Advanced Search
Article Contents
Article Contents

Yet another variation on minimal linear codes

Abstract Related Papers Cited by
  • Minimal linear codes are linear codes such that the support of every codeword does not contain the support of another linearly independent codeword. Such codes have applications in cryptography, e.g. to secret sharing. We pursue here their study and construct improved asymptotically good families of minimal linear codes. We also consider quasi-minimal, $t$-minimal, and $t$-quasi-minimal linear codes, which are new variations on this notion.
    Mathematics Subject Classification: 94B25, 94B27, 05D40.


    \begin{equation} \\ \end{equation}
  • [1]

    N. Alon, G. Cohen, M. Krivilevitch and S. Litsyn, Generalized hashing and applications, JCT-A, 104 (2003), 207-215.doi: 10.1016/j.jcta.2003.08.001.


    A. Ashikhmin and A. Barg, Minimal vectors in linear codes, IEEE Trans. Inf. Theory, 44 (1998), 2010-2017.doi: 10.1109/18.705584.


    A. Ashikhmin, A. Barg, G. Cohen and L. Huguet, Variations on minimal codewords in linear codes, in Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Springer, 1995, 96-105.doi: 10.1007/3-540-60114-7_7.


    A. Bassa, P. Beelen, A. Garcia and H. Stichtenoth, Towers of function fields over non-prime finite fields, Moscow Math. J., 15 (2015), 1-29.


    G. Brassard, C. Crépeau and M. Santha, Oblivious transfers and intersecting codes, IEEE Trans. Inf. Theory, 42 (1996), 1769-1780.doi: 10.1109/18.556673.


    H. Chabanne, G. Cohen and A. Patey, Towards secure two-party computation from the wire-tap channel, in Information Security and Cryptology-ICISC 2013, Springer, 2013, 34-46.doi: 10.1007/978-3-319-12160-4_3.


    G. Cohen, S. Encheva, S. Litsyn and H.-G. Schaathun, Intersecting codes and separating codes, Discrete Appl. Math., 128 (2003), 75-83.doi: 10.1016/S0166-218X(02)00437-7.


    G. Cohen and A. Lempel, Linear intersecting codes, Discrete Math., 56 (1985), 35-43.doi: 10.1016/0012-365X(85)90190-6.


    G. Cohen, S. Mesnager and A. Patey, On minimal and quasi-minimal linear codes, in Proc. 14th Int. Conf. Crypt. Coding, Springer, Heidelberg, 2013, 85-98.doi: 10.1007/978-3-642-45239-0_6.


    G. Cohen and H.-G. Schaathun, Upper bounds on separating codes, IEEE Trans. Inf. Theory, 50 (2004), 1291-1295.doi: 10.1109/TIT.2004.828140.


    C. Ding and J. Yuan, Covering and secret sharing with linear codes, in DMTCS, Springer, 2003, 11-25.doi: 10.1007/3-540-45066-1_2.


    E. N. Gilbert, A comparison of signaling alphabets, Bell Syst. Techn. J., 31 (1952), 504-522.


    F. J. MacWilliams and N. J. Sloane, The theory of error-correcting codes, North Holland, Amsterdam, 1977.


    J. L. Massey, Minimal codewords and secret sharing, in Proc. 6th Joint Swedish-Russian Int. Workshop Info. Theory, 1993, 276-279.


    J. L. Massey, Some applications of coding theory in cryptography, in Codes and Cyphers: Cryptography and Coding IV (ed. P.G. Farrell), 1995, 33-47.


    H. Randriambololona, $(2,1)$-separating systems beyond the probabilistic bound, Israel J. Math., 195 (2013), 171-186.doi: 10.1007/s11856-012-0126-9.


    H. Randriambololona, Asymptotically good binary linear codes with asymptotically good self-intersection spans, IEEE Trans. Inf. Theory, 59 (2013), 3038-3045.doi: 10.1109/TIT.2013.2237944.


    H. Randriambololona, On products and powers of linear codes under componentwise multiplication, in Proc. 14th Int. Conf. Arithm. Geom. Crypt. Coding Theory (AGCT-14), Luminy, 2015, 3-7.doi: 10.1090/conm/637/12749.


    H. G. Schaathun, The Boneh-Shaw fingerprinting scheme is better than we thought, IEEE Trans. Inf. Forensics Sec., 1 (2006), 248-255.


    Y. Song and Z. Li, Secret sharing with a class of minimal linear codes, preprint, arXiv:1202.4058


    Y. Song, Z. Li, Y. Li and J. Li, A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes, Sec. Commun. Netw., 8 (2015), 202-211.


    M. A. Tsfasman and S. G. Vladut, Algebraic Geometric Codes, Kluwer, 1991.doi: 10.1007/978-94-011-3810-9.

  • 加载中

Article Metrics

HTML views() PDF downloads(265) Cited by(0)

Access History

Other Articles By Authors



    DownLoad:  Full-Size Img  PowerPoint