Skip to main content
Top
Published in: Designs, Codes and Cryptography 1/2015

01-04-2015

On relative constant-weight codes

Authors: Zihui Liu, Xin-Wen Wu

Published in: Designs, Codes and Cryptography | Issue 1/2015

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, relative two-weight and three-weight codes are studied, which are both called relative constant-weight codes. A geometric approach is introduced to construct and characterize relative constant-weight codes, using the finite projective geometry. A sufficient and necessary condition is derived for linear codes to be relative constant-weight codes, based on the geometric approach. A family of infinite number of relative constant-weight codes are constructed, which includes dual Hamming codes and subcodes of punctured Reed–Muller codes as special instances. It is well known that determining all the minimal codewords is a hard problem for an arbitrary linear code. For relative constant-weight codes, minimal codewords are completely determined in this paper. Based on the above-mentioned results, applications of relative constant-weight codes to wire-tap channel of type II and secret sharing are discussed. A comparative study shows that relative constant-weight codes form a new family. They are not covered by the previously well-known three-weight codes or linear codes for which minimal codewords can be determined.
Literature
1.
go back to reference Ashikhmin A., Barg A.: Minimal vectors in linear codes. IEEE Trans. Inf. Theory 44(5), 2010–2017 (1998). Ashikhmin A., Barg A.: Minimal vectors in linear codes. IEEE Trans. Inf. Theory 44(5), 2010–2017 (1998).
2.
go back to reference Bouyukliev I.G.: Classification of Griesmer codes and dual transform. Discret. Math. 309(12), 4049–4068 (2009). Bouyukliev I.G.: Classification of Griesmer codes and dual transform. Discret. Math. 309(12), 4049–4068 (2009).
3.
go back to reference Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089–2102 (2005). Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089–2102 (2005).
4.
go back to reference Chen W.D., Kløve T.: The weight hierarchies of \(q\)-ary codes of dimension 4. IEEE Trans. Inf. Theory 42(6), 2265–2272 (1996). Chen W.D., Kløve T.: The weight hierarchies of \(q\)-ary codes of dimension 4. IEEE Trans. Inf. Theory 42(6), 2265–2272 (1996).
5.
go back to reference Cohen G.D., Lempel A.: Linear intersecting codes. Discret. Math. 56(1), 35–43 (1984). Cohen G.D., Lempel A.: Linear intersecting codes. Discret. Math. 56(1), 35–43 (1984).
6.
go back to reference Encheva S.B., Cohen G.D.: Constructions of intersecting codes. IEEE Trans. Inf. Theory 45(4), 1234–1237 (1999). Encheva S.B., Cohen G.D.: Constructions of intersecting codes. IEEE Trans. Inf. Theory 45(4), 1234–1237 (1999).
7.
go back to reference Forney G.D.: Dimension/length profiles and trellis complexity of linear block codes. IEEE Trans. Inf. Theory 40(6), 1741–1752 (1994). Forney G.D.: Dimension/length profiles and trellis complexity of linear block codes. IEEE Trans. Inf. Theory 40(6), 1741–1752 (1994).
8.
go back to reference Li Z.H., Xue T., Lai H.: Secret sharing schemes from binary linear codes. Inf. Sci. 180(22), 4412–4419 (2010). Li Z.H., Xue T., Lai H.: Secret sharing schemes from binary linear codes. Inf. Sci. 180(22), 4412–4419 (2010).
9.
go back to reference Liu Z.H., Chen W.D.: Notes on the value function. Des. Codes Cryptogr. 54(1), 11–19 (2010). Liu Z.H., Chen W.D.: Notes on the value function. Des. Codes Cryptogr. 54(1), 11–19 (2010).
10.
go back to reference Liu Z.H., Zeng X.Y.: On a kind of two-weight code. Eur. J. Comb. 33(6), 1265–1272 (2012). Liu Z.H., Zeng X.Y.: On a kind of two-weight code. Eur. J. Comb. 33(6), 1265–1272 (2012).
11.
go back to reference Luo Y., Mitrpant C., Han Vinck A.J., Chen K.F.: Some new characters on the wire-tap channel of type II. IEEE Trans. Inf. Theory 51(3), 1222–1229 (2005). Luo Y., Mitrpant C., Han Vinck A.J., Chen K.F.: Some new characters on the wire-tap channel of type II. IEEE Trans. Inf. Theory 51(3), 1222–1229 (2005).
12.
go back to reference MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977). MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977).
13.
go back to reference Massey J.L.: Minimal codewords and secret sharing. In: The 6th Joint Swedish-Russian Workshop on Information Theory, Mölle, Sweden, pp. 276–279 (1993). Massey J.L.: Minimal codewords and secret sharing. In: The 6th Joint Swedish-Russian Workshop on Information Theory, Mölle, Sweden, pp. 276–279 (1993).
14.
go back to reference Pellikaan R., Wu X.-W., Bulygin S., Jurrius R.: Error-Correcting Codes and Cryptology. Cambridge University Press, Cambridge (2012). Pellikaan R., Wu X.-W., Bulygin S., Jurrius R.: Error-Correcting Codes and Cryptology. Cambridge University Press, Cambridge (2012).
15.
go back to reference Tsfasman M.A., Vladuts S.: Geometric approach to higher weights. IEEE Trans. Inf. Theory 41(6), 1564–1588 (1995). Tsfasman M.A., Vladuts S.: Geometric approach to higher weights. IEEE Trans. Inf. Theory 41(6), 1564–1588 (1995).
16.
go back to reference Yuan J., Ding C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206–212 (2006). Yuan J., Ding C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206–212 (2006).
17.
go back to reference Zhou Z.C., Ding C.: A class of three-weight cyclic codes (2013) (arXiv: 1302.0569vl [cs.IT]). Zhou Z.C., Ding C.: A class of three-weight cyclic codes (2013) (arXiv: 1302.0569vl [cs.IT]).
Metadata
Title
On relative constant-weight codes
Authors
Zihui Liu
Xin-Wen Wu
Publication date
01-04-2015
Publisher
Springer US
Published in
Designs, Codes and Cryptography / Issue 1/2015
Print ISSN: 0925-1022
Electronic ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-013-9896-2

Other articles of this Issue 1/2015

Designs, Codes and Cryptography 1/2015 Go to the issue

Premium Partner