{"title":"On the uniqueness of balanced complex orthogonal design","authors":"Yiwen Gao, Yuan Li, Haibin Kan","doi":"10.1007/s10623-024-01483-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01483-x","url":null,"abstract":"<p><i>Complex orthogonal designs</i> (CODs) have been used to construct <i>space-time block codes</i>. Its real analog, real orthogonal designs, or equivalently, sum of squares composition formula, have a long history in mathematics. Driven by some practical considerations, Adams et al. (IEEE Trans Info Theory, 57(4):2254–2262, 2011) introduced the definition of <i>balanced complex orthogonal designs</i> (BCODs). The code rate of BCODs is 1/2, and their minimum decoding delay is proven to be <span>(2^m)</span>, where 2<i>m</i> is the number of columns. We prove, when the number of columns is fixed, all (indecomposable) balanced complex orthogonal designs (BCODs) have the same parameters <span>([2^m, 2m, 2^{m-1}])</span>, and moreover, they are all equivalent.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimal abundant packings and choosability with separation","authors":"Zoltán Füredi, Alexandr Kostochka, Mohit Kumbhat","doi":"10.1007/s10623-024-01484-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01484-w","url":null,"abstract":"<p>A (<i>v</i>, <i>k</i>, <i>t</i>) packing of size <i>b</i> is a system of <i>b</i> subsets (blocks) of a <i>v</i>-element underlying set such that each block has <i>k</i> elements and every <i>t</i>-set is contained in at most one block. <i>P</i>(<i>v</i>, <i>k</i>, <i>t</i>) stands for the maximum possible <i>b</i>. A packing is called <i>abundant</i> if <span>(b> v)</span>. We give new estimates for <i>P</i>(<i>v</i>, <i>k</i>, <i>t</i>) around the critical range, slightly improving the Johnson bound and asymptotically determine the minimum <span>(v=v_0(k,t))</span> when <i>abundant</i> packings exist. For a graph <i>G</i> and a positive integer <i>c</i>, let <span>(chi _ell (G,c))</span> be the minimum value of <i>k</i> such that one can properly color the vertices of <i>G</i> from any assignment of lists <i>L</i>(<i>v</i>) such that <span>(|L(v)|=k)</span> for all <span>(vin V(G))</span> and <span>(|L(u)cap L(v)|le c)</span> for all <span>(uvin E(G))</span>. Kratochvíl, Tuza and Voigt in 1998 asked to determine <span>(lim _{nrightarrow infty } chi _ell (K_n,c)/sqrt{cn})</span> (if it exists). Using our bound on <span>(v_0(k,t))</span>, we prove that the limit exists and equals 1. Given <i>c</i>, we find the exact value of <span>(chi _ell (K_n,c))</span> for infinitely many <i>n</i>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field","authors":"Simon Masson, Antonio Sanso, Zhenfei Zhang","doi":"10.1007/s10623-024-01472-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01472-0","url":null,"abstract":"<p>In this paper, we introduce Bandersnatch, a new elliptic curve built over the BLS12-381 scalar field. The curve is equipped with an efficient endomorphism, allowing a fast scalar multiplication algorithm. Our benchmark shows that the multiplication is 42% faster, 21% reduction in terms of circuit size in the form of rank 1 constraint systems (R1CS), and 10% reduction in terms of Plonk circuit, compared to another curve, called Jubjub, having similar properties. Many zero-knowledge proof systems that rely on the Jubjub curve can benefit from our result.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"47 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142100951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Moments of autocorrelation demerit factors of binary sequences","authors":"Daniel J. Katz, Miriam E. Ramirez","doi":"10.1007/s10623-024-01482-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01482-y","url":null,"abstract":"<p>Sequences with low aperiodic autocorrelation are used in communications and remote sensing for synchronization and ranging. The autocorrelation demerit factor of a sequence is the sum of the squared magnitudes of its autocorrelation values at every nonzero shift when we normalize the sequence to have unit Euclidean length. The merit factor, introduced by Golay, is the reciprocal of the demerit factor. We consider the uniform probability measure on the <span>(2^ell )</span> binary sequences of length <span>(ell )</span> and investigate the distribution of the demerit factors of these sequences. Sarwate and Jedwab have respectively calculated the mean and variance of this distribution. We develop new combinatorial techniques to calculate the <i>p</i>th central moment of the demerit factor for binary sequences of length <span>(ell )</span>. These techniques prove that for <span>(pge 2)</span> and <span>(ell ge 4)</span>, all the central moments are strictly positive. For any given <i>p</i>, one may use the technique to obtain an exact formula for the <i>p</i>th central moment of the demerit factor as a function of the length <span>(ell )</span>. Jedwab’s formula for variance is confirmed by our technique with a short calculation, and we go beyond previous results by also deriving an exact formula for the skewness. A computer-assisted application of our method also obtains exact formulas for the kurtosis, which we report here, as well as the fifth central moment.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"26 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142100952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexander Barg, Ohad Elishco, Ryan Gabrys, Geyang Wang, Eitan Yaakobi
{"title":"Storage codes and recoverable systems on lines and grids","authors":"Alexander Barg, Ohad Elishco, Ryan Gabrys, Geyang Wang, Eitan Yaakobi","doi":"10.1007/s10623-024-01481-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01481-z","url":null,"abstract":"<p>A storage code is an assignment of symbols to the vertices of a connected graph <i>G</i>(<i>V</i>, <i>E</i>) with the property that the value of each vertex is a function of the values of its neighbors, or more generally, of a certain neighborhood of the vertex in <i>G</i>. In this work we introduce a new construction method of storage codes, enabling one to construct new codes from known ones via an interleaving procedure driven by resolvable designs. We also study storage codes on <span>({mathbb Z})</span> and <span>({mathbb Z}^2)</span> (lines and grids), finding closed-form expressions for the capacity of several one and two-dimensional systems depending on their recovery set, using connections between storage codes, graphs, anticodes, and difference-avoiding sets.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"9 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142100950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency distance sequences for packet detection in physical-layer security","authors":"Radi Abubaker, Guang Gong","doi":"10.1007/s10623-024-01475-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01475-x","url":null,"abstract":"<p>In this paper, we investigate how to construct the required sequences to be used as pilot signals for packet detection in physical-layer security. Our construction starts from the frequency domain, where a set of orthogonal frequencies cover an entire given bandwidth. The construction is a generalized construction from Milewski’s construction, where it takes the inverse discrete Fourier transform of the given frequency domain sequences. In this paper, we call a set of the <i>q</i> sequences of length <span>(ell q)</span> with an equal distanced, nonzero frequency response in the frequency domain a <i>frequency distance sequence set</i> (<i>FDSS</i>) and a sequence interleaved from this set an <i>FDSS interleaved sequence</i>. By applying frequency and time domain relations, we show that such a set is mutually orthogonal, and is a complementary sequence set if and only if the seed sequence is perfect (i.e., zero autocorrelation at all out-of-phase shift). The FDSS interleaved sequence is perfect if and only if the seed sequence is perfect. We apply the proposed sequences to real world experiments as pilot sequences for coarse synchronization. In our experiments, we selected Frank–Zadoff–Chu sequences and Golay pair sequences in our construction for use with an ADALM-Pluto SDR from Analog Devices and simulations, and we show the pilot detection rate under different noisy channel conditions, when compared to alternative pilot selections. The false negative detection rate of our pilot decreases to zero when the SNR is 20 dB. In contrast, a general OFDM QPSK pilot has a false-negative detection rate near 70% at the same SNR. In general, our pilot sequence consistently has a lower false-negative rate to the OFDM QPSK pilot, which failed to detect most packets in the ADALM-Pluto SDR environment.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"380 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142100953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feixiang Zhao, Jian Weng, Wenli Xie, Lin Hou, Ming Li
{"title":"Time-based attribute-based proxy re-encryption with decryption key update","authors":"Feixiang Zhao, Jian Weng, Wenli Xie, Lin Hou, Ming Li","doi":"10.1007/s10623-024-01467-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01467-x","url":null,"abstract":"<p>Proxy re-encryption (PRE) is a cryptosystem that realizes efficient encrypted data sharing by allowing a third party proxy to transform a ciphertext intended for a delegator (i.e., Alice) to a ciphertext intended for a delegatee (i.e., Bob). Attribute-based proxy re-encrypftion (AB-PRE) generalizes PRE to the attribute-based scenarios, enabling fine-grained access control on ciphertexts. However, the existing AB-PRE schemes do not adequately address the following problems: (1) the risk of decryption key leakage, and (2) the need of time-based delegation. To resolve these problems, we introduce a primitive called time-based attribute-based proxy re-encryption (TB-AB-PRE) with decryption key update. TB-AB-PRE associates keys with the current time information and supports efficient periodical decryption key update for each time transition. This property guarantees that a compromise of a decryption key for some time does not breach the security of ciphertexts from the others. Leveraging this time-based property, the proposed TB-AB-PRE elegantly achieves time-based delegation which enables Alice to decide which ciphertexts can be transformed and their decryptable timeframe after being transformed. The proposed construction is proven to be secure against honest re-encryption attacks with decryption key exposure resistance, under the learning with errors assumption.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142100949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the construction of certain odd degree irreducible polynomials over finite fields","authors":"Melek Çil, Barış Bülent Kırlar","doi":"10.1007/s10623-024-01479-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01479-7","url":null,"abstract":"<p>For an odd prime power <i>q</i>, let <span>(mathbb {F}_{q^2}=mathbb {F}_q(alpha ))</span>, <span>(alpha ^2=tin mathbb {F}_q)</span> be the quadratic extension of the finite field <span>(mathbb {F}_q)</span>. In this paper, we consider the irreducible polynomials <span>(F(x)=x^k-c_1x^{k-1}+c_2x^{k-2}-cdots -c_{2}^qx^2+c_{1}^qx-1)</span> over <span>(mathbb {F}_{q^2})</span>, where <i>k</i> is an odd integer and the coefficients <span>(c_i)</span> are in the form <span>(c_i=a_i+b_ialpha )</span> with at least one <span>(b_ine 0)</span>. For a given such irreducible polynomial <i>F</i>(<i>x</i>) over <span>(mathbb {F}_{q^2})</span>, we provide an algorithm to construct an irreducible polynomial <span>(G(x)=x^k-A_1x^{k-1}+A_2x^{k-2}-cdots -A_{k-2}x^2+A_{k-1}x-A_k)</span> over <span>(mathbb {F}_q)</span>, where the <span>(A_i)</span>’s are explicitly given in terms of the <span>(c_i)</span>’s. This gives a bijective correspondence between irreducible polynomials over <span>(mathbb {F}_{q^2})</span> and <span>(mathbb {F}_q)</span>. This fact generalizes many recent results on this subject in the literature.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142084946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An algebraic approach to circulant column parity mixers","authors":"Robert Christian Subroto","doi":"10.1007/s10623-024-01476-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01476-w","url":null,"abstract":"<p>Circulant Column Parity Mixers (CCPMs) are a particular type of linear maps, used as the mixing layer in permutation-based cryptographic primitives like <span>Keccak</span>-<i>f</i> (SHA3) and <span>Xoodoo</span>. Although being successfully applied, not much is known regarding their algebraic properties. They are limited to invertibility of CCPMs, and that the set of invertible CCPMs forms a group. A possible explanation is due to the complexity of describing CCPMs in terms of linear algebra. In this paper, we introduce a new approach to studying CCPMs using module theory from commutative algebra. We show that many interesting algebraic properties can be deduced using this approach, and that known results regarding CCPMs resurface as trivial consequences of module theoretic concepts. We also show how this approach can be used to study the linear layer of <span>Xoodoo</span>, and other linear maps with a similar structure which we call DCD-compositions. Using this approach, we prove that every DCD-composition where the underlying vector space with the same dimension as that of <span>Xoodoo</span> has a low order. This provides a solid mathematical explanation for the low order of the linear layer of <span>Xoodoo</span>, which equals 32. We design a DCD-composition using this module-theoretic approach, but with a higher order using a different dimension.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142022186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepak Agrawal, Srinivasan Krishnaswamy, Smarajit Das
{"title":"On Boolean functions derived from linear maps over $$mathbb {Z}_4$$ and their application to secret sharing","authors":"Deepak Agrawal, Srinivasan Krishnaswamy, Smarajit Das","doi":"10.1007/s10623-024-01478-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01478-8","url":null,"abstract":"<p>The Gray map converts a symbol in <span>(mathbb {Z}_4)</span> to a pair of binary symbols. Therefore, under the Gray map, a linear function from <span>(mathbb {Z}_4^n)</span> to <span>(mathbb {Z}_4)</span> gives rise to a pair of boolean functions from <span>(mathbb {F}_2^{2n})</span> to <span>(mathbb {F}_2)</span>. This paper studies such boolean functions. We state and prove a condition for the nonlinearity of such functions and derive closed-form expressions for them. Further, results related to the mutual information between random variables that satisfy such expressions have been derived. These results are then used to construct a couple of nonlinear boolean secret sharing schemes. These schemes are then analyzed for their closeness to ‘perfectness’ and their ability to resist ‘Tompa–Woll’-like attacks.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"30 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141992009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}