Rong Luo, Mingliang Yan, Sihem Mesnager, Dongchun Han
{"title":"On Abelian one-dimensional hull codes in group algebras","authors":"Rong Luo, Mingliang Yan, Sihem Mesnager, Dongchun Han","doi":"10.1007/s10623-024-01504-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01504-9","url":null,"abstract":"<p>This paper focuses on hull dimensional codes obtained by the intersection of linear codes and their dual. These codes were introduced by Assmus and Key and have been the subject of significant theoretical and practical research over the years, gaining increased attention in recent years. Let <span>(mathbb {F}_q)</span> denote the finite field with <i>q</i> elements, and let <i>G</i> be a finite Abelian group of order <i>n</i>. The paper investigates Abelian codes defined as ideals of the group algebra <span>(mathbb {F}_qG)</span> with coefficients in <span>(mathbb {F}_q)</span>. Specifically, it delves into Abelian hull dimensional codes in the group algebra <span>(mathbb {F}_qG)</span>, where <i>G</i> is a finite Abelian group of order <i>n</i> with <span>(gcd (n,q)=1)</span>. Specifically, we first examine general hull Abelian codes and then narrow its focus to Abelian one-dimensional hull codes. Next, we focus on Abelian one-dimensional hull codes and present some necessary and sufficient conditions for characterizing them. Consequently, we generalize a recent result on Abelian codes and show that no binary or ternary Abelian codes with one-dimensional hulls exist. Furthermore, we construct Abelian codes with one-dimensional hulls by generating idempotents, derive optimal ones with one-dimensional hulls, and establish several existing results of Abelian codes with one-dimensional hulls. Finally, we develop enumeration results through a simple formula that counts Abelian codes with one-dimensional hulls in <span>(mathbb {F}_qG)</span>. These achievements exploit the rich algebraic structure of those Abelian codes and enhance and increase our knowledge of them by considering their hull dimensions, reducing the gap between their interests and our understanding of them.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions","authors":"Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang","doi":"10.1007/s10623-024-01501-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01501-y","url":null,"abstract":"<p>Quasi-complementary sequence sets (QCSSs) are important in modern communication systems as they are capable of supporting more users, which is desired in applications like MC-CDMA nowadays. Although several constructions of aperiodic QCSSs have been proposed in the literature, the known optimal aperiodic QCSSs have limited length or have large alphabet. In this paper, based on extended Boolean functions, we present two constructions of aperiodic QCSSs with parameters <span>((q(p_0-1),q,q-t,q))</span> and <span>((q^m(p_0-1),q^m,q^m-t,q^m))</span>, where <span>(qge 3)</span> is an odd integer, <span>(p_0)</span> is the minimum prime factor of <i>q</i>. The proposed constructions can generate asymptotically optimal or near-optimal aperiodic QCSSs with new parameters.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142329172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicola Durante, Giovanni Giuseppe Grimaldi, Giovanni Longobardi
{"title":"Non-linear MRD codes from cones over exterior sets","authors":"Nicola Durante, Giovanni Giuseppe Grimaldi, Giovanni Longobardi","doi":"10.1007/s10623-024-01492-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01492-w","url":null,"abstract":"<p>By using the notion of a <i>d</i>-embedding <span>(Gamma )</span> of a (canonical) subgeometry <span>(Sigma )</span> and of exterior sets with respect to the <i>h</i>-secant variety <span>(Omega _{h}({mathcal {A}}))</span> of a subset <span>({mathcal {A}})</span>, <span>( 0 le h le n-1)</span>, in the finite projective space <span>({textrm{PG}}(n-1,q^n))</span>, <span>(n ge 3)</span>, in this article we construct a class of non-linear (<i>n</i>, <i>n</i>, <i>q</i>; <i>d</i>)-MRD codes for any <span>( 2 le d le n-1)</span>. A code of this class <span>({mathcal {C}}_{sigma ,T})</span>, where <span>(1in T subseteq {mathbb {F}}_q^*)</span> and <span>(sigma )</span> is a generator of <span>(textrm{Gal}({mathbb {F}}_{q^n}|{mathbb {F}}_q))</span>, arises from a cone of <span>({textrm{PG}}(n-1,q^n))</span> with vertex an <span>((n-d-2))</span>-dimensional subspace over a maximum exterior set <span>({mathcal {E}})</span> with respect to <span>(Omega _{d-2}(Gamma ))</span>. We prove that the codes introduced in Cossidente et al (Des Codes Cryptogr 79:597–609, 2016), Donati and Durante (Des Codes Cryptogr 86:1175–1184, 2018), Durante and Siciliano (Electron J Comb, 2017) are suitable punctured ones of <span>({mathcal {C}}_{sigma ,T})</span> and we solve completely the inequivalence issue for this class showing that <span>({mathcal {C}}_{sigma ,T})</span> is neither equivalent nor adjointly equivalent to the non-linear MRD codes <span>({mathcal {C}}_{n,k,sigma ,I})</span>, <span>(I subseteq {mathbb {F}}_q)</span>, obtained in Otal and Özbudak (Finite Fields Appl 50:293–303, 2018).</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142245509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arithmetization-oriented APN permutations","authors":"Lilya Budaghyan, Mohit Pal","doi":"10.1007/s10623-024-01487-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01487-7","url":null,"abstract":"<p>Recently, many cryptographic primitives such as homomorphic encryption (HE), multi-party computation (MPC) and zero-knowledge (ZK) protocols have been proposed in the literature which operate on the prime field <span>({mathbb {F}}_p)</span> for some large prime <i>p</i>. Primitives that are designed using such operations are called <i>arithmetization-oriented</i> primitives. As the concept of arithmetization-oriented primitives is new, a rigorous cryptanalysis of such primitives is yet to be done. In this paper, we investigate arithmetization-oriented APN functions. More precisely, we investigate APN permutations in the CCZ-classes of known families of APN power functions over the prime field <span>({mathbb {F}}_p)</span>. Moreover, we present a class of binomial permutation having differential uniformity at most 5 defined via the quadratic character over finite fields of odd characteristic. Computationally it is confirmed that the latter family contains new APN permutations for some small parameters. We conjecture it to contain an infinite subfamily of APN permutations.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142236229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jozefien D’haeseleer, Ferdinand Ihringer, Kai-Uwe Schmidt
{"title":"A common generalization of hypercube partitions and ovoids in polar spaces","authors":"Jozefien D’haeseleer, Ferdinand Ihringer, Kai-Uwe Schmidt","doi":"10.1007/s10623-024-01489-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01489-5","url":null,"abstract":"<p>We investigate what we call generalized ovoids, that is families of totally isotropic subspaces of finite classical polar spaces such that each maximal totally isotropic subspace contains precisely one member of that family. This is a generalization of ovoids in polar spaces as well as the natural <i>q</i>-analog of a subcube partition of the hypercube (which can be seen as a polar space with <span>(q=1)</span>). Our main result proves that a generalized ovoid of <i>k</i>-spaces in polar spaces of large rank does not exist.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142235131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity of an infinite family of networks related to the diamond network for fixed alphabet sizes","authors":"Sascha Kurz","doi":"10.1007/s10623-024-01485-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01485-9","url":null,"abstract":"<p>We consider the problem of error correction in a network where the errors can occur only on a proper subset of the network edges. For a generalization of the so-called Diamond Network we consider lower and upper bounds for the network’s (1-shot) capacity for fixed alphabet sizes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142235129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Kiermaier, Kai-Uwe Schmidt, Alfred Wassermann
{"title":"Designs in finite classical polar spaces","authors":"Michael Kiermaier, Kai-Uwe Schmidt, Alfred Wassermann","doi":"10.1007/s10623-024-01491-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01491-x","url":null,"abstract":"<p>Combinatorial designs have been studied for nearly 200 years. 50 years ago, Cameron, Delsarte, and Ray-Chaudhury started investigating their <i>q</i>-analogs, also known as subspace designs or designs over finite fields. Designs can be defined analogously in finite classical polar spaces, too. The definition includes the <i>m</i>-regular systems from projective geometry as the special case where the blocks are generators of the polar space. The first nontrivial such designs for <span>(t > 1)</span> were found by De Bruyn and Vanhove in 2012, and some more designs appeared recently in the PhD thesis of Lansdown. In this article, we investigate the theory of classical and subspace designs for applicability to designs in polar spaces, explicitly allowing arbitrary block dimensions. In this way, we obtain divisibility conditions on the parameters, derived and residual designs, intersection numbers and an analog of Fisher’s inequality. We classify the parameters of symmetric designs. Furthermore, we conduct a computer search to construct designs of strength <span>(t=2)</span>, resulting in designs for more than 140 previously unknown parameter sets in various classical polar spaces over <span>(mathbb {F}_2)</span> and <span>(mathbb {F}_3)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142235130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the uniqueness of balanced complex orthogonal design","authors":"Yiwen Gao, Yuan Li, Haibin Kan","doi":"10.1007/s10623-024-01483-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01483-x","url":null,"abstract":"<p><i>Complex orthogonal designs</i> (CODs) have been used to construct <i>space-time block codes</i>. Its real analog, real orthogonal designs, or equivalently, sum of squares composition formula, have a long history in mathematics. Driven by some practical considerations, Adams et al. (IEEE Trans Info Theory, 57(4):2254–2262, 2011) introduced the definition of <i>balanced complex orthogonal designs</i> (BCODs). The code rate of BCODs is 1/2, and their minimum decoding delay is proven to be <span>(2^m)</span>, where 2<i>m</i> is the number of columns. We prove, when the number of columns is fixed, all (indecomposable) balanced complex orthogonal designs (BCODs) have the same parameters <span>([2^m, 2m, 2^{m-1}])</span>, and moreover, they are all equivalent.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimal abundant packings and choosability with separation","authors":"Zoltán Füredi, Alexandr Kostochka, Mohit Kumbhat","doi":"10.1007/s10623-024-01484-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01484-w","url":null,"abstract":"<p>A (<i>v</i>, <i>k</i>, <i>t</i>) packing of size <i>b</i> is a system of <i>b</i> subsets (blocks) of a <i>v</i>-element underlying set such that each block has <i>k</i> elements and every <i>t</i>-set is contained in at most one block. <i>P</i>(<i>v</i>, <i>k</i>, <i>t</i>) stands for the maximum possible <i>b</i>. A packing is called <i>abundant</i> if <span>(b> v)</span>. We give new estimates for <i>P</i>(<i>v</i>, <i>k</i>, <i>t</i>) around the critical range, slightly improving the Johnson bound and asymptotically determine the minimum <span>(v=v_0(k,t))</span> when <i>abundant</i> packings exist. For a graph <i>G</i> and a positive integer <i>c</i>, let <span>(chi _ell (G,c))</span> be the minimum value of <i>k</i> such that one can properly color the vertices of <i>G</i> from any assignment of lists <i>L</i>(<i>v</i>) such that <span>(|L(v)|=k)</span> for all <span>(vin V(G))</span> and <span>(|L(u)cap L(v)|le c)</span> for all <span>(uvin E(G))</span>. Kratochvíl, Tuza and Voigt in 1998 asked to determine <span>(lim _{nrightarrow infty } chi _ell (K_n,c)/sqrt{cn})</span> (if it exists). Using our bound on <span>(v_0(k,t))</span>, we prove that the limit exists and equals 1. Given <i>c</i>, we find the exact value of <span>(chi _ell (K_n,c))</span> for infinitely many <i>n</i>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field","authors":"Simon Masson, Antonio Sanso, Zhenfei Zhang","doi":"10.1007/s10623-024-01472-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01472-0","url":null,"abstract":"<p>In this paper, we introduce Bandersnatch, a new elliptic curve built over the BLS12-381 scalar field. The curve is equipped with an efficient endomorphism, allowing a fast scalar multiplication algorithm. Our benchmark shows that the multiplication is 42% faster, 21% reduction in terms of circuit size in the form of rank 1 constraint systems (R1CS), and 10% reduction in terms of Plonk circuit, compared to another curve, called Jubjub, having similar properties. Many zero-knowledge proof systems that rely on the Jubjub curve can benefit from our result.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142100951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}