29,100 research outputs found
Linear codes with few weights from non-weakly regular plateaued functions
Linear codes with few weights have significant applications in secret sharing
schemes, authentication codes, association schemes, and strongly regular
graphs. There are a number of methods to construct linear codes, one of which
is based on functions. Furthermore, two generic constructions of linear codes
from functions called the first and the second generic constructions, have
aroused the research interest of scholars. Recently, in \cite{Nian}, Li and
Mesnager proposed two open problems: Based on the first and the second generic
constructions, respectively, construct linear codes from non-weakly regular
plateaued functions and determine their weight distributions.
Motivated by these two open problems, in this paper, firstly, based on the
first generic construction, we construct some three-weight and at most
five-weight linear codes from non-weakly regular plateaued functions and
determine the weight distributions of the constructed codes. Next, based on the
second generic construction, we construct some three-weight and at most
five-weight linear codes from non-weakly regular plateaued functions belonging
to (defined in this paper) and determine the weight
distributions of the constructed codes. We also give the punctured codes of
these codes obtained based on the second generic construction and determine
their weight distributions. Meanwhile, we obtain some optimal and almost
optimal linear codes. Besides, by the Ashikhmin-Barg condition, we have that
the constructed codes are minimal for almost all cases and obtain some secret
sharing schemes with nice access structures based on their dual codes.Comment: 52 pages, 34 table
Dual and Hull code in the first two generic constructions and relationship with the Walsh transform of cryptographic functions
We contribute to the knowledge of linear codes from special polynomials and
functions, which have been studied intensively in the past few years. Such
codes have several applications in secret sharing, authentication codes,
association schemes and strongly regular graphs.
This is the first work in which we study the dual codes in the framework of
the two generic constructions; in particular, we propose a Gram-Schmidt
(complexity of ) process to compute them explicitly. The
originality of this contribution is in the study of the existence or not of
defining sets , which can be used as ingredients to construct the dual code
for a given code in the context of the second
generic construction. We also determine a necessary condition expressed by
employing the Walsh transform for a codeword of to belong in the
dual. This achievement was done in general and when the involved functions are
weakly regularly bent. We shall give a novel description of the Hull code in
the framework of the two generic constructions. Our primary interest is
constructing linear codes of fixed Hull dimension and determining the (Hamming)
weight of the codewords in their duals
Relative generalized Hamming weights of one-point algebraic geometric codes
Security of linear ramp secret sharing schemes can be characterized by the
relative generalized Hamming weights of the involved codes. In this paper we
elaborate on the implication of these parameters and we devise a method to
estimate their value for general one-point algebraic geometric codes. As it is
demonstrated, for Hermitian codes our bound is often tight. Furthermore, for
these codes the relative generalized Hamming weights are often much larger than
the corresponding generalized Hamming weights
Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets
We improve the flexibility in designing access structures of quantum
stabilizer-based secret sharing schemes for classical secrets, by introducing
message randomization in their encoding procedures. We generalize the
Gilbert-Varshamov bound for deterministic encoding to randomized encoding of
classical secrets. We also provide an explicit example of a ramp secret sharing
scheme with which multiple symbols in its classical secret are revealed to an
intermediate set, and justify the necessity of incorporating strong security
criterion of conventional secret sharing. Finally, we propose an explicit
construction of strongly secure ramp secret sharing scheme by quantum
stabilizers, which can support twice as large classical secrets as the
McEliece-Sarwate strongly secure ramp secret sharing scheme of the same share
size and the access structure.Comment: Publisher's Open Access PDF. arXiv admin note: text overlap with
arXiv:1811.0521
- …