Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower
|
|
- Bonnie Phillips
- 5 years ago
- Views:
Transcription
1 Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower arxiv:5.0630v [cs.it] 9 Nov 05 Olav Geil, Stefano Martin, Umberto Martínez-Peñas, Diego Ruano Abstract Asymptotically good sequences of ramp secret sharing schemes were given in [4] by using one-point algebraic geometric codes defined from asymptotically good towers of function fields. Their security is given by the relative generalized Hamming weights of the corresponding codes. In this paper we demonstrate how to obtain refined information on the RGHWs when the codimension of the codes is small. For general codimension, we give an improved estimate for the highest RGHW. Introduction Relative generalized Hamming weights (RGHWs) of two linear codes are fundamental for evaluating the security of ramp secret sharing schemes and wire-tap channels of type II [5, 6, 8, ]. Until few years ago only the RGHWs of MDS codes and a few other examples of codes were known [7], but recently new results were discovered for one-point algebraic geometric codes [5], q-ary Reed-Muller codes [9] and cyclic codes [3]. In [4] it was discussed how to obtain asymptotically good sequences of ramp secret sharing schemes by using one-point algebraic geometric codes defined from asymptotically good towers of function fields. The tools used in [4] were the Goppa bound and the Supported by the Danish Council for Independent Research, grant DFF and the Spanish Ministry of Economy, grant MTM C Department of Mathematical Sciences, Aalborg University, Fredrik Bajers Vej 7G, 90-Aalborg Øst, Denmark. {olav,stefano,umberto,diego}@math.aau.dk
2 Feng-Rao bounds. In the present paper we focus on secret sharing schemes coming from the Garcia-Stichtenoth s second tower [3]. We give a method for obtaining new information on the RGHWs when the used codes have small codimension. For general codimension we give an improved estimate on the highest RGHW. The new results are obtained by studying in detail the sequence of Weierstrass semigroups related to the sequence of rational places [0]. We recall the definition of RGHWs and briefly mention their use in connection with secret sharing schemes. Definition. Let C C F n q be two linear codes. For m =,..., l = dim C dim C the m-th relative generalized Hamming weight of C with respect to C is M m (C, C ) = min{#suppd D C is a linear space, dim D = m, D C = { 0}}. Here SuppD = #{i N exists (c,..., c n ) D with c i 0}. Note that for m =,..., dim C, the m-th generalized Hamming weight (GHW) of C d m (C ) is M m (C, { 0}). Given C C linear codes, by definition, we have that the m-th generalized Hamming weight is a lower bound for the m-th relative generalized Hamming weight of C with respect to C, i.e. M m (C, C ) d m (C ). In [], a general construction of a linear secret sharing scheme with n participants is defined from two linear codes C C of length n. It was proved in [5, 6] that it has r m = n M l m+ (C, C )+ reconstruction and t m = M m (C, C ) privacy for m =,..., l. Here, r m and t m are the unique numbers such that the following holds: It is not possible to recover m q-bits of information about the secret with only t m shares, but it is possible with some t m + shares. With any r m shares it is possible to recover m q-bits of information about the secret, but it is not possible to recover m q-bits of information with some r m shares. We shall focus on one-point algebraic geometric codes C L (D, G) where D = P P n, G = µq, and P,..., P n, Q are pairwise different rational places over a function field. By writing ν Q for the valuation at Q, the Weiestrass semigroup corresponding to Q is ( ) H(Q) = ν Q L(µQ) = {µ N 0 L(µQ) L((µ )Q)}. µ=0 We denote by g the genus of the function field and by c the conductor of the Weierstrass semigroup. We consider C = C L (D, µ Q) and C =
3 C L (D, µ Q), with µ < µ. Observe that for l = dim(c ) dim(c ) and µ = µ µ we have that l µ, with equality if g µ < µ n holds. From [5, Theorem 9] we have the following bound: Theorem. For m =,..., l we have that: where M m (C, C ) n µ + Z(H(Q), µ, m), Z(H(Q), µ, m) = min{#{α m s= (i s + H(Q)) α / H(Q)} (µ ) i < i <... < i m }. For m > g, one has that d m (C) = n k + m, that is the Singleton bound is reached [, Corollary 4.]. For other values of m, using Theorem, the following result was found [4, Proposition 4]. Proposition 3. Let C L (D, µq) be a one-point algebraic geometric code of length n and dimension k. If µ < n and m min{k, g}, then: d m (C L (D, µq)) n k + m c + h c m n k + m c where h c m = #(H(Q) (0, c m]). Moreover, in the proof of [4, Proposition 4], one has that d m (C L (D, µq)) n µ + g + m c + h c m, which may allow us to improve the bound in Proposition 3 for µ g, since in this case k µ + g. Furthermore, we can apply it to bound the RGHWs of a pair of codes. Proposition 4. Let C L (D, µ Q) C L (D, µ Q) be two one-point algebraic geometric codes of length n and dimension k and k, respectively. If µ < µ < n and m min{k, g} then d m (C L (D, µ Q)) n µ + g + m c + h c m where h c m = #(H(Q) (0, c m]). Moreover, if m min{k k, g} then M m (C L (D, µ Q), C L (D, µ Q)) n µ + g + m c + h c m 3
4 From Garcia-Stichtenoth s second tower [3] one obtains codes over any field F q where q is an even power of a prime. Garcia and Stichtenoth analyzed the asymptotic behaviour of the number of rational places and the genus, from which one has that the codes beat the Gilbert-Varshamov bound for q 49. This allows us to create sequences of asymptotically good codes. The Garcia-Stichtenoth s tower (F, F, F 3,...) in [3] over F q, for q an even power of a prime, is given by: F = F q (x ) for ν >, F ν = F ν (x ν ) with x ν satisfying x q ν + x ν = x q ν q x +. ν The number of rational points of F ν is N q (F ν ) q ν (q q) and its genus is g ν = g(f ν ) = (q ν+ )(q ν+ ). For every function field F ν the following complete description of the Weierstrass semigroups corresponding to a sequence of rational places was given in [0]. Let Q ν be the rational point that is the unique pole in x. The Weierstrass semigroups H(Q ν ) at Q ν in F ν are given recursively by: H(Q ) = N 0 H(Q ν ) = q H(Q ν ) {i N 0 : i c ν }, where c ν = q ν q ν+ is the conductor of H(Qν ). An alternative way to obtain these Weiestrass semigroups was described in []. Definition 5. First we define H(Q ) = N 0. j = ν, we define: For ν positive integer and c ν = q ν q (ν j ), H(Q ν ) = S 0 ν S ν S ν... S j ν S ν, where: S 0 ν = {x ν, } = {0} For i j, Si ν = {x i, x ν,q + ν,q i, x + ν,q i,..., x +3 ν,q i } where for k q i q i we have that x i = q j q ν i+ + kq ν i+ ν,q +k S ν = [c ν +, ) Using the previous description of the Weierstrass semigroup H(Q ν ), we can see that it has the following properties: 4
5 Lemma 6. With the same notation as before, one has that:. For any i, i {0,,,..., j, j, }, i i, we have that S i ν S i ν =.. For i {,..., j } we have that #Si ν = q i q i and # ( i r=0s r ν) = q i. 3. For i {,..., j } and for any two consecutive elements x, y Si ν, with x > y, we have that x y = q ν i+. 4. For i {,..., j }. Let x be the first element of Si ν and y the last element of Sν i, we have that x y = q ν i+. 5. For i {,..., j }, and for any x, y i r=0s r ν, x > y we have that x y q ν i+. Proof.. By Theorem in [].. Let i {,..., j }, the cardinality of Si ν follows by its definition. For the second part, by (), we have that: # ( i r=0s r ν) = #S 0 ν + i #Sν r = + r= i r= (q r q r ) = + q i = q i 3. Consider two consecutive elements x, y Sν, i x > y. There exists a k {,..., q i q i } such that x = q j q ν i+ + kq ν i+ and y = q j q ν i+ + (k + )q ν i+. It follows that x y = q ν i+. 4. Let y be the last element of Sν i, i.e. y = q j q ν i+, and x be the first element of Sν, i i.e. x = q j q ν i+ + q ν i+. We have that x y = q ν i+. 5. For i {,..., j }, consider x, y i r=0sν r with x > y. This mean that there exists i, i {,..., i}, i i such that x S i ν, y S i ν. Let x be the element that precedes x in H(Q ν ), then we have that x y = (x x ) + (x y) = q ν i + + (x y) q ν i + q ν i+. The second inequality follows by (3) and (4), the third one since x y and the last one since i i.. Applying Proposition 3 to code pairs coming from Garcia-Stichtenoth s second tower [3], an asymptotic result was given in [4, Theorem 3], which combined with Proposition 4 allows us to obtain the following result. 5
6 Corollary 7. Let (F i ) i= be Garcia-Stichtenoth s second tower of function fields over F q, where q is an even power of a prime. Let (C i ) i= be a sequence of one-point algebraic geometric codes constructed from (F i ) i=. Consider R, R, ρ with 0 R q, 0 R < and 0 ρ min{r, q }, and assume that dim(c i )/n i R and µ i /n i R. For all sequences of positive integers (m i ) i= with m i /n i ρ, it holds that δ = lim inf i d m (C i )/n i satisfies δ R + ρ. q () δ R + ρ. () Note that the bound () is sharper than () for q R q. Small codimension In this section we give a refined bound on the RGHWs of two nested one-point algebraic geometric codes coming from Garcia-Stichtenoth s towers when the codimension is small. Before giving such bound, we illustrate the main idea with an example. Example. Consider q = 9 and let F 6 be the 6-th function field defined by the Garcia-Stichtenoth s tower over F q. The Weierstrass semigroup H(Q 6 ) at Q 6 in F 6 is H(Q 6 ) = {0, 43, 486, 53, 540, 567, 594, 6, 648} {3n n N and 3n [654, 70]} {n N n > 70}. We denote these three sets as A 0, B 0 and C 0 respectively. For computing Z(H(Q 6 ), µ, m) one should find i,..., i m such that (µ ) i < i < < i m and minimize #{α m s= (i s + H(Q 6 )) α / H(Q 6 )}. In this example we fix i = 0, thus: i + H(Q 6 ) = { 0, 3, 466, 493, 50, 547, 574, 60, 68} {3n 0 n N and 3n [654, 70]} {n N n > 68} = = (i + A 0 )f (i + B 0 ) (i + C 0 ). Note that i +A 0 and H(Q 6 ) are disjoint since i = 0 < 7 and x y 7 for any x, y A 0 x y. For the same reason for any 0 < i < < i m, we have that i m +A 0, i m +A 0,..., i +A 0, i +A 0 and H(Q 6 ) 6
7 are disjoint. It follows that m v= (i v + A 0 ) {α m v= (i v + H(Q 6 )) α / H(Q 6 )} and # m v= (i v +A 0 ) = m v= #(i v +A 0 ) = (m )#A 0 = 9(m ). The same argument does not hold for i + B 0 (or i + C 0 ) because there exists x, y B 0 (or C 0 ) such that x y = 3 and i > 3 thus it is possible that (i v + B 0 ) B 0 (or (i v + C 0 ) C 0 ) for some v =,..., m. Note that #((i +C 0 )\C 0 ) = i = 0, but (i +C 0 )\C 0 may intersect A 0 B 0. Therefore we consider (i + C 0 )\ qn, in this way (i + C 0 )\(C 0 qn) and H(Q 6 ) are disjoint. It follows that if i = 0, then Z(H(Q 6 ), µ, m) # m v= (i v + A 0 ) + #((i + C 0 )\(C 0 qn)) = (m ) As we can see from previous example, we do not consider the sets B 0, i +B 0,..., i m +B 0 because of their intersections with other sets. In general, we will also consider all the possible values i in the range [m, µ ] to obtain the following bound. Theorem 8. Let ν be an even positive integer and q an even power of a prime. Consider two one-point algebraic geometric codes C = C L (D, µ Q) C = C L (D, µ Q) of length n built on the ν-th Garcia-Stichtenoth s function field over F q and µ = µ µ. For µ < q ν+ ( ( )), m =,..., µ, consider u = + ν + log m 3 4 q ( and β = min{q ν+ 4 ( q )(µ ) 3 + q ), q ν 5 ( q ) + }, we have that: 4 M m (C, C ) n µ + g(m) where min { (m )q ν 4 u + q u ( q ) : if m > β u {log g(m) = q (m ), log q(µ ) + 3}} (m )q ν 4 u + q u ( q ) if m β, m 0 if m = Proof. By Theorem we have that M m (C, C ) n µ + Z(H(Q ν ), µ, m) thus we will estimate Z(H(Q ν ), µ, m). If m =, Z(H(Q ν ), µ, ) = 0, otherwise we denote the conductor of H(Q ν ) by c. Set (µ ) i < < i m, we define u(i ) = log q ( i ) +, then q u(i ) i < q u(i )+. For the sake of simplicity we write u instead of u(i ). To estimate Z(H(Q ν ), µ, m) we consider the following two sets: A(i, i,..., i v ) = {α m v= (i v + A 0 (u)) α / H(Q ν )} where A 0 (u) = ν u i=0 Si ν and C(i ) = (i + C 0 )\H(Q ν ) where C 0 = {α N α > c}. Again, to simplify the notation we write A = A(i, i,..., i v ), A 0 = A 0 (u) and C = C(i ). By 7
8 construction A C {α m s= (i s + H(Q ν )) α / H(Q ν )} and A C =. Thus we have that Z(H(Q ν ), µ, m) #A + #C. We start by computing the cardinality of A. By definition of A 0 for any x, y A 0, x y there exist i x, i y {0,..., ν u} such that x Six ν and y Sν iy. We can assume without loss of generality that i x i j and x > y, then we obtain by (6) in Lemma 6 that x y q ν ix+. Since µ < q ν+, then i x ν ν ix+ u 0 and x y q q ν ( ν u)+ = q u+. Thus for x, y A 0, x > y, we have that x y q u+. Since i < q u+, it follows that (j + A 0 ) (j + A 0 ) = for any j, j [i, 0]. Therefore we have that #A = # m v= (i v +A 0 ) = (m )#A 0. By () in Lemma 6, we have #A 0 = #( ν u i=0 Si ν) = q ν 4 u. Thus #A = (m )q ν 4 u. Furthermore, #C = #((i +C 0 )\H(Q ν )) = #([c+i, c)\h(q ν )) #([c+ i, c)\ qn) = i ( q ) where the inequality follows since H(Q ν ) [0, c) qn. Hence, M m (C, C ) n µ + Z(H(Q ν ), µ, m) n µ + min (#A + #C) i { (µ ),..., (m )} n µ + min { ) (m )q ν 4 u + i ( q i { (µ ),..., (m )} }. One could try to minimize the previous expression bounding u by log q ( i )+. However, the obtained bound is too loose. Hence, we consider the minimum among all possible values of u instead of i : ( ) M m (C, C ) n µ + min {(m )q ν4 u + q u q { u log q (m ) +, log q (m) +,..., log q (µ ) + } } { ( ) n µ + min (m )q ν 4 u + q u q { u log q (m ) +, log q (m) +,..., log q (µ ) + } } { ( ) n µ + min (m )q ν 4 u + q u q log q (m ) u log q(µ ) + }, 8
9 where the second to last inequality is obtained since i q u ( ). We define f(u) = (m )q ν 4 u + q u q. In this way our bound becomes: { M m (C, C ) n µ +min f(u) log q (m ) u log q(µ ) + }. By looking( the derivative( of f(u), )) one can see that f(u) only has a minimum at u = + ν + log m 3 4 q (. However, it does not always hold that q ) log q (m ) / u log q (µ ) + /. This happens when either u < log q (m ) or u > log q (µ ) +. The first case is equivalent to m > q ν 5 ( q ) +, the second one to m > q ν+ 4 ( q )(µ ) +. 4 Thus if m > β = min{q ν+ 4 ( q )(µ ) 3 +, q ν 5 ( q ) + }, 4 then the minimum is reached in log q (m ) or log q(µ ) +. The previous result has an asymptotic implication as well. Corollary 9. Let q be an even power of a prime, 0 R R <, and R = R R < q. There exists a sequence of pairs of one-point AG codes C,i = C L (D i, µ,i Q) C,i = C L (D i, µ,i Q), such that: n i = n(c,i ) = n(c,i ), µ j,i /n i R j when i, for j =,. For a given ρ let m i be such that m i /n i ρ when i and let M = lim inf M mi (C,i, C,i )/n i. It holds that: M R + g(ρ), where min w {ρ, R} {ρ(w(q q)) + w(q } q) if ρ > β, q ( ) g(ρ) = ρ 3 ( + ρ ) 3 q q if ρ β, ρ 0, 0 if ρ = 0, and β = min { 4 q 5 ( q ) 3, q 4 (R } q R) 3. Proof. Consider the Garcia-Stichtenoth s tower (F, F,...) over F q described at the end of section, and 0 µ,i < µ,i n i with µ j,i /n i R j for j =,. Now consider C j,i = C L (D i, µ j,i Q) for j =,, where D i is a divisor of degree n i and with n i distinct places not containing Q i, which is the unique pole of x F i. By taking the limit of the bound obtained in Theorem 8, the corollary holds. 9
10 Note that if we assume that C,i is the zero code for all i, then lim inf M mi (C,i, { 0}) is the asymptotic value of the m i -th general Hamming weight of C i,. For R < 4(q, the bound in Corollary 9 is sharper than the one obtained in q) [4, Theorem 3]. In the following graph we compare the bound from Corollary 7 (the dashed curve) with the bound from Corollary 9 (the solid curve). The first axis represents ρ = lim m i /n i, and the second axis represents δ = lim inf M mi (C,i, { 0}). 3 The highest RGHW As we illustrated at the beginning of section, for any n M l (C, C ) + obtained shares an eavesdropper may recover at least one q-bit of the secret. In this section, for g µ < µ n, we obtain a refined bound for the highest RGHW of two one-point algebraic geometric codes obtained from Garcia-Stichtenoth s towers, i.e. M l (C, C ). Proposition 0. Let ν be an even positive integer and g µ < µ n. Consider two one-point algebraic geometric codes C = C L (D, µ Q) C = C L (D, µ Q) built on the ν-th Garcia-Stichtenoth s tower. We have that µ = µ µ = dim(c ) dim(c ) = l and M µ (C, C ) n dim C M µ (C, C ) n dim C if µ q ν, ( ν+ q ν log q (µ) (q i q i )+ i= 0
11 +(q ν+ ν+ log q (µ) µ)q ν+ log q (µ) ) if µ < q ν. Proof. Since g µ < µ n, then µ = µ µ = l [4, Lemma ]. By Theorem, we have that M µ (C, C ) n µ + Z(H(Q), µ, µ), where Z(H(Q), µ, µ) = #{α µ v=( v + H(Q)) α / H(Q)}. For any x, y H(Q), we have that x y q ν, thus if µ q ν then ( µ v=0 v+h(q)) = N 0 {,..., (µ )}. It follows that Z(H(Q), µ, µ) = (N 0 \H(Q ν )) {,..., (µ )}) = g + µ. Thus M µ (C, C ) n µ + g + µ. Moreover since µ g, then µ g + = dim C and the first part of the proposition holds. For l q ν we claim that: Z(H(Q), µ, µ) = µ + g (q ν u (µ) i= (q i + q i ) + u (µ)q u (µ) ), where u (µ) = ν+ log q (µ) ν u (µ)+ and u (µ) = q µ. This means that µ = q ν+ u(µ) u (µ). We prove it by decreasing induction on µ, for q ν µ. For the basis step we have µ = q ν, thus u (µ) = and u (µ) = 0. According to our claim, Z(H(Q), µ, µ) is equal to µ + g, which has been already proven in the first part of this proposition. For the inductive step, we now assume that our claim is true for Z(H(Q), µ, µ) and we want to prove it for Z(H(Q), µ, µ ). We note that: Z(H(Q), µ, µ) = #{α µ v=( v + H(Q)) α / H(Q)} + #{α (µ ) + H(Q)) α / µ v=0( v + H(Q))} = Z(H(Q), µ, µ ) + #T (µ), where T (µ) = {α (µ ) + H(Q) α / µ v=0( v + H(Q))}. Thus Z(H(Q), µ, µ ) = Z(H(Q), µ, µ) #T (µ). We consider two cases: µ such that q ν u (µ ) < µ < q ν u (µ )+ and µ = q ν u (µ )+ Let us consider the first case, µ such that q ν u (µ ) < µ < q ν u (µ )+ then u (µ ) = u (µ) and u (µ ) = u (µ) +. By induction we have that Z(H(Q), µ, µ) = µ+g (q ν u (µ), i= (q i q i ) + u (µ)q u (µ) ). We claim that #T (µ) = q u (µ). By (5) in Lemma 6, for any x, y u (µ ) i=0 Sν, i x > y we have that x y q ν u (µ )+, moreover µ < q ν u (µ )+. Therefore, one has that ( (µ ) + u (µ ) i=0 Sν) i
12 ( µ v=0 v + H(Q)) =. Then (µ ) + u (µ ) i=0 Sν i T (µ). Actually, the previous inclusion is an equality. We shall prove it by contradiction: we assume that there exists an element x T (µ) but not in (µ ) + u (µ ) i=0 Sν. i By definition of T (µ), we have that x (µ ) + (Sν ( j/ i=u (µ )+ Si ν)) where j = ν/. Consider y < x to be the previous element of x in (µ ) + H(Q). By (3) and (4) in Lemma 6, we have that x y q ν u (µ ) < µ. Thus, (µ ) (µ ) + (x y) 0 and x (µ ) + (x y) + H(Q) µ v=0( v + H(Q)). This means x / T (µ), which is a contradiction. It follows that #T (µ) = # ( (µ ) + u ) ( (µ ) i=0 Sν i u = # (µ ) ) i=0 Sν i u (µ ) = q = q u (µ). We consider now the second case, µ = q ν u (µ )+, then u (µ ) = u (µ)+ and u (µ ) = 0. By using the same argument as in the first case, one may also prove that #T (µ) = q u (µ). Corollary. By using the same notation of the previous proposition, for g µ < µ < n and l q ν we have that M l (C, C ) = n dim C. Proof. By 0, M l (C, C ) n dim C. And M l (C, C ) n dim C, by the Singleton bound for one-point algebraic geometric codes and the result holds. This means that for l q ν the Singleton bound is reached. Note that for l < q ν, the bound in Proposition 0 allows us to get a refined bound since we could consider h c m. As before, this result has an asymptotically implication: Corollary. Let q be an even power of a prime, q R R <, and R = R R. There exists a sequence of one-point algebraic geometric codes C,i = C L (D i, µ,i Q) C,i = C L (D i, µ,i Q), µ i = µ,i µ,i, such that: n i = n(c,i ) = n(c,i ), µ j,i /n i R j when i, for j =,. Let l i = dim C,i dim C,i, M = lim inf M li (C,i, C,i )/n i, R j = lim dim C i,j n i for j =,, and R = R R, we have that: M = R if R q q
13 and ( M R q q ) +q + log q (R( q )) ( logq (R( q )) i= + Rq log q (R( q )) ) (q i q i )+ if R < q q. Proof. Let (F, F,...) be the tower of function fields defined in section, and 0 µ,i < µ,i n i with µ j,i /n i R j for j =,, where n i is the length of rational places of F i. Now consider C j,i = C L (D i, µ j,i Q) for j =,, where D i is a divisor of degree n i, with n i distinct places not containing Q, which is the unique pole of x F i. Since we assume that q R R < then R j = R j q, for j =, and R = R. By taking the limit of the result obtained in Proposition 0 and Corollary the result holds. Note that if log q (R( q )) = log q (R( q )) then the formulas in Corollary become: and M R q q M = R if R log q (R( q )) i= q q ( ) q i q i if R < q q. Corollary 7 can be used for ρ min{r, q }. If C,i = {0} for all i, then the value M of Corollary represents the asymptotic value of the highest GHW of C i,. Note that Corollary can be used for any value of R, but 7 cannot. References [] Maria Bras-Amorós and Michael E O Sullivan. The order bound on the minimum distance of the one-point codes associated to the Garcia Stichtenoth tower. Information Theory, IEEE Transactions on, 53():44 445,
14 [] Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, and Vinod Vaikuntanathan. Secure computation from random error correcting codes. In Advances in cryptology EUROCRYPT 007, volume 455 of Lecture Notes in Comput. Sci., pages Springer, Berlin, 007. [3] Arnaldo Garcia and Henning Stichtenoth. On the asymptotic behaviour of some towers of function fields over finite fields. Journal of Number Theory, 6():48 73, 996. [4] Olav Geil, Stefano Martin, Umberto Martínez-Peñas, Ryutaroh Matsumoto, and Diego Ruano. Asymptotically good ramp secret sharing schemes. arxiv preprint arxiv: , 05. [5] Olav Geil, Stefano Martin, Ryutaroh Matsumoto, Diego Ruano, and Yuan Luo. Relative generalized hamming weights of one-point algebraic geometric codes. Information Theory, IEEE Transactions on, 60(0): , 04. [6] Jun Kurihara, Tomohiko Uyematsu, and Ryutaroh Matsumoto. Secret sharing schemes based on linear codes can be precisely characterized by the relative generalized Hamming weight. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 95(): , 0. [7] Zihui Liu, Wende Chen, and Yuan Luo. The relative generalized Hamming weight of linear q-ary codes and their subcodes. Designs, Codes and Cryptography, 48(): 3, 008. [8] Yuan Luo, Chaichana Mitrpant, A. J. Han Vinck, and Kefei Chen. Some new characters on the wire-tap channel of type II. IEEE Trans. Inform. Theory, 5(3): 9, 005. [9] Stefano Martin and Olav Geil. Relative generalized Hamming weights of q-ary reed-muller codes. arxiv preprint arxiv: , 04. [0] Ruud Pellikaan, Henning Stichtenoth, and Fernando Torres. Weierstrass semigroups in an asymptotically good tower of function fields. Finite fields and their applications, 4(4):38 39, 998. [] Michael A. Tsfasman and Serge G. Vlăduț. Geometric approach to higher weights. IEEE Trans. Inform. Theory, 4(6, part ): , 995. Special issue on algebraic geometry codes. 4
15 [] Victor K. Wei. Generalized Hamming weights for linear codes. IEEE Trans. Inform. Theory, 37(5):4 48, 99. [3] Jun Zhang and Keqin Feng. Relative generalized Hamming weights of cyclic codes. arxiv preprint arxiv: , 05. 5
RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES
Appeared in: Finite Fields and their Applications, vol. 4, pp. 38-392, 998. WEIERSTRASS SEMIGROUPS IN AN ASYMPTOTICALLY GOOD TOWER OF FUNCTION FIELDS RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES
More informationLET be the finite field of cardinality and let
128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,
More informationON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES
ON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES RUUD PELLIKAAN AND FERNANDO TORRES Appeared in: IEEE Trans. Inform. Theory, vol. 45, pp. 2512-2519, Nov. 1999 Abstract. Improved
More informationThe Feng Rao bounds. KIAS International Conference on Coding Theory and Applications Olav Geil, Aalborg University, Denmark
Olav Geil Aalborg University Denmark KIAS International Conference on Coding Theory and Applications 2012 Linear code = a subspace. Operations are: Vector addition. Scalar multiplication. [n, k, d] the
More informationConstructions of digital nets using global function fields
ACTA ARITHMETICA 105.3 (2002) Constructions of digital nets using global function fields by Harald Niederreiter (Singapore) and Ferruh Özbudak (Ankara) 1. Introduction. The theory of (t, m, s)-nets and
More informationA Characterization Of Quantum Codes And Constructions
A Characterization Of Quantum Codes And Constructions Chaoping Xing Department of Mathematics, National University of Singapore Singapore 117543, Republic of Singapore (email: matxcp@nus.edu.sg) Abstract
More informationSemigroup Ideals and Generalized Hamming Weights
Semigroup Ideals and Generalized Hamming Weights Maria Bras-Amorós CIMPA Research School Algebraic Methods in Coding Theory Ubatuba, July 3-7, 2017 Contents 1 Maximum integer not in an ideal Maximum integer
More informationGeneralization of the Lee-O Sullivan List Decoding for One-Point AG Codes
arxiv:1203.6129v2 [cs.it] 5 Apr 2012 Generalization of the Lee-O Sullivan List Decoding for One-Point AG Codes Olav Geil Ryutaroh Matsumoto Diego Ruano April 5, 2012 Abstract We generalize the list decoding
More informationAsymptotically good sequences of curves and codes
Asymptotically good sequences of curves and codes Ruud Pellikaan Appeared in in Proc 34th Allerton Conf on Communication, Control, and Computing, Urbana-Champaign, October 2-4, 1996, 276-285 1 Introduction
More informationAlgebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.
Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,
More informationPublished in: Proceedings of the 21st Symposium on Mathematical Theory of Networks and Systems
Aalborg Universitet Affine variety codes are better than their reputation Geil, Hans Olav; Martin, Stefano Published in: Proceedings of the 21st Symposium on Mathematical Theory of Networks and Systems
More informationAsymptotically good sequences of codes and curves
Asymptotically good sequences of codes and curves Ruud Pellikaan Technical University of Eindhoven Soria Summer School on Computational Mathematics July 9, 2008 /k 1/29 Content: 8 Some algebraic geometry
More informationA Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems Alain Couvreur 1, Irene Márquez-Corbella 1, and Ruud Pellikaan 1 INRIA Saclay & LIX, CNRS UMR 7161 École Polytechnique,
More informationCryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes Alain Couvreur, Irene Márquez-Corbella and Ruud Pellikaan Abstract We give a polynomial time attack on the McEliece
More informationGeneralized weights and bounds for error probability over erasure channels
Generalized weights and bounds for error probability over erasure channels Leandro Cruvinel Lemes Department of Electrical Engineering Federal University of Triangulo Mineiro Uberaba - MG, Brazil Email:
More informationPAPER Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight
2067 PAPER Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight Jun KURIHARA, a), Member, Tomohiko UYEMATSU b), Senior Member, and Ryutaroh
More informationADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP. Maria Bras-Amorós
Séminaires & Congrès 11, 2005, p. 21 28 ADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP by Maria Bras-Amorós Abstract. In this work we study some objects describing the addition behavior of a numerical semigroup
More informationOn the floor and the ceiling of a divisor
Finite Fields and Their Applications 12 (2006) 38 55 http://www.elsevier.com/locate/ffa On the floor and the ceiling of a divisor Hiren Maharaj, Gretchen L. Matthews 1 Department of Mathematical Sciences,
More informationOn the order bound of one-point algebraic geometry codes.
On the order bound of one-point algebraic geometry codes. Anna Oneto and Grazia Tamone 1 Abstract. Let S ={s i} i IN IN be a numerical semigroup. For each i IN, let ν(s i) denote the number of pairs (s
More informationSecret Sharing Schemes with Strong Multiplication and a Large Number of Players from Toric Varieties
Contemporary Mathematics Secret Sharing Schemes with Strong Multiplication and a Large Number of Players from Toric Varieties Johan P. Hansen Abstract. This article consider Massey s construction for constructing
More informationTwo-point codes on Norm-Trace curves
Two-point codes on Norm-Trace curves C. Munuera 1, G. C. Tizziotti 2 and F. Torres 2 1 Dept. of Applied Mathematics, University of Valladolid Avda Salamanca SN, 47012 Valladolid, Castilla, Spain 2 IMECC-UNICAMP,
More informationError-correcting Pairs for a Public-key Cryptosystem
Error-correcting Pairs for a Public-key Cryptosystem Ruud Pellikaan g.r.pellikaan@tue.nl joint work with Irene Márquez-Corbella Code-based Cryptography Workshop 2012 Lyngby, 9 May 2012 Introduction and
More informationOn the Parameters of r-dimensional Toric Codes
On the Parameters of r-dimensional Toric Codes Diego Ruano Abstract From a rational convex polytope of dimension r 2 J.P. Hansen constructed an error correcting code of length n = (q 1) r over the finite
More informationThe minimum distance of codes in an array coming from telescopic semigroups
The minimum distance of codes in an array coming from telescopic semigroups Christoph Kirfel and Ruud Pellikaan in IEEE Transactions Information Theory, vol. 41, pp. 1720 1732, (1995) Abstract The concept
More informationCoding problems for memory and storage applications
.. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:
More informationAuthentication Codes and Algebraic Curves
Authentication Codes and Algebraic Curves Chaoping Xing Abstract. We survey a recent application of algebraic curves over finite fields to the constructions of authentication codes. 1. Introduction Authentication
More informationA generalization of the Weierstrass semigroup
Journal of Pure and Applied Algebra 207 (2006) 243 260 www.elsevier.com/locate/jpaa A generalization of the Weierstrass semigroup Peter Beelen a,, Nesrin Tutaş b a Department of Mathematics, Danish Technical
More informationMatrix characterization of linear codes with arbitrary Hamming weight hierarchy
Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department
More informationOn the gonality of curves, abundant codes and decoding
On the gonality of curves, abundant codes and decoding Ruud Pellikaan Appeared in: in Coding Theory Algebraic Geometry, Luminy 99, (H. Stichtenoth and M.A. Tsfasman eds.), Lect. Notes Math. 58, Springer,
More informationFlags of almost ane codes
Flags of almost ane codes Trygve Johnsen Hugues Verdure April 0, 207 Abstract We describe a two-party wire-tap channel of type II in the framework of almost ane codes. Its cryptological performance is
More informationCOUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF
COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF NATHAN KAPLAN Abstract. The genus of a numerical semigroup is the size of its complement. In this paper we will prove some results
More informationAsymptotically exact sequences of algebraic function fields defined over F q and application
Asymptotically exact sequences of algebraic function fields defined over F q and application Stéphane Ballet and Robert Rolland Institut de Mathématiques de Luminy UMR C.N.R.S. / Université de la Méditerranée
More informationIN this paper, we exploit the information given by the generalized
4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by
More informationUnifying notions of generalized weights for universal security on wire-tap networks
Unifying notions of generalized weights for universal security on wire-tap networks arxiv:1607.01263v2 [cs.it] 6 Dec 2016 Umberto Martínez-Peñas Department of Mathematical Sciences, Aalborg University,
More informationOn the Existence of Non-Special Divisors of Degree g and g 1 in Algebraic Function Fields over F q
arxiv:math/0410193v2 [math.nt] 13 Oct 2004 On the Existence of Non-Special Divisors of Degree g and g 1 in Algebraic Function Fields over F q Stéphane Ballet ( ) and Dominique Le Brigand ( ) November 13,
More informationProof: Let the check matrix be
Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion
More informationBounding the number of affine roots
with applications in reliable and secure communication Inaugural Lecture, Aalborg University, August 11110, 11111100000 with applications in reliable and secure communication Polynomials: F (X ) = 2X 2
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/57796 holds various files of this Leiden University dissertation Author: Mirandola, Diego Title: On products of linear error correcting codes Date: 2017-12-06
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationConstruction of Arithmetic Secret Sharing Schemes by Using Torsion Limits
Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits Seher Tutdere, and Osmanbey Uzunkol Abstract Recent results of Cascudo, Cramer, and Xing on the construction of arithmetic secret
More informationLecture 19: Elias-Bassalygo Bound
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecturer: Atri Rudra Lecture 19: Elias-Bassalygo Bound October 10, 2007 Scribe: Michael Pfetsch & Atri Rudra In the last lecture,
More informationQuantum codes from two-point Hermitian codes
Clemson University TigerPrints All Theses Theses 8-2010 Quantum codes from two-point Hermitian codes Justine Hyde-volpe Clemson University, jchasma@clemson.edu Follow this and additional works at: https://tigerprints.clemson.edu/all_theses
More informationON THE RELATIVE GENERALIZED HAMMING WEIGHTS OF A 4-DIMENSIONAL LINEAR CODE AND A SUBCODE WITH DIMENSION ONE
J Syst Sci Complex (2012) 25: 821 832 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS OF A 4-DIMENSIONAL LINEAR CODE AND A SUBCODE WITH DIMENSION ONE Zihui LIU Wende CHEN DOI: 10.1007/s11424-012-0192-4 Received:
More informationAsymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field Ignacio Cascudo 1, Hao Chen 2, Ronald Cramer 3, and Chaoping Xing 4 1 Department of Mathematics, University
More informationExistence and Non-existence Results for Strong External Difference Families
Existence and Non-existence Results for Strong External Difference Families Sophie Huczynska School of Mathematics and Statistics, University of St Andrews, St Andrews, Scotland, U.K. sh70@st-andrews.ac.uk
More informationarxiv: v1 [cs.it] 13 Mar 2019
Squares of Matrix-product Codes Ignacio Cascudo, Jaron Skovsted Gundersen, and Diego Ruano 14th March 2019 arxiv:1903.05494v1 [cs.it] 13 Mar 2019 Abstract The component-wise or Schur product C C of two
More informationVisual Cryptography Schemes with Optimal Pixel Expansion
Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato and Alfredo De Santis Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno, 808, Baronissi
More informationComputation of numerical semigroups by means of seeds
Computation of numerical semigroups by means of seeds Maria Bras-Amorós, Julio Fernández-González December 27, 27 arxiv:67.545v3 [math.co] 23 Dec 27 Abstract For the elements of a numerical semigroup which
More informationConstruction of a Class of Algebraic-Geometric Codes via Gröbner Bases
MM Research Preprints, 42 48 No. 16, April 1998. Beijing Construction of a Class of Algebraic-Geometric Codes via Gröbner Bases Changyan Di, Zhuojun Liu Institute of Systems Science Academia Sinica, Beijing
More informationCRYPTANALYSE EN TEMPS POLYNOMIAL DU SCHÉMA DE MCELIECE BASÉ SUR LES CODES
POLYNOMIAL DU SCHÉMA CODES GÉOMÉTRIQUES A. COUVREUR 1 I. MÁRQUEZ-CORBELLA 1 R. PELLIKAAN 2 1 INRIA Saclay & LIX 2 Department of Mathematics and Computing Science, TU/e. Journées Codage et Cryptographie
More informationCode Based Cryptology at TU/e
Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University Padjadjaran, Bandung, Nov. 6 Institute Technology Bandung, Bandung, Nov. 6 University Gadjah
More informationQuantum Algebraic-Geometric Codes
Quantum Algebraic-Geometric Codes Chiu Fan Lee Clare Hall Cambridge Part III essay in the Department of Applied Mathematics and Theoretical Physics University of Cambridge May 21 Abstract This is a Part
More informationCode constructions and existence bounds for relative generalized Hamming weight
Des. Codes Cryptogr. 2013) 69:275 297 DOI 10.1007/s10623-012-9657-7 Code constructions and existence bounds for relative generalized Hamming weight Zhuojun Zhuang Yuan Luo Bin Dai Received: 28 November
More informationOn the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 1, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
More informationSecure RAID Schemes from EVENODD and STAR Codes
Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationTwo-Point Codes for the Generalized GK Curve
Two-Point Codes for the Generalized GK Curve Elise Barelli, Peter Beelen, Mrinmoy Datta, Vincent Neiger, Johan Rosenkilde To cite this version: Elise Barelli, Peter Beelen, Mrinmoy Datta, Vincent Neiger,
More informationarxiv: v3 [math.ac] 29 Aug 2018
ON THE LOCAL K-ELASTICITIES OF PUISEUX MONOIDS MARLY GOTTI arxiv:1712.00837v3 [math.ac] 29 Aug 2018 Abstract. If M is an atomic monoid and x is a nonzero non-unit element of M, then the set of lengths
More informationTORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS
TORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS YUSUKE SUYAMA Abstract. We give a necessary and sufficient condition for the nonsingular projective toric variety associated to a building set to be
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationwith many rational points
Algebraic curves over F 2 with many rational points, René Schoof version May 7, 1991 Algebraic curves over F 2 with many rational points René Schoof Dipartimento di Matematica Università degli Studi di
More informationTowards a Better Understanding of the Semigroup Tree
arxiv:0810.1619v1 [math.co] 9 Oct 2008 Towards a Better Understanding of the Semigroup Tree Maria Bras-Amorós and Stanislav Bulygin October 27, 2018 Abstract In this paper we elaborate on the structure
More information5 Set Operations, Functions, and Counting
5 Set Operations, Functions, and Counting Let N denote the positive integers, N 0 := N {0} be the non-negative integers and Z = N 0 ( N) the positive and negative integers including 0, Q the rational numbers,
More informationOpen Questions in Coding Theory
Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems
More informationThe Real Number System
MATH 337 The Real Number System Sets of Numbers Dr. Neal, WKU A set S is a well-defined collection of objects, with well-defined meaning that there is a specific description from which we can tell precisely
More informationMAXIMUM NUMBER OF COMMON ZEROS OF HOMOGENEOUS POLYNOMIALS OVER FINITE FIELDS PETER BEELEN, MRINMOY DATTA, AND SUDHIR R. GHORPADE
Peter Beelen, Mrinmoy Datta, Sudhir R Ghorpade Maximum number of common zeros of homogeneous polynomials over finite fields Proceedings of the American Mathematical Society DOI: 10.1090/proc/13863 Accepted
More informationApplications of Algebraic Geometric Codes to Polar Coding
Clemson University TigerPrints All Dissertations Dissertations 5-015 Applications of Algebraic Geometric Codes to Polar Coding Sarah E Anderson Clemson University Follow this and additional works at: https://tigerprintsclemsonedu/all_dissertations
More informationarxiv: v1 [cs.it] 26 Apr 2007
EVALUATION CODES DEFINED BY PLANE VALUATIONS AT INFINITY C. GALINDO AND F. MONSERRAT arxiv:0704.3536v1 [cs.it] 26 Apr 2007 Abstract. We introduce the concept of δ-sequence. A δ-sequence generates a wellordered
More informationAlgebraic geometry codes
Algebraic geometry codes Tom Høholdt, Jacobus H. van Lint and Ruud Pellikaan In the Handbook of Coding Theory, vol 1, pp. 871-961, (V.S. Pless, W.C. Huffman and R.A. Brualdi Eds.), Elsevier, Amsterdam
More informationMaximum union-free subfamilies
Maximum union-free subfamilies Jacob Fox Choongbum Lee Benny Sudakov Abstract An old problem of Moser asks: how large of a union-free subfamily does every family of m sets have? A family of sets is called
More informationSuccess Probability of the Hellman Trade-off
This is the accepted version of Information Processing Letters 109(7 pp.347-351 (2009. https://doi.org/10.1016/j.ipl.2008.12.002 Abstract Success Probability of the Hellman Trade-off Daegun Ma 1 and Jin
More informationLow-discrepancy sequences obtained from algebraic function fields over finite fields
ACTA ARITHMETICA LXXII.3 (1995) Low-discrepancy sequences obtained from algebraic function fields over finite fields by Harald Niederreiter (Wien) and Chaoping Xing (Hefei) 1. Introduction. We present
More informationConstructions of Optimal Cyclic (r, δ) Locally Repairable Codes
Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Bin Chen, Shu-Tao Xia, Jie Hao, and Fang-Wei Fu Member, IEEE 1 arxiv:160901136v1 [csit] 5 Sep 016 Abstract A code is said to be a r-local
More informationVisual cryptography schemes with optimal pixel expansion
Theoretical Computer Science 369 (2006) 69 82 wwwelseviercom/locate/tcs Visual cryptography schemes with optimal pixel expansion Carlo Blundo a,, Stelvio Cimato b, Alfredo De Santis a a Dipartimento di
More informationMaximum Distance Separable Symbol-Pair Codes
2012 IEEE International Symposium on Information Theory Proceedings Maximum Distance Separable Symbol-Pair Codes Yeow Meng Chee, Han Mao Kiah, and Chengmin Wang School of Physical and Mathematical Sciences,
More informationDEPTH OF FACTORS OF SQUARE FREE MONOMIAL IDEALS
DEPTH OF FACTORS OF SQUARE FREE MONOMIAL IDEALS DORIN POPESCU Abstract. Let I be an ideal of a polynomial algebra over a field, generated by r-square free monomials of degree d. If r is bigger (or equal)
More informationAlgebraic geometric codes on curves and surfaces
Algebraic geometric codes on curves and surfaces Paolo Zampolini Master Program in Mathematics Faculty of Science University of Padova, Italy. Supervisor: prof. Luca Barbieri Viale Department of Pure and
More informationSecret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring
Journal of Computational Information Systems 9: 7 (2013) 2777 2784 Available at http://www.jofcis.com Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring Jianzhang CHEN, Yuanyuan
More informationarxiv: v1 [math.ac] 28 Dec 2007
arxiv:0712.4329v1 [math.ac] 28 Dec 2007 On the value-semigroup of a simple complete ideal in a two-dimensional regular local ring S. Greco Politecnico di Torino Abstract K. Kiyek University of Paderborn
More informationNew Inequalities for q-ary Constant-Weight Codes
New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway
More informationPhase Transitions of Random Codes and GV-Bounds
Phase Transitions of Random Codes and GV-Bounds Yun Fan Math Dept, CCNU A joint work with Ling, Liu, Xing Oct 2011 Y. Fan (CCNU) Phase Transitions of Random Codes and GV-Bounds Oct 2011 1 / 36 Phase Transitions
More informationRelative generalized matrix weights of matrix codes for universal security on wire-tap networks Martinez Peñas, Umberto; Matsumoto, Rytaro Yamashita
Aalborg Universitet Relative generalized matrix weights of matrix codes for universal security on wire-tap networks Martinez Peñas, Umberto; Matsumoto, Rytaro Yamashita Published in: I E E E Transactions
More informationOptimal algebraic manipulation detection codes and difference families
Optimal algebraic manipulation detection codes and difference families Douglas R. Stinson David R. Cheriton School of Computer Science, University of Waterloo Southeastern Conference, Boca Raton, March
More informationLecture notes on coding theory
Lecture notes on coding theory Raymond van Bommel Curves over finite fields, Autumn 2017, Leiden 1 Introduction When one agent tries to transfer information to another agent through a noisy channel, errors
More informationSome Results Concerning Uniqueness of Triangle Sequences
Some Results Concerning Uniqueness of Triangle Sequences T. Cheslack-Postava A. Diesl M. Lepinski A. Schuyler August 12 1999 Abstract In this paper we will begin by reviewing the triangle iteration. We
More informationBases and applications of Riemann-Roch Spaces of Function Fields with Many Rational Places
Clemson University TigerPrints All Dissertations Dissertations 12-2011 Bases and applications of Riemann-Roch Spaces of Function Fields with Many Rational Places Justin Peachey Clemson University, jpeache@clemson.edu
More informationSecret Sharing. Qi Chen. December 14, 2015
Secret Sharing Qi Chen December 14, 2015 What is secret sharing? A dealer: know the secret S and distribute the shares of S to each party A set of n parties P n {p 1,, p n }: each party owns a share Authorized
More informationarxiv: v3 [cs.it] 16 Jul 2015
NEW QUANTUM CODES FROM EVALUATION AND MATRIX-PRODUCT CODES arxiv:1406.0650v3 [cs.it] 16 Jul 2015 CARLOS GALINDO, FERNANDO HERNANDO INSTITUTO UNIVERSITARIO DE MATEMÁTICAS Y APLICACIONES DE CASTELLÓN AND
More informationSphere Packing and Shannon s Theorem
Chapter 2 Sphere Packing and Shannon s Theorem In the first section we discuss the basics of block coding on the m-ary symmetric channel. In the second section we see how the geometry of the codespace
More informationAsymptotics for the genus and the number of rational places in towers offunction fields over a finite field
Finite Fields and Their Applications 11 (2005) 434 450 http://www.elsevier.com/locate/ffa Asymptotics for the genus and the number of rational places in towers offunction fields over a finite field Arnaldo
More informationFinite Fields and Their Applications
Finite Fields and Their Applications 18 (2012) 865 885 Contents lists available at SciVerse ScienceDirect Finite Fields and Their Applications www.elsevier.com/locate/ffa Delta sets for divisors supported
More informationEfficient Secret Sharing Schemes Achieving Optimal Information Rate
Efficient Secret Sharing Schemes Achieving Optimal Information Rate Yongge Wang KINDI Center for Computing Research, Qatar University, Qatar and Department of SIS, UNC Charlotte, USA Email: yonggewang@unccedu
More informationLinear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach
Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Mehran Elyasi Department of ECE University of Minnesota melyasi@umn.edu Soheil Mohajer Department of ECE University
More informationarxiv:math/ v1 [math.ag] 28 Oct 1999
arxiv:math/9910155v1 [math.ag] 28 Oct 1999 Computing Weierstrass semigroups and the Feng-Rao distance from singular plane models A. Campillo J. I. Farrán July 25, 1999 Abstract We present an algorithm
More informationStandard forms for writing numbers
Standard forms for writing numbers In order to relate the abstract mathematical descriptions of familiar number systems to the everyday descriptions of numbers by decimal expansions and similar means,
More informationSYMMETRIC SUBGROUP ACTIONS ON ISOTROPIC GRASSMANNIANS
1 SYMMETRIC SUBGROUP ACTIONS ON ISOTROPIC GRASSMANNIANS HUAJUN HUANG AND HONGYU HE Abstract. Let G be the group preserving a nondegenerate sesquilinear form B on a vector space V, and H a symmetric subgroup
More informationError-correcting pairs for a public-key cryptosystem
Error-correcting pairs for a public-key cryptosystem Irene Márquez-Corbella and Ruud Pellikaan Department of Algebra, Geometry and Topology, University of Valladolid Facultad de Ciencias, 47005 Valladolid,
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt
More informationA finite universal SAGBI basis for the kernel of a derivation. Osaka Journal of Mathematics. 41(4) P.759-P.792
Title Author(s) A finite universal SAGBI basis for the kernel of a derivation Kuroda, Shigeru Citation Osaka Journal of Mathematics. 4(4) P.759-P.792 Issue Date 2004-2 Text Version publisher URL https://doi.org/0.890/838
More informationOn Secret Sharing Schemes, Matroids and Polymatroids
On Secret Sharing Schemes, Matroids and Polymatroids Jaume Martí-Farré, Carles Padró Dep. de Matemàtica Aplicada 4, Universitat Politècnica de Catalunya, Barcelona, Spain {jaumem,cpadro}@ma4.upc.edu June
More information