Several Classes of Minimal Linear Codes With Few Weights From Weakly Regular Plateaued Functions

被引:60
作者
Mesnager, Sihem [1 ,2 ,3 ,4 ]
Sinak, Ahmet [2 ,3 ,5 ]
机构
[1] Univ Paris VIII, Dept Math, F-93526 St Denis, France
[2] Univ Paris VIII, CNRS, LAGA, UMR 7539, F-93526 St Denis, France
[3] Univ Paris XIII, F-93526 St Denis, France
[4] Telecom ParisTech, F-75013 Paris, France
[5] Necmettin Erbakan Univ, Dept Math & Comp, TR-42090 Konya, Turkey
关键词
Linear codes; Cryptography; Hamming weight; Generators; Mathematics; Electronic mail; Linear code; minimal code; secret sharing scheme; weakly regular plateaued function; weight distribution; 3-WEIGHT CODES; CONSTRUCTION; 2-WEIGHT;
D O I
10.1109/TIT.2019.2956130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Minimal linear codes have significant applications in secret sharing schemes and secure two-party computation. There are several methods to construct linear codes, one of which is based on functions over finite fields. Recently, many construction methods for linear codes from functions have been proposed in the literature. In this paper, we generalize the recent construction methods given by Tang et al. in [IEEE Transactions on Information Theory, 62(3), 1166-1176, 2016] to weakly regular plateaued functions over finite fields of odd characteristic. We first construct three-weight linear codes from weakly regular plateaued functions based on the second generic construction and then determine their weight distributions. We also give a punctured version and subcode of each constructed code. We note that they may be (almost) optimal codes and can be directly employed to obtain (democratic) secret sharing schemes, which have diverse applications in the industry. We next observe that the constructed codes are minimal for almost all cases and finally describe the access structures of the secret sharing schemes based on their dual codes.
引用
收藏
页码:2296 / 2310
页数:15
相关论文
共 35 条
[1]   How to Build Robust Shared Control Systems [J].
Anderson R. ;
Ding C. ;
Helleseth T. ;
Kløve T. .
Designs, Codes and Cryptography, 1998, 15 (2) :111-124
[2]  
[Anonymous], 1997, FINITE FIELDS
[3]  
[Anonymous], [No title captured]
[4]   Minimal vectors in linear codes [J].
Ashikhmin, A ;
Barg, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :2010-2017
[5]  
Blakley G.R, 1979, P NAT COMP C, V48, DOI 10.1109/MARK.1979.8817296
[6]   The Magma algebra system .1. The user language [J].
Bosma, W ;
Cannon, J ;
Playoust, C .
JOURNAL OF SYMBOLIC COMPUTATION, 1997, 24 (3-4) :235-265
[7]  
CALDERBANK AR, 1984, PHILIPS J RES, V39, P143
[8]   THE GEOMETRY OF 2-WEIGHT CODES [J].
CALDERBANK, R ;
KANTOR, WM .
BULLETIN OF THE LONDON MATHEMATICAL SOCIETY, 1986, 18 :97-122
[9]   Linear codes from perfect nonlinear mappings and their secret sharing schemes [J].
Carlet, C ;
Ding, CS ;
Yuan, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) :2089-2102
[10]   Linear codes from simplicial complexes [J].
Chang, Seunghwan ;
Hyun, Jong Yoon .
DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (10) :2167-2181