Showing 1–2 of 2 results for author: Rayudu, S S
-
Quantum Bicyclic Hyperbolic Codes
Authors:
Sankara Sai Chaithanya Rayudu,
Pradeep Kiran Sarvepalli
Abstract:
Bicyclic codes are a generalization of the one dimensional (1D) cyclic codes to two dimensions (2D). Similar to the 1D case, in some cases, 2D cyclic codes can also be constructed to guarantee a specified minimum distance. Many aspects of these codes are yet unexplored. Motivated by the problem of constructing quantum codes, in this paper, we study some structural properties of certain bicyclic co…
▽ More
Bicyclic codes are a generalization of the one dimensional (1D) cyclic codes to two dimensions (2D). Similar to the 1D case, in some cases, 2D cyclic codes can also be constructed to guarantee a specified minimum distance. Many aspects of these codes are yet unexplored. Motivated by the problem of constructing quantum codes, in this paper, we study some structural properties of certain bicyclic codes. We show that a primitive narrow-sense bicyclic hyperbolic code of length $n^2$ contains its dual if and only if its design distance is lower than $n-Δ$, where $Δ=\mathcal{O}(\sqrt{n})$. We extend the sufficiency condition to the non-primitive case as well. We also show that over quadratic extension fields, a primitive bicyclic hyperbolic code of length $n^2$ contains Hermitian dual if and only if its design distance is lower than $n-Δ_h$, where $Δ_h=\mathcal{O}(\sqrt{n})$. Our results are analogous to some structural results known for BCH and Reed-Solomon codes. They further our understanding of bicyclic codes. We also give an application of these results by showing that we can construct two classes of quantum bicyclic codes based on our results.
△ Less
Submitted 25 September, 2019;
originally announced September 2019.
-
Preserving privacy for secure and outsourcing for Linear Programming in cloud computing
Authors:
G. Vidhisha,
C. Surekha,
S. Sanjeeva Rayudu,
U. Seshadri
Abstract:
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. we utilize the public key based homomorphism authen…
▽ More
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. we utilize the public key based homomorphism authenticator and uniquely integrate it with random mask technique to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously along with investigates secure outsourcing of widely applicable linear programming (LP) computations. In order to achieve practical efficiency, our mechanism design explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient.
△ Less
Submitted 7 November, 2012;
originally announced November 2012.