Deepak Agrawal, Srinivasan Krishnaswamy, Smarajit Das
{"title":"论从 $$\\mathbb {Z}_4$$ 上的线性映射派生的布尔函数及其在秘密共享中的应用","authors":"Deepak Agrawal, Srinivasan Krishnaswamy, Smarajit Das","doi":"10.1007/s10623-024-01478-8","DOIUrl":null,"url":null,"abstract":"<p>The Gray map converts a symbol in <span>\\(\\mathbb {Z}_4\\)</span> to a pair of binary symbols. Therefore, under the Gray map, a linear function from <span>\\(\\mathbb {Z}_4^n\\)</span> to <span>\\(\\mathbb {Z}_4\\)</span> gives rise to a pair of boolean functions from <span>\\(\\mathbb {F}_2^{2n}\\)</span> to <span>\\(\\mathbb {F}_2\\)</span>. This paper studies such boolean functions. We state and prove a condition for the nonlinearity of such functions and derive closed-form expressions for them. Further, results related to the mutual information between random variables that satisfy such expressions have been derived. These results are then used to construct a couple of nonlinear boolean secret sharing schemes. These schemes are then analyzed for their closeness to ‘perfectness’ and their ability to resist ‘Tompa–Woll’-like attacks.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"30 1","pages":""},"PeriodicalIF":1.4000,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On Boolean functions derived from linear maps over $$\\\\mathbb {Z}_4$$ and their application to secret sharing\",\"authors\":\"Deepak Agrawal, Srinivasan Krishnaswamy, Smarajit Das\",\"doi\":\"10.1007/s10623-024-01478-8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The Gray map converts a symbol in <span>\\\\(\\\\mathbb {Z}_4\\\\)</span> to a pair of binary symbols. Therefore, under the Gray map, a linear function from <span>\\\\(\\\\mathbb {Z}_4^n\\\\)</span> to <span>\\\\(\\\\mathbb {Z}_4\\\\)</span> gives rise to a pair of boolean functions from <span>\\\\(\\\\mathbb {F}_2^{2n}\\\\)</span> to <span>\\\\(\\\\mathbb {F}_2\\\\)</span>. This paper studies such boolean functions. We state and prove a condition for the nonlinearity of such functions and derive closed-form expressions for them. Further, results related to the mutual information between random variables that satisfy such expressions have been derived. These results are then used to construct a couple of nonlinear boolean secret sharing schemes. These schemes are then analyzed for their closeness to ‘perfectness’ and their ability to resist ‘Tompa–Woll’-like attacks.</p>\",\"PeriodicalId\":11130,\"journal\":{\"name\":\"Designs, Codes and Cryptography\",\"volume\":\"30 1\",\"pages\":\"\"},\"PeriodicalIF\":1.4000,\"publicationDate\":\"2024-08-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Designs, Codes and Cryptography\",\"FirstCategoryId\":\"100\",\"ListUrlMain\":\"https://doi.org/10.1007/s10623-024-01478-8\",\"RegionNum\":2,\"RegionCategory\":\"数学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Designs, Codes and Cryptography","FirstCategoryId":"100","ListUrlMain":"https://doi.org/10.1007/s10623-024-01478-8","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
On Boolean functions derived from linear maps over $$\mathbb {Z}_4$$ and their application to secret sharing
The Gray map converts a symbol in \(\mathbb {Z}_4\) to a pair of binary symbols. Therefore, under the Gray map, a linear function from \(\mathbb {Z}_4^n\) to \(\mathbb {Z}_4\) gives rise to a pair of boolean functions from \(\mathbb {F}_2^{2n}\) to \(\mathbb {F}_2\). This paper studies such boolean functions. We state and prove a condition for the nonlinearity of such functions and derive closed-form expressions for them. Further, results related to the mutual information between random variables that satisfy such expressions have been derived. These results are then used to construct a couple of nonlinear boolean secret sharing schemes. These schemes are then analyzed for their closeness to ‘perfectness’ and their ability to resist ‘Tompa–Woll’-like attacks.
期刊介绍:
Designs, Codes and Cryptography is an archival peer-reviewed technical journal publishing original research papers in the designated areas. There is a great deal of activity in design theory, coding theory and cryptography, including a substantial amount of research which brings together more than one of the subjects. While many journals exist for each of the individual areas, few encourage the interaction of the disciplines.
The journal was founded to meet the needs of mathematicians, engineers and computer scientists working in these areas, whose interests extend beyond the bounds of any one of the individual disciplines. The journal provides a forum for high quality research in its three areas, with papers touching more than one of the areas especially welcome.
The journal also considers high quality submissions in the closely related areas of finite fields and finite geometries, which provide important tools for both the construction and the actual application of designs, codes and cryptographic systems. In particular, it includes (mostly theoretical) papers on computational aspects of finite fields. It also considers topics in sequence design, which frequently admit equivalent formulations in the journal’s main areas.
Designs, Codes and Cryptography is mathematically oriented, emphasizing the algebraic and geometric aspects of the areas it covers. The journal considers high quality papers of both a theoretical and a practical nature, provided they contain a substantial amount of mathematics.