Designs, Codes and Cryptography最新文献

筛选
英文 中文
The weight hierarchy of decreasing norm-trace codes 递减规范跟踪代码的权重层次结构
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-04-01 DOI: 10.1007/s10623-025-01619-7
Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José
{"title":"The weight hierarchy of decreasing norm-trace codes","authors":"Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José","doi":"10.1007/s10623-025-01619-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01619-7","url":null,"abstract":"<p>The Generalized Hamming weights and their relative version, which generalize the minimum distance of a linear code, are relevant to numerous applications, including coding on the wire-tap channel of type II, <i>t</i>-resilient functions, bounding the cardinality of the output in list decoding algorithms, ramp secret sharing schemes, and quantum error correction. The generalized Hamming weights have been determined for some families of codes, including Cartesian codes and Hermitian one-point codes. In this paper, we determine the generalized Hamming weights of decreasing norm-trace codes, which are linear codes defined by evaluating sets of monomials that are closed under divisibility on the rational points of the extended norm-trace curve given by <span>(x^{u} = y^{q^{s - 1}} + y^{q^{s - 2}} + cdots + y)</span> over the finite field of cardinality <span>(q^s)</span>, where <i>u</i> is a positive divisor of <span>(frac{q^s - 1}{q - 1})</span>. As a particular case, we obtain the weight hierarchy of one-point norm-trace codes and recover the result of Barbero and Munuera (2001) giving the weight hierarchy of one-point Hermitian codes. We also study the relative generalized Hamming weights for these codes and use them to construct impure quantum codes with excellent parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"22 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143745305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods 一类伽罗瓦NFSRs的循环结构:具有相同周期的分量序列
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-29 DOI: 10.1007/s10623-025-01616-w
Xiao-juan Wang, Tian Tian, Wen-feng Qi
{"title":"On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods","authors":"Xiao-juan Wang, Tian Tian, Wen-feng Qi","doi":"10.1007/s10623-025-01616-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01616-w","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are widely used in the design of stream ciphers and the cycle structure of an NFSR is a fundamental problem still open. In this paper, a new configuration of Galois NFSRs, called F-Ring NFSRs, is proposed. It is shown that an <i>n</i>-bit F-Ring NFSR generates <i>n</i> sequences with the same period simultaneously, that is, sequences from all bit registers have the same period. Recall that the ring-like cascade connection proposed by Zhao et al. (Des Codes Cryptogr 86:2775–2790, 2018) also has such period property. But it is abnormal that if every component shift register is nonsingular, then the ring-like cascade connection is <i>singular</i>. F-Ring NFSRs proposed in this paper could fix this weakness. Moreover, it is proved that when an <i>n</i>-stage <i>m</i>-sequence is input to the internal state of an F-Ring NFSR by xor, the periods of its internal state are multiples of <span>(2^n-1)</span>. At last, two toy examples are given to illustrate the new configuration.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"216 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Universal partial tori 泛偏环面
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-27 DOI: 10.1007/s10623-025-01609-9
William D. Carey, Matthew David Kearney, Rachel Kirsch, Stefan Popescu
{"title":"Universal partial tori","authors":"William D. Carey, Matthew David Kearney, Rachel Kirsch, Stefan Popescu","doi":"10.1007/s10623-025-01609-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01609-9","url":null,"abstract":"<p>A De Bruijn cycle is a cyclic sequence in which every word of length <i>n</i> over an alphabet <span>(mathcal {A})</span> appears exactly once. De Bruijn tori are a two-dimensional analogue. Motivated by recent progress on universal partial cycles and words, which shorten De Bruijn cycles using a wildcard character, we introduce universal partial tori and matrices. We find them computationally and construct infinitely many of them using one-dimensional variants of universal cycles, including a new variant called a universal partial family.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying the isomorphism of NFSRs via a general framework of bijections 用双射的一般框架研究nfsr的同构性
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-27 DOI: 10.1007/s10623-025-01622-y
Jingtao Xiong, Jianghua Zhong, Dongdai Lin
{"title":"Studying the isomorphism of NFSRs via a general framework of bijections","authors":"Jingtao Xiong, Jianghua Zhong, Dongdai Lin","doi":"10.1007/s10623-025-01622-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01622-y","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic, and to be equivalent if their sets of output sequences are equal. So far, numerous work has been done on the equivalence of NFSRs with same bit number, but much less has been done on their isomorphism. Actually, the equivalence problem of NFSRs with same bit number can be transformed to their isomorphism problem. The latter can be solved if the bijection between their states and its inverse can be explicitly expressed, which are quite hard to get in general. This paper studies the isomorphism of NFSRs by building a general framework for bijections. It first gives basic bijections. It then presents a unified formula for bijections, and discloses that any bijection can be expressed as a composite of finite basic bijections, setting up a general framework for bijections. Based on the general framework, the paper discloses in theory how to obtain all Galois NFSRs that are isomorphic to a given NFSR, and then reveals the bijections between the states of the previous types of Galois NFSRs and their own equivalent Fibonacci NFSRs. Finally, it proposes a new type of Galois NFSRs that are isomorphic and further equivalent to Fibonacci NFSRs, covering and improving most previous types of Galois NFSRs known to be equivalent to Fibonacci NFSRs.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"183 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143713069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The complete weight enumerator of the square of one-weight irreducible cyclic codes 一权不可约循环码平方的完全权枚举数
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-22 DOI: 10.1007/s10623-025-01620-0
Canze Zhu
{"title":"The complete weight enumerator of the square of one-weight irreducible cyclic codes","authors":"Canze Zhu","doi":"10.1007/s10623-025-01620-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01620-0","url":null,"abstract":"<p>In this paper, for an odd prime power <i>q</i> and an integer <span>(mge 2)</span>, let <span>(mathcal {C}(q,m))</span> be a one-weight irreducible cyclic code with parameters <span>([q^m-1,m,(q-1)q^{m-1}])</span>, we consider the complete weight enumerator and the weight distribution of the square <span>(big (mathcal {C}(q,m)big )^2)</span>, whose dual has <span>(lfloor frac{m}{2}rfloor +1)</span> zeros. Using the character sums method and the known result of counting <span>(mtimes m)</span> symmetric matrices over <span>(mathbb {F}_q)</span> with given rank, we explicitly determine the complete weight enumerator of <span>(left( mathcal {C}(q,m)right) ^2)</span> and show that <span>(left( mathcal {C}(q,m)right) ^2)</span> is a <span>((2lfloor frac{m}{2}rfloor +1))</span>-weight cyclic code with parameters <span>([q^{m}-1,frac{m(m+1)}{2},(q-1)(q^{m-1}-q^{m-2})])</span>. Moreover, we get the weight distribution of the square of the simplex code by puncturing the last <span>(frac{(q-2)(q^m-1)}{q-1})</span> coordinates of <span>(left( mathcal {C}(q,m)right) ^2)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"56 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143672621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Limitations of the decoding-to-LPN reduction via code smoothing 通过代码平滑降低解码到lpn的局限性
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-22 DOI: 10.1007/s10623-025-01617-9
Madhura Pathegama, Alexander Barg
{"title":"Limitations of the decoding-to-LPN reduction via code smoothing","authors":"Madhura Pathegama, Alexander Barg","doi":"10.1007/s10623-025-01617-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01617-9","url":null,"abstract":"<p>The learning parity with noise (LPN) problem underlines several classic cryptographic primitives. Researchers have attempted to show the algorithmic difficulty of this problem by finding a reduction from the decoding problem of linear codes, for which several hardness results exist. Earlier studies used code smoothing as a technical tool to achieve such reductions for codes with vanishing rate. This has left open the question of attaining a reduction with positive-rate codes. Addressing this case, we characterize the efficiency of the reduction in terms of the parameters of the decoding and LPN problems. As a conclusion, we isolate the parameter regimes for which a meaningful reduction is possible and the regimes for which its existence is unlikely.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143672619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary stretch embedding of weighted graphs 加权图的二元拉伸嵌入
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-21 DOI: 10.1007/s10623-025-01608-w
Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab
{"title":"Binary stretch embedding of weighted graphs","authors":"Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab","doi":"10.1007/s10623-025-01608-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01608-w","url":null,"abstract":"<p>In this paper, we introduce and study the problem of <i>binary stretch embedding</i> of edge-weighted graphs in both integer and fractional settings. Roughly speaking, the binary stretch embedding problem for a weighted graph <i>G</i> is to find a mapping from the vertex set of <i>G</i>, to the vertices of a hypercube graph such that the distance between every pair of the vertices is not reduced under the mapping, hence the name binary stretch embedding. The minimum dimension of a hypercube for which such a stretch embedding exists is called the binary addressing number of <i>G</i>. We show that the binary addressing number of weighted graphs is the optimum value of an integer program. The optimum value for the corresponding linear relaxation problem is called the fractional binary addressing number of <i>G</i>. This embedding type problem is closely related to the well-known <i>addressing problem</i> of Graham and Pollak and <i>isometric hypercube embedding problem</i> of Firsov. Using tools and techniques such as Hadamard codes and the linear programming theory help us to find upper and lower bounds, approximations, or exact values of the binary addressing number and the fractional variant of graphs. As an application of our results, we derive improved upper bounds or exact values of the maximum size of Lee metric codes of certain parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"41 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143666542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Additive combinatorial designs 加性组合设计
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-20 DOI: 10.1007/s10623-025-01594-z
Marco Buratti, Francesca Merola, Anamari Nakić
{"title":"Additive combinatorial designs","authors":"Marco Buratti, Francesca Merola, Anamari Nakić","doi":"10.1007/s10623-025-01594-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01594-z","url":null,"abstract":"<p>A <span>(2-(v, k, lambda ))</span> design is additive if, up to isomorphism, the point set is a subset of an abelian group <i>G</i> and every block is zero-sum. This definition was introduced in Caggegi et al. (J Algebr Comb 45:271-294, 2017) and was the starting point of an interesting new theory. Although many additive designs have been constructed and known designs have been shown to be additive, these structures seem quite hard to construct in general, particularly when we look for additive Steiner 2-designs. One might generalize additive Steiner 2-designs in a natural way to graph decompositions as follows: given a simple graph <span>(Gamma )</span>, an <i>additive </i><span>((K_v,Gamma ))</span><i>-design</i> is a decomposition of the graph <span>(K_v)</span> into subgraphs (<i>blocks</i>) <span>(B_1,dots ,B_t)</span> all isomorphic to <span>(Gamma )</span>, such that the vertex set <span>(V(K_v))</span> is a subset of an abelian group <i>G</i>, and the sets <span>(V(B_1), dots , V(B_t))</span> are zero-sum in <i>G</i>. In this work we begin the study of additive <span>((K_v,Gamma ))</span>-designs: we develop different tools instrumental in constructing these structures, and apply them to obtain some infinite classes of designs and many sporadic examples. We will consider decompositions into various graphs <span>(Gamma )</span>, for instance cycles, paths, and <i>k</i>-matchings. Similar ideas will also allow us to present here a sporadic additive 2-(124, 4, 1) design.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"34 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143661406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An attack on p-adic lattice public-key encryption cryptosystems and signature schemes 对 p 演算网格公钥加密密码系统和签名方案的攻击
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-18 DOI: 10.1007/s10623-025-01618-8
Chi Zhang
{"title":"An attack on p-adic lattice public-key encryption cryptosystems and signature schemes","authors":"Chi Zhang","doi":"10.1007/s10623-025-01618-8","DOIUrl":"https://doi.org/10.1007/s10623-025-01618-8","url":null,"abstract":"<p>Lattices have many significant applications in cryptography. In 2021, the <i>p</i>-adic signature scheme and public-key encryption cryptosystem were introduced. They are based on the Longest Vector Problem (LVP) and the Closest Vector Problem (CVP) in <i>p</i>-adic lattices. These problems are considered to be challenging and there are no known deterministic polynomial time algorithms to solve them. In this paper, we improve the LVP algorithm in local fields. The modified LVP algorithm is a deterministic polynomial time algorithm when the field is totally ramified and <i>p</i> is a polynomial in the rank of the input lattice. We utilize this algorithm to attack the above schemes so that we are able to forge a valid signature of any message and decrypt any ciphertext. Although these schemes are broken, this work does not mean that <i>p</i>-adic lattices are not suitable in constructing cryptographic primitives. We propose some possible modifications to avoid our attack at the end of this paper.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"69 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143640437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new framework for fast homomorphic matrix multiplication 一个新的快速同态矩阵乘法框架
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-03-15 DOI: 10.1007/s10623-025-01614-y
Xiaopeng Zheng, Hongbo Li, Dingkang Wang
{"title":"A new framework for fast homomorphic matrix multiplication","authors":"Xiaopeng Zheng, Hongbo Li, Dingkang Wang","doi":"10.1007/s10623-025-01614-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01614-y","url":null,"abstract":"<p>Homomorphic encryption (HE) is one of the mainstream cryptographic tools used to enable secure outsourced computation. A typical task is secure matrix computation, which is a fundamental operation used in various outsourced computing applications such as statistical analysis and machine learning. In this paper, we present a new framework for secure multiplication of two matrices with size <span>(r times s)</span> and <span>(s times t)</span> respectively, which requires only <span>(O(log n))</span> basic homomorphic operations if <span>(rst le n)</span>, where <i>n</i> is dimension of the polynomial ring used in RLWE encryption. Our method was implemented in HElib using the BGV scheme. Experimental results show that the new framework has significant advantage in efficiency when <span>(rst le n)</span>. In this case, the new framework is 1.2 to 106.8 times faster than exiting algorithms in experiments.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"41 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143627620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信