×

Minimal linear codes arising from blocking sets. (English) Zbl 1489.94130

A codeword of a linear code is called minimal if its support (the set of nonzero coordinates) does not contain the support of any other linearly independent codeword. For a linear code \(C\), the supports of minimal codewords of the dual code \(C^\bot\) give the access structure of a secret sharing scheme, introduced by Massey.
The authors recall some results about blocking sets and introduce a new definition of cutting blocking set: An affine (respectively projective, respectively vectorial) \(k\)-blocking set is cutting if its intersection with every \((n-k)\)-dimensional affine (respectively projective, respectively affine through the origin) subspace is not contained in any other \((n-k)\)-dimensional affine (respectively projective, respectively affine through the origin) subspace. It is shown that a set \(B\) is a \(t\)-dimensional (with \(t>n-k\)) affine cutting \(k\)-blocking set if and only if the intersection between \(B\) and every \((n-k)\)-dimensional affine subspace is not contained in any other \((n-k)\)-dimensional affine subspace.
A general construction of minimal linear codes related to blocking sets, both in affine and in projective case is provided. For every function \(f:\mathbb{F}_q^n\to\mathbb{F}_q\), the code \(C_f\) is defined as the set \(\{c(u,v)\}=\{uf(x)+v\cdot x\}\) for all \(u\in F_q\) and \(v\in\mathbb{F}_q^n\), \(x\in (\mathbb{F}_q^n)^\ast,\) where \(\cdot\) is the Euclidean inner product. The parameters of \(C_f\) are found for a nonlinear function \(f\) and its minimality is shown when the affine surface \(V(f)^\ast\) is an \(n\)-dimensional cutting vectorial \((1,n-1)\)-blocking set in \(\mathbb{A}(\mathbb{F}_n^q)\) and for every nonzero vector \(v,\) it exists \(x\) such that \(f(x)+v\cdot x=0\) and \(f(x)\) is different from 0. These results are extended to the projective space taking a nonzero vector from each one-dimensional subspace of \(\mathbb{F}_n^q.\)
The last section presents an explicit family of minimal linear codes and it is proved that infinitely many of its members do not satisfy the Ashikhmin and Barg condition \(\cfrac{w_{\max}}{w_{\min}}\leq\cfrac{q}{q-1},\) where \(w_{\max}\) and \(w_{\min}\) are the maximum and minimum nonzero weights in \(C\), respectively.

MSC:

94B05 Linear codes (general theory)
51E21 Blocking sets, ovals, \(k\)-arcs
94B27 Geometric methods (including applications of algebraic geometry) applied to coding theory
94A62 Authentication, digital signatures and secret sharing

References:

[1] Ashikhmin, A.; Barg, A., Minimal vectors in linear codes, IEEE Trans. Inform. Theory, 44, 5, 2010-2017 (1998) · Zbl 0932.94032 · doi:10.1109/18.705584
[2] Berlekamp, ER; McEliece, RJ; van Tilborg, HCA, On the inherent intractability of certain coding problems, IEEE Trans. Inform. Theory, 24, 3, 384-386 (1978) · Zbl 0377.94018 · doi:10.1109/TIT.1978.1055873
[3] Bartoli, D.; Bonini, M., Minimal linear codes in odd characteristic, IEEE Trans. Inform. Theory, 65, 7, 4152-4155 (2019) · Zbl 1432.94161 · doi:10.1109/TIT.2019.2891992
[4] Bruck, J.; Naor, M., The hardness of decoding linear codes with preprocessing, IEEE Trans. Inform. Theory, 36, 2, 381-385 (1990) · Zbl 0704.94022 · doi:10.1109/18.52484
[5] Chabanne, H., Cohen, G., Patey, A.: Towards secure two-party computation from the wiretap channel. In: Information Security and Cryptology—ICISC 2013, pp. 34-46. Springer, Berlin (2013) · Zbl 1445.68087
[6] Chang, S.; Hyun, JY, Linear codes from simplicial complexes, Des. Codes Cryptogr., 86, 10, 2167-2181 (2017) · Zbl 1408.94978 · doi:10.1007/s10623-017-0442-5
[7] Clark, P.L.: The Chevalley-Warning theorem (featuring the Erdos-Ginzburg-Ziv theorem). http://math.uga.edu/ pete/4400ChevalleyWarning.pdf
[8] Ding, K.; Ding, C., A class of two-weight and three-weight codes and their applications in secret sharing, IEEE Trans. Inform. Theory, 61, 11, 5835-5842 (2015) · Zbl 1359.94687 · doi:10.1109/TIT.2015.2473861
[9] Ding, C.; Heng, Z.; Zhou, Z., Minimal binary linear codes, IEEE Trans. Inform. Theory, 64, 10, 6536-6545 (2018) · Zbl 1401.94205 · doi:10.1109/TIT.2018.2819196
[10] Ding, C.; Yuan, J.; Calude, CS, Covering and secret sharing with linear codes, Discrete Mathematics and Theoretical Computer Science, 11-25 (2003), Berlin: Springer, Berlin · Zbl 1038.94008 · doi:10.1007/3-540-45066-1_2
[11] Heng, Z.; Ding, C.; Zhou, Z., Minimal linear codes over finite fields, Finite Fields Appl., 54, 176-196 (2018) · Zbl 1401.94262 · doi:10.1016/j.ffa.2018.08.010
[12] Huffman, WC; Pless, V., Fundamentals of Error-Correcting Codes (2010), Cambridge: Cambridge University Press, Cambridge · Zbl 1191.94107
[13] Hirschfeld, JWP, Projective Geometries Over Finite Fields (1980), Oxford: Oxford University Press, Oxford · Zbl 0418.51002
[14] Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory, pp. 276-279, Mölle (1993)
[15] Massey, J.L.: Some applications of coding theory in cryptography. In: Codes and Cyphers: Cryptography and Coding IV, pp. 33-47, Formara Ltd, Essex (1995)
[16] Mesnager, S.; Özbudak, F.; Sınak, A., Linear codes from weakly regular plateaued functions and their secret sharing schemes, Des. Codes Cryptogr., 87, 2-3, 463-480 (2019) · Zbl 1421.94098 · doi:10.1007/s10623-018-0556-4
[17] Storme, L.; De Beule, J., Current Research Topics in Galois Geometry (2011), New York: Nova Publishers, New York · Zbl 1298.51007
[18] Zhang, W.; Yan, H.; Wei, H., Four families of minimal binary linear codes with \(w_{{\rm min}}/w_{{\rm max}}\le 1/2\), Appl. Algebra Engrg. Comm. Comput., 30, 2, 175-184 (2019) · Zbl 1412.94237 · doi:10.1007/s00200-018-0367-x
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.