Skip to main content
Top
Published in: Designs, Codes and Cryptography 1/2017

13-04-2016

Complete weight enumerators of a class of linear codes

Authors: Jaehyun Ahn, Dongseok Ka, Chengju Li

Published in: Designs, Codes and Cryptography | Issue 1/2017

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Let \(\mathbb {F}_{q}\) be the finite field with \(q=p^{m}\) elements, where p is an odd prime and m is a positive integer. For a positive integer t, let \(D\subset \mathbb {F}^{t}_{q}\) and let \({\mathrm {Tr}}_{m}\) be the trace function from \(\mathbb {F}_{q}\) onto \(\mathbb {F}_{p}\). In this paper, let \(D=\{(x_{1},x_{2},\ldots ,x_{t}) \in \mathbb {F}_{q}^{t}\setminus \{(0,0,\ldots ,0)\} : {\mathrm {Tr}}_{m}(x_{1}+x_{2}+\cdots +x_{t})=0\},\) we define a p-ary linear code \(\mathcal {C}_{D}\) by
$$\begin{aligned} \mathcal {C}_{D}=\{\mathbf {c}(a_{1},a_{2},\ldots ,a_{t}) : (a_{1},a_{2},\ldots ,a_{t})\in \mathbb {F}^{t}_{q}\}, \end{aligned}$$
where
$$\begin{aligned} \mathbf {c}(a_{1},a_{2},\ldots ,a_{t})=({\mathrm {Tr}}_{m}(a_{1}x^{2}_{1}+a_{2}x^{2}_{2}+\cdots +a_{t}x^{2}_{t}))_{(x_{1},x_{2},\ldots ,x_{t}) \in D}. \end{aligned}$$
We shall present the complete weight enumerators of the linear codes \(\mathcal {C}_{D}\) and give several classes of linear codes with a few weights. This paper generalizes the results of Yang and Yao (Des Codes Cryptogr, 2016).
Literature
1.
go back to reference Bae S., Li C., Yue Q.: Some results on two-weight and three-weight linear codes, preprint (2015). Bae S., Li C., Yue Q.: Some results on two-weight and three-weight linear codes, preprint (2015).
2.
go back to reference Berndt B., Evans R., Williams K.: Gauss and Jacobi Sums. Wiley, New York (1997). Berndt B., Evans R., Williams K.: Gauss and Jacobi Sums. Wiley, New York (1997).
3.
go back to reference Calderbank A.R., Goethals J.M.: Three-weight codes and association schemes. Philips J. Res. 39, 143–152 (1984). Calderbank A.R., Goethals J.M.: Three-weight codes and association schemes. Philips J. Res. 39, 143–152 (1984).
4.
go back to reference Calderbank A.R., Kantor W.M.: The geometry of two-weight codes. Bull. Lond. Math. Soc. 18, 97–122 (1986). Calderbank A.R., Kantor W.M.: The geometry of two-weight codes. Bull. Lond. Math. Soc. 18, 97–122 (1986).
5.
go back to reference Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089–2102 (2005). Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089–2102 (2005).
6.
go back to reference Ding C.: Codes from Difference Sets. World Scientific, Singapore (2014). Ding C.: Codes from Difference Sets. World Scientific, Singapore (2014).
7.
go back to reference Ding C.: Linear codes from some 2-designs. IEEE Trans. Inf. Theory 61(6), 3265–3275 (2015). Ding C.: Linear codes from some 2-designs. IEEE Trans. Inf. Theory 61(6), 3265–3275 (2015).
8.
go back to reference Ding K., Ding C.: Binary linear codes with three weights. IEEE Commun. Lett. 18(11), 1879–1882 (2014). Ding K., Ding C.: Binary linear codes with three weights. IEEE Commun. Lett. 18(11), 1879–1882 (2014).
9.
go back to reference Ding K., Ding C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 61(11), 5835–5842 (2015). Ding K., Ding C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 61(11), 5835–5842 (2015).
10.
go back to reference Ding C., Niederreiter H.: Cyclotomic linear codes of order 3. IEEE Trans. Inf. Theory 53(6), 2274–2277 (2007). Ding C., Niederreiter H.: Cyclotomic linear codes of order 3. IEEE Trans. Inf. Theory 53(6), 2274–2277 (2007).
11.
go back to reference Ding C., Wang X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330(1), 81–99 (2005). Ding C., Wang X.: A coding theory construction of new systematic authentication codes. Theor. Comput. Sci. 330(1), 81–99 (2005).
12.
go back to reference Ding C., Helleseth T., Kløve T., Wang X.: A general construction of authentication codes. IEEE Trans. Inf. Theory 53(6), 2229–2235 (2007). Ding C., Helleseth T., Kløve T., Wang X.: A general construction of authentication codes. IEEE Trans. Inf. Theory 53(6), 2229–2235 (2007).
13.
go back to reference Ding C., Luo J., Niederreiter H.: Two-weight codes puncturedfrom irreducible cyclic codes. In: Li Y, et al. (eds.) Proceedings of the First Worshop on Coding and Cryptography, pp. 119–124. World Scientific, Singapore (2008). Ding C., Luo J., Niederreiter H.: Two-weight codes puncturedfrom irreducible cyclic codes. In: Li Y, et al. (eds.) Proceedings of the First Worshop on Coding and Cryptography, pp. 119–124. World Scientific, Singapore (2008).
14.
go back to reference Lidl R., Niederreiter H.: Finite Fields. Addison-Wesley, Reading (1983). Lidl R., Niederreiter H.: Finite Fields. Addison-Wesley, Reading (1983).
15.
go back to reference Myerson G.: Period polynomials and gauss sums for finite fields. Acta Arith. 39(3), 251–264 (1981). Myerson G.: Period polynomials and gauss sums for finite fields. Acta Arith. 39(3), 251–264 (1981).
16.
go back to reference Tang C., Li N., Qi Y., Zhou Z., Helleseth T.: Linear codes with two or three weights from weakly regular bent functions. IEEE Trans. Inf. Theory 62(3), 1166–1176 (2016). Tang C., Li N., Qi Y., Zhou Z., Helleseth T.: Linear codes with two or three weights from weakly regular bent functions. IEEE Trans. Inf. Theory 62(3), 1166–1176 (2016).
18.
go back to reference Yuan J., Ding C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206–212 (2006). Yuan J., Ding C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206–212 (2006).
Metadata
Title
Complete weight enumerators of a class of linear codes
Authors
Jaehyun Ahn
Dongseok Ka
Chengju Li
Publication date
13-04-2016
Publisher
Springer US
Published in
Designs, Codes and Cryptography / Issue 1/2017
Print ISSN: 0925-1022
Electronic ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-016-0205-8

Other articles of this Issue 1/2017

Designs, Codes and Cryptography 1/2017 Go to the issue

Premium Partner