Skip to main content
Top
Published in: Cryptography and Communications 3/2021

27-02-2021

An inductive construction of minimal codes

Authors: Daniele Bartoli, Matteo Bonini, Burçin Güneş

Published in: Cryptography and Communications | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We provide new families of minimal codes in any characteristic, useful for the construction of secret sharing schemes. Also, an inductive construction of minimal codes is presented.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Bartoli, D, Bonini, M: Minimal linear codes in odd characteristic. IEEE Trans. Inform. Theory. 65, 4152–4155 (2019)MathSciNetCrossRef Bartoli, D, Bonini, M: Minimal linear codes in odd characteristic. IEEE Trans. Inform. Theory. 65, 4152–4155 (2019)MathSciNetCrossRef
3.
go back to reference Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Trans. Inform. Theory. 24, 384–386 (1978)MathSciNetCrossRef Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Trans. Inform. Theory. 24, 384–386 (1978)MathSciNetCrossRef
4.
go back to reference Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. of AFIPS National Computer Conference, pp. 313–317. New York (1979) Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. of AFIPS National Computer Conference, pp. 313–317. New York (1979)
6.
go back to reference Carlet, C., Ding, C., Yuan, J.: Linear codes from highly nonlinear functions and their secret sharing schemes. IEEE Trans. Inf. Theory. 51, 2089–2102 (2005)CrossRef Carlet, C., Ding, C., Yuan, J.: Linear codes from highly nonlinear functions and their secret sharing schemes. IEEE Trans. Inf. Theory. 51, 2089–2102 (2005)CrossRef
7.
go back to reference Chabanne, H., Cohen, G., Patey, A.: Towards secure two-party computation from the wire-tap channel. In: Information Security and Cryptology – ICISC 2013, pp. 34–46. Heidelberg (2014) Chabanne, H., Cohen, G., Patey, A.: Towards secure two-party computation from the wire-tap channel. In: Information Security and Cryptology – ICISC 2013, pp. 34–46. Heidelberg (2014)
8.
9.
go back to reference Bruck, J, Naor, M.: The hardness of decoding linear codes with preprocessing. IEEE Trans. Inform. Theory. 36, 381–385 (1990)MathSciNetCrossRef Bruck, J, Naor, M.: The hardness of decoding linear codes with preprocessing. IEEE Trans. Inform. Theory. 36, 381–385 (1990)MathSciNetCrossRef
10.
go back to reference Cohen, G.D., Mesnager, S., Patey, A.: On minimal and quasi-minimal linear codes. In: IMACC 2013 pp. 85–98. Heidelberg (2013) Cohen, G.D., Mesnager, S., Patey, A.: On minimal and quasi-minimal linear codes. In: IMACC 2013 pp. 85–98. Heidelberg (2013)
12.
13.
go back to reference Ding, C., Li, N., Li, C., Zhou, Z.: Three-weight cyclic codes and their weight distributions. Discrete Math. 339, 415–427 (2016)MathSciNetCrossRef Ding, C., Li, N., Li, C., Zhou, Z.: Three-weight cyclic codes and their weight distributions. Discrete Math. 339, 415–427 (2016)MathSciNetCrossRef
14.
go back to reference Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: DMTCS 2003, pp.11–25. Heidelberg (2003) Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: DMTCS 2003, pp.11–25. Heidelberg (2003)
15.
16.
go back to reference Klove, T.: Codes for Error Detection Series on Coding Theory and Cryptology, vol. 2. World Scientific Publishing Co. Pte. Ltd., Hackensack (2007) Klove, T.: Codes for Error Detection Series on Coding Theory and Cryptology, vol. 2. World Scientific Publishing Co. Pte. Ltd., Hackensack (2007)
17.
go back to reference Massey, J.L.: Minimal codewords and secret sharing (1993) Massey, J.L.: Minimal codewords and secret sharing (1993)
18.
go back to reference Massey, J.L.: Some applications of coding theory in cryptography. In Codes and Cyphers: Cryptography and Coding IV, pp. 33–47. Esses (1995) Massey, J.L.: Some applications of coding theory in cryptography. In Codes and Cyphers: Cryptography and Coding IV, pp. 33–47. Esses (1995)
21.
go back to reference Yuan, J., Ding, C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory. 52, 206–212 (2006)MathSciNetCrossRef Yuan, J., Ding, C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory. 52, 206–212 (2006)MathSciNetCrossRef
Metadata
Title
An inductive construction of minimal codes
Authors
Daniele Bartoli
Matteo Bonini
Burçin Güneş
Publication date
27-02-2021
Publisher
Springer US
Published in
Cryptography and Communications / Issue 3/2021
Print ISSN: 1936-2447
Electronic ISSN: 1936-2455
DOI
https://doi.org/10.1007/s12095-021-00474-2

Other articles of this Issue 3/2021

Cryptography and Communications 3/2021 Go to the issue

Premium Partner