Skip to main content

On Minimal and Quasi-minimal Linear Codes

  • Conference paper
Cryptography and Coding (IMACC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8308))

Included in the following conference series:

Abstract

Minimal linear codes are linear codes such that the support of every codeword does not contain the support of another linearly independent codeword. Such codes have applications in cryptography, e.g. to secret sharing. We here study minimal codes, give new bounds and properties and exhibit families of minimal linear codes. We also introduce and study the notion of quasi-minimal linear codes, which is a relaxation of the notion of minimal linear codes, where two non-zero codewords have the same support if and only if they are linearly dependent.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashikhmin, A.E., Barg, A.: Minimal vectors in linear codes. IEEE Transactions on Information Theory 44(5), 2010–2017 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  2. Brassard, G., Crépeau, C., Santha, M.: Oblivious transfers and intersecting codes. IEEE Transactions on Information Theory 42(6), 1769–1780 (1996)

    Article  MATH  Google Scholar 

  3. Carlet, C., Ding, C., Yuan, J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Transactions on Information Theory 51(6), 2089–2102 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  4. Chabanne, H., Cohen, G., Patey, A.: Towards Secure Two-Party Computation from the Wire-Tap Channel. ArXiv e-prints (June 2013)

    Google Scholar 

  5. Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering codes. North Holland (1997)

    Google Scholar 

  6. Cohen, G.D., Encheva, S.B., Litsyn, S., Schaathun, H.G.: Intersecting codes and separating codes. Discrete Applied Mathematics 128(1), 75–83 (2003)

    Article  MathSciNet  Google Scholar 

  7. Cohen, G.D., Lempel, A.: Linear intersecting codes. Discrete Mathematics 56(1), 35–43 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  8. Cohen, G.D., Zémor, G.: Intersecting codes and independent families. IEEE Transactions on Information Theory 40(6), 1872–1881 (1994)

    Article  MATH  Google Scholar 

  9. Ding, C.: A class of three-weight and four-weight codes. In: Chee, Y.M., Li, C., Ling, S., Wang, H., Xing, C. (eds.) IWCC 2009. LNCS, vol. 5557, pp. 34–42. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: Calude, C.S., Dinneen, M.J., Vajnovszki, V. (eds.) DMTCS 2003. LNCS, vol. 2731, pp. 11–25. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Encheva, S.B., Cohen, G.D.: Constructions of intersecting codes. IEEE Transactions on Information Theory 45(4), 1234–1237 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  12. Gilbert, E.N.: A comparison of signalling alphabets. Bell System Technical Journal 31(3), 504–522 (1952)

    Article  Google Scholar 

  13. van Lint, J.H., Schrijver, A.: Construction of strongly regular graphs, two-weight codes and partial geometries by finite fields. Combinatorica 1(1), 63–73 (1981)

    Article  MathSciNet  MATH  Google Scholar 

  14. MacWilliams, F.J., Sloane, N.J.: The theory of error-correcting codes. North-Holland, Amsterdam (1977)

    MATH  Google Scholar 

  15. Massey, J.L.: Minimal codewords and secret sharing. In: Proc. 6th Joint Swedish-Russian Int. Workshop on Info. Theory, pp. 276–279 (1993)

    Google Scholar 

  16. Massey, J.L.: Some applications of coding theory in cryptography. In: Farrell, P.G. (ed.) Codes and Cyphers: Cryptography and Coding IV, pp. 33–47. Formara Ltd. (1995)

    Google Scholar 

  17. Mesnager, S.: Bent functions from spreads. Fq11 proceedings (preprint 2013)

    Google Scholar 

  18. Schaathun, H.G.: The Boneh-Shaw fingerprinting scheme is better than we thought. IEEE Transactions on Information Forensics and Security 1(2), 248–255 (2006)

    Article  Google Scholar 

  19. Sloane, N.: Covering arrays and intersecting codes. Journal of Combinatorics Designs 1, 51–63 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  20. Song, Y., Li, Z.: Secret sharing with a class of minimal linear codes. CoRR abs/1202.4058 (2012)

    Google Scholar 

  21. Tsfasman, M.A., Vladut, S.G.: Algebraic Geometric Codes. Kluwer (1991)

    Google Scholar 

  22. Zhou, Z., Ding, C.: A class of three-weight cyclic codes. CoRR abs/1302.0569 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cohen, G.D., Mesnager, S., Patey, A. (2013). On Minimal and Quasi-minimal Linear Codes. In: Stam, M. (eds) Cryptography and Coding. IMACC 2013. Lecture Notes in Computer Science, vol 8308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45239-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45239-0_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45238-3

  • Online ISBN: 978-3-642-45239-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics