Minimal Linear Codes with Few Weights and Their Secret Sharing
Minimal Linear Codes with Few Weights and Their Secret Sharing
Minimal linear codes with few weights have significant applications in secure two-party computation and secret sharing schemes. In this paper, we construct two-weight and three-weight minimal linear codes by using weakly regular plateaued functions in the well-known construction method based on the second generic construction. We also give punctured codes and subcodes for some constructed minimal codes. We finally obtain secret sharing schemes with high democracy from the dual codes of our minimal codes.
___
- [1] A. Ashikhmin and A. Barg. Minimal vectors in linear codes.
IEEE Transactions on Information Theory, 44(5):2010–2017,
(1998).
- [2] G. R. Blakley et al. Safeguarding cryptographic keys. In
Proceedings of the national computer conference, volume 48,
pages 313–317, 1979.
- [3] A. Calderbank and J. Goethals. Three-weight codes and
association schemes. Philips J. Res, 39(4-5):143–152, 1984.
- [4] R. Calderbank and W. Kantor. The geometry of two-weight
codes. Bulletin of the London Mathematical Society, 18(2):97–
122, 1986.
- [5] C. Ding. Linear codes from some 2-designs. IEEE Transactions
on information theory, 61(6):3265–3275, 2015.
- [6] C. Ding. A construction of binary linear codes from boolean
functions. Discrete mathematics, 339(9):2288–2303, 2016.
- [7] K. Ding and C. Ding. A class of two-weight and threeweight codes and their applications in secret sharing. IEEE
Transactions on Information Theory, 61(11):5835–5842, 2015.
- [8] O. Goldreich, S. Micali, and A. Wigderson. How to play any
mental game. In Proceedings of the nineteenth annual ACM
symposium on Theory of computing, pages 218–229. ACM,
1987.
- [9] J. L. Massey. Minimal codewords and secret sharing. In
Proceedings of the 6th joint Swedish-Russian international
workshop on information theory, pages 276–279, 1993.
- [10] R. J. McEliece and D. V. Sarwate. On sharing secrets and reedsolomon codes. Communications of the ACM, 24(9):583–584,
1981.
- [11] S. Mesnager, F. Ozbudak, and A. Sınak. A new class of three- ¨
weight linear codes from weakly regular plateaued functions.
In Proceedings of the Tenth International Workshop on Coding
and Cryptography (WCC) 2017.
- [12] S. Mesnager, F. Ozbudak, and A. Sınak. Linear codes from ¨
weakly regular plateaued functions and their secret sharing
schemes. Designs, Codes and Cryptography, 87(2-3):463–480,
2019.
- [13] S. Mesnager, A. Sınak, and O. Yayla. Three-weight minimal
linear codes and their applications. In Proceedings of the Second
International Workshop on Cryptography and its Applications
(2IWCA’19), pages 216-220, 19-20 June 2019, Oran, Algeria.
- [14] S. Mesnager and A. Sınak. Several classes of minimal linear codes with few weights from weakly regular plateaued
functions. IEEE Transaction on Information Theory, DOI:
10.1109/TIT.2019.2956130, 2019.
- [15] J. Pieprzyk and X. Zhang. Ideal secret sharing schemes from
mds codes. In Proc. 5th Int. Conf. Information Security and
Cryptology (ICISC 2002), pages 269–279, 2002.
- [16] A. Renvall and C. Ding. The access structure of some secretsharing schemes. In Information Security and Privacy, pages
67–78. Springer, 1996.
- [17] B. Schoenmakers. A simple publicly verifiable secret sharing
scheme and its application to electronic voting. In Annual
International Cryptology Conference, pages 148–164. Springer,
1999.
- [18] A. Shamir. How to share a secret. Communications of the ACM,
22(11):612–613, 1979.
- [19] A. Sınak. Three-weight and four-weight minimal linear codes
and their secret sharing schemes. Submitted to the international
journal, 2019.
- [20] C. Tang, N. Li, Y. Qi, Z. Zhou, and T. Helleseth. Linear codes
with two or three weights from weakly regular bent functions.
IEEE Transactions on Information Theory, 62(3):1166–1176,
2016.
- [21] C. Tang, C. Xiang, and K. Feng. Linear codes with few weights
from inhomogeneous quadratic functions. Designs, Codes and
Cryptography, 83(3):691–714, 2017.
- [22] C.-N. Yang and J.-B. Lai. Protecting data privacy and security
for cloud computing based on secret sharing. In 2013 International Symposium on Biometrics and Security Technologies,
pages 259–266. IEEE, 2013.
- [23] Y. Zheng and X.-M. Zhang. Plateaued functions. In ICICS,
volume 99, pages 284–300. Springer, 1999.
- [24] Z. Zhou, N. Li, C. Fan, and T. Helleseth. Linear codes with
two or three weights from quadratic bent functions. Designs,
Codes and Cryptography, 81(2):283–295, 2016.
- [25] G. Zyskind, O. Nathan, et al. Decentralizing privacy: Using
blockchain to protect personal data. In 2015 IEEE Security and
Privacy Workshops, pages 180–184. IEEE, 2015.