{"title":"Polynomial reduction from syndrome decoding problem to regular decoding problem","authors":"Pavol Zajac","doi":"10.1007/s10623-025-01567-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01567-2","url":null,"abstract":"<p>The regular decoding problem asks for (the existence of) regular solutions to a syndrome decoding problem (SDP). This problem has increased applications in post-quantum cryptography and cryptanalysis. Recently, Esser and Santini explored in depth the connection between the regular (RSD) and classical syndrome decoding problems. They have observed that while RSD to SDP reductions are known (in any parametric regime), a similar generic reduction from SDP to RSD is not known. In our contribution, we examine two different generic polynomial reductions from a syndrome decoding problem to a regular decoding problem instance. The first reduction is based on constructing a special parity check matrix that encodes weight counter progression inside the parity check matrix, which is then the input of the regular decoding oracle. The target regular decoding problem has a significantly longer code length, that depends linearly on the weight parameter of the original SDP. The second reduction is based on translating the SDP to a non-linear system of equations in the Multiple Right-Hand Sides form, and then applying RSD oracle to solve this system. The second reduction has better code length. The ratio between RSD and SDP code length of the second reduction can be bounded by a constant (less than 8).</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"114 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143049911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 4","authors":"Mark Pankov, Krzysztof Petelczyc, Mariusz Żynel","doi":"10.1007/s10623-025-01570-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01570-7","url":null,"abstract":"<p>Let <span>(n=2^k-1)</span> and <span>(m=2^{k-2})</span> for a certain <span>(kge 3)</span>. Consider the point-line geometry of 2<i>m</i>-element subsets of an <i>n</i>-element set. Maximal singular subspaces of this geometry correspond to binary simplex codes of dimension <i>k</i>. For <span>(kge 4)</span> the associated collinearity graph contains maximal cliques different from maximal singular subspaces. We investigate maximal cliques corresponding to symmetric (<i>n</i>, 2<i>m</i>, <i>m</i>)-designs. The main results concern the case <span>(k=4)</span> and give a geometric interpretation of the five well-known symmetric (15, 8, 4)-designs.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"206 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143026657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bart De Bruyn, Puspendu Pradhan, Binod Kumar Sahoo
{"title":"Blocking sets of secant and tangent lines with respect to a quadric of $$text{ PG }(n,q)$$","authors":"Bart De Bruyn, Puspendu Pradhan, Binod Kumar Sahoo","doi":"10.1007/s10623-024-01559-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01559-8","url":null,"abstract":"<p>For a set <span>({mathcal {L}})</span> of lines of <span>(text{ PG }(n,q))</span>, a set <i>X</i> of points of <span>(text{ PG }(n,q))</span> is called an <span>({mathcal {L}})</span>-blocking set if each line of <span>({mathcal {L}})</span> contains at least one point of <i>X</i>. Consider a possibly singular quadric <i>Q</i> of <span>(text{ PG }(n,q))</span> and denote by <span>({mathcal {S}})</span> (respectively, <span>({mathcal {T}})</span>) the set of all lines of <span>(text{ PG }(n,q))</span> meeting <i>Q</i> in 2 (respectively, 1 or <span>(q+1)</span>) points. For <span>({mathcal {L}}in {{mathcal {S}},{mathcal {T}}cup {mathcal {S}}})</span>, we find the minimal cardinality of an <span>({mathcal {L}})</span>-blocking set of <span>(text{ PG }(n,q))</span> and determine all <span>({mathcal {L}})</span>-blocking sets of that minimal cardinality.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"43 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient information-theoretic distributed point functions with general output groups","authors":"Junru Li, Pengzhen Ke, Liang Feng Zhang","doi":"10.1007/s10623-024-01562-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01562-z","url":null,"abstract":"<p>An <i>n</i>-server information-theoretic <i>Distributed Point Function</i> (DPF) allows a client to secret-share a point function <span>(f_{alpha ,beta }(x))</span> with domain [<i>N</i>] and output group <span>(mathbb {G})</span> among <i>n</i> servers such that each server learns no information about the function from its share (called a <i>key</i>) but can compute an additive share of <span>(f_{alpha ,beta }(x))</span> for any <i>x</i>. DPFs with small key sizes and general output groups are preferred. In this paper, we propose a new transformation from share conversions to information-theoretic DPFs. By applying it to the share conversions from Efremenko’s PIR and Dvir–Gopi PIR, we obtain both an 8-server DPF with key size <span>( O(2^{10sqrt{log Nlog log N}}+log p))</span> and output group <span>(mathbb {Z}_p)</span> and a 4-server DPF with key size <span>(O(tau cdot 2^{6sqrt{log Nlog log N}}))</span> and output group <span>(mathbb {Z}_{2^tau })</span>. The former allows us to partially answer an open question by Boyle, Gilboa, Ishai, and Kolobov (ITC 2022) and the latter allows us to build the first DPFs that may take any finite Abelian groups as output groups. We also discuss how to further reduce the key sizes by using different PIRs, how to reduce the number of servers by resorting to statistical security or using nice integers, and how to obtain DPFs with <i>t</i>-security. We show the applications of the new DPFs by constructing new efficient PIR protocols with result verification.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"29 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rate-improved multi-permutation codes for correcting a single burst of stable deletions","authors":"Xiang Wang, Fang-Wei Fu","doi":"10.1007/s10623-025-01564-5","DOIUrl":"https://doi.org/10.1007/s10623-025-01564-5","url":null,"abstract":"<p>Permutation and multi-permutation codes have been widely studied due to their potential applications in communications and storage systems, especially in flash memory. In this paper, we consider balanced multi-permutation codes correcting a single burst of stable deletions of length <i>t</i> and length at most <i>t</i>, respectively. Based on the properties of burst stable deletions and stabilizer permutation subgroups, we propose two constructions of multi-permutation codes correcting a single burst of stable deletions of length up to some parameter. The multi-permutation codes can achieve larger rates than available codes while maintaining simple interleaving structures. Moreover, the decoding methods are given in proofs and verified by examples.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"6 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Additive twisted codes: new distance bounds and infinite families of quantum codes","authors":"Reza Dastbasteh, Petr Lisoněk","doi":"10.1007/s10623-024-01552-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01552-1","url":null,"abstract":"<p>We provide a new construction of quantum codes that enables integration of a broader class of classical codes into the mathematical framework of quantum stabilizer codes. Next, we present new connections between twisted codes and linear cyclic codes and provide novel bounds for the minimum distance of twisted codes. We show that classical tools such as the Hartmann–Tzeng minimum distance bound are applicable to twisted codes. This enabled us to discover five new infinite families and many other examples of record-breaking, and sometimes optimal, binary quantum codes. We also discuss the role of the <span>(gamma )</span> value on the parameters of twisted codes and present new results regarding the construction of twisted codes with different <span>(gamma )</span> values but identical parameters. Finally, we list many new record-breaking binary quantum codes that we obtained from additive twisted, linear cyclic, and constacyclic codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"77 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed El Badry, Abdelfattah Haily, Ayoub Mounir
{"title":"On LCD skew group codes","authors":"Mohammed El Badry, Abdelfattah Haily, Ayoub Mounir","doi":"10.1007/s10623-024-01561-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01561-0","url":null,"abstract":"<p>In this paper we study skew group codes as left ideals in some skew group rings. We have constructed a large class of LCD codes and a class of an LCD MDS codes. An important interest is given to the construction of idempotents generators of these codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"76 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142974807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designer of codes: a tribute to Jennifer Key","authors":"Vassili C. Mavron, Harold N. Ward","doi":"10.1007/s10623-024-01517-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01517-4","url":null,"abstract":"<p>We offer this tribute to our friend and colleague, Jenny Key. After describing her education and career, we comment on her areas of research. The paper concludes with a complete list of her publications.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"36 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142967962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos Aguilar-Melchor, Victor Dyseryn, Philippe Gaborit
{"title":"Somewhat homomorphic encryption based on random codes","authors":"Carlos Aguilar-Melchor, Victor Dyseryn, Philippe Gaborit","doi":"10.1007/s10623-024-01555-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01555-y","url":null,"abstract":"<p>We present a secret-key encryption scheme based on random rank metric ideal linear codes with a simple decryption circuit. It supports unlimited homomorphic additions and plaintext multiplications (i.e. the homomorphic multiplication of a clear plaintext with a ciphertext) as well as a fixed arbitrary number of homomorphic multiplications. We study a candidate bootstrapping algorithm that requires no multiplication but additions and plaintext multiplications only. This latter operation is therefore very efficient in our scheme, whereas bootstrapping is usually the main reason which penalizes the performance of other fully homomorphic encryption schemes. However, the security reduction of our scheme restricts the number of independent ciphertexts that can be published. In particular, this prevents to securely evaluate the bootstrapping algorithm as the number of ciphertexts in the key switching material is too large. Our scheme is nonetheless the first somewhat homomorphic encryption scheme based on random ideal codes and a first step towards full homomorphism. Random ideal codes give stronger security guarantees as opposed to existing constructions based on highly structured codes. We give concrete parameters for our scheme that shows that it achieves competitive sizes and performance, with a key size of 3.7 kB and a ciphertext size of 0.9 kB when a single multiplication is allowed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"28 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142934919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minjia Shi, Ruowen Liu, Dean Crnković, Patrick Solé, Andrea Švob
{"title":"Ternary isodual codes and 3-designs","authors":"Minjia Shi, Ruowen Liu, Dean Crnković, Patrick Solé, Andrea Švob","doi":"10.1007/s10623-024-01558-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01558-9","url":null,"abstract":"<p>Ternary isodual codes and their duals are shown to support 3-designs under mild symmetry conditions. These designs are held invariant by a double cover of the permutation part of the automorphism group of the code. Examples of interest include extended quadratic residues (QR) codes of lengths 14 and 38 whose automorphism groups are <i>PSL</i>(2, 13) and <i>PSL</i>(2, 37), respectively. We also consider Generalized Quadratic Residue (GQR) codes in the sense of Lint and MacWiliams (IEEE Trans Inf Theory 24(6): 730-737,1978). These codes are the abelian generalizations of the Quadratic Residue (QR) codes which are cyclic. We construct them as row span of a Jacobsthal matrix. In lengths 50 and 26 we obtain 3-designs invariant under a double cover of <span>(P{Sigma }L(2,49),)</span> and <span>(P{Sigma }L(2,25),)</span> respectively. In addition, from block orbits of these 3-designs we construct a number of other 3-designs and 2-designs. Finally, we apply the same construction to the binary extended GQR code of length 82.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142935023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}