describing through a series of results how the properties of the knot translate into code parameters. We show that knots can be used to obtain error-correcting codes with prescribed parameters and an efficient decoding algorithm.

本文在代数编码理论和数学结理论之间建立了一个新的桥梁,在两个方向上都有应用。我们给出了从结的颜色开始构造纠错码的方法,通过一系列的结果描述了结的性质如何转化为码参数。我们证明了结点可以用来获得具有指定参数和有效译码算法的纠错码。
{"title":"Knot theory and error-correcting codes","authors":"Altan B. Kılıç, Anne Nijsten, Ruud Pellikaan, Alberto Ravagnani","doi":"10.1007/s10623-025-01615-x","DOIUrl":"https://doi.org/10.1007/s10623-025-01615-x","url":null,"abstract":"<p>This paper builds a novel bridge between algebraic coding theory and mathematical knot theory, with applications in both directions. We give methods to construct error-correcting codes starting from the colorings of a knot, describing through a series of results how the properties of the knot translate into code parameters. We show that knots can be used to obtain error-correcting codes with prescribed parameters and an efficient decoding algorithm.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143849749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing two subfields to accelerate individual logarithm computation in extended tower number field sieve 利用两个子域加速扩展塔数场筛中单个对数的计算
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-10 DOI: 10.1007/s10623-025-01590-3
Yuqing Zhu, Chang Lv, Jiqiang Liu

The hardness of discrete logarithm problem (DLP) over finite fields forms the security foundation of many cryptographic schemes. When the characteristic is not small, the state-of-the-art algorithms for solving the DLP are the number field sieve (NFS) and its variants. NFS first computes the logarithms of the factor base, which consists of elements of small norms. Then, for a target element, its logarithm is calculated by establishing a relation with the factor base. Although computing the factor-base elements is the most time-consuming part of NFS, it can be performed only once and treated as pre-computation for a fixed finite field when multiple logarithms need to be computed. In this paper, we present a method for accelerating individual logarithm computation by utilizing two subfields. We focus on the case where the extension degree of the finite field is a multiple of 6 within the extended tower number field sieve framework. Our method allows for the construction of an element with a lower degree, while maintaining the same coefficient bound compared to Guillevic’s method, which uses only one subfield. Consequently, the element derived from our approach enjoys a smaller norm, which will improve the efficiency in individual logarithm computation.

有限域上离散对数问题(DLP)的难解性是许多密码方案的安全基础。当特征不小时,解决DLP的最先进算法是数字字段筛选(NFS)及其变体。NFS首先计算因子基的对数,因子基由小规范的元素组成。然后,对于目标元素,通过与因子基建立关系来计算其对数。虽然计算基于因子的元素是NFS中最耗时的部分,但是当需要计算多个对数时,它可以只执行一次,并作为固定有限域的预计算。在本文中,我们提出了一种利用两个子域加速单个对数计算的方法。我们重点研究了扩展塔数场筛网框架内有限域的扩展度是6的倍数的情况。与Guillevic的方法相比,我们的方法允许构造具有较低度的元素,同时保持相同的系数界,Guillevic的方法只使用一个子域。因此,从我们的方法中得到的元素具有较小的范数,这将提高单个对数计算的效率。
{"title":"Utilizing two subfields to accelerate individual logarithm computation in extended tower number field sieve","authors":"Yuqing Zhu, Chang Lv, Jiqiang Liu","doi":"10.1007/s10623-025-01590-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01590-3","url":null,"abstract":"<p>The hardness of discrete logarithm problem (DLP) over finite fields forms the security foundation of many cryptographic schemes. When the characteristic is not small, the state-of-the-art algorithms for solving the DLP are the number field sieve (NFS) and its variants. NFS first computes the logarithms of the factor base, which consists of elements of small norms. Then, for a target element, its logarithm is calculated by establishing a relation with the factor base. Although computing the factor-base elements is the most time-consuming part of NFS, it can be performed only once and treated as pre-computation for a fixed finite field when multiple logarithms need to be computed. In this paper, we present a method for accelerating individual logarithm computation by utilizing two subfields. We focus on the case where the extension degree of the finite field is a multiple of 6 within the extended tower number field sieve framework. Our method allows for the construction of an element with a lower degree, while maintaining the same coefficient bound compared to Guillevic’s method, which uses only one subfield. Consequently, the element derived from our approach enjoys a smaller norm, which will improve the efficiency in individual logarithm computation.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"26 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143819557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The geometry of covering codes in the sum–rank metric 和秩度量中覆盖码的几何形状
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-09 DOI: 10.1007/s10623-025-01628-6
Matteo Bonini, Martino Borello, Eimear Byrne

We introduce the concept of a sum–rank saturating system and outline its correspondence to covering properties of a sum–rank metric code. We consider the problem of determining the shortest length of a sum–rank-(rho )-saturating system of a fixed dimension, which is equivalent to the covering problem in the sum–rank metric. We obtain upper and lower bounds on this quantity. We also give constructions of saturating systems arising from geometrical structures.

我们引入了和秩饱和系统的概念,并概述了它与和秩度量码的覆盖性质的对应关系。我们考虑确定固定维的和秩- (rho ) -饱和系统的最短长度问题,它等价于和秩度量中的覆盖问题。我们得到了这个量的上界和下界。我们还给出了由几何结构引起的饱和系统的构造。
{"title":"The geometry of covering codes in the sum–rank metric","authors":"Matteo Bonini, Martino Borello, Eimear Byrne","doi":"10.1007/s10623-025-01628-6","DOIUrl":"https://doi.org/10.1007/s10623-025-01628-6","url":null,"abstract":"<p>We introduce the concept of a sum–rank saturating system and outline its correspondence to covering properties of a sum–rank metric code. We consider the problem of determining the shortest length of a sum–rank-<span>(rho )</span>-saturating system of a fixed dimension, which is equivalent to the covering problem in the sum–rank metric. We obtain upper and lower bounds on this quantity. We also give constructions of saturating systems arising from geometrical structures.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"74 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143805904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast multiplication and the PLWE–RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields 分环场无穷一族极大实子域的快速乘法和PLWE-RLWE等价
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-07 DOI: 10.1007/s10623-025-01601-3
Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti, Rodrigo M. Sánchez-Ledesma

We prove the equivalence between the Ring Learning With Errors (RLWE) and the Polynomial Learning With Errors (PLWE) problems for the maximal totally real subfield of the (2^r 3^s)th cyclotomic field for (r ge 3) and (s ge 1). Moreover, we describe a fast algorithm for computing the product of two elements in the ring of integers of these subfields. This multiplication algorithm has quasilinear complexity in the dimension of the field, as it makes use of the fast Discrete Cosine Transform (DCT). Our approach assumes that the two input polynomials are given in a basis of Chebyshev-like polynomials, in contrast to the customary power basis. To validate this assumption, we prove that the change of basis from the power basis to the Chebyshev-like basis can be computed with ({mathcal {O}}(n log n)) arithmetic operations, where n is the problem dimension. Finally, we provide a heuristic and theoretical comparison of the vulnerability to some attacks for the pth cyclotomic field versus the maximal totally real subextension of the 4pth cyclotomic field for a reasonable set of parameters of cryptographic size.

我们证明了带误差环学习(RLWE)问题与带误差多项式学习(PLWE)问题在全实数子域上的等价性 (2^r 3^s)切眼场为 (r ge 3) 和 (s ge 1). 此外,我们还描述了一种计算这些子域的整数环中两个元素乘积的快速算法。该乘法算法在域的维度上具有拟线性复杂性,因为它使用了快速的离散余弦变换(DCT)。我们的方法假设两个输入多项式是在类似切比雪夫多项式的基础上给出的,与习惯的幂基相反。为了验证这一假设,我们证明了基从幂基到类切比雪夫基的变化可以用 ({mathcal {O}}(n log n)) 算术运算,其中n是问题维数。最后,我们提供了一个启发式的和理论上的比较,在一组合理的密码大小参数下,第p个环形域与第4个环形域的最大全实子扩展对某些攻击的脆弱性。
{"title":"Fast multiplication and the PLWE–RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields","authors":"Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti, Rodrigo M. Sánchez-Ledesma","doi":"10.1007/s10623-025-01601-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01601-3","url":null,"abstract":"<p>We prove the equivalence between the Ring Learning With Errors (RLWE) and the Polynomial Learning With Errors (PLWE) problems for the maximal totally real subfield of the <span>(2^r 3^s)</span>th cyclotomic field for <span>(r ge 3)</span> and <span>(s ge 1)</span>. Moreover, we describe a fast algorithm for computing the product of two elements in the ring of integers of these subfields. This multiplication algorithm has quasilinear complexity in the dimension of the field, as it makes use of the fast Discrete Cosine Transform (DCT). Our approach assumes that the two input polynomials are given in a basis of Chebyshev-like polynomials, in contrast to the customary power basis. To validate this assumption, we prove that the change of basis from the power basis to the Chebyshev-like basis can be computed with <span>({mathcal {O}}(n log n))</span> arithmetic operations, where <i>n</i> is the problem dimension. Finally, we provide a heuristic and theoretical comparison of the vulnerability to some attacks for the <i>p</i>th cyclotomic field versus the maximal totally real subextension of the 4<i>p</i>th cyclotomic field for a reasonable set of parameters of cryptographic size.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"74 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143797694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructions of binary cyclic codes with minimum weights exceeding the square-root lower bound 最小权值超过平方根下界的二进制循环码的构造
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-07 DOI: 10.1007/s10623-025-01621-z
Hai Liu, Chunyu Gan, Chengju Li, Xueying Shi

Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. Constructing binary cyclic codes with parameters ([n, frac{n+1}{2}, d ge sqrt{n}]) is an interesting topic in coding theory, as their minimum distances have a square-root bound. Let (n=2^lambda -1), where (lambda ) has three forms: (p^2, p_1p_2, 2p_2) for odd primes (p, p_1, p_2). In this paper, we mainly construct several classes of binary cyclic codes with parameters ([2^lambda -1, k ge 2^{lambda -1}, d ge sqrt{n}]). Specifically, the binary cyclic codes ({mathcal {C}}_{(1, p^2)}), ({mathcal {C}}_{(1, 2p_2)}), ({mathcal {C}}_{(2, 2p_2)}), and ({mathcal {C}}_{(1, p_1p_2)}) have minimum distance (d ge sqrt{n}) though their dimensions satisfy (k > frac{n+1}{2}). Moreover, two classes of binary cyclic codes ({mathcal {C}}_{(2, p^2)}) and ({mathcal {C}}_{(2, p_1p_2)}) with dimension (k= frac{n+1}{2}) and minimum distance d much exceeding the square-root bound are presented, which extends the results given by Sun, Li, and Ding [30]. In fact, the rate of these two classes of binary cyclic codes are around (frac{1}{2}) and the lower bounds on their minimum distances are close to (frac{n}{log _2 n}). In addition, their extended codes are also investigated.

循环码是一种有趣的线性码,由于其高效的编解码算法,在通信和存储系统中有着广泛的应用。构造参数为([n, frac{n+1}{2}, d ge sqrt{n}])的二进制循环码是编码理论中一个有趣的话题,因为它们的最小距离具有平方根界。设(n=2^lambda -1),其中(lambda )有三种形式:(p^2, p_1p_2, 2p_2)表示奇数素数(p, p_1, p_2)。本文主要构造了几类参数为([2^lambda -1, k ge 2^{lambda -1}, d ge sqrt{n}])的二进制循环码。具体来说,二进制循环码({mathcal {C}}_{(1, p^2)})、({mathcal {C}}_{(1, 2p_2)})、({mathcal {C}}_{(2, 2p_2)})和({mathcal {C}}_{(1, p_1p_2)})的最小距离为(d ge sqrt{n}),但它们的维数满足(k > frac{n+1}{2})。此外,给出了维数(k= frac{n+1}{2})和最小距离d远远超过平方根界的两类二进制循环码({mathcal {C}}_{(2, p^2)})和({mathcal {C}}_{(2, p_1p_2)}),推广了Sun、Li、Ding[30]的结果。事实上,这两类二进制循环码的速率在(frac{1}{2})左右,其最小距离的下界接近(frac{n}{log _2 n})。此外,还研究了它们的扩展码。
{"title":"Constructions of binary cyclic codes with minimum weights exceeding the square-root lower bound","authors":"Hai Liu, Chunyu Gan, Chengju Li, Xueying Shi","doi":"10.1007/s10623-025-01621-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01621-z","url":null,"abstract":"<p>Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. Constructing binary cyclic codes with parameters <span>([n, frac{n+1}{2}, d ge sqrt{n}])</span> is an interesting topic in coding theory, as their minimum distances have a square-root bound. Let <span>(n=2^lambda -1)</span>, where <span>(lambda )</span> has three forms: <span>(p^2, p_1p_2, 2p_2)</span> for odd primes <span>(p, p_1, p_2)</span>. In this paper, we mainly construct several classes of binary cyclic codes with parameters <span>([2^lambda -1, k ge 2^{lambda -1}, d ge sqrt{n}])</span>. Specifically, the binary cyclic codes <span>({mathcal {C}}_{(1, p^2)})</span>, <span>({mathcal {C}}_{(1, 2p_2)})</span>, <span>({mathcal {C}}_{(2, 2p_2)})</span>, and <span>({mathcal {C}}_{(1, p_1p_2)})</span> have minimum distance <span>(d ge sqrt{n})</span> though their dimensions satisfy <span>(k &gt; frac{n+1}{2})</span>. Moreover, two classes of binary cyclic codes <span>({mathcal {C}}_{(2, p^2)})</span> and <span>({mathcal {C}}_{(2, p_1p_2)})</span> with dimension <span>(k= frac{n+1}{2})</span> and minimum distance <i>d</i> much exceeding the square-root bound are presented, which extends the results given by Sun, Li, and Ding [30]. In fact, the rate of these two classes of binary cyclic codes are around <span>(frac{1}{2})</span> and the lower bounds on their minimum distances are close to <span>(frac{n}{log _2 n})</span>. In addition, their extended codes are also investigated.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143797794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum codes and irreducible products of characters 量子码与字符的不可约积
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-05 DOI: 10.1007/s10623-025-01599-8
Eric Kubischta, Ian Teixeira

In a recent paper, we defined a type of weighted unitary design called a twisted unitary 1-group and showed that such a design automatically induced error-detecting quantum codes. We also showed that twisted unitary 1-groups correspond to irreducible products of characters thereby reducing the problem of code-finding to a computation in the character theory of finite groups. Using a combination of GAP computations and results from the mathematics literature on irreducible products of characters, we identify many new non-trivial quantum codes with unusual transversal gates. Transversal gates are of significant interest to the quantum information community for their central role in fault tolerant quantum computing. Most unitary (text {t})-designs have never been realized as the transversal gate group of a quantum code. We, for the first time, find nontrivial quantum codes realizing nearly every finite group which is a unitary 2-design or better as the transversal gate group of some error-detecting quantum code.

在最近的一篇论文中,我们定义了一种称为扭曲幺正1群的加权幺正设计,并证明了这种设计可以自动诱导错误检测量子码。我们还证明了扭曲酉1群对应于字符的不可约积,从而将码查找问题简化为有限群字符理论中的一个计算。结合GAP计算和数学文献中关于字符不可约积的结果,我们识别了许多新的具有异常横门的非平凡量子码。横向门因其在容错量子计算中的核心作用而引起了量子信息界的极大兴趣。大多数统一的(text {t}) -设计从未被实现为量子码的横向门群。我们首次发现非平凡量子码可以实现几乎所有的有限群,这些群是酉2型或更好的设计,作为某些检错量子码的横门群。
{"title":"Quantum codes and irreducible products of characters","authors":"Eric Kubischta, Ian Teixeira","doi":"10.1007/s10623-025-01599-8","DOIUrl":"https://doi.org/10.1007/s10623-025-01599-8","url":null,"abstract":"<p>In a recent paper, we defined a type of weighted unitary design called a twisted unitary 1-group and showed that such a design automatically induced error-detecting quantum codes. We also showed that twisted unitary 1-groups correspond to irreducible products of characters thereby reducing the problem of code-finding to a computation in the character theory of finite groups. Using a combination of GAP computations and results from the mathematics literature on irreducible products of characters, we identify many new non-trivial quantum codes with unusual transversal gates. Transversal gates are of significant interest to the quantum information community for their central role in fault tolerant quantum computing. Most unitary <span>(text {t})</span>-designs have never been realized as the transversal gate group of a quantum code. We, for the first time, find nontrivial quantum codes realizing nearly every finite group which is a unitary 2-design or better as the transversal gate group of some error-detecting quantum code.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"72 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143784818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructions of locally recoverable codes with large availability 具有大可用性的局部可恢复代码的构造
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-05 DOI: 10.1007/s10623-025-01624-w
Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith

Let p be a prime number, m be a positive integer, and (q=p^m). For any fixed locality r such that (pnot mid r(r+1)), we construct infinite families of locally recoverable codes with availabilty of nodes lower bounded by (q/r!+O(sqrt{q})) and number of locality sets equal to (q^2/(r+1)!+O(q^{3/2})).

设p是质数,m是正整数,(q=p^m)。对于任意满足(pnot mid r(r+1))的固定局部性r,我们构造了无限的局部性可恢复码族,节点的可用性下界为(q/r!+O(sqrt{q})),局部性集的个数等于(q^2/(r+1)!+O(q^{3/2}))。
{"title":"Constructions of locally recoverable codes with large availability","authors":"Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith","doi":"10.1007/s10623-025-01624-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01624-w","url":null,"abstract":"<p>Let <i>p</i> be a prime number, <i>m</i> be a positive integer, and <span>(q=p^m)</span>. For any fixed locality <i>r</i> such that <span>(pnot mid r(r+1))</span>, we construct infinite families of locally recoverable codes with availabilty of nodes lower bounded by <span>(q/r!+O(sqrt{q}))</span> and number of locality sets equal to <span>(q^2/(r+1)!+O(q^{3/2}))</span>.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"34 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143784812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new method for erasure decoding of convolutional codes 一种新的卷积码擦除译码方法
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-03 DOI: 10.1007/s10623-025-01623-x
Julia Lieb, Raquel Pinto, Carlos Vela

In this paper, we propose a new erasure decoding algorithm for convolutional codes using the generator matrix. This implies that our decoding method also applies to catastrophic convolutional codes in opposite to the classic approach using the parity-check matrix. We compare the performance of both decoding algorithms. Moreover, we enlarge the family of optimal convolutional codes (complete-MDP) based on the generator matrix.

本文提出了一种基于生成矩阵的卷积码擦除译码算法。这意味着我们的解码方法也适用于灾难性卷积码,而不是使用奇偶校验矩阵的经典方法。我们比较了两种解码算法的性能。此外,我们还扩大了基于生成器矩阵的最优卷积码族(complete-MDP)。
{"title":"A new method for erasure decoding of convolutional codes","authors":"Julia Lieb, Raquel Pinto, Carlos Vela","doi":"10.1007/s10623-025-01623-x","DOIUrl":"https://doi.org/10.1007/s10623-025-01623-x","url":null,"abstract":"<p>In this paper, we propose a new erasure decoding algorithm for convolutional codes using the generator matrix. This implies that our decoding method also applies to catastrophic convolutional codes in opposite to the classic approach using the parity-check matrix. We compare the performance of both decoding algorithms. Moreover, we enlarge the family of optimal convolutional codes (complete-MDP) based on the generator matrix.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"17 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143766850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The weight hierarchy of decreasing norm-trace codes 递减规范跟踪代码的权重层次结构
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-04-01 DOI: 10.1007/s10623-025-01619-7
Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José

The Generalized Hamming weights and their relative version, which generalize the minimum distance of a linear code, are relevant to numerous applications, including coding on the wire-tap channel of type II, t-resilient functions, bounding the cardinality of the output in list decoding algorithms, ramp secret sharing schemes, and quantum error correction. The generalized Hamming weights have been determined for some families of codes, including Cartesian codes and Hermitian one-point codes. In this paper, we determine the generalized Hamming weights of decreasing norm-trace codes, which are linear codes defined by evaluating sets of monomials that are closed under divisibility on the rational points of the extended norm-trace curve given by (x^{u} = y^{q^{s - 1}} + y^{q^{s - 2}} + cdots + y) over the finite field of cardinality (q^s), where u is a positive divisor of (frac{q^s - 1}{q - 1}). As a particular case, we obtain the weight hierarchy of one-point norm-trace codes and recover the result of Barbero and Munuera (2001) giving the weight hierarchy of one-point Hermitian codes. We also study the relative generalized Hamming weights for these codes and use them to construct impure quantum codes with excellent parameters.

广义汉明权重及其相关版本概括了线性码的最小距离,与许多应用相关,包括在II型有线监听信道上编码、t弹性函数、在列表解码算法中限制输出的基数、斜坡秘密共享方案和量子纠错。本文确定了一些码族的广义汉明权值,包括笛卡儿码和厄米点码。在本文中,我们确定了递减范迹码的广义Hamming权值,递减范迹码是线性码,它是由在基数(q^s)有限域上的扩展范迹曲线((x^{u} = y^{q^{s - 1}} + y^{q^{s - 2}} + cdots + y))的有理点上可除闭的单项式集定义的,其中u是(frac{q^s - 1}{q - 1})的正因子。作为一个特例,我们得到了一点范迹码的权层次,并恢复了Barbero和Munuera(2001)给出的一点厄米码的权层次的结果。我们还研究了这些码的相对广义汉明权值,并用它们构造具有优良参数的非纯量子码。
{"title":"The weight hierarchy of decreasing norm-trace codes","authors":"Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José","doi":"10.1007/s10623-025-01619-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01619-7","url":null,"abstract":"<p>The Generalized Hamming weights and their relative version, which generalize the minimum distance of a linear code, are relevant to numerous applications, including coding on the wire-tap channel of type II, <i>t</i>-resilient functions, bounding the cardinality of the output in list decoding algorithms, ramp secret sharing schemes, and quantum error correction. The generalized Hamming weights have been determined for some families of codes, including Cartesian codes and Hermitian one-point codes. In this paper, we determine the generalized Hamming weights of decreasing norm-trace codes, which are linear codes defined by evaluating sets of monomials that are closed under divisibility on the rational points of the extended norm-trace curve given by <span>(x^{u} = y^{q^{s - 1}} + y^{q^{s - 2}} + cdots + y)</span> over the finite field of cardinality <span>(q^s)</span>, where <i>u</i> is a positive divisor of <span>(frac{q^s - 1}{q - 1})</span>. As a particular case, we obtain the weight hierarchy of one-point norm-trace codes and recover the result of Barbero and Munuera (2001) giving the weight hierarchy of one-point Hermitian codes. We also study the relative generalized Hamming weights for these codes and use them to construct impure quantum codes with excellent parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"22 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143745305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods 一类伽罗瓦NFSRs的循环结构:具有相同周期的分量序列
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-03-29 DOI: 10.1007/s10623-025-01616-w
Xiao-juan Wang, Tian Tian, Wen-feng Qi

Nonlinear feedback shift registers (NFSRs) are widely used in the design of stream ciphers and the cycle structure of an NFSR is a fundamental problem still open. In this paper, a new configuration of Galois NFSRs, called F-Ring NFSRs, is proposed. It is shown that an n-bit F-Ring NFSR generates n sequences with the same period simultaneously, that is, sequences from all bit registers have the same period. Recall that the ring-like cascade connection proposed by Zhao et al. (Des Codes Cryptogr 86:2775–2790, 2018) also has such period property. But it is abnormal that if every component shift register is nonsingular, then the ring-like cascade connection is singular. F-Ring NFSRs proposed in this paper could fix this weakness. Moreover, it is proved that when an n-stage m-sequence is input to the internal state of an F-Ring NFSR by xor, the periods of its internal state are multiples of (2^n-1). At last, two toy examples are given to illustrate the new configuration.

非线性反馈移位寄存器(NFSRs)在流密码设计中得到了广泛的应用,而非线性反馈移位寄存器的周期结构是一个尚未解决的基本问题。本文提出了一种新的伽罗瓦NFSRs构型,称为f -环NFSRs。结果表明,一个n位的F-Ring NFSR同时产生n个具有相同周期的序列,即来自所有位寄存器的序列具有相同的周期。回想一下,Zhao等人(Des Codes Cryptogr 86:2775-2790, 2018)提出的环状级联连接也具有这样的周期性质。但如果每个分量移位寄存器都是非奇异的,那么环形级联连接就是奇异的,这是不正常的。本文提出的f环NFSRs可以弥补这一弱点。进一步证明了当n阶m序列以xor输入到f环NFSR的内部状态时,其内部状态周期为(2^n-1)的倍数。最后,给出了两个示例来说明新的结构。
{"title":"On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods","authors":"Xiao-juan Wang, Tian Tian, Wen-feng Qi","doi":"10.1007/s10623-025-01616-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01616-w","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are widely used in the design of stream ciphers and the cycle structure of an NFSR is a fundamental problem still open. In this paper, a new configuration of Galois NFSRs, called F-Ring NFSRs, is proposed. It is shown that an <i>n</i>-bit F-Ring NFSR generates <i>n</i> sequences with the same period simultaneously, that is, sequences from all bit registers have the same period. Recall that the ring-like cascade connection proposed by Zhao et al. (Des Codes Cryptogr 86:2775–2790, 2018) also has such period property. But it is abnormal that if every component shift register is nonsingular, then the ring-like cascade connection is <i>singular</i>. F-Ring NFSRs proposed in this paper could fix this weakness. Moreover, it is proved that when an <i>n</i>-stage <i>m</i>-sequence is input to the internal state of an F-Ring NFSR by xor, the periods of its internal state are multiples of <span>(2^n-1)</span>. At last, two toy examples are given to illustrate the new configuration.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"216 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1