-
Data sharing in the metaverse with key abuse resistance based on decentralized CP-ABE
Authors:
Liang Zhang,
Zhanrong Ou,
Changhui Hu,
Haibin Kan,
Jiheng Zhang
Abstract:
Data sharing is ubiquitous in the metaverse, which adopts blockchain as its foundation. Blockchain is employed because it enables data transparency, achieves tamper resistance, and supports smart contracts. However, securely sharing data based on blockchain necessitates further consideration. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising primitive to provide confidentiality…
▽ More
Data sharing is ubiquitous in the metaverse, which adopts blockchain as its foundation. Blockchain is employed because it enables data transparency, achieves tamper resistance, and supports smart contracts. However, securely sharing data based on blockchain necessitates further consideration. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising primitive to provide confidentiality and fine-grained access control. Nonetheless, authority accountability and key abuse are critical issues that practical applications must address. Few studies have considered CP-ABE key confidentiality and authority accountability simultaneously. To our knowledge, we are the first to fill this gap by integrating non-interactive zero-knowledge (NIZK) proofs into CP-ABE keys and outsourcing the verification process to a smart contract. To meet the decentralization requirement, we incorporate a decentralized CP-ABE scheme into the proposed data sharing system. Additionally, we provide an implementation based on smart contract to determine whether an access control policy is satisfied by a set of CP-ABE keys. We also introduce an open incentive mechanism to encourage honest participation in data sharing. Hence, the key abuse issue is resolved through the NIZK proof and the incentive mechanism. We provide a theoretical analysis and conduct comprehensive experiments to demonstrate the feasibility and efficiency of the data sharing system. Based on the proposed accountable approach, we further illustrate an application in GameFi, where players can play to earn or contribute to an accountable DAO, fostering a thriving metaverse ecosystem.
△ Less
Submitted 18 December, 2024;
originally announced December 2024.
-
BA-ORABE: Blockchain-Based Auditable Registered Attribute-Based Encryption With Reliable Outsourced Decryption
Authors:
Dongliang Cai,
Borui Chen,
Liang Zhang,
Haibin Kan
Abstract:
Attribute-based encryption (ABE) is a generalization of public-key encryption that enables fine-grained access control in cloud services. Recently, Hohenberger et al. (Eurocrypt 2023) introduced the notion of registered ABE, which is an ABE scheme without a trusted central authority. Instead, users generate their own public/secret keys and then register their keys and attributes with a key curator…
▽ More
Attribute-based encryption (ABE) is a generalization of public-key encryption that enables fine-grained access control in cloud services. Recently, Hohenberger et al. (Eurocrypt 2023) introduced the notion of registered ABE, which is an ABE scheme without a trusted central authority. Instead, users generate their own public/secret keys and then register their keys and attributes with a key curator. The key curator is a transparent and untrusted entity and its behavior needs to be audited for malicious registration. In addition, pairing-based registered ABE still suffers the heavy decryption overhead like ABE. A general approach to address this issue is to outsource decryption to a decryption cloud service (DCS).In this work, we propose BA-ORABE, the first fully auditable registered ABE with reliable outsourced decryption scheme based on blockchain. First, we utilize a verifiable tag mechanism to achieve verifiability of ciphertext transformation, and the exemptibility which enables the honest DCS to escape from wrong claims is guaranteed by zero knowledge fraud proof under optimistic assumption. Additionally, our system achieves fairness and decentralized outsourcing to protect the interests of all parties and the registration and outsourcing process are transparent and fully auditable through blockchain. Finally, we give security analysis, implement and evaluate our scheme on Ethereum to demonstrate its feasibility and efficiency, and show its advantages in real application of decentralized finance.
△ Less
Submitted 16 December, 2024; v1 submitted 12 December, 2024;
originally announced December 2024.
-
Attribute-Based Encryption With Payable Outsourced Decryption Using Blockchain and Responsive Zero Knowledge Proof
Authors:
Dongliang Cai,
Borui Chen,
Liang Zhang,
Kexin Li,
Haibin Kan
Abstract:
Attribute-Based Encryption (ABE) is a promising solution for access control in cloud services. However, the heavy decryption overhead hinders its widespread adoption. A general approach to address this issue is to outsource decryption to decryption cloud service(DCS). Existing schemes have utilized various methods to enable users to verify outsourced results; however, they lack an effective mechan…
▽ More
Attribute-Based Encryption (ABE) is a promising solution for access control in cloud services. However, the heavy decryption overhead hinders its widespread adoption. A general approach to address this issue is to outsource decryption to decryption cloud service(DCS). Existing schemes have utilized various methods to enable users to verify outsourced results; however, they lack an effective mechanism to achieve exemptibility which enables the honest DCS to escape from wrong claims. And it is impractical to assume that the DCS will provide free services. In this paper, we propose a blockchain-based payable outsourced decryption ABE scheme that achieves both verifiability and exemptibility without adding redundant information to ABE ciphertext. We use zero-knowledge proof to verify outsourced results on blockchain and introduce an optional single-round challenge game under optimistic assumption to address the high cost of proof generation. Moreover, our system achieves fairness and decentralized outsourcing to protect the interests of all parties. Finally, we implement and evaluate our scheme on Ethereum to demonstrate its feasibility and efficiency, the gas usage in attribute numbers from 5 to 60 is 11$\times$ to 140$\times$ in the happy case and 4$\times$ to 55$\times$ in the challenge case lower than the scheme of Ge et al. (TDSC'23).
△ Less
Submitted 6 November, 2024;
originally announced November 2024.
-
$r$-Minimal Codes with Respect to Rank Metric
Authors:
Yang Xu,
Haibin Kan,
Guangyue Han
Abstract:
In this paper, we propose and study $r$-minimal codes, a natural extension of minimal codes which have been extensively studied with respect to Hamming metric, rank metric and sum-rank metric. We first propose $r$-minimal codes in a general setting where the ambient space is a finite dimensional left module over a division ring and is supported on a lattice. We characterize minimal subcodes and…
▽ More
In this paper, we propose and study $r$-minimal codes, a natural extension of minimal codes which have been extensively studied with respect to Hamming metric, rank metric and sum-rank metric. We first propose $r$-minimal codes in a general setting where the ambient space is a finite dimensional left module over a division ring and is supported on a lattice. We characterize minimal subcodes and $r$-minimal codes, derive a general singleton bound, and give existence results for $r$-minimal codes by using combinatorial arguments. We then consider $r$-minimal rank metric codes over a field extension $\mathbb{E}/\mathbb{F}$ of degree $m$, where $\mathbb{E}$ can be infinite. We characterize these codes in terms of cutting $r$-blocking sets, generalized rank weights of the codes and those of the dual codes, and classify codes whose $r$-dimensional subcodes have constant rank support weight. Next, with the help of the evasiveness property of cutting $r$-blocking sets and some upper bounds for the dimensions of evasive subspaces, we derive several lower and upper bounds for the minimal length of $r$-minimal codes. Furthermore, when $\mathbb{E}$ is finite, we establish a general upper bound which generalizes and improves the counterpart for minimal codes in the literature. As a corollary, we show that if $m=3$, then for any $k\geqslant2$, the minimal length of $k$-dimensional minimal codes is equal to $2k$. To the best of our knowledge, when $m\geqslant3$, there was no known explicit formula for the minimal length of $k$-dimensional minimal codes for arbitrary $k$ in the literature.
△ Less
Submitted 28 August, 2024;
originally announced August 2024.
-
Minimal Ternary Linear Codes from Vectorial Functions
Authors:
Yanjun Li,
Haibin Kan,
Fangfang Liu,
Jie Peng,
Lijing Zheng,
Zepeng Zhuo
Abstract:
The study on minimal linear codes has received great attention due to their significant applications in secret sharing schemes and secure two-party computation. Until now, numerous minimal linear codes have been discovered. However, to the best of our knowledge, no infinite family of minimal ternary linear codes was found from vectorial functions. In this paper, we present a necessary and sufficie…
▽ More
The study on minimal linear codes has received great attention due to their significant applications in secret sharing schemes and secure two-party computation. Until now, numerous minimal linear codes have been discovered. However, to the best of our knowledge, no infinite family of minimal ternary linear codes was found from vectorial functions. In this paper, we present a necessary and sufficient condition for a large class of ternary linear codes from vectorial functions such that those codes are minimal. Based on that, we construct several minimal ternary linear codes with three-weight from vectorial regular plateaued functions, and determine their weight distributions. Moreover, we also give a necessary and sufficient condition for a large family of ternary linear codes from vectorial functions such that the codes are minimal and violate the AB condition simultaneously. According to this characterization, we find several minimal ternary linear codes violating the AB condition. Notably, our results show that our method can be applied to solve a problem on minimal linear codes proposed by Li et al.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Trace Monomial Boolean Functions with Large High-Order Nonlinearities
Authors:
Jinjie Gao,
Haibin Kan,
Yuan Li,
Jiahua Xu,
Qichun Wang
Abstract:
Exhibiting an explicit Boolean function with a large high-order nonlinearity is an important problem in cryptography, coding theory, and computational complexity. We prove lower bounds on the second-order, third-order, and higher-order nonlinearities of some trace monomial Boolean functions.
We prove lower bounds on the second-order nonlinearities of functions $\mathrm{tr}_n(x^7)$ and…
▽ More
Exhibiting an explicit Boolean function with a large high-order nonlinearity is an important problem in cryptography, coding theory, and computational complexity. We prove lower bounds on the second-order, third-order, and higher-order nonlinearities of some trace monomial Boolean functions.
We prove lower bounds on the second-order nonlinearities of functions $\mathrm{tr}_n(x^7)$ and $\mathrm{tr}_n(x^{2^r+3})$ where $n=2r$. Among all trace monomials, our bounds match the best second-order nonlinearity lower bounds by \cite{Car08} and \cite{YT20} for odd and even $n$ respectively. We prove a lower bound on the third-order nonlinearity for functions $\mathrm{tr}_n(x^{15})$, which is the best third-order nonlinearity lower bound. For any $r$, we prove that the $r$-th order nonlinearity of $\mathrm{tr}_n(x^{2^{r+1}-1})$ is at least $2^{n-1}-2^{(1-2^{-r})n+\frac{r}{2^{r-1}}-1}- O(2^{\frac{n}{2}})$. For $r \ll \log_2 n$, this is the best lower bound among all explicit functions.
△ Less
Submitted 20 September, 2023;
originally announced September 2023.
-
H-DenseFormer: An Efficient Hybrid Densely Connected Transformer for Multimodal Tumor Segmentation
Authors:
Jun Shi,
Hongyu Kan,
Shulan Ruan,
Ziqi Zhu,
Minfan Zhao,
Liang Qiao,
Zhaohui Wang,
Hong An,
Xudong Xue
Abstract:
Recently, deep learning methods have been widely used for tumor segmentation of multimodal medical images with promising results. However, most existing methods are limited by insufficient representational ability, specific modality number and high computational complexity. In this paper, we propose a hybrid densely connected network for tumor segmentation, named H-DenseFormer, which combines the…
▽ More
Recently, deep learning methods have been widely used for tumor segmentation of multimodal medical images with promising results. However, most existing methods are limited by insufficient representational ability, specific modality number and high computational complexity. In this paper, we propose a hybrid densely connected network for tumor segmentation, named H-DenseFormer, which combines the representational power of the Convolutional Neural Network (CNN) and the Transformer structures. Specifically, H-DenseFormer integrates a Transformer-based Multi-path Parallel Embedding (MPE) module that can take an arbitrary number of modalities as input to extract the fusion features from different modalities. Then, the multimodal fusion features are delivered to different levels of the encoder to enhance multimodal learning representation. Besides, we design a lightweight Densely Connected Transformer (DCT) block to replace the standard Transformer block, thus significantly reducing computational complexity. We conduct extensive experiments on two public multimodal datasets, HECKTOR21 and PI-CAI22. The experimental results show that our proposed method outperforms the existing state-of-the-art methods while having lower computational complexity. The source code is available at https://github.com/shijun18/H-DenseFormer.
△ Less
Submitted 4 July, 2023;
originally announced July 2023.
-
Deep Anatomical Federated Network (Dafne): An open client-server framework for the continuous, collaborative improvement of deep learning-based medical image segmentation
Authors:
Francesco Santini,
Jakob Wasserthal,
Abramo Agosti,
Xeni Deligianni,
Kevin R. Keene,
Hermien E. Kan,
Stefan Sommer,
Fengdan Wang,
Claudia Weidensteiner,
Giulia Manco,
Matteo Paoletti,
Valentina Mazzoli,
Arjun Desai,
Anna Pichiecchio
Abstract:
Purpose: To present and evaluate Dafne (deep anatomical federated network), a freely available decentralized, collaborative deep learning system for the semantic segmentation of radiological images through federated incremental learning. Materials and Methods: Dafne is free software with a client-server architecture. The client side is an advanced user interface that applies the deep learning mode…
▽ More
Purpose: To present and evaluate Dafne (deep anatomical federated network), a freely available decentralized, collaborative deep learning system for the semantic segmentation of radiological images through federated incremental learning. Materials and Methods: Dafne is free software with a client-server architecture. The client side is an advanced user interface that applies the deep learning models stored on the server to the user's data and allows the user to check and refine the prediction. Incremental learning is then performed at the client's side and sent back to the server, where it is integrated into the root model. Dafne was evaluated locally, by assessing the performance gain across model generations on 38 MRI datasets of the lower legs, and through the analysis of real-world usage statistics (n = 639 use-cases). Results: Dafne demonstrated a statistically improvement in the accuracy of semantic segmentation over time (average increase of the Dice Similarity Coefficient by 0.007 points/generation on the local validation set, p < 0.001). Qualitatively, the models showed enhanced performance on various radiologic image types, including those not present in the initial training sets, indicating good model generalizability. Conclusion: Dafne showed improvement in segmentation quality over time, demonstrating potential for learning and generalization.
△ Less
Submitted 23 April, 2025; v1 submitted 13 February, 2023;
originally announced February 2023.
-
Characterization for a generic construction of bent functions and its consequences
Authors:
Yanjun Li,
Jinjie Gao,
Haibin Kan,
Jie Peng,
Lijing Zheng,
Changhui Chen
Abstract:
In this letter, we give a characterization for a generic construction of bent functions. This characterization enables us to obtain another efficient construction of bent functions and to give a positive answer on a problem of bent functions.
In this letter, we give a characterization for a generic construction of bent functions. This characterization enables us to obtain another efficient construction of bent functions and to give a positive answer on a problem of bent functions.
△ Less
Submitted 10 March, 2024; v1 submitted 11 January, 2023;
originally announced January 2023.
-
Resistance Distances in Simplicial Networks
Authors:
Mingzhe Zhu,
Wanyue Xu,
Zhongzhi Zhang,
Haibin Kan,
Guanrong Chen
Abstract:
It is well known that in many real networks, such as brain networks and scientific collaboration networks, there exist higher-order nonpairwise relations among nodes, i.e., interactions between among than two nodes at a time. This simplicial structure can be described by simplicial complexes and has an important effect on topological and dynamical properties of networks involving such group intera…
▽ More
It is well known that in many real networks, such as brain networks and scientific collaboration networks, there exist higher-order nonpairwise relations among nodes, i.e., interactions between among than two nodes at a time. This simplicial structure can be described by simplicial complexes and has an important effect on topological and dynamical properties of networks involving such group interactions. In this paper, we study analytically resistance distances in iteratively growing networks with higher-order interactions characterized by the simplicial structure that is controlled by a parameter q. We derive exact formulas for interesting quantities about resistance distances, including Kirchhoff index, additive degree-Kirchhoff index, multiplicative degree-Kirchhoff index, as well as average resistance distance, which have found applications in various areas elsewhere. We show that the average resistance distance tends to a q-dependent constant, indicating the impact of simplicial organization on the structural robustness measured by average resistance distance.
△ Less
Submitted 12 December, 2022;
originally announced December 2022.
-
Hitting Times of Random Walks on Edge Corona Product Graphs
Authors:
Mingzhe Zhu,
Wanyue Xu,
Wei Li,
Zhongzhi Zhang,
Haibin Kan
Abstract:
Graph products have been extensively applied to model complex networks with striking properties observed in real-world complex systems. In this paper, we study the hitting times for random walks on a class of graphs generated iteratively by edge corona product. We first derive recursive solutions to the eigenvalues and eigenvectors of the normalized adjacency matrix associated with the graphs. Bas…
▽ More
Graph products have been extensively applied to model complex networks with striking properties observed in real-world complex systems. In this paper, we study the hitting times for random walks on a class of graphs generated iteratively by edge corona product. We first derive recursive solutions to the eigenvalues and eigenvectors of the normalized adjacency matrix associated with the graphs. Based on these results, we further obtain interesting quantities about hitting times of random walks, providing iterative formulas for two-node hitting time, as well as closed-form expressions for the Kemeny's constant defined as a weighted average of hitting times over all node pairs, as well as the arithmetic mean of hitting times of all pairs of nodes.
△ Less
Submitted 12 December, 2022;
originally announced December 2022.
-
On the Uniqueness of Balanced Complex Orthogonal Design
Authors:
Yiwen Gao,
Yuan Li,
Haibin Kan
Abstract:
Complex orthogonal designs (CODs) play a crucial role in the construction of space-time block codes. Their real analog, real orthogonal designs (or equivalently, sum of squares composition formula) have a long history. Adams et al. (2011) introduced the concept of balanced complex orthogonal designs (BCODs) to address practical considerations. BCODs have a constant code rate of $1/2$ and a minimum…
▽ More
Complex orthogonal designs (CODs) play a crucial role in the construction of space-time block codes. Their real analog, real orthogonal designs (or equivalently, sum of squares composition formula) have a long history. Adams et al. (2011) introduced the concept of balanced complex orthogonal designs (BCODs) to address practical considerations. BCODs have a constant code rate of $1/2$ and a minimum decoding delay of $2^m$, where $2m$ is the number of columns. Understanding the structure of BCODs helps design space-time block codes, and it is also fascinating in its own right.
We prove, when the number of columns is fixed, all (indecomposable) balanced complex orthogonal designs (BCODs) have the same parameters $[2^m, 2m, 2^{m-1}]$, and moreover, they are all equivalent.
△ Less
Submitted 6 July, 2023; v1 submitted 13 November, 2022;
originally announced November 2022.
-
SoccerNet 2022 Challenges Results
Authors:
Silvio Giancola,
Anthony Cioppa,
Adrien Deliège,
Floriane Magera,
Vladimir Somers,
Le Kang,
Xin Zhou,
Olivier Barnich,
Christophe De Vleeschouwer,
Alexandre Alahi,
Bernard Ghanem,
Marc Van Droogenbroeck,
Abdulrahman Darwish,
Adrien Maglo,
Albert Clapés,
Andreas Luyts,
Andrei Boiarov,
Artur Xarles,
Astrid Orcesi,
Avijit Shah,
Baoyu Fan,
Bharath Comandur,
Chen Chen,
Chen Zhang,
Chen Zhao
, et al. (69 additional authors not shown)
Abstract:
The SoccerNet 2022 challenges were the second annual video understanding challenges organized by the SoccerNet team. In 2022, the challenges were composed of 6 vision-based tasks: (1) action spotting, focusing on retrieving action timestamps in long untrimmed videos, (2) replay grounding, focusing on retrieving the live moment of an action shown in a replay, (3) pitch localization, focusing on det…
▽ More
The SoccerNet 2022 challenges were the second annual video understanding challenges organized by the SoccerNet team. In 2022, the challenges were composed of 6 vision-based tasks: (1) action spotting, focusing on retrieving action timestamps in long untrimmed videos, (2) replay grounding, focusing on retrieving the live moment of an action shown in a replay, (3) pitch localization, focusing on detecting line and goal part elements, (4) camera calibration, dedicated to retrieving the intrinsic and extrinsic camera parameters, (5) player re-identification, focusing on retrieving the same players across multiple views, and (6) multiple object tracking, focusing on tracking players and the ball through unedited video streams. Compared to last year's challenges, tasks (1-2) had their evaluation metrics redefined to consider tighter temporal accuracies, and tasks (3-6) were novel, including their underlying data and annotations. More information on the tasks, challenges and leaderboards are available on https://www.soccer-net.org. Baselines and development kits are available on https://github.com/SoccerNet.
△ Less
Submitted 5 October, 2022;
originally announced October 2022.
-
Minimal Binary Linear Codes from Vectorial Boolean Functions
Authors:
Yanjun Li,
Jie Peng,
Haibin Kan,
Lijing Zheng
Abstract:
Recently, much progress has been made to construct minimal linear codes due to their preference in secret sharing schemes and secure two-party computation. In this paper, we put forward a new method to construct minimal linear codes by using vectorial Boolean functions. Firstly, we give a necessary and sufficient condition for a generic class of linear codes from vectorial Boolean functions to be…
▽ More
Recently, much progress has been made to construct minimal linear codes due to their preference in secret sharing schemes and secure two-party computation. In this paper, we put forward a new method to construct minimal linear codes by using vectorial Boolean functions. Firstly, we give a necessary and sufficient condition for a generic class of linear codes from vectorial Boolean functions to be minimal. Based on that, we derive some new three-weight minimal linear codes and determine their weight distributions. Secondly, we obtain a necessary and sufficient condition for another generic class of linear codes from vectorial Boolean functions to be minimal and to be violated the AB condition. As a result, we get three infinite families of minimal linear codes violating the AB condition. To the best of our knowledge, this is the first time that minimal liner codes are constructed from vectorial Boolean functions. Compared with other known ones, in general the minimal liner codes obtained in this paper have higher dimensions.
△ Less
Submitted 7 August, 2022;
originally announced August 2022.
-
Self-supervised Group Meiosis Contrastive Learning for EEG-Based Emotion Recognition
Authors:
Haoning Kan,
Jiale Yu,
Jiajin Huang,
Zihe Liu,
Haiyan Zhou
Abstract:
The progress of EEG-based emotion recognition has received widespread attention from the fields of human-machine interactions and cognitive science in recent years. However, how to recognize emotions with limited labels has become a new research and application bottleneck. To address the issue, this paper proposes a Self-supervised Group Meiosis Contrastive learning framework (SGMC) based on the s…
▽ More
The progress of EEG-based emotion recognition has received widespread attention from the fields of human-machine interactions and cognitive science in recent years. However, how to recognize emotions with limited labels has become a new research and application bottleneck. To address the issue, this paper proposes a Self-supervised Group Meiosis Contrastive learning framework (SGMC) based on the stimuli consistent EEG signals in human being. In the SGMC, a novel genetics-inspired data augmentation method, named Meiosis, is developed. It takes advantage of the alignment of stimuli among the EEG samples in a group for generating augmented groups by pairing, cross exchanging, and separating. And the model adopts a group projector to extract group-level feature representations from group EEG samples triggered by the same emotion video stimuli. Then contrastive learning is employed to maximize the similarity of group-level representations of augmented groups with the same stimuli. The SGMC achieves the state-of-the-art emotion recognition results on the publicly available DEAP dataset with an accuracy of 94.72% and 95.68% in valence and arousal dimensions, and also reaches competitive performance on the public SEED dataset with an accuracy of 94.04%. It is worthy of noting that the SGMC shows significant performance even when using limited labels. Moreover, the results of feature visualization suggest that the model might have learned video-level emotion-related feature representations to improve emotion recognition. And the effects of group size are further evaluated in the hyper parametric analysis. Finally, a control experiment and ablation study are carried out to examine the rationality of architecture. The code is provided publicly online.
△ Less
Submitted 2 August, 2022; v1 submitted 12 July, 2022;
originally announced August 2022.
-
The Covering Radius of the Third-Order Reed-Muller Code RM(3,7) is 20
Authors:
Jinjie Gao,
Haibin Kan,
Yuan Li,
Qichun Wang
Abstract:
We prove the covering radius of the third-order Reed-Muller code RM(3,7) is 20, which was previously known to be between 20 and 23 (inclusive). The covering radius of RM(3, 7) is the maximum third-order nonlinearity among all 7-variable Boolean functions. It was known that there exist 7-variable Boolean functions with third-order nonlinearity 20. We prove the third-order nonlinearity cannot achiev…
▽ More
We prove the covering radius of the third-order Reed-Muller code RM(3,7) is 20, which was previously known to be between 20 and 23 (inclusive). The covering radius of RM(3, 7) is the maximum third-order nonlinearity among all 7-variable Boolean functions. It was known that there exist 7-variable Boolean functions with third-order nonlinearity 20. We prove the third-order nonlinearity cannot achieve 21. According to the classification of the quotient space of RM(6,6)/RM(3,6), we classify all 7-variable Boolean functions into 66 types. Firstly, we prove 62 types (among 66) cannot have third-order nonlinearity 21; Secondly, we prove function of the remaining 4 types can be transformed into a type (6, 10) function, if its third-order nonlinearity is 21; Finally, we transform type (6, 10) functions into a specific form, and prove the functions in that form cannot achieve third-order nonlinearity 21 (with the assistance of computers). By the way, we prove that the affine transformation group over any finite field can be generated by two elements.
△ Less
Submitted 14 January, 2023; v1 submitted 22 June, 2022;
originally announced June 2022.
-
Isometries and MacWilliams Extension Property for Weighted Poset Metric
Authors:
Yang Xu,
Haibin Kan,
Guangyue Han
Abstract:
Let $\mathbf{H}$ be the cartesian product of a family of left modules over a ring $S$, indexed by a finite set $Ω$. We are concerned with the $(\mathbf{P},ω)$-weight on $\mathbf{H}$, where $\mathbf{P}=(Ω,\preccurlyeq_{\mathbf{P}})$ is a poset and $ω:Ω\longrightarrow\mathbb{R}^{+}$ is a weight function. We characterize the group of $(\mathbf{P},ω)$-weight isometries of $\mathbf{H}$, and give a cano…
▽ More
Let $\mathbf{H}$ be the cartesian product of a family of left modules over a ring $S$, indexed by a finite set $Ω$. We are concerned with the $(\mathbf{P},ω)$-weight on $\mathbf{H}$, where $\mathbf{P}=(Ω,\preccurlyeq_{\mathbf{P}})$ is a poset and $ω:Ω\longrightarrow\mathbb{R}^{+}$ is a weight function. We characterize the group of $(\mathbf{P},ω)$-weight isometries of $\mathbf{H}$, and give a canonical decomposition for semi-simple subcodes of $\mathbf{H}$ when $\mathbf{P}$ is hierarchical. We then study the MacWilliams extension property (MEP) for $(\mathbf{P},ω)$-weight. We show that the MEP implies the unique decomposition property (UDP) of $(\mathbf{P},ω)$, which further implies that $\mathbf{P}$ is hierarchical if $ω$ is identically $1$. For the case that either $\mathbf{P}$ is hierarchical or $ω$ is identically $1$, we show that the MEP for $(\mathbf{P},ω)$-weight can be characterized in terms of the MEP for Hamming weight, and give necessary and sufficient conditions for $\mathbf{H}$ to satisfy the MEP for $(\mathbf{P},ω)$-weight when $S$ is an Artinian simple ring (either finite or infinite). When $S$ is a finite field, in the context of $(\mathbf{P},ω)$-weight, we compare the MEP with other coding theoretic properties including the MacWilliams identity, Fourier-reflexivity of partitions and the UDP, and show that the MEP is strictly stronger than all the rest among them.
△ Less
Submitted 20 July, 2022; v1 submitted 3 February, 2022;
originally announced February 2022.
-
Reflexivity of Partitions Induced by Weighted Poset Metric and Combinatorial Metric
Authors:
Yang Xu,
Haibin Kan,
Guangyue Han
Abstract:
Let $\mathbf{H}$ be the Cartesian product of a family of finite abelian groups. Via a polynomial approach, we give sufficient conditions for a partition of $\mathbf{H}$ induced by weighted poset metric to be reflexive, which also become necessary for some special cases. Moreover, by examining the roots of the Krawtchouk polynomials, we establish non-reflexive partitions of $\mathbf{H}$ induced by…
▽ More
Let $\mathbf{H}$ be the Cartesian product of a family of finite abelian groups. Via a polynomial approach, we give sufficient conditions for a partition of $\mathbf{H}$ induced by weighted poset metric to be reflexive, which also become necessary for some special cases. Moreover, by examining the roots of the Krawtchouk polynomials, we establish non-reflexive partitions of $\mathbf{H}$ induced by combinatorial metric. When $\mathbf{H}$ is a vector space over a finite field $\mathbb{F}$, we consider the property of admitting MacWilliams identity (PAMI) and the MacWilliams extension property (MEP) for partitions of $\mathbf{H}$. With some invariance assumptions, we show that two partitions of $\mathbf{H}$ admit MacWilliams identity if and only if they are mutually dual and reflexive, and any partition of $\mathbf{H}$ satisfying the MEP is in fact an orbit partition induced by some subgroup of $\Aut_{\mathbb{F}}(\mathbf{H})$, which is necessarily reflexive. As an application of the aforementioned results, we establish partitions of $\mathbf{H}$ induced by combinatorial metric that do not satisfy the MEP, which further enable us to provide counter-examples to a conjecture proposed by Pinheiro, Machado and Firer in \cite{39}.
△ Less
Submitted 20 July, 2022; v1 submitted 26 January, 2022;
originally announced January 2022.
-
Role Similarity Metric Based on Spanning Rooted Forest
Authors:
Qi Bao,
Zhongzhi Zhang,
Haibin Kan
Abstract:
As a fundamental issue in network analysis, structural node similarity has received much attention in academia and is adopted in a wide range of applications. Among these proposed structural node similarity measures, role similarity stands out because of satisfying several axiomatic properties including automorphism conformation. Existing role similarity metrics cannot handle top-k queries on larg…
▽ More
As a fundamental issue in network analysis, structural node similarity has received much attention in academia and is adopted in a wide range of applications. Among these proposed structural node similarity measures, role similarity stands out because of satisfying several axiomatic properties including automorphism conformation. Existing role similarity metrics cannot handle top-k queries on large real-world networks due to the high time and space cost. In this paper, we propose a new role similarity metric, namely \textsf{ForestSim}. We prove that \textsf{ForestSim} is an admissible role similarity metric and devise the corresponding top-k similarity search algorithm, namely \textsf{ForestSimSearch}, which is able to process a top-k query in $O(k)$ time once the precomputation is finished. Moreover, we speed up the precomputation by using a fast approximate algorithm to compute the diagonal entries of the forest matrix, which reduces the time and space complexity of the precomputation to $O(ε^{-2}m\log^5{n}\log{\frac{1}ε})$ and $O(m\log^3{n})$, respectively. Finally, we conduct extensive experiments on 26 real-world networks. The results show that \textsf{ForestSim} works efficiently on million-scale networks and achieves comparable performance to the state-of-art methods.
△ Less
Submitted 1 April, 2024; v1 submitted 15 October, 2021;
originally announced October 2021.
-
Fourier-Reflexive Partitions Induced by Poset Metric
Authors:
Yang Xu,
Haibin Kan,
Guangyue Han
Abstract:
Let $\mathbf{H}$ be the cartesian product of a family of finite abelian groups indexed by a finite set $Ω$. A given poset (i.e., partially ordered set) $\mathbf{P}=(Ω,\preccurlyeq_{\mathbf{P}})$ gives rise to a poset metric on $\mathbf{H}$, which further leads to a partition $\mathcal{Q}(\mathbf{H},\mathbf{P})$ of $\mathbf{H}$. We prove that if $\mathcal{Q}(\mathbf{H},\mathbf{P})$ is Fourier-refle…
▽ More
Let $\mathbf{H}$ be the cartesian product of a family of finite abelian groups indexed by a finite set $Ω$. A given poset (i.e., partially ordered set) $\mathbf{P}=(Ω,\preccurlyeq_{\mathbf{P}})$ gives rise to a poset metric on $\mathbf{H}$, which further leads to a partition $\mathcal{Q}(\mathbf{H},\mathbf{P})$ of $\mathbf{H}$. We prove that if $\mathcal{Q}(\mathbf{H},\mathbf{P})$ is Fourier-reflexive, then its dual partition $Λ$ coincides with the partition of $\hat{\mathbf{H}}$ induced by $\mathbf{\overline{P}}$, the dual poset of $\mathbf{P}$, and moreover, $\mathbf{P}$ is necessarily hierarchical. This result establishes a conjecture proposed by Gluesing-Luerssen in \cite{4}. We also show that with some other assumptions, $Λ$ is finer than the partition of $\hat{\mathbf{H}}$ induced by $\mathbf{\overline{P}}$. In addition, we give some necessary and sufficient conditions for $\mathbf{P}$ to be hierarchical, and for the case that $\mathbf{P}$ is hierarchical, we give an explicit criterion for determining whether two codewords in $\hat{\mathbf{H}}$ belong to the same block of $Λ$. We prove these results by relating the involved partitions with certain family of polynomials, a generalized version of which is also proposed and studied to generalize the aforementioned results.
△ Less
Submitted 21 July, 2021;
originally announced July 2021.
-
Constructing new APN functions through relative trace functions
Authors:
Lijing Zheng,
Haibin Kan,
Yanjun Li,
Jie Peng,
Deng Tang
Abstract:
In 2020, Budaghyan, Helleseth and Kaleyski [IEEE TIT 66(11): 7081-7087, 2020] considered an infinite family of quadrinomials over $\mathbb{F}_{2^{n}}$ of the form $x^3+a(x^{2^s+1})^{2^k}+bx^{3\cdot 2^m}+c(x^{2^{s+m}+2^m})^{2^k}$, where $n=2m$ with $m$ odd. They proved that such kind of quadrinomials can provide new almost perfect nonlinear (APN) functions when $\gcd(3,m)=1$, $ k=0 $, and…
▽ More
In 2020, Budaghyan, Helleseth and Kaleyski [IEEE TIT 66(11): 7081-7087, 2020] considered an infinite family of quadrinomials over $\mathbb{F}_{2^{n}}$ of the form $x^3+a(x^{2^s+1})^{2^k}+bx^{3\cdot 2^m}+c(x^{2^{s+m}+2^m})^{2^k}$, where $n=2m$ with $m$ odd. They proved that such kind of quadrinomials can provide new almost perfect nonlinear (APN) functions when $\gcd(3,m)=1$, $ k=0 $, and $(s,a,b,c)=(m-2,ω, ω^2,1)$ or $((m-2)^{-1}~{\rm mod}~n,ω, ω^2,1)$ in which $ω\in\mathbb{F}_4\setminus \mathbb{F}_2$. By taking $a=ω$ and $b=c=ω^2$, we observe that such kind of quadrinomials can be rewritten as $a {\rm Tr}^{n}_{m}(bx^3)+a^q{\rm Tr}^{n}_{m}(cx^{2^s+1})$, where $q=2^m$ and $ {\rm Tr}^n_{m}(x)=x+x^{2^m} $ for $ n=2m$. Inspired by the quadrinomials and our observation, in this paper we study a class of functions with the form $f(x)=a{\rm Tr}^{n}_{m}(F(x))+a^q{\rm Tr}^{n}_{m}(G(x))$ and determine the APN-ness of this new kind of functions, where $a \in \mathbb{F}_{2^n} $ such that $ a+a^q\neq 0$, and both $F$ and $G$ are quadratic functions over $\mathbb{F}_{2^n}$. We first obtain a characterization of the conditions for $f(x)$ such that $f(x) $ is an APN function. With the help of this characterization, we obtain an infinite family of APN functions for $ n=2m $ with $m$ being an odd positive integer: $ f(x)=a{\rm Tr}^{n}_{m}(bx^3)+a^q{\rm Tr}^{n}_{m}(b^3x^9) $, where $ a\in \mathbb{F}_{2^n}$ such that $ a+a^q\neq 0 $ and $ b $ is a non-cube in $ \mathbb{F}_{2^n} $.
△ Less
Submitted 27 January, 2021;
originally announced January 2021.
-
A Galois Connection Approach to Wei-Type Duality Theorems
Authors:
Yang Xu,
Haibin Kan,
Guangyue Han
Abstract:
In $1991$, Wei proved a duality theorem that established an interesting connection between the generalized Hamming weights of a linear code and those of its dual code. Wei's duality theorem has since been extensively studied from different perspectives and extended to other settings. In this paper, we re-examine Wei's duality theorem and its various extensions, henceforth referred to as Wei-type d…
▽ More
In $1991$, Wei proved a duality theorem that established an interesting connection between the generalized Hamming weights of a linear code and those of its dual code. Wei's duality theorem has since been extensively studied from different perspectives and extended to other settings. In this paper, we re-examine Wei's duality theorem and its various extensions, henceforth referred to as Wei-type duality theorems, from a new Galois connection perspective. Our approach is based on the observation that the generalized Hamming weights and the dimension/length profiles of a linear code form a Galois connection. The central result in this paper is a general Wei-type duality theorem for two Galois connections between finite subsets of $\mathbb{Z}$, from which all the known Wei-type duality theorems can be recovered. As corollaries of our central result, we prove new Wei-type duality theorems for $w$-demimatroids defined over finite sets and $w$-demi-polymatroids defined over modules with a composition series, which further allows us to unify and generalize all the known Wei-type duality theorems established for codes endowed with various metrics.
△ Less
Submitted 22 July, 2021; v1 submitted 27 November, 2020;
originally announced November 2020.
-
FollowMeUp Sports: New Benchmark for 2D Human Keypoint Recognition
Authors:
Ying Huang,
Bin Sun,
Haipeng Kan,
Jiankai Zhuang,
Zengchang Qin
Abstract:
Human pose estimation has made significant advancement in recent years. However, the existing datasets are limited in their coverage of pose variety. In this paper, we introduce a novel benchmark FollowMeUp Sports that makes an important advance in terms of specific postures, self-occlusion and class balance, a contribution that we feel is required for future development in human body models. This…
▽ More
Human pose estimation has made significant advancement in recent years. However, the existing datasets are limited in their coverage of pose variety. In this paper, we introduce a novel benchmark FollowMeUp Sports that makes an important advance in terms of specific postures, self-occlusion and class balance, a contribution that we feel is required for future development in human body models. This comprehensive dataset was collected using an established taxonomy of over 200 standard workout activities with three different shot angles. The collected videos cover a wider variety of specific workout activities than previous datasets including push-up, squat and body moving near the ground with severe self-occlusion or occluded by some sport equipment and outfits. Given these rich images, we perform a detailed analysis of the leading human pose estimation approaches gaining insights for the success and failures of these methods.
△ Less
Submitted 19 November, 2019;
originally announced November 2019.
-
Constructing vectorial bent functions via second-order derivatives
Authors:
Lijing Zheng,
Jie Peng,
Haibin Kan,
Yanjun Li
Abstract:
Let $n$ be an even positive integer, and $m<n$ be one of its positive divisors. In this paper, inspired by a nice work of Tang et al. on constructing large classes of bent functions from known bent functions [27, IEEE TIT, 63(10): 6149-6157, 2017], we consider the construction of vectorial bent and vectorial plateaued $(n,m)$-functions of the form $H(x)=G(x)+g(x)$, where $G(x)$ is a vectorial bent…
▽ More
Let $n$ be an even positive integer, and $m<n$ be one of its positive divisors. In this paper, inspired by a nice work of Tang et al. on constructing large classes of bent functions from known bent functions [27, IEEE TIT, 63(10): 6149-6157, 2017], we consider the construction of vectorial bent and vectorial plateaued $(n,m)$-functions of the form $H(x)=G(x)+g(x)$, where $G(x)$ is a vectorial bent $(n,m)$-function, and $g(x)$ is a Boolean function over $\mathbb{F}_{2^{n}}$. We find an efficient generic method to construct vectorial bent and vectorial plateaued functions of this form by establishing a link between the condition on the second-order derivatives and the key condition given by [27]. This allows us to provide (at least) three new infinite families of vectorial bent functions with high algebraic degrees. New vectorial plateaued $(n,m+t)$-functions are also obtained ($t\geq 0$ depending on $n$ can be taken as a very large number), two classes of which have the maximal number of bent components.
△ Less
Submitted 24 May, 2019;
originally announced May 2019.
-
On constructions and properties of $(n,m)$-functions with maximal number of bent components
Authors:
Lijing Zheng,
Jie Peng,
Haibin Kan,
Yanjun Li,
Juan Luo
Abstract:
For any positive integers $n=2k$ and $m$ such that $m\geq k$, in this paper we show the maximal number of bent components of any $(n,m)$-functions is equal to $2^{m}-2^{m-k}$, and for those attaining the equality, their algebraic degree is at most $k$. It is easily seen that all $(n,m)$-functions of the form $G(x)=(F(x),0)$ with $F(x)$ being any vectorial bent $(n,k)$-function, have the maximum nu…
▽ More
For any positive integers $n=2k$ and $m$ such that $m\geq k$, in this paper we show the maximal number of bent components of any $(n,m)$-functions is equal to $2^{m}-2^{m-k}$, and for those attaining the equality, their algebraic degree is at most $k$. It is easily seen that all $(n,m)$-functions of the form $G(x)=(F(x),0)$ with $F(x)$ being any vectorial bent $(n,k)$-function, have the maximum number of bent components. Those simple functions $G$ are called trivial in this paper. We show that for a power $(n,n)$-function, it has such large number of bent components if and only if it is trivial under a mild condition. We also consider the $(n,n)$-function of the form $F^{i}(x)=x^{2^{i}}h({\rm Tr}^{n}_{e}(x))$, where $h: \mathbb{F}_{2^{e}} \rightarrow \mathbb{F}_{2^{e}}$, and show that $F^{i}$ has such large number if and only if $e=k$, and $h$ is a permutation over $\mathbb{F}_{2^{k}}$. It proves that all the previously known nontrivial such functions are subclasses of the functions $F^{i}$. Based on the Maiorana-McFarland class, we present constructions of large numbers of $(n,m)$-functions with maximal number of bent components for any integer $m$ in bivariate representation. We also determine the differential spectrum and Walsh spectrum of the constructed functions. It is found that our constructions can also provide new plateaued vectorial functions.
△ Less
Submitted 24 May, 2019;
originally announced May 2019.
-
A Novel Construction of Low-Complexity MDS Codes with Optimal Repair Capability for Distributed Storage Systems
Authors:
Sheng Guan,
Haibin Kan,
Xin Wang
Abstract:
Maximum-distance-separable (MDS) codes are a class of erasure codes that are widely adopted to enhance the reliability of distributed storage systems (DSS). In (n, k) MDS coded DSS, the original data are stored into n distributed nodes in an efficient manner such that each storage node only contains a small amount (i.e., 1/k) of the data and a data collector connected to any k nodes can retrieve t…
▽ More
Maximum-distance-separable (MDS) codes are a class of erasure codes that are widely adopted to enhance the reliability of distributed storage systems (DSS). In (n, k) MDS coded DSS, the original data are stored into n distributed nodes in an efficient manner such that each storage node only contains a small amount (i.e., 1/k) of the data and a data collector connected to any k nodes can retrieve the entire data. On the other hand, a node failure can be repaired (i.e., stored data at the failed node can be successfully recovered) by downloading data segments from other surviving nodes. In this paper, we develop a new approach to construction of simple (5, 3) MDS codes. With judiciously block-designed generator matrices, we show that the proposed MDS codes have a minimum stripe size α = 2 and can be constructed over a small (Galois) finite field F4 of only four elements, both facilitating low-complexity computations and implementations for data storage, retrieval and repair. In addition, with the proposed MDS codes, any single node failure can be repaired through interference alignment technique with a minimum data amount downloaded from the surviving nodes; i.e., the proposed codes ensure optimal exact-repair of any single node failure using the minimum bandwidth. The low-complexity and all-node-optimal-repair properties of the proposed MDS codes make them readily deployed for practical DSS.
△ Less
Submitted 15 June, 2017;
originally announced June 2017.
-
On the Minimum Decoding Delay of Balanced Complex Orthogonal Design
Authors:
Xiaodong Liu,
Yuan Li,
Haibin Kan
Abstract:
Complex orthogonal design (COD) with parameter $[p, n, k]$ is a combinatorial design used in space-time block codes (STBCs). For STBC, $n$ is the number of antennas, $k/p$ is the rate, and $p$ is the decoding delay. A class of rate $1/2$ COD called balanced complex orthogonal design (BCOD) has been proposed by Adams et al., and they constructed BCODs with rate $k/p = 1/2$ and decoding delay…
▽ More
Complex orthogonal design (COD) with parameter $[p, n, k]$ is a combinatorial design used in space-time block codes (STBCs). For STBC, $n$ is the number of antennas, $k/p$ is the rate, and $p$ is the decoding delay. A class of rate $1/2$ COD called balanced complex orthogonal design (BCOD) has been proposed by Adams et al., and they constructed BCODs with rate $k/p = 1/2$ and decoding delay $p = 2^m$ for $n=2m$. Furthermore, they prove that the constructions have optimal decoding delay when $m$ is congruent to $1$, $2$, or $3$ module $4$. They conjecture that for the case $m \equiv 0 \pmod 4$, $2^m$ is also a lower bound of $p$. In this paper, we prove this conjecture.
△ Less
Submitted 2 January, 2014; v1 submitted 30 December, 2013;
originally announced December 2013.
-
Capacity Factors of a Point-to-point Network
Authors:
Yuan Li,
Yue Zhao,
Haibin Kan
Abstract:
In this paper, we investigate some properties on capacity factors, which were proposed to investigate the link failure problem from network coding. A capacity factor (CF) of a network is an edge set, deleting which will cause the maximum flow to decrease while deleting any proper subset will not. Generally, a $k$-CF is a minimal (not minimum) edge set which will cause the network maximum flow decr…
▽ More
In this paper, we investigate some properties on capacity factors, which were proposed to investigate the link failure problem from network coding. A capacity factor (CF) of a network is an edge set, deleting which will cause the maximum flow to decrease while deleting any proper subset will not. Generally, a $k$-CF is a minimal (not minimum) edge set which will cause the network maximum flow decrease by $k$.
Under point to point acyclic scenario, we characterize all the edges which are contained in some CF, and propose an efficient algorithm to classify. And we show that all edges on some $s$-$t$ path in an acyclic point-to-point acyclic network are contained in some 2-CF. We also study some other properties of CF of point to point network, and a simple relationship with CF in multicast network.
On the other hand, some computational hardness results relating to capacity factors are obtained. We prove that deciding whether there is a capacity factor of a cyclic network with size not less a given number is NP-complete, and the time complexity of calculating the capacity rank is lowered bounded by solving the maximal flow. Besides that, we propose the analogous definition of CF on vertices and show it captures edge capacity factors as a special case.
△ Less
Submitted 13 January, 2012; v1 submitted 2 January, 2012;
originally announced January 2012.
-
On $2k$-Variable Symmetric Boolean Functions with Maximum Algebraic Immunity $k$
Authors:
Hui Wang,
Jie Peng,
Yuan Li,
Haibin Kan
Abstract:
Algebraic immunity of Boolean function $f$ is defined as the minimal degree of a nonzero $g$ such that $fg=0$ or $(f+1)g=0$. Given a positive even integer $n$, it is found that the weight distribution of any $n$-variable symmetric Boolean function with maximum algebraic immunity $\frac{n}{2}$ is determined by the binary expansion of $n$. Based on the foregoing, all $n$-variable symmetric Boolean f…
▽ More
Algebraic immunity of Boolean function $f$ is defined as the minimal degree of a nonzero $g$ such that $fg=0$ or $(f+1)g=0$. Given a positive even integer $n$, it is found that the weight distribution of any $n$-variable symmetric Boolean function with maximum algebraic immunity $\frac{n}{2}$ is determined by the binary expansion of $n$. Based on the foregoing, all $n$-variable symmetric Boolean functions with maximum algebraic immunity are constructed. The amount is $(2\wt(n)+1)2^{\lfloor \log_2 n \rfloor}$
△ Less
Submitted 4 February, 2012; v1 submitted 9 November, 2011;
originally announced November 2011.
-
A Note on "On the Construction of Boolean Functions with Optimal Algebraic Immunity"
Authors:
Yuan Li,
Haibin Kan,
Futatsugi Kokichi
Abstract:
In this note, we go further on the "basis exchange" idea presented in \cite{LiNa1} by using Mobious inversion. We show that the matrix $S_1(f)S_0(f)^{-1}$ has a nice form when $f$ is chosen to be the majority function, where $S_1(f)$ is the matrix with row vectors $\upsilon_k(α)$ for all $α\in 1_f$ and $S_0(f)=S_1(f\oplus1)$. And an exact counting for Boolean functions with maximum algebraic immun…
▽ More
In this note, we go further on the "basis exchange" idea presented in \cite{LiNa1} by using Mobious inversion. We show that the matrix $S_1(f)S_0(f)^{-1}$ has a nice form when $f$ is chosen to be the majority function, where $S_1(f)$ is the matrix with row vectors $\upsilon_k(α)$ for all $α\in 1_f$ and $S_0(f)=S_1(f\oplus1)$. And an exact counting for Boolean functions with maximum algebraic immunity by exchanging one point in on-set with one point in off-set of the majority function is given. Furthermore, we present a necessary condition according to weight distribution for Boolean functions to achieve algebraic immunity not less than a given number.
△ Less
Submitted 18 November, 2012; v1 submitted 18 October, 2011;
originally announced October 2011.
-
Constructing and Counting Even-Variable Symmetric Boolean Functions with Algebraic Immunity not Less Than $d$
Authors:
Yuan Li,
Hui Wang,
Haibin Kan
Abstract:
In this paper, we explicitly construct a large class of symmetric Boolean functions on $2k$ variables with algebraic immunity not less than $d$, where integer $k$ is given arbitrarily and $d$ is a given suffix of $k$ in binary representation. If let $d = k$, our constructed functions achieve the maximum algebraic immunity. Remarkably, $2^{\lfloor \log_2{k} \rfloor + 2}$ symmetric Boolean functions…
▽ More
In this paper, we explicitly construct a large class of symmetric Boolean functions on $2k$ variables with algebraic immunity not less than $d$, where integer $k$ is given arbitrarily and $d$ is a given suffix of $k$ in binary representation. If let $d = k$, our constructed functions achieve the maximum algebraic immunity. Remarkably, $2^{\lfloor \log_2{k} \rfloor + 2}$ symmetric Boolean functions on $2k$ variables with maximum algebraic immunity are constructed, which is much more than the previous constructions. Based on our construction, a lower bound of symmetric Boolean functions with algebraic immunity not less than $d$ is derived, which is $2^{\lfloor \log_2{d} \rfloor + 2(k-d+1)}$. As far as we know, this is the first lower bound of this kind.
△ Less
Submitted 18 October, 2011;
originally announced October 2011.
-
On the nonexistence of $[\binom{2m}{m-1}, 2m, \binom{2m-1}{m-1}]$, $m$ odd, complex orthogonal design
Authors:
Yuan Li,
Haibin Kan
Abstract:
Complex orthogonal designs (CODs) are used to construct space-time block codes. COD $\mathcal{O}_z$ with parameter $[p, n, k]$ is a $p\times n$ matrix, where nonzero entries are filled by $\pm z_i$ or $\pm z^*_i$, $i = 1, 2,..., k$, such that $\mathcal{O}^H_z \mathcal{O}_z = (|z_1|^2+|z_2|^2+...+|z_k|^2)I_{n \times n}$. Adams et al. in "The final case of the decoding delay problem for maximum rate…
▽ More
Complex orthogonal designs (CODs) are used to construct space-time block codes. COD $\mathcal{O}_z$ with parameter $[p, n, k]$ is a $p\times n$ matrix, where nonzero entries are filled by $\pm z_i$ or $\pm z^*_i$, $i = 1, 2,..., k$, such that $\mathcal{O}^H_z \mathcal{O}_z = (|z_1|^2+|z_2|^2+...+|z_k|^2)I_{n \times n}$. Adams et al. in "The final case of the decoding delay problem for maximum rate complex orthogonal designs," IEEE Trans. Inf. Theory, vol. 56, no. 1, pp. 103-122, Jan. 2010, first proved the nonexistence of $[\binom{2m}{m-1}, 2m, \binom{2m-1}{m-1}]$, $m$ odd, COD. Combining with the previous result that decoding delay should be an integer multiple of $\binom{2m}{m-1}$, they solved the final case $n \equiv 2 \pmod 4$ of the decoding delay problem for maximum rate complex orthogonal designs.
In this paper, we give another proof of the nonexistence of COD with parameter $[\binom{2m}{m-1}, 2m, \binom{2m-1}{m-1}]$, $m$ odd. Our new proof is based on the uniqueness of $[\binom{2m}{m-1}, 2m-1, \binom{2m-1}{m-1}]$ under equivalence operation, where an explicit-form representation is proposed to help the proof. Then, by proving it's impossible to add an extra orthogonal column on COD $[\binom{2m}{m-1}, 2m-1, \binom{2m-1}{m-1}]$ when $m$ is odd, we complete the proof of the nonexistence of COD $[\binom{2m}{m-1}, 2m, \binom{2m-1}{m-1}]$.
△ Less
Submitted 13 September, 2011;
originally announced September 2011.
-
Complex Orthogonal Designs with Forbidden $2 \times 2$ Submatrices
Authors:
Yuan Li,
Haibin Kan
Abstract:
Complex orthogonal designs (CODs) are used to construct space-time block codes. COD $\mathcal{O}_z$ with parameter $[p, n, k]$ is a $p \times n$ matrix, where nonzero entries are filled by $\pm z_i$ or $\pm z^*_i$, $i = 1, 2,..., k$, such that $\mathcal{O}^H_z \mathcal{O}_z = (|z_1|^2+|z_2|^2+...+|z_k|^2)I_{n \times n}$. Define $\mathcal{O}_z$ a first type COD if and only if $\mathcal{O}_z$ does n…
▽ More
Complex orthogonal designs (CODs) are used to construct space-time block codes. COD $\mathcal{O}_z$ with parameter $[p, n, k]$ is a $p \times n$ matrix, where nonzero entries are filled by $\pm z_i$ or $\pm z^*_i$, $i = 1, 2,..., k$, such that $\mathcal{O}^H_z \mathcal{O}_z = (|z_1|^2+|z_2|^2+...+|z_k|^2)I_{n \times n}$. Define $\mathcal{O}_z$ a first type COD if and only if $\mathcal{O}_z$ does not contain submatrix {\pm z_j & 0; \ 0 & \pm z^*_j}$ or ${\pm z^*_j & 0; \ 0 & \pm z_j}$. It is already known that, all CODs with maximal rate, i.e., maximal $k/p$, are of the first type.
In this paper, we determine all achievable parameters $[p, n, k]$ of first type COD, as well as all their possible structures. The existence of parameters is proved by explicit-form constructions. New CODs with parameters $[p,n,k]=[\binom{n}{w-1}+\binom{n}{w+1}, n, \binom{n}{w}], $ for $0 \le w \le n$, are constructed, which demonstrate the possibility of sacrificing code rate to reduce decoding delay. It's worth mentioning that all maximal rate, minimal delay CODs are contained in our constructions, and their uniqueness under equivalence operation is proved.
△ Less
Submitted 1 April, 2012; v1 submitted 16 July, 2011;
originally announced July 2011.