28 research outputs found
Explicit towers of Drinfeld modular curves
We give explicit equations for the simplest towers of Drinfeld modular curves
over any finite field, and observe that they coincide with the asymptotically
optimal towers of curves constructed by Garcia and Stichtenoth.Comment: 10 pages. For mini-symposium on "curves over finite fields and codes"
at the 3rd European Congress in Barcelona 7/2000 Revised to correct minor
typographical and grammatical error
The Poincaré Polynomial of a Linear Code
We introduce the Poincaré polynomial of a linear q-ary code and its relation to the corresponding weight enumerator. The question of whether the Poincaré polynomial is a complete invariant is answered affirmatively for q = 2, 3 and negatively for q ≥ 4. Finally we determine this polynomial for MDS codes and, by means of a recursive formula, for binary Reed-Muller codes
Partial spreads and vector space partitions
Constant-dimension codes with the maximum possible minimum distance have been
studied under the name of partial spreads in Finite Geometry for several
decades. Not surprisingly, for this subclass typically the sharpest bounds on
the maximal code size are known. The seminal works of Beutelspacher and Drake
\& Freeman on partial spreads date back to 1975, and 1979, respectively. From
then until recently, there was almost no progress besides some computer-based
constructions and classifications. It turns out that vector space partitions
provide the appropriate theoretical framework and can be used to improve the
long-standing bounds in quite a few cases. Here, we provide a historic account
on partial spreads and an interpretation of the classical results from a modern
perspective. To this end, we introduce all required methods from the theory of
vector space partitions and Finite Geometry in a tutorial style. We guide the
reader to the current frontiers of research in that field, including a detailed
description of the recent improvements.Comment: 30 pages, 1 tabl
Blackbox secret sharing revisited: A coding-theoretic approach with application to expansionless near-threshold schemes
A blackbox secret sharing (BBSS) scheme works in exactly the same way for all finite Abelian groups G; it can be instantiated for any such group G and only black-box access to its group operations and to random group elements is required. A secret is a single group element and each of the n players’ shares is a vector of such elements. Share-computation and secret-reconstruction is by integer linear combinations. These do not depend on G, and neither do the privacy and reconstruction parameters t, r. This classical, fundamental primitive was introduced by Desmedt and Frankel (CRYPTO 1989) in their context of “threshold cryptography.” The expansion factor is the total number of group elements in a full sharing divided by n. For threshold BBSS with t-privacy (Formula presented)-reconstruction and arbitrary n, constructions with minimal expansion (Formula presented) exist (CRYPTO 2002, 2005). These results are firmly rooted in number theory; each makes (different) judicious choices of orders in number fields admitting a vector of elements of very large length (in the number field degree) whose corresponding Vandermonde-determinant is sufficiently controlled so as to enable BBSS by a suitable adaptation of Shamir’s scheme. Alternative approaches generally lead to very large expansion. The state of the art of BBSS has not changed for the last 17 years. Our contributions are two-fold. (1) We introduce a novel, nontrivial, effective construction of BBSS based on coding theory instead of number theory. For threshold-BBSS we also achieve minimal expansion factor O(log n).(2) Our method is more versatile. Namely, we show, for the first time, BBSS that is near-threshold, i.e., r-t is an arbitrarily small constant fraction of n, and that has expansion factor O(1), i.e., individual share-vectors of constant length (“asymptotically expansionless”). Threshold can be concentrated essentially freely across full range. We also show expansion is minimal for near-threshold and that such BBSS cannot be attained by previous methods. Our general construction is based on a well-known mathematical principle, the local-global principle. More precisely, we first construct BBSS over local rings through either Reed-Solomon or algebraic geometry codes. We then “glue” these schemes together in a dedicated manner to obtain a global secret sharing scheme, i.e., defined over the integers, which, as we finally prove using novel insights, has the desired BBSS properties. Though our main purpose here is advancing BBSS for its own sake, we also briefly address possible protocol applications