FEW-WEIGHT CODES FROM TRACE CODES OVER

2018 ◽  
Vol 98 (1) ◽  
pp. 167-174
Author(s):  
MINJIA SHI ◽  
YUE GUAN ◽  
CHENCHEN WANG ◽  
PATRICK SOLÉ

We construct two families of few-weight codes for the Lee weight over the ring $R_{k}$ based on two different defining sets. For the first defining set, taking the Gray map, we obtain an infinite family of binary two-weight codes which are in fact $2^{k}$-fold replicated MacDonald codes. For the second defining set, we obtain two infinite families of few-weight codes. These few-weight codes can be used to implement secret-sharing schemes.

2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Minjia Shi ◽  
Liqin Qian ◽  
Tor Helleseth ◽  
Patrick Solé

<p style='text-indent:20px;'>In this paper, for each of six families of three-valued <inline-formula><tex-math id="M1">\begin{document}$ m $\end{document}</tex-math></inline-formula>-sequence correlation, we construct an infinite family of five-weight codes from trace codes over the ring <inline-formula><tex-math id="M2">\begin{document}$ R = \mathbb{F}_2+u\mathbb{F}_2 $\end{document}</tex-math></inline-formula>, where <inline-formula><tex-math id="M3">\begin{document}$ u^2 = 0. $\end{document}</tex-math></inline-formula> The trace codes have the algebraic structure of abelian codes. Their Lee weight distribution is computed by using character sums. Their support structure is determined. An application to secret sharing schemes is given. The parameters of the binary image are <inline-formula><tex-math id="M4">\begin{document}$ [2^{m+1}(2^m-1),4m,2^{m}(2^m-2^r)] $\end{document}</tex-math></inline-formula> for some explicit <inline-formula><tex-math id="M5">\begin{document}$ r. $\end{document}</tex-math></inline-formula></p>


2006 ◽  
Vol 40 (2) ◽  
pp. 225-236 ◽  
Author(s):  
Mike J. Grannell ◽  
Terry S. Griggs ◽  
Anne Penfold Street

2022 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Tonghui Zhang ◽  
Hong Lu ◽  
Shudi Yang

<p style='text-indent:20px;'>Linear codes with few weights are widely used in strongly regular graphs, secret sharing schemes, association schemes and authentication codes. In this paper, we construct several two-weight and three-weight linear codes over finite fields by choosing suitable different defining sets. We also give some examples and some of the codes are optimal or almost optimal. Their applications to secret sharing schemes are also investigated.</p>


Author(s):  
Shingo HASEGAWA ◽  
Shuji ISOBE ◽  
Jun-ya IWAZAKI ◽  
Eisuke KOIZUMI ◽  
Hiroki SHIZUYA

1991 ◽  
Vol 4 (2) ◽  
pp. 123-134 ◽  
Author(s):  
Ernest F. Brickell ◽  
Daniel M. Davenport

1994 ◽  
Vol 4 (1) ◽  
pp. 83-95 ◽  
Author(s):  
Wen-Ai Jackson ◽  
Keith M. Martin

Author(s):  
C. Blundo ◽  
A. Cresti ◽  
A. De Santis ◽  
U. Vaccaro

Sign in / Sign up

Export Citation Format

Share Document