Several classes of minimal linear codes with few weights from weakly regular plateaued functions


Mesnager S., SINAK A.

IEEE Transactions on Information Theory, cilt.66, sa.4, ss.2296-2310, 2020 (SCI-Expanded) identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 66 Sayı: 4
  • Basım Tarihi: 2020
  • Doi Numarası: 10.1109/tit.2019.2956130
  • Dergi Adı: IEEE Transactions on Information Theory
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Academic Search Premier, PASCAL, Aerospace Database, Applied Science & Technology Source, Business Source Elite, Business Source Premier, Communication Abstracts, Compendex, Computer & Applied Sciences, INSPEC, MathSciNet, Metadex, zbMATH, Civil Engineering Abstracts
  • Sayfa Sayıları: ss.2296-2310
  • Anahtar Kelimeler: Linear code, minimal code, secret sharing scheme, weakly regular plateaued function, weight distribution
  • Akdeniz Üniversitesi Adresli: Hayır

Özet

Minimal linear codes have significant applications in secret sharing schemes and secure two-party computation. There are several methods to construct linear codes, one of which is based on functions over finite fields. Recently, many construction methods for linear codes from functions have been proposed in the literature. In this paper, we generalize the recent construction methods given by Tang et al. in [IEEE Transactions on Information Theory, 62(3), 1166-1176, 2016] to weakly regular plateaued functions over finite fields of odd characteristic. We first construct three-weight linear codes from weakly regular plateaued functions based on the second generic construction and then determine their weight distributions. We also give a punctured version and subcode of each constructed code. We note that they may be (almost) optimal codes and can be directly employed to obtain (democratic) secret sharing schemes, which have diverse applications in the industry. We next observe that the constructed codes are minimal for almost all cases and finally describe the access structures of the secret sharing schemes based on their dual codes.