Designs, Codes and Cryptography最新文献

筛选
英文 中文
On two non-existence results for Cameron–Liebler k-sets in $${{,mathrm{textrm{PG}},}}(n,q)$$ 论 $${{,mathrm{textrm{PG}},}}(n,q)$$ 中卡梅隆-利勃勒 k 集的两个不存在结果
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-10 DOI: 10.1007/s10623-024-01505-8
Jan De Beule, Jonathan Mannaert, Leo Storme
{"title":"On two non-existence results for Cameron–Liebler k-sets in $${{,mathrm{textrm{PG}},}}(n,q)$$","authors":"Jan De Beule, Jonathan Mannaert, Leo Storme","doi":"10.1007/s10623-024-01505-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01505-8","url":null,"abstract":"<p>This paper focuses on non-existence results for Cameron–Liebler <i>k</i>-sets. A Cameron–Liebler <i>k</i>-set is a collection of <i>k</i>-spaces in <span>({{,mathrm{textrm{PG}},}}(n,q))</span> or <span>({{,mathrm{textrm{AG}},}}(n,q))</span> admitting a certain parameter <i>x</i>, which is dependent on the size of this collection. One of the main research questions remains the (non-)existence of Cameron–Liebler <i>k</i>-sets with parameter <i>x</i>. This paper improves two non-existence results. First we show that the parameter of a non-trivial Cameron–Liebler <i>k</i>-set in <span>({{,mathrm{textrm{PG}},}}(n,q))</span> should be larger than <span>(q^{n-frac{5k}{2}-1})</span>, which is an improvement of an earlier known lower bound. Secondly, we prove a modular equality on the parameter <i>x</i> of Cameron–Liebler <i>k</i>-sets in <span>({{,mathrm{textrm{PG}},}}(n,q))</span> with <span>(x&lt;frac{q^{n-k}-1}{q^{k+1}-1})</span>, <span>(nge 2k+1)</span>, <span>(n-k+1ge 7)</span> and <span>(n-k)</span> even. In the affine case we show a similar result for <span>(n-k+1ge 3)</span> and <span>(n-k)</span> even. This is a generalization of earlier known modular equalities in the projective and affine case.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"13 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142405484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient error-correcting codes for the HQC post-quantum cryptosystem HQC 后量子密码系统的高效纠错码
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-09 DOI: 10.1007/s10623-024-01507-6
Carlos Aguilar-Melchor, Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit, Jérôme Lacan, Gilles Zémor
{"title":"Efficient error-correcting codes for the HQC post-quantum cryptosystem","authors":"Carlos Aguilar-Melchor, Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit, Jérôme Lacan, Gilles Zémor","doi":"10.1007/s10623-024-01507-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01507-6","url":null,"abstract":"<p>The HQC post-quantum cryptosystem enables two parties to share noisy versions of a common secret binary string, and an error-correcting code is required to deal with the mismatch between both versions. This code is required to deal with binary symmetric channels with as large a transition parameter as possible, while guaranteeing, for cryptographic reasons, a decoding error probability of provably not more than 2<sup>-128</sup>. This requirement is non-standard for digital communications, and modern coding techniques are not amenable to this setting. This paper explains how this issue is addressed in the last version of HQC: precisely, we introduce a coding scheme that consists of concatenating a Reed–Solomon code with the tensor product of a Reed–Muller code and a repetition code. We analyze its behavior in detail and show that it significantly improves upon the previous proposition for HQC, which consisted of tensoring a BCH and a repetition code. As additional results, we also provide a better approximation of the weight distribution for HQC error vectors, and we remark that the size of the exchanged secret in HQC can be reduced to match the protocol security which also significantly improves performance.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infinite families of 3-designs from special symmetric polynomials 来自特殊对称多项式的无穷 3 设计族
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-05 DOI: 10.1007/s10623-024-01508-5
Guangkui Xu, Xiwang Cao, Gaojun Luo, Huawei Wu
{"title":"Infinite families of 3-designs from special symmetric polynomials","authors":"Guangkui Xu, Xiwang Cao, Gaojun Luo, Huawei Wu","doi":"10.1007/s10623-024-01508-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01508-5","url":null,"abstract":"<p>Tang and Ding (IEEE Trans Inf Theory 67(1):244–254, 2021) opened a new direction of searching for <i>t</i>-designs from elementary symmetric polynomials, which are used to construct the first infinite family of linear codes supporting 4-designs. In this paper, we first study the properties of elementary symmetric polynomials with 6 or 7 variables over <span>(textrm{GF}(3^{m}))</span>. Based on them, we present more infinite families of 3-designs that contain some 3-designs with new parameters as checked by Magma for small numbers <i>m</i>. We also construct an infinite family of cyclic codes over <span>(textrm{GF}(q^2))</span> and prove that the codewords of any nonzero weight support a 3-design. In particular, we present an infinite family of 6-dimensional AMDS codes over <span>(textrm{GF}(3^{2m}))</span> holding an infinite family of 3-designs and an infinite family of 7-dimensional NMDS codes over <span>(textrm{GF}(3^{2m}))</span> holding an infinite family of 3-designs.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"7 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142377701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing 配备自适应小组测试检测功能的交互式汇总信息验证
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01498-4
Kazuhiko Minematsu, Shingo Sato, Junji Shikata
{"title":"Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing","authors":"Kazuhiko Minematsu, Shingo Sato, Junji Shikata","doi":"10.1007/s10623-024-01498-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01498-4","url":null,"abstract":"<p>In this paper, we propose a formal security model and a construction methodology of interactive aggregate message authentication codes with detecting functionality (IAMDs). The IAMD is an interactive aggregate MAC protocol which can identify invalid messages with a small amount of tag-size. Several aggregate MAC schemes that can detect invalid messages have been proposed so far by using non-adaptive group testing in the prior work. In this paper, we utilize adaptive group testing to construct IAMD scheme, and we show that the resulting IAMD scheme can identify invalid messages with a small amount of tag-size compared to the previous schemes. To this end, we give the formalization of adaptive group testing and IAMD, and propose a generic construction starting from any aggregate MAC and any adaptive group testing method. In addition, we compare instantiations of our generic constructions, in terms of total tag-size and several properties. Furthermore, we show advantages of IAMD by implementing constructions of (non-)adaptive aggregate message authentication with detecting functionality and comparing these ones in terms of the data-size and running time of verification algorithms.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"12 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142377699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intersection distribution of degree four polynomials over finite fields 有限域上四度多项式的交集分布
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01488-6
Shuxing Li, Maosheng Xiong
{"title":"Intersection distribution of degree four polynomials over finite fields","authors":"Shuxing Li, Maosheng Xiong","doi":"10.1007/s10623-024-01488-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01488-6","url":null,"abstract":"<p>Given a polynomial <i>f</i> over the finite field <span>(mathbb {F}_q)</span>, its intersection distribution provides fruitful information on how lines in the affine plane intersect the graph of <i>f</i> over <span>(mathbb {F}_q)</span>. The intersection distribution in its simplest cases gives rise to oval polynomials in finite geometry and Steiner triple systems in design theory. Previously, the intersection distribution of degree two and degree three polynomials has been computed. In this paper, we determine the intersection distribution of all degree four polynomials over finite fields. As an application, we present a direct construction of Steiner systems using polynomials with prescribed intersection distribution.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantum-secure partial parallel MAC QPCBC 量子安全部分并行 MAC QPCBC
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01506-7
Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu
{"title":"A quantum-secure partial parallel MAC QPCBC","authors":"Shuping Mao, Tingting Guo, Peng Wang, Ruozhou Xu, Yuchao Chen, Lei Hu","doi":"10.1007/s10623-024-01506-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01506-7","url":null,"abstract":"<p>The quantum security of message authentication codes (MACs) has been gaining increasing attention in recent years, particularly with regard to proving the quantum security of classical MACs, which has emerged as a significant area of interest. In this work, we present two variants of classical MACs: QPMAC, a quantum-secure parallel version of PMAC, and QCBCMAC, a quantum-secure variant of CBCMAC and NMAC that supports variable-length input. We demonstrate that QPMAC is a parallel quantum-secure MAC, with an inverse relationship between its degree of parallelism and its level of quantum security. On the other hand, QCBCMAC provides quantum security for variable-length inputs. To achieve an optimal balance between parallelism and quantum security, we propose QPCBC, a hybrid construction that combines the strengths of QPMAC and QCBCMAC. We also provide an instantiation of QPCBC using tweakable block ciphers.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Association schemes arising from non-weakly regular bent functions 非弱正则弯曲函数产生的关联方案
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-04 DOI: 10.1007/s10623-024-01495-7
Yadi Wei, Jiaxin Wang, Fang-Wei Fu
{"title":"Association schemes arising from non-weakly regular bent functions","authors":"Yadi Wei, Jiaxin Wang, Fang-Wei Fu","doi":"10.1007/s10623-024-01495-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01495-7","url":null,"abstract":"<p>Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in Özbudak and Pelen (J Algebr Comb 56:635–658, 2022), Özbudak and Pelen constructed infinite families of symmetric association schemes of classes 5 and 6 by using ternary non-weakly regular bent functions. They also stated that “constructing 2<i>p</i>-class association schemes from <i>p</i>-ary non-weakly regular bent functions is an interesting problem\", where <span>(p&gt;3)</span> is an odd prime. In this paper, using non-weakly regular bent functions, we construct infinite families of symmetric association schemes of classes 2<i>p</i>, <span>((2p+1))</span> and <span>(frac{3p+1}{2})</span> for any odd prime <i>p</i>. Fusing those association schemes, we obtain <i>t</i>-class symmetric association schemes, where <span>(t=4,5,6,7)</span>. In addition, we give the sufficient and necessary conditions for the partitions <i>P</i>, <i>D</i>, <i>T</i>, <i>U</i> and <i>V</i> (defined in this paper) to induce symmetric association schemes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"59 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142374111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transitive path decompositions of Cartesian products of complete graphs 完整图笛卡儿积的传递路径分解
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01493-9
Ajani De Vas Gunasekara, Alice Devillers
{"title":"Transitive path decompositions of Cartesian products of complete graphs","authors":"Ajani De Vas Gunasekara, Alice Devillers","doi":"10.1007/s10623-024-01493-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01493-9","url":null,"abstract":"<p>An <i>H</i>-decomposition of a graph <span>(Gamma )</span> is a partition of its edge set into subgraphs isomorphic to <i>H</i>. A transitive decomposition is a special kind of <i>H</i>-decomposition that is highly symmetrical in the sense that the subgraphs (copies of <i>H</i>) are preserved and transitively permuted by a group of automorphisms of <span>(Gamma )</span>. This paper concerns transitive <i>H</i>-decompositions of the graph <span>(K_n Box K_n)</span> where <i>H</i> is a path. When <i>n</i> is an odd prime, we present a construction for a transitive path decomposition where the paths in the decomposition are considerably large compared to the number of vertices. Our main result supports well-known Gallai’s conjecture and an extended version of Ringel’s conjecture.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"5 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two classes of exceptional m-to-1 rational functions 两类特殊的 m 对 1 有理函数
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01499-3
Zhiguo Ding, Michael E. Zieve
{"title":"Two classes of exceptional m-to-1 rational functions","authors":"Zhiguo Ding, Michael E. Zieve","doi":"10.1007/s10623-024-01499-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01499-3","url":null,"abstract":"<p>For each odd prime power <i>q</i>, we present two rational functions <span>(f(X)in mathbb {F}_q(X))</span> which have the unusual property that, for every odd <i>n</i>, the function induced by <i>f</i>(<i>X</i>) on <span>(mathbb {F}_{q^n}setminus mathbb {F}_q)</span> is <span>((q-1))</span>-to-1.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tactical decompositions in finite polar spaces and non-spreading classical group actions 有限极空间中的战术分解与非展开经典群作用
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-03 DOI: 10.1007/s10623-024-01490-y
John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle
{"title":"Tactical decompositions in finite polar spaces and non-spreading classical group actions","authors":"John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle","doi":"10.1007/s10623-024-01490-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01490-y","url":null,"abstract":"<p>For finite classical groups acting naturally on the set of points of their ambient polar spaces, the symmetry properties of <i>synchronising</i> and <i>separating</i> are equivalent to natural and well-studied problems on the existence of certain configurations in finite geometry. The more general class of <i>spreading</i> permutation groups is harder to describe, and it is the purpose of this paper to explore this property for finite classical groups. In particular, we show that for most finite classical groups, their natural action on the points of its polar space is non-spreading. We develop and use a result on tactical decompositions (an <i>AB-Lemma</i>) that provides a useful technique for finding witnesses for non-spreading permutation groups. We also consider some of the other primitive actions of the classical groups.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142369112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信