Subfield codes of linear codes over finite fields have recently attracted great attention due to their wide applications in secret sharing, authentication codes and association schemes. In this paper, we first present...
详细信息
Subfield codes of linear codes over finite fields have recently attracted great attention due to their wide applications in secret sharing, authentication codes and association schemes. In this paper, we first present a construction of 3-dimensional linear codes C-f over finite field F-2(m) parameterized by any Boolean function f. Then we determine explicitly the weight distributions of C-f, the punctured code (C) over tilde (f), as well as the corresponding subfield codes over F-2 for several classes of Boolean functions ff. In particular, we determine the weight distributions of subfield codes derived from r-plateaued functions. Moreover, the parameters of their dual codes are investigated, which contain length-optimal and dimension-optimal AMDS codes with respect to the sphere packing bound. We emphasize that the new codes are projective and contain binary self-complementary codes. As applications, some of the projective codes we present can be employed to construct s-sum sets for any odd integer s >1.
Using an approach from finite group representation theory we construct quaternary non-projective codes with parameters [693,6,480]4,[1386,6,1008]4,[2016,6,1488]4, quaternary projective codes with parameters [231,6,160...
详细信息
Using an approach from finite group representation theory we construct quaternary non-projective codes with parameters [693,6,480]4,[1386,6,1008]4,[2016,6,1488]4, quaternary projective codes with parameters [231,6,160]4,[462,6,336]4 and [672,6,496]4 and binary projective codes with parameters [693,12,320]2,[1386,12,672]2,[2016,12,992]2 as examples of two-weight codes on which a finite almost quasisimple group of sporadic type acts transitively as permutation groups of automorphisms. In particular, we show that these codes are invariant under the 3-fold covers 3M22 and 3M22:2, respectively, of the Mathieu groups M22 and M22:2. Employing a known construction of strongly regular graphs from projective two-weight codes we obtain from the binary projective (respectively, quaternary projective) two-weight codes with parameters those given above, the strongly regular graphs with parameters (4096,693,152,110),(4096,1386,482,462), and (4096,2016,992,992), respectively. The latter graph can be viewed as a 2-(4096,2016,992)-symmetric design with the symmetric difference property whose residual and derived designs with respect to a block give rise to binary self-complementary codes meeting the Grey-Rankin bound with equality.
Binary linear codes with few weights have wide applications in communication, secret sharing schemes, authentication codes, association schemes, strongly regular graphs, etc. projective binary linear codes are among t...
详细信息
Binary linear codes with few weights have wide applications in communication, secret sharing schemes, authentication codes, association schemes, strongly regular graphs, etc. projective binary linear codes are among the most important subclasses of binary linear codes for practical applications. In this paper, motivated by the two excellent recent papers (Li et al. in IEEE Trans Inf Theory 67(7):4263-4275, 2021) and (Wang et al. in IEEE Trans Inf Theory 67(8):5133-5148, 2021), several new families of few-weight projective binary linear codes are constructed from the defining sets, and then their Hamming weight distributions are determined by employing the Walsh transform of the corresponding two-to-one functions over finite fields with the even characteristic. Our constructions can produce binary linear codes with new parameters. Some of the constructed binary linear codes are optimal or almost optimal according to the online Database of Grassl, and the duals of some of them are distance-optimal with respect to the sphere packing bound. This paper also shows once again that the two-to-one functions initially studied in (Mesnager and Qu in IEEE Trans Inf Theory 65(12):7884-7895, 2019) are also promising objects in coding theory. Although our derived codes use objects considered in the very recent literature, the analysis of our designed codes involves functions having different algebraic structures (and, therefore, other Walsh transform distribution) and requires solving new systems of equations over finite fields, which is an essential step in determining the weight distribution of our constructed codes. As applications, some of the codes presented in this paper can be used to construct association schemes and secret sharing schemes with interesting access structures.
Linear codes with a few weights have nice applications in communication, secret sharing schemes, authentication codes, association schemes, block designs and so on. projective binary linear codes are one of the most i...
详细信息
Linear codes with a few weights have nice applications in communication, secret sharing schemes, authentication codes, association schemes, block designs and so on. projective binary linear codes are one of the most important subclasses of linear codes for practical applications. The objective of this paper is to construct projective binary linear codes with some special Boolean functions. Four families of binary linear codes with three or four weights are derived and the parameters of their duals are also determined. It turns out that the duals of these codes are optimal or almost optimal with respect to the sphere-packing bound. As applications, the codes presented in this paper can be used to construct association schemes and secret sharing schemes with interesting access structures.
projective linear codes are a special class of linear codes whose dual codes have minimum distance at least 3. projective linear codes with only a few weights are useful in authentication codes, secret sharing schemes...
详细信息
projective linear codes are a special class of linear codes whose dual codes have minimum distance at least 3. projective linear codes with only a few weights are useful in authentication codes, secret sharing schemes, data storage systems and so on. In this paper, two constructions of q-ary linear codes are presented with defining sets given by the intersection and difference of two sets. These constructions produce several families of new projective two-weight or three-weight linear codes. As applications, our projective codes can be used to construct secret sharing schemes with interesting access structures, strongly regular graphs and association schemes with three classes.(c) 2022 Elsevier Inc. All rights reserved.
It is shown that there does not exist a projective triply-even binary code of length 59. This settles the last open length for projective triply-even binary codes, which therefore exist precisely for the lengths 15, 1...
详细信息
It is shown that there does not exist a projective triply-even binary code of length 59. This settles the last open length for projective triply-even binary codes, which therefore exist precisely for the lengths 15, 16, 30, 31, 32, 45-51, and >= 60.
Consider the Grassmann graph formed by k-dimensional subspaces of an n-dimensional vector space over the field of q elements (1 = ((n)(2)), we show that the graph II(n, k)(q) is connected, its diameter is equal to the...
详细信息
Consider the Grassmann graph formed by k-dimensional subspaces of an n-dimensional vector space over the field of q elements (1 < k < n-1) and denote by II(n, k), the restriction of this graph to the set of projective [n, k](q) codes. In the case when q >= ((n)(2)), we show that the graph II(n, k)(q) is connected, its diameter is equal to the diameter of the Grassmann graph and the distance between any two vertices coincides with the distance between these vertices in the Grassmann graph. Also, we give some observations concerning the graphs of simplex codes. For example, binary simplex codes of dimension 3 are precisely maximal singular subspaces of a non-degenerate quadratic form. (C) 2018 Elsevier Inc. All rights reserved.
In [6] we introduced line Hermitian Grassmann codes and determined their parameters. The aim of this paper is to present (in the spirit of [4]) an algorithm for the point enumerator of a line Hermitian Grassmannian wh...
详细信息
In [6] we introduced line Hermitian Grassmann codes and determined their parameters. The aim of this paper is to present (in the spirit of [4]) an algorithm for the point enumerator of a line Hermitian Grassmannian which can be usefully applied to get efficient encoders, decoders and error correction algorithms for the aforementioned codes. (C) 2019 Elsevier Inc. All rights reserved.
In this paper we introduce and study line Hermitian Grassmann codes as those subcodes of the Grassmann codes associated to the 2-Grassmannian of a Hermitian polar space defined over a finite field. In particular, we d...
详细信息
In this paper we introduce and study line Hermitian Grassmann codes as those subcodes of the Grassmann codes associated to the 2-Grassmannian of a Hermitian polar space defined over a finite field. In particular, we determine the parameters and characterize the words of minimum weight. (C) 2018 Elsevier Inc. All rights reserved.
We give necessary conditions for a two-weight projective cyclic code to be the direct sum of two one-weight irreducible cyclic subcodes of the same dimension, following the work of Wolfmann and Vega. This confirms Veg...
详细信息
We give necessary conditions for a two-weight projective cyclic code to be the direct sum of two one-weight irreducible cyclic subcodes of the same dimension, following the work of Wolfmann and Vega. This confirms Vega's conjecture that all the two-weight cyclic codes of this type are the known ones in the projective case.
暂无评论