Skip to main content
Erschienen in: Designs, Codes and Cryptography 2-3/2019

26.09.2018

Linear codes from weakly regular plateaued functions and their secret sharing schemes

verfasst von: Sihem Mesnager, Ferruh Özbudak, Ahmet Sınak

Erschienen in: Designs, Codes and Cryptography | Ausgabe 2-3/2019

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Linear codes, the most significant class of codes in coding theory, have diverse applications in secret sharing schemes, authentication codes, communication, data storage devices and consumer electronics. The main objectives of this paper are twofold: to construct three-weight linear codes from plateaued functions over finite fields, and to analyze the constructed linear codes for secret sharing schemes. To do this, we generalize the recent contribution of Mesnager given in (Cryptogr Commun 9(1):71–84, 2017). We first introduce the notion of (non)-weakly regular plateaued functions over \({{\mathbb {F}}}_p\), with p being an odd prime. We next construct three-weight linear p-ary (resp. binary) codes from weakly regular p-ary plateaued (resp. Boolean plateaued) functions and determine their weight distributions. We finally observe that the constructed linear codes are minimal for almost all cases, which implies that they can be directly used to construct secret sharing schemes with nice access structures. To the best of our knowledge, the construction of linear codes from plateaued functions over \({{\mathbb {F}}}_p\), with p being an odd prime, is studied in this paper for the first time in the literature.
Literatur
2.
Zurück zum Zitat Blakley G.R.: Safeguarding cryptographic keys. Proc. Natl. Comput. Conf. 48, 313–317 (1979). Blakley G.R.: Safeguarding cryptographic keys. Proc. Natl. Comput. Conf. 48, 313–317 (1979).
3.
5.
Zurück zum Zitat Canteaut A., Charpin P., Kyureghyan G.M.: A new class of monomial bent functions. Finite Fields Appl. 14(1), 221–241 (2008).MathSciNetCrossRefMATH Canteaut A., Charpin P., Kyureghyan G.M.: A new class of monomial bent functions. Finite Fields Appl. 14(1), 221–241 (2008).MathSciNetCrossRefMATH
6.
Zurück zum Zitat Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inform. Theory 51(6), 2089–2102 (2005).MathSciNetCrossRefMATH Carlet C., Ding C., Yuan J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inform. Theory 51(6), 2089–2102 (2005).MathSciNetCrossRefMATH
7.
Zurück zum Zitat Çeşmelioğlu A., Meidl W.: A construction of bent functions from plateaued functions. Des. Codes Cryptogr. 66, 231–242 (2013).MathSciNetCrossRefMATH Çeşmelioğlu A., Meidl W.: A construction of bent functions from plateaued functions. Des. Codes Cryptogr. 66, 231–242 (2013).MathSciNetCrossRefMATH
9.
Zurück zum Zitat Ding K., Ding C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inform. Theory 61(11), 5835–5842 (2015).MathSciNetCrossRefMATH Ding K., Ding C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inform. Theory 61(11), 5835–5842 (2015).MathSciNetCrossRefMATH
10.
11.
Zurück zum Zitat Helleseth T., Kholosha A.: Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Trans. Inform. Theory 52(5), 2018–2032 (2006).MathSciNetCrossRefMATH Helleseth T., Kholosha A.: Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Trans. Inform. Theory 52(5), 2018–2032 (2006).MathSciNetCrossRefMATH
12.
Zurück zum Zitat Helleseth T., Kholosha A.: New binomial bent functions over the finite fields of odd characteristic. In 2010 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 1277–1281. IEEE (2010). Helleseth T., Kholosha A.: New binomial bent functions over the finite fields of odd characteristic. In 2010 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 1277–1281. IEEE (2010).
14.
Zurück zum Zitat Hyun J.Y., Lee J., Lee Y.: Explicit criteria for construction of plateaued functions. IEEE Trans. Inform. Theory 62(12), 7555–7565 (2016).MathSciNetCrossRefMATH Hyun J.Y., Lee J., Lee Y.: Explicit criteria for construction of plateaued functions. IEEE Trans. Inform. Theory 62(12), 7555–7565 (2016).MathSciNetCrossRefMATH
15.
Zurück zum Zitat Ireland K., Rosen M.: A Classical Introduction to Modern Number Theory, 84th edn. Springer, Berlin (2013).MATH Ireland K., Rosen M.: A Classical Introduction to Modern Number Theory, 84th edn. Springer, Berlin (2013).MATH
16.
17.
Zurück zum Zitat Lidl R., Niederreiter H.: Finite Tields, 20th edn. Cambridge University Press, Cambridge (1997). Lidl R., Niederreiter H.: Finite Tields, 20th edn. Cambridge University Press, Cambridge (1997).
18.
19.
Zurück zum Zitat Mesnager S.: Characterizations of plateaued and bent functions in characteristic p. In: International Conference on Sequences and Their Applications, pp. 72–82. Springer, New York (2014). Mesnager S.: Characterizations of plateaued and bent functions in characteristic p. In: International Conference on Sequences and Their Applications, pp. 72–82. Springer, New York (2014).
20.
Zurück zum Zitat Mesnager S.: Linear codes with few weights from weakly regular bent functions based on a generic construction. Cryptogr. Commun. 9(1), 71–84 (2017).MathSciNetCrossRefMATH Mesnager S.: Linear codes with few weights from weakly regular bent functions based on a generic construction. Cryptogr. Commun. 9(1), 71–84 (2017).MathSciNetCrossRefMATH
21.
Zurück zum Zitat Mesnager S., Özbudak F., Sınak A.: Results on characterizations of plateaued functions in arbitrary characteristic. In: International Conference on Cryptography and Information Security in the Balkans, pp. 17–30. Springer, New York (2015). Mesnager S., Özbudak F., Sınak A.: Results on characterizations of plateaued functions in arbitrary characteristic. In: International Conference on Cryptography and Information Security in the Balkans, pp. 17–30. Springer, New York (2015).
22.
Zurück zum Zitat Mesnager S., Özbudak F., Sınak A.: A new class of three-weight linear codes from weakly regular plateaued functions. In: Proceedings of the Tenth International Workshop on Coding and Cryptography (WCC) (2017). Mesnager S., Özbudak F., Sınak A.: A new class of three-weight linear codes from weakly regular plateaued functions. In: Proceedings of the Tenth International Workshop on Coding and Cryptography (WCC) (2017).
23.
Zurück zum Zitat Rothaus O.S.: On “bent” functions. J. Comb. Theory Ser. A 20(3), 300–305 (1976).CrossRefMATH Rothaus O.S.: On “bent” functions. J. Comb. Theory Ser. A 20(3), 300–305 (1976).CrossRefMATH
25.
Zurück zum Zitat Tang C., Li N., Qi Y., Zhou Z., Helleseth T.: Linear codes with two or three weights from weakly regular bent functions. IEEE Trans. Inform. Theory 62(3), 1166–1176 (2016).MathSciNetCrossRefMATH Tang C., Li N., Qi Y., Zhou Z., Helleseth T.: Linear codes with two or three weights from weakly regular bent functions. IEEE Trans. Inform. Theory 62(3), 1166–1176 (2016).MathSciNetCrossRefMATH
26.
Zurück zum Zitat Zheng Y., Zhang X.-M.: Plateaued functions. In: ICICS, vol. 99, pp. 284–300. Springer, New York (1999). Zheng Y., Zhang X.-M.: Plateaued functions. In: ICICS, vol. 99, pp. 284–300. Springer, New York (1999).
27.
Zurück zum Zitat Zhou Z., Li N., Fan C., Helleseth T.: Linear codes with two or three weights from quadratic bent functions. Des. Codes Cryptogr. 81(2), 283–295 (2016).MathSciNetCrossRefMATH Zhou Z., Li N., Fan C., Helleseth T.: Linear codes with two or three weights from quadratic bent functions. Des. Codes Cryptogr. 81(2), 283–295 (2016).MathSciNetCrossRefMATH
Metadaten
Titel
Linear codes from weakly regular plateaued functions and their secret sharing schemes
verfasst von
Sihem Mesnager
Ferruh Özbudak
Ahmet Sınak
Publikationsdatum
26.09.2018
Verlag
Springer US
Erschienen in
Designs, Codes and Cryptography / Ausgabe 2-3/2019
Print ISSN: 0925-1022
Elektronische ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-018-0556-4

Weitere Artikel der Ausgabe 2-3/2019

Designs, Codes and Cryptography 2-3/2019 Zur Ausgabe