On Four Conjectures of Heng-Ding and p-ary Linear Codes From Monomials

被引:0
作者
Qian, Liqin [1 ]
Shi, Minjia [2 ,3 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace Secur, Hangzhou 310018, Peoples R China
[2] Anhui Univ, Sch Math Sci, Key Lab Intelligent Comp Signal Proc, Minist Educ, Hefei 230601, Anhui, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Codes; Linear codes; Codecs; Polynomials; Transforms; Vectors; Translation; Training; Kernel; Hamming weight; Linear code; subfield code; weight distribution; oval polynomial; monomial; SUBFIELD CODES;
D O I
10.1109/TIT.2025.3538117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Subfield codes of linear codes over finite fields have recently attracted great attention due to their wide applications in secret sharing schemes, authentication codes and association schemes. There are two major ingredients in this paper. The first ingredient is to solve four conjectures recently proposed by Heng and Ding (IEEE Trans. Inf. Theory, 68(6): 3643-3656, 2022). Besides, we also determine the weight distributions of subfield codes derived from x(3) and oval polynomials over F-2(m) . The second ingredient is to obtain two classes of pary linear codes from monomials over F-p(m) . We study the parameters of the constructed codes and determine their weight distributions. Notably, we show that the codes C-(xp((p))i,p(m)) are optimal and almost optimal in many cases with respect to the online Database of Grassl. Finally, we observe that the derived linear codes also have the minimality property for most cases.
引用
收藏
页码:5154 / 5165
页数:12
相关论文
共 35 条
[1]   Minimal vectors in linear codes [J].
Ashikhmin, A ;
Barg, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :2010-2017
[2]  
Cannon J., 2013, Handbook of Magma functions
[3]   Weight divisibility of cyclic codes, highly nonlinear functions on F2m, and crosscorrelation of maximum-length sequences [J].
Canteaut, A ;
Charpin, P ;
Dobbertin, H .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 2000, 13 (01) :105-138
[4]   Linear codes from perfect nonlinear mappings and their secret sharing schemes [J].
Carlet, C ;
Ding, CS ;
Yuan, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) :2089-2102
[5]   Codes, Bent Functions and Permutations Suitable for DES-like Cryptosystems [J].
Carlet C. ;
Charpin P. ;
Zinoviev V. .
Designs, Codes and Cryptography, 1998, 15 (2) :125-156
[6]  
Carlet C., 2021, Boolean Functions for Cryptography and Coding Theory
[7]   Towards Secure Two-Party Computation from the Wire-Tap Channel [J].
Chabanne, Herve ;
Cohen, Gerard ;
Patey, Alain .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 :34-46
[8]  
Coulter R. S., 1999, New Zealand J. Math., V28, P171
[9]  
Ding CS, 2003, LECT NOTES COMPUT SC, V2731, P11
[10]   The Subfield Codes of Ovoid Codes [J].
Ding, Cunsheng ;
Heng, Ziling .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (08) :4715-4729