1-17hit |
Lin-Zhi SHEN Fang-Wei FU Xuan GUANG
In this paper, we consider the Reed-Solomon codes over Fqm with evaluations in a subfield Fq. By the “virtual extension”, we can embed these codes into homogeneous interleaved Reed-Solomon codes. Based on this property and the collaborative decoding algorithm, a new probabilistic decoding algorithm that can correct errors up to $rac{m}{m+1}(n-k)$ for these codes is proposed. We show that whether the new decoding algorithm fails or not is only dependent on the error. We also give an upper bound on the failure probability of the new decoding algorithm for the case s=2. The new decoding algorithm has some advantages over some known decoding algorithms.
In this paper, we study self-dual cyclic codes of length n over the ring R=Z4[u]/
Gang WANG Min-Yao NIU Jian GAO Fang-Wei FU
Compressed sensing theory provides a new approach to acquire data as a sampling technique and makes sure that a sparse signal can be reconstructed from few measurements. The construction of compressed sensing matrices is a main problem in compressed sensing theory (CS). In this paper, the deterministic constructions of compressed sensing matrices based on affine singular linear space over finite fields are presented and a comparison is made with the compressed sensing matrices constructed by DeVore based on polynomials over finite fields. By choosing appropriate parameters, our sparse compressed sensing matrices are superior to the DeVore's matrices. Then we use a new formulation of support recovery to recover the support sets of signals with sparsity no more than k on account of binary compressed sensing matrices satisfying disjunct and inclusive properties.
Lin-Zhi SHEN Fang-Wei FU Xuan GUANG
Linear codes with locality r and availability t have a wide application in distribution storage because they permit local repair and parallel accesses of hot data. In this letter, the locality and availability of some linear codes based on finite geometry are given. According to these results, we give some linear codes that have higher rate than known codes with the same locality and availability.
Jiyong LU Xuan GUANG Linzhi SHEN Fang-Wei FU
In distributed storage systems, codes with lower repair locality are much more desirable due to their superiority in reducing the disk I/O complexity of each repair process. Motivated partially by both codes with information (r,δ1)c locality and codes with cooperative (r,l) locality, we propose the concept of codes with information (r,l,δ) locality in this paper. For a linear code C with information (r,l,δ) locality, values at arbitrary l information coordinates of an information set I can be recovered by connecting any of δ existing pairwise disjoint local repair sets with size no more than r, where a local repair set of l coordinates is defined as the set of some other coordinates by which one can recover the values at these l coordinates. We derive a lower bound on the codeword length n for [n,k,d] linear codes with information (r,l,δ) locality. Furthermore, we indicate its tightness for some special cases. Particularly, some existing results can be deduced from our bound by restriction on parameters.
Wenli REN Fang-Wei FU Feng WANG Jian GAO
In this letter, we first investigate some new properties of a known power residue frequency-hopping sequence (FHS) set which is established as an optimal one-coincidence frequency-hopping sequence (OC-FHS) set with near-optimal set size. Next, combining the mathematical structure of power residue theory with interleaving technique, we present a new class of optimal OC-FHS set, using the Chinese Remainder Theorem (CRT). As a result, one optimal OC-FHS set with prime length is extended to another optimal OC-FHS set with composite length in which the construction preserves the maximum Hamming correlation (MHC) and the set size as well as the optimality of the Lempel-Greenberger bound.
In network coding, for the case that the network topology is unknown completely, random linear network coding has been proposed as an acceptable coding technique. In this paper, we define average failure probability of random linear network coding in order to characterize the performance of random network coding, and then analyze this failure probability for different known topological information of network. We obtain several upper bounds on the failure probabilities, and further show that, for some networks, these upper bounds are tight or asymptotically tight. Moreover, if the more topological information of the network is utilized, the better upper bounds are acquired.
Gang WANG Min-Yao NIU You GAO Fang-Wei FU
In this letter, as a generalization of Heng's constructions in the paper [9], a construction of codebooks, which meets the Welch bound asymptotically, is proposed. The parameters of codebooks presented in this paper are new in some cases.
Tingting WU Jian GAO Fang-Wei FU
Let R=Z4 be the integer ring mod 4 and C be a linear code over R. The code C is called a triple cyclic code of length (r, s, t) over R if the set of its coordinates can be partitioned into three parts so that any cyclic shift of the coordinates of the three parts leaves the code invariant. These codes can be viewed as R[x]-submodules of R[x]/
Gang WANG Min-Yao NIU Jian GAO Fang-Wei FU
In this letter, as a generalization of Luo et al.'s constructions, a construction of codebook, which meets the Welch bound asymptotically, is proposed. The parameters of codebook presented in this paper are new in some cases.
In the paradigm of network coding, when the network topology information cannot be utilized completely, random linear network coding (RLNC) is proposed as a feasible coding scheme. But since RLNC neither considers the global network topology nor coordinates codings between different nodes, it may not achieve the best possible performance of network coding. Hence, the performance analysis of RLNC is very important for both theoretical research and practical applications. Motivated by a fact that different network topology information can be available for different network communication problems, we study and obtain several upper and lower bounds on the failure probability at sink nodes depending on different network topology information in this paper, which is also the kernel to discuss some other types of network failure probabilities. In addition, we show that the obtained upper bounds are tight, the obtained lower bound is asymptotically tight, and we give the worst cases for different scenarios.
In this short correspondence, (1+uv)-constacyclic codes over the finite non-chain ring R[v]/(v2+v) are investigated, where R=F2+uF2 with u2=0. Some structural properties of this class of constacyclic codes are studied. Further, some optimal binary linear codes are obtained from these constacyclic codes.
Jian GAO Fang-Wei FU Linzhi SHEN Wenli REN
Generalized quasi-cyclic (GQC) codes with arbitrary lengths over the ring $mathbb{F}_{q}+umathbb{F}_{q}$, where u2=0, q=pn, n a positive integer and p a prime number, are investigated. By the Chinese Remainder Theorem, structural properties and the decomposition of GQC codes are given. For 1-generator GQC codes, minimum generating sets and lower bounds on the minimum distance are given.
Xinran LI Fang-Wei FU Xuan GUANG
FOX is a family of block ciphers published in 2004 and is famous for its provable security to cryptanalysis. In this paper, we present multiple 4-round impossible differentials and several new results of impossible differential attacks on 5,6,7-round FOX64 and 5-round FOX128 with the multiple differentials and the new early abort technique which shall reduce the data complexity and the time complexity respectively. In terms of the data complexity and the time complexity, our results are better than any of the previously known attacks.
Xianfang WANG Fang-Wei FU Xuan GUANG
In this paper, we construct ideal and probabilistic secret sharing schemes for some multipartite access structures, including the General Hierarchical Access Structure and Compartmented Access Structures. We devise an ideal scheme which implements the general hierarchical access structure. For the compartmented access structures, we consider three special access structures. We propose ideal and probabilistic schemes for these three compartmented access structures by bivariate interpolation.
Wenli REN Fang-Wei FU Zhengchun ZHOU
The average Hamming correlation is an important performance indicator of frequency-hopping sequences (FHSs). In this letter, the average partial Hamming correlation (APHC) properties of FHSs are discussed. Firstly, the theoretical bound on the average partial Hamming correlation of FHSs is established. It works for any correlation window with length 1≤ω≤υ, where υ is the sequence period, and generalizes the bound developed by Peng et al which is valid only when ω=υ. A sufficient and necessary condition for a set of FHSs having optimal APHC for any correlation window is then given. Finally, sets of FHSs with optimal APHC are presented.
Lei SUN Fang-Wei FU Xuan GUANG
Recent research has shown that the class of rotation symmetric Boolean functions is beneficial to cryptographics. In this paper, for an odd prime p, two sufficient conditions for p-variable rotation symmetric Boolean functions to be 1-resilient are obtained, and then several concrete constructions satisfying the conditions are presented. This is the first time that resilient rotation symmetric Boolean functions have been systematically constructed. In particular, we construct a class of 2-resilient rotation symmetric Boolean functions when p=2m+1 for m ≥ 4. Moreover, several classes of 1-order correlation immune rotation symmetric Boolean functions are also got.