Abstract

Minimal linear codes have important applications in secure communications, including in the framework of secret sharing schemes and secure multi-party computation. A lot of research have been carried out to derive codes with few weights (but more importantly, being minimal) using algebraic or geometric approaches. One of the main power and fructify algebraic methods is based on the design of those codes by employing functions over finite fields. K. Li, C. Li, T. Helleseth, and L. Qu have recently identified in [Binary linear codes with few weights from two-to-one functions, IEEE Trans. Inf. Theory, 2021] some binary linear codes with few weights from two classes of two-to-one functions. In this paper, our ultimate objective is to expand the class of codes derived from the paper of Li <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al</i> . by proposing larger classes of binary linear codes with few weights via generic constructions involving other known families of two-to-one functions over the finite field F <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2<sup><i>n</i></sup></sub> of order 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><i>n</i></sup> . We succeed in constructing such codes, and we also completely determine their weight distributions. The linear codes presented in this paper differ in parameters from those known in the literature. Besides, some of them are optimal concerning the well-known Griesmer bound. Notably, we prove that our codes are either optimal or almost optimal with respect to the online Database of Grassl. We next observe that the derived binary linear codes also have the minimality property for most cases. We then describe the access structures of the secret-sharing schemes based on their dual codes. Finally, we solve two problems left open in the paper by Li <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al</i> . (more specifically, a complete solution to Problem 2 and a partial solution to Problem 1).

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call