-
Characterization of Nearly Self-Orthogonal Quasi-Twisted Codes and Related Quantum Codes
Authors:
Martianus Frederic Ezerman,
Markus Grassl,
San Ling,
Ferruh Özbudak,
Buket Özkaya
Abstract:
Quasi-twisted codes are used here as the classical ingredients in the so-called Construction X for quantum error-control codes. The construction utilizes nearly self-orthogonal codes to design quantum stabilizer codes. We expand the choices of the inner product to also cover the symplectic and trace-symplectic inner products, in addition to the original Hermitian one. A refined lower bound on the…
▽ More
Quasi-twisted codes are used here as the classical ingredients in the so-called Construction X for quantum error-control codes. The construction utilizes nearly self-orthogonal codes to design quantum stabilizer codes. We expand the choices of the inner product to also cover the symplectic and trace-symplectic inner products, in addition to the original Hermitian one. A refined lower bound on the minimum distance of the resulting quantum codes is established and illustrated. We report numerous record breaking quantum codes from our randomized search for inclusion in the updated online database.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
On Linear Codes Whose Hermitian Hulls are MD
Authors:
Gaojun Luo,
Lin Sok,
Martianus Frederic Ezerman,
San Ling
Abstract:
Hermitian hulls of linear codes are interesting for theoretical and practical reasons alike. In terms of recent application, linear codes whose hulls meet certain conditions have been utilized as ingredients to construct entanglement-assisted quantum error correcting codes. This family of quantum codes is often seen as a generalization of quantum stabilizer codes. Theoretically, compared with the…
▽ More
Hermitian hulls of linear codes are interesting for theoretical and practical reasons alike. In terms of recent application, linear codes whose hulls meet certain conditions have been utilized as ingredients to construct entanglement-assisted quantum error correcting codes. This family of quantum codes is often seen as a generalization of quantum stabilizer codes. Theoretically, compared with the Euclidean setup, the Hermitian case is much harder to deal with. Hermitian hulls of MDS linear codes with low dimensions have been explored, mostly from generalized Reed-Solomon codes. Characterizing Hermitian hulls which themselves are MDS appears to be more involved and has not been extensively studied.
This paper introduces some tools to study linear codes whose Hermitian hulls are MDS. Using the tools, we then propose explicit constructions of such codes. We consider Hermitian hulls of both Reed-Solomon and non Reed-Solomon types of linear MDS codes. We demonstrate that, given the same Hermitian hull dimensions, the codes from our constructions have dimensions which are larger than those in the literature.
△ Less
Submitted 7 April, 2024;
originally announced April 2024.
-
Griesmer Bound and Constructions of Linear Codes in $b$-Symbol Metric
Authors:
Gaojun Luo,
Martianus Frederic Ezerman,
Cem Güneri,
San Ling,
Ferruh Özbudak
Abstract:
The $b$-symbol metric is a generalization of the Hamming metric. Linear codes, in the $b$-symbol metric, have been used in the read channel whose outputs consist of $b$ consecutive symbols. The Griesmer bound outperforms the Singleton bound for $\mathbb{F}_q$-linear codes in the Hamming metric, when $q$ is fixed and the length is large enough. This scenario is also applicable in the $b$-symbol met…
▽ More
The $b$-symbol metric is a generalization of the Hamming metric. Linear codes, in the $b$-symbol metric, have been used in the read channel whose outputs consist of $b$ consecutive symbols. The Griesmer bound outperforms the Singleton bound for $\mathbb{F}_q$-linear codes in the Hamming metric, when $q$ is fixed and the length is large enough. This scenario is also applicable in the $b$-symbol metric. Shi, Zhu, and Helleseth recently made a conjecture on cyclic codes in the $b$-symbol metric. In this paper, we present the $b$-symbol Griesmer bound for linear codes by concatenating linear codes and simplex codes. Based on cyclic codes and extended cyclic codes, we propose two families of distance-optimal linear codes with respect to the $b$-symbol Griesmer bound.
△ Less
Submitted 10 January, 2024;
originally announced January 2024.
-
Bounds and Constructions of Quantum Locally Recoverable Codes from Quantum CSS Codes
Authors:
Gaojun Luo,
Bocong Chen,
Martianus Frederic Ezerman,
San Ling
Abstract:
Classical locally recoverable codes (LRCs) have become indispensable in distributed storage systems. They provide efficient recovery in terms of localized errors. Quantum LRCs have very recently been introduced for their potential application in quantum data storage. In this paper, we use classical LRCs to investigate quantum LRCs. We prove that the parameters of quantum LRCs are bounded by their…
▽ More
Classical locally recoverable codes (LRCs) have become indispensable in distributed storage systems. They provide efficient recovery in terms of localized errors. Quantum LRCs have very recently been introduced for their potential application in quantum data storage. In this paper, we use classical LRCs to investigate quantum LRCs. We prove that the parameters of quantum LRCs are bounded by their classical counterparts. We deduce the bounds on the parameters of quantum LRCs from the bounds on the parameters of the classical ones. We establish a characterization of optimal pure quantum LRCs based on classical codes with specific properties. Using well-crafted classical LRCs as ingredients in the construction of quantum CSS codes, we offer the first construction of several families of optimal pure quantum LRCs.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
Improved Spectral Bound for Quasi-Cyclic Codes
Authors:
Gaojun Luo,
Martianus Frederic Ezerman,
San Ling,
Buket Özkaya
Abstract:
Spectral bounds form a powerful tool to estimate the minimum distances of quasi-cyclic codes. They generalize the defining set bounds of cyclic codes to those of quasi-cyclic codes. Based on the eigenvalues of quasi-cyclic codes and the corresponding eigenspaces, we provide an improved spectral bound for quasi-cyclic codes. Numerical results verify that the improved bound outperforms the Jensen bo…
▽ More
Spectral bounds form a powerful tool to estimate the minimum distances of quasi-cyclic codes. They generalize the defining set bounds of cyclic codes to those of quasi-cyclic codes. Based on the eigenvalues of quasi-cyclic codes and the corresponding eigenspaces, we provide an improved spectral bound for quasi-cyclic codes. Numerical results verify that the improved bound outperforms the Jensen bound in almost all cases. Based on the improved bound, we propose a general construction of quasi-cyclic codes with excellent designed minimum distances. For the quasi-cyclic codes produced by this general construction, the improved spectral bound is always sharper than the Jensen bound.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
A Construction of Asymptotically Optimal Cascaded CDC Schemes via Combinatorial Designs
Authors:
Yingjie Cheng,
Gaojun Luo,
Xiwang Cao,
Martianus Frederic Ezerman,
San Ling
Abstract:
A coded distributed computing (CDC) system aims to reduce the communication load in the MapReduce framework. Such a system has $K$ nodes, $N$ input files, and $Q$ Reduce functions. Each input file is mapped by $r$ nodes and each Reduce function is computed by $s$ nodes. The objective is to achieve the maximum multicast gain. There are known CDC schemes that achieve optimal communication load. In s…
▽ More
A coded distributed computing (CDC) system aims to reduce the communication load in the MapReduce framework. Such a system has $K$ nodes, $N$ input files, and $Q$ Reduce functions. Each input file is mapped by $r$ nodes and each Reduce function is computed by $s$ nodes. The objective is to achieve the maximum multicast gain. There are known CDC schemes that achieve optimal communication load. In some prominent known schemes, however, $N$ and $Q$ grow too fast in terms of $K$, greatly reducing their gains in practical scenarios. To mitigate the situation, some asymptotically optimal cascaded CDC schemes with $r=s$ have been proposed by using symmetric designs. In this paper, we put forward new asymptotically optimal cascaded CDC schemes with $r=s$ by using $1$-designs. Compared with earlier schemes from symmetric designs, ours have much smaller computation loads while keeping the other relevant parameters the same. We also obtain new asymptotically optimal cascaded CDC schemes with more flexible parameters compared with previously best-performing schemes.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Sharper Asymptotically Optimal CDC Schemes via Combinatorial Designs
Authors:
Yingjie Cheng,
Gaojun Luo,
Xiwang Cao,
Martianus Frederic Ezerman,
San Ling
Abstract:
Coded distributed computing (CDC) was introduced to greatly reduce the communication load for MapReduce computing systems. Such a system has $K$ nodes, $N$ input files, and $Q$ Reduce functions. Each input file is mapped by $r$ nodes and each Reduce function is computed by $s$ nodes. The architecture must allow for coding techniques that achieve the maximum multicast gain. Some CDC schemes that ac…
▽ More
Coded distributed computing (CDC) was introduced to greatly reduce the communication load for MapReduce computing systems. Such a system has $K$ nodes, $N$ input files, and $Q$ Reduce functions. Each input file is mapped by $r$ nodes and each Reduce function is computed by $s$ nodes. The architecture must allow for coding techniques that achieve the maximum multicast gain. Some CDC schemes that achieve optimal communication load have been proposed before. The parameters $N$ and $Q$ in those schemes, however, grow too fast with respect to $K$ to be of great practical value. To improve the situation, researchers have come up with some asymptotically optimal cascaded CDC schemes with $s+r=K$ from symmetric designs.
In this paper, we propose new asymptotically optimal cascaded CDC schemes. Akin to known schemes, ours have $r+s=K$ and make use of symmetric designs as construction tools. Unlike previous schemes, ours have much smaller communication loads, given the same set of parameters $K$, $r$, $N$, and $Q$. We also expand the construction tools to include almost difference sets. Using them, we have managed to construct a new asymptotically optimal cascaded CDC scheme.
△ Less
Submitted 9 July, 2023;
originally announced July 2023.
-
How Much Entanglement Does a Quantum Code Need?
Authors:
Gaojun Luo,
Martianus Frederic Ezerman,
Markus Grassl,
San Ling
Abstract:
In the setting of entanglement-assisted quantum error-correcting codes (EAQECCs), the sender and the receiver have access to pre-shared entanglement. Such codes promise better information rates or improved error handling properties. Entanglement incurs costs and must be judiciously calibrated in designing quantum codes with good performance, relative to their deployment parameters.
Revisiting kn…
▽ More
In the setting of entanglement-assisted quantum error-correcting codes (EAQECCs), the sender and the receiver have access to pre-shared entanglement. Such codes promise better information rates or improved error handling properties. Entanglement incurs costs and must be judiciously calibrated in designing quantum codes with good performance, relative to their deployment parameters.
Revisiting known constructions, we devise tools from classical coding theory to better understand how the amount of entanglement can be varied. We present three new propagation rules and discuss how each of them affects the error handling. Tables listing the parameters of the best performing qubit and qutrit EAQECCs that we can explicitly construct are supplied for reference and comparison.
△ Less
Submitted 5 September, 2022; v1 submitted 12 July, 2022;
originally announced July 2022.
-
Entanglement-Assisted and Subsystem Quantum Codes: New Propagation Rules and Constructions
Authors:
Gaojun Luo,
Martianus Frederic Ezerman,
San Ling
Abstract:
This paper proposes new propagation rules on quantum codes in the entanglement-assisted and in quantum subsystem scenarios. The rules lead to new families of such quantum codes whose parameters are demonstrably optimal. To obtain the results, we devise tools to puncture and shorten codes in ways that ensure their Hermitian hulls have certain desirable properties. More specifically, we give a gener…
▽ More
This paper proposes new propagation rules on quantum codes in the entanglement-assisted and in quantum subsystem scenarios. The rules lead to new families of such quantum codes whose parameters are demonstrably optimal. To obtain the results, we devise tools to puncture and shorten codes in ways that ensure their Hermitian hulls have certain desirable properties. More specifically, we give a general framework to construct $k$-dimensional generalized Reed-Solomon codes whose Hermitian hulls are $(k-1)$-dimensional maximum distance separable codes.
△ Less
Submitted 20 June, 2022;
originally announced June 2022.
-
A New Approach to Determine the Minimal Polynomials of Binary Modified de Bruijn Sequences
Authors:
Musthofa,
Indah Emilia Wijayanti,
Diah Junia Eksi Palupi,
Martianus Frederic Ezerman
Abstract:
A binary modified de Bruijn sequence is an infinite and periodic binary sequence derived by removing a zero from the longest run of zeros in a binary de Bruijn sequence. The minimal polynomial of the modified sequence is its unique least-degree characteristic polynomial. Leveraging on a recent characterization, we devise a novel general approach to determine the minimal polynomial. We translate th…
▽ More
A binary modified de Bruijn sequence is an infinite and periodic binary sequence derived by removing a zero from the longest run of zeros in a binary de Bruijn sequence. The minimal polynomial of the modified sequence is its unique least-degree characteristic polynomial. Leveraging on a recent characterization, we devise a novel general approach to determine the minimal polynomial. We translate the characterization into a problem of identifying a Hamiltonian cycle in a specially constructed graph. Along the way, we demonstrate the usefullness of computational tools from the cycle joining method in the modified setup.
△ Less
Submitted 3 February, 2022;
originally announced February 2022.
-
New Interleaving Constructions of Asymptotically Optimal Periodic Quasi-Complementary Sequence Sets
Authors:
Gaojun Luo,
Martianus Frederic Ezerman,
San Ling
Abstract:
The correlation properties of sequences form a focal point in the design of multiple access systems of communications. Such a system must be able to serve a number of simultaneous users while keeping interference low. A popular choice for the set of sequences to deploy is the quasi-complementary sequence set (QCSS). Its large set size enables the system to accommodate a lot of users. The set has l…
▽ More
The correlation properties of sequences form a focal point in the design of multiple access systems of communications. Such a system must be able to serve a number of simultaneous users while keeping interference low. A popular choice for the set of sequences to deploy is the quasi-complementary sequence set (QCSS). Its large set size enables the system to accommodate a lot of users. The set has low nontrivial correlation magnitudes within a zone around the origin. This keeps undue interference among users under control. A QCSS performs better than the perfect complementary sequence set (PCSS) does in schemes with fractional delays.
The optimality of a set of periodic sequences is measured by its maximum periodic correlation magnitude, for which there is an established lower bound to aim at. For a fixed period, optimal sets are known only for very restricted parameters. Efforts have therefore been centered around the constructions of asymptotically optimal sets. Their periods are allowed to be as large as sufficient to establish optimality. In this paper we share an insight that a sequence set that asymptotically attains the Welch bound generates an asymptotically optimal periodic QCSS by interleaving. One can simply use known families of such sequence sets to construct the desired QCSSs. Seven families of QCSSs with specific parameters are shown as examples of this general construction. We build upon the insight to propose two new direct constructions of asymptotically optimal QCSSs with very flexible parameters without interleaving. The flexibility enhances their appeal for practical implementation. The mathematical tools come from the theory of groups in the form of additive and multiplicative characters of finite fields.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Three New Infinite Families of Optimal Locally Repairable Codes from Matrix-Product Codes
Authors:
Gaojun Luo,
Martianus Frederic Ezerman,
San Ling
Abstract:
Locally repairable codes have become a key instrument in large-scale distributed storage systems. This paper focuses on the construction of locally repairable codes with $(r,δ)$-locality that achieve the equality in the Singleton-type bound. We use matrix-product codes to propose two infinite families of $q$-ary optimal $(r,δ)$ locally repairable codes of lengths up to $q^2+q$. The ingredients in…
▽ More
Locally repairable codes have become a key instrument in large-scale distributed storage systems. This paper focuses on the construction of locally repairable codes with $(r,δ)$-locality that achieve the equality in the Singleton-type bound. We use matrix-product codes to propose two infinite families of $q$-ary optimal $(r,δ)$ locally repairable codes of lengths up to $q^2+q$. The ingredients in the matrix-product codes are either linear maximum distance separable codes or optimal locally repairable codes of small lengths. Further analysis and refinement yield a construction of another infinite family of optimal $(r,δ)$ locally repairable codes. The codes in this third family have unbounded lengths not divisible by $(r+δ-1)$.
The three families of optimal $(r,δ)$ locally repairable codes constructed here are new. Previously constructed codes in the literature have not covered the same sets of parameters. Our construction proposals are flexible since one can easily vary $r$ and $δ$ to come up with particular parameters that can suit numerous scenarios.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Two New Zero-Dimensional Qubit Codes from Bordered Metacirculant Construction
Authors:
Padmapani Seneviratne,
Martianus Frederic Ezerman
Abstract:
We construct qubit stabilizer codes with parameters $[[81, 0, 20]]$ and $[[94, 0, 22]]$ for the first time. We use symplectic self-dual additive codes over $\mathbb{F}_4$ built by modifying the adjacency matrices of suitable metacirculant graphs found by a randomized search procedure.
We construct qubit stabilizer codes with parameters $[[81, 0, 20]]$ and $[[94, 0, 22]]$ for the first time. We use symplectic self-dual additive codes over $\mathbb{F}_4$ built by modifying the adjacency matrices of suitable metacirculant graphs found by a randomized search procedure.
△ Less
Submitted 27 May, 2021;
originally announced May 2021.
-
Improved Quantum Codes from Metacirculant Graphs via Self-Dual Additive $\mathbb{F}_4$-Codes
Authors:
Padmapani Seneviratne,
Martianus Frederic Ezerman
Abstract:
We use symplectic self-dual additive codes over $\mathbb{F}_4$ obtained from metacirculant graphs to construct, for the first time, $[[\ell, 0, d ]]$ qubit codes with parameters $(\ell,d) \in \{(78, 20), (90, 21), (91, 22), (93,21),(96,21)\}$. Secondary constructions applied to the qubit codes result in many qubit codes that perform better than the previous best-known.
We use symplectic self-dual additive codes over $\mathbb{F}_4$ obtained from metacirculant graphs to construct, for the first time, $[[\ell, 0, d ]]$ qubit codes with parameters $(\ell,d) \in \{(78, 20), (90, 21), (91, 22), (93,21),(96,21)\}$. Secondary constructions applied to the qubit codes result in many qubit codes that perform better than the previous best-known.
△ Less
Submitted 26 May, 2021;
originally announced May 2021.
-
A Comparison of Distance Bounds for Quasi-Twisted Codes
Authors:
Martianus Frederic Ezerman,
John Mark Lampos,
San Ling,
Buket Ozkaya,
Jareena Tharnnukhroh
Abstract:
Spectral bounds on the minimum distance of quasi-twisted codes over finite fields are proposed, based on eigenvalues of polynomial matrices and the corresponding eigenspaces. They generalize the Semenov-Trifonov and Zeh-Ling bounds in a way similar to how the Roos and shift bounds extend the BCH and HT bounds for cyclic codes. The eigencodes of a quasi-twisted code in the spectral theory and the o…
▽ More
Spectral bounds on the minimum distance of quasi-twisted codes over finite fields are proposed, based on eigenvalues of polynomial matrices and the corresponding eigenspaces. They generalize the Semenov-Trifonov and Zeh-Ling bounds in a way similar to how the Roos and shift bounds extend the BCH and HT bounds for cyclic codes. The eigencodes of a quasi-twisted code in the spectral theory and the outer codes in its concatenated structure are related. A comparison based on this relation verifies that the Jensen bound always outperforms the spectral bound under special conditions, which yields a similar relation between the Lally and the spectral bounds. The performances of the Lally, Jensen and spectral bounds are presented in comparison with each other.
△ Less
Submitted 24 May, 2021; v1 submitted 18 December, 2020;
originally announced December 2020.
-
Quantum Error-Control Codes
Authors:
Martianus Frederic Ezerman
Abstract:
The article surveys quantum error control, focusing on quantum stabilizer codes, stressing on the how to use classical codes to design good quantum codes. It is to appear as a book chapter in "A Concise Encyclopedia of Coding Theory," edited by C. Huffman, P. Sole and J-L Kim, to be published by CRC Press.
The article surveys quantum error control, focusing on quantum stabilizer codes, stressing on the how to use classical codes to design good quantum codes. It is to appear as a book chapter in "A Concise Encyclopedia of Coding Theory," edited by C. Huffman, P. Sole and J-L Kim, to be published by CRC Press.
△ Less
Submitted 12 September, 2020;
originally announced September 2020.
-
A Graph Joining Greedy Approach to Binary de Bruijn Sequences
Authors:
Zuling Chang,
Martianus Frederic Ezerman,
Adamas Aqsa Fahreza,
Qiang Wang
Abstract:
Using greedy algorithms to generate de Bruijn sequences is a classical approach that has produced numerous interesting theoretical results. This paper investigates an algorithm which we call the Generalized Prefer-Opposite (GPO). It includes all prior greedy algorithms, with the exception of the Fleury Algorithm applied on the de Bruijn graph, as specific instances. The GPO Algorithm can produce a…
▽ More
Using greedy algorithms to generate de Bruijn sequences is a classical approach that has produced numerous interesting theoretical results. This paper investigates an algorithm which we call the Generalized Prefer-Opposite (GPO). It includes all prior greedy algorithms, with the exception of the Fleury Algorithm applied on the de Bruijn graph, as specific instances. The GPO Algorithm can produce any binary periodic sequences with nonlinear complexity at least two on input a pair of suitable feedback function and initial state. In particular, a sufficient and necessary condition for the GPO Algorithm to generate binary de Bruijn sequences is established. This requires the use of feedback functions with a unique cycle or loop in their respective state graphs. Moreover, we discuss modifications to the GPO Algorithm to handle more families of feedback functions whose state graphs have multiple cycles or loops. These culminate in a graph joining method. Several large classes of feedback functions are subsequently used to illustrate how the GPO Algorithm and its modification into the Graph Joining Prefer-Opposite (GJPO) Algorithm work in practice.
△ Less
Submitted 3 June, 2021; v1 submitted 21 April, 2020;
originally announced April 2020.
-
An Efficiently Generated Family of Binary de Bruijn Sequences
Authors:
Yunlong Zhu,
Zuling Chang,
Martianus Frederic Ezerman,
Qiang Wang
Abstract:
We study how to generate binary de Bruijn sequences efficiently from the class of simple linear feedback shift registers with feedback function $f(x_0, x_1, \ldots, x_{n-1}) = x_0 + x_1 + x_{n-1}$ for $n \geq 3$, using the cycle joining method. Based on the properties of this class of LFSRs, we propose two new generic successor rules, each of which produces at least $2^{n-3}$ de Bruijn sequences.…
▽ More
We study how to generate binary de Bruijn sequences efficiently from the class of simple linear feedback shift registers with feedback function $f(x_0, x_1, \ldots, x_{n-1}) = x_0 + x_1 + x_{n-1}$ for $n \geq 3$, using the cycle joining method. Based on the properties of this class of LFSRs, we propose two new generic successor rules, each of which produces at least $2^{n-3}$ de Bruijn sequences. These two classes build upon a framework proposed by Gabric, Sawada, Williams and Wong in Discrete Mathematics vol. 341, no. 11, pp. 2977--2987, November 2018. Here we introduce new useful choices for the uniquely determined state in each cycle to devise valid successor rules. These choices significantly increase the number of de Bruijn sequences that can be generated. In each class, the next bit costs $O(n)$ time and $O(n)$ space for a fixed $n$.
△ Less
Submitted 12 January, 2021; v1 submitted 20 March, 2020;
originally announced March 2020.
-
Patch-Based Holographic Image Sensing
Authors:
Alfred Marcel Bruckstein,
Martianus Frederic Ezerman,
Adamas Aqsa Fahreza,
San Ling
Abstract:
Holographic representations of data enable distributed storage with progressive refinement when the stored packets of data are made available in any arbitrary order. In this paper, we propose and test patch-based transform coding holographic sensing of image data. Our proposal is optimized for progressive recovery under random order of retrieval of the stored data. The coding of the image patches…
▽ More
Holographic representations of data enable distributed storage with progressive refinement when the stored packets of data are made available in any arbitrary order. In this paper, we propose and test patch-based transform coding holographic sensing of image data. Our proposal is optimized for progressive recovery under random order of retrieval of the stored data. The coding of the image patches relies on the design of distributed projections ensuring best image recovery, in terms of the $\ell_2$ norm, at each retrieval stage. The performance depends only on the number of data packets that has been retrieved thus far. Several possible options to enhance the quality of the recovery while changing the size and number of data packets are discussed and tested. This leads us to examine several interesting bit-allocation and rate-distortion trade offs, highlighted for a set of natural images with ensemble estimated statistical properties.
△ Less
Submitted 19 December, 2020; v1 submitted 9 February, 2020;
originally announced February 2020.
-
New Successor Rules to Efficiently Produce Exponentially Many Binary de Bruijn Sequences
Authors:
Zuling Chang,
Martianus Frederic Ezerman,
Pinhui Ke,
Qiang Wang
Abstract:
We put forward new general criteria to design successor rules that generate binary de Bruijn sequences. Prior fast algorithms based on successor rules in the literature are then shown to be special instances. We implemented the criteria to join the cycles generated by a number of simple feedback shift registers (FSRs) of order $n$. These include the pure cycling register (PCR) and the pure summing…
▽ More
We put forward new general criteria to design successor rules that generate binary de Bruijn sequences. Prior fast algorithms based on successor rules in the literature are then shown to be special instances. We implemented the criteria to join the cycles generated by a number of simple feedback shift registers (FSRs) of order $n$. These include the pure cycling register (PCR) and the pure summing register (PSR). For the PCR, we define a transitive relation on its cycles, based on their weights. We also extend the choices of conjugate states by using shift operations. For the PSR, we define three distinct transitive relations on its cycles, namely a run order, a necklace order, and a mixed order. Using the new orders, we propose numerous classes of successor rules. Each class efficiently generates a number, exponential in $n$, of binary de Bruijn sequences. Producing the next bit in each such sequence takes $O(n)$ memory and $O(n)$ time. We implemented computational routines to confirm the claims.
△ Less
Submitted 5 July, 2021; v1 submitted 15 November, 2019;
originally announced November 2019.
-
Provably Secure Group Signature Schemes from Code-Based Assumptions
Authors:
Martianus Frederic Ezerman,
Hyung Tae Lee,
San Ling,
Khoa Nguyen,
Huaxiong Wang
Abstract:
We solve an open question in code-based cryptography by introducing two provably secure group signature schemes from code-based assumptions. Our basic scheme satisfies the CPA-anonymity and traceability requirements in the random oracle model, assuming the hardness of the McEliece problem, the Learning Parity with Noise problem, and a variant of the Syndrome Decoding problem. The construction prod…
▽ More
We solve an open question in code-based cryptography by introducing two provably secure group signature schemes from code-based assumptions. Our basic scheme satisfies the CPA-anonymity and traceability requirements in the random oracle model, assuming the hardness of the McEliece problem, the Learning Parity with Noise problem, and a variant of the Syndrome Decoding problem. The construction produces smaller key and signature sizes than the previous group signature schemes from lattices, as long as the cardinality of the underlying group does not exceed $2^{24}$, which is roughly comparable to the current population of the Netherlands. We develop the basic scheme further to achieve the strongest anonymity notion, i.e., CCA-anonymity, with a small overhead in terms of efficiency. The feasibility of two proposed schemes is supported by implementation results. Our two schemes are the first in their respective classes of provably secure groups signature schemes. Additionally, the techniques introduced in this work might be of independent interest. These are a new verifiable encryption protocol for the randomized McEliece encryption and a novel approach to design formal security reductions from the Syndrome Decoding problem.
△ Less
Submitted 17 February, 2020; v1 submitted 10 September, 2019;
originally announced September 2019.
-
Spectral Bounds for Quasi-Twisted Codes
Authors:
Martianus Frederic Ezerman,
San Ling,
Buket Özkaya,
Jareena Tharnnukhroh
Abstract:
New lower bounds on the minimum distance of quasi-twisted codes over finite fields are proposed. They are based on spectral analysis and eigenvalues of polynomial matrices. They generalize the Semenov-Trifonov and Zeh-Ling bounds in a manner similar to how the Roos and shift bounds extend the BCH and HT bounds for cyclic codes.
New lower bounds on the minimum distance of quasi-twisted codes over finite fields are proposed. They are based on spectral analysis and eigenvalues of polynomial matrices. They generalize the Semenov-Trifonov and Zeh-Ling bounds in a manner similar to how the Roos and shift bounds extend the BCH and HT bounds for cyclic codes.
△ Less
Submitted 12 June, 2019;
originally announced June 2019.
-
Good Stabilizer Codes from Quasi-Cyclic Codes over $\mathbb{F}_4$ and $\mathbb{F}_9$
Authors:
Martianus Frederic Ezerman,
San Ling,
Buket Özkaya,
Patrick Solé
Abstract:
We apply quantum Construction X on quasi-cyclic codes with large Hermitian hulls over $\mathbb{F}_4$ and $\mathbb{F}_9$ to derive good qubit and qutrit stabilizer codes, respectively. In several occasions we obtain quantum codes with stricly improved parameters than the current record. In numerous other occasions we obtain quantum codes with best-known performance. For the qutrit ones we supply a…
▽ More
We apply quantum Construction X on quasi-cyclic codes with large Hermitian hulls over $\mathbb{F}_4$ and $\mathbb{F}_9$ to derive good qubit and qutrit stabilizer codes, respectively. In several occasions we obtain quantum codes with stricly improved parameters than the current record. In numerous other occasions we obtain quantum codes with best-known performance. For the qutrit ones we supply a systematic construction to fill some gaps in the literature.
△ Less
Submitted 12 June, 2019;
originally announced June 2019.
-
On Greedy Algorithms for Binary de Bruijn Sequences
Authors:
Zuling Chang,
Martianus Frederic Ezerman,
Adamas Aqsa Fahreza
Abstract:
We propose a general greedy algorithm for binary de Bruijn sequences, called Generalized Prefer-Opposite (GPO) Algorithm, and its modifications. By identifying specific feedback functions and initial states, we demonstrate that most previously-known greedy algorithms that generate binary de Bruijn sequences are particular cases of our new algorithm.
We propose a general greedy algorithm for binary de Bruijn sequences, called Generalized Prefer-Opposite (GPO) Algorithm, and its modifications. By identifying specific feedback functions and initial states, we demonstrate that most previously-known greedy algorithms that generate binary de Bruijn sequences are particular cases of our new algorithm.
△ Less
Submitted 21 January, 2020; v1 submitted 23 February, 2019;
originally announced February 2019.
-
Skew Cyclic Codes Over $\mathbb{F}_4 R$
Authors:
Nasreddine Benbelkacem,
Martianus Frederic Ezerman,
Taher Abualrub,
Aicha Batoul
Abstract:
This paper considers a new alphabet set, which is a ring that we call $\mathbb{F}_4R$, to construct linear error-control codes. Skew cyclic codes over the ring are then investigated in details. We define a nondegenerate inner product and provide a criteria to test for self-orthogonality. Results on the algebraic structures lead us to characterize $\mathbb{F}_4R$-skew cyclic codes. Interesting conn…
▽ More
This paper considers a new alphabet set, which is a ring that we call $\mathbb{F}_4R$, to construct linear error-control codes. Skew cyclic codes over the ring are then investigated in details. We define a nondegenerate inner product and provide a criteria to test for self-orthogonality. Results on the algebraic structures lead us to characterize $\mathbb{F}_4R$-skew cyclic codes. Interesting connections between the image of such codes under the Gray map to linear cyclic and skew-cyclic codes over $\mathbb{F}_4$ are shown. These allow us to learn about the relative dimension and distance profile of the resulting codes. Our setup provides a natural connection to DNA codes where additional biomolecular constraints must be incorporated into the design. We present a characterization of $R$-skew cyclic codes which are reversible complement.
△ Less
Submitted 27 December, 2018;
originally announced December 2018.
-
Holographic Sensing
Authors:
Alfred Marcel Bruckstein,
Martianus Frederic Ezerman,
Adamas Aqsa Fahreza,
San Ling
Abstract:
Holographic representations of data encode information in packets of equal importance that enable progressive recovery. The quality of recovered data improves as more and more packets become available. This progressive recovery of the information is independent of the order in which packets become available. Such representations are ideally suited for distributed storage and for the transmission o…
▽ More
Holographic representations of data encode information in packets of equal importance that enable progressive recovery. The quality of recovered data improves as more and more packets become available. This progressive recovery of the information is independent of the order in which packets become available. Such representations are ideally suited for distributed storage and for the transmission of data packets over networks with unpredictable delays and or erasures.
Several methods for holographic representations of signals and images have been proposed over the years and multiple description information theory also deals with such representations. Surprisingly, however, these methods had not been considered in the classical framework of optimal least-squares estimation theory, until very recently. We develop a least-squares approach to the design of holographic representation for stochastic data vectors, relying on the framework widely used in modeling signals and images.
△ Less
Submitted 28 July, 2018;
originally announced July 2018.
-
Binary de Bruijn Sequences via Zech's Logarithms
Authors:
Zuling Chang,
Martianus Frederic Ezerman,
Adamas Aqsa Fahreza,
San Ling,
Janusz Szmidt,
Huaxiong Wang
Abstract:
The focus of this work is to show how to combine Zech's logarithms and each of the cycle joining and cross-join pairing methods to construct binary de Bruijn sequences of any order. A basic implementation is supplied as a proof-of-concept.
The cycles, in the cycle joining method, are typically generated by a linear feedback shift register. We prove a crucial characterization that determining Zec…
▽ More
The focus of this work is to show how to combine Zech's logarithms and each of the cycle joining and cross-join pairing methods to construct binary de Bruijn sequences of any order. A basic implementation is supplied as a proof-of-concept.
The cycles, in the cycle joining method, are typically generated by a linear feedback shift register. We prove a crucial characterization that determining Zech's logarithms is equivalent to identifying conjugate pairs shared by any two distinct cycles. This speeds up the task of building a connected adjacency subgraph that contains all vertices of the complete adjacency graph. Distinct spanning trees in either graph correspond to cyclically inequivalent de Bruijn sequences. As the cycles are being joined, guided by the conjugate pairs, we track the changes in the feedback function. Certificates of star or almost-star spanning trees conveniently handle large order cases.
The characterization of conjugate pairs via Zech's logarithms, as positional markings, is then adapted to identify cross-join pairs. A modified $m$-sequence is initially used, for ease of generation. The process can be repeated on each of the resulting de Bruijn sequences. We show how to integrate an analytic tool, attributed to Fryers, in the process.
Most prior constructions in the literature measure the complexity of the corresponding bit-by-bit algorithms. Our approach is different. We aim first to build a connected adjacency subgraph that is certified to contain all of the cycles as vertices. The ingredients are computed just once and concisely stored. Simple strategies are offered to keep the complexities low as the order grows.
△ Less
Submitted 4 June, 2019; v1 submitted 8 May, 2017;
originally announced May 2017.
-
The Cycle Structure of LFSR with Arbitrary Characteristic Polynomial over Finite Fields
Authors:
Zuling Chang,
Martianus Frederic Ezerman,
San Ling,
Huaxiong Wang
Abstract:
We determine the cycle structure of linear feedback shift register with arbitrary monic characteristic polynomial over any finite field. For each cycle, a method to find a state and a new way to represent the state are proposed.
We determine the cycle structure of linear feedback shift register with arbitrary monic characteristic polynomial over any finite field. For each cycle, a method to find a state and a new way to represent the state are proposed.
△ Less
Submitted 23 December, 2016;
originally announced December 2016.
-
On Binary de Bruijn Sequences from LFSRs with Arbitrary Characteristic Polynomials
Authors:
Zuling Chang,
Martianus Frederic Ezerman,
San Ling,
Huaxiong Wang
Abstract:
We propose a construction of de Bruijn sequences by the cycle joining method from linear feedback shift registers (LFSRs) with arbitrary characteristic polynomial $f(x)$. We study in detail the cycle structure of the set $Ω(f(x))$ that contains all sequences produced by a specific LFSR on distinct inputs and provide a fast way to find a state of each cycle. This leads to an efficient algorithm to…
▽ More
We propose a construction of de Bruijn sequences by the cycle joining method from linear feedback shift registers (LFSRs) with arbitrary characteristic polynomial $f(x)$. We study in detail the cycle structure of the set $Ω(f(x))$ that contains all sequences produced by a specific LFSR on distinct inputs and provide a fast way to find a state of each cycle. This leads to an efficient algorithm to find all conjugate pairs between any two cycles, yielding the adjacency graph. The approach is practical to generate a large class of de Bruijn sequences up to order $n \approx 20$. Many previously proposed constructions of de Bruijn sequences are shown to be special cases of our construction.
△ Less
Submitted 8 June, 2018; v1 submitted 30 November, 2016;
originally announced November 2016.
-
Rates of DNA Sequence Profiles for Practical Values of Read Lengths
Authors:
Zuling Chang,
Johan Chrisnata,
Martianus Frederic Ezerman,
Han Mao Kiah
Abstract:
A recent study by one of the authors has demonstrated the importance of profile vectors in DNA-based data storage. We provide exact values and lower bounds on the number of profile vectors for finite values of alphabet size $q$, read length $\ell$, and word length $n$.Consequently, we demonstrate that for $q\ge 2$ and $n\le q^{\ell/2-1}$, the number of profile vectors is at least $q^{κn}$ with…
▽ More
A recent study by one of the authors has demonstrated the importance of profile vectors in DNA-based data storage. We provide exact values and lower bounds on the number of profile vectors for finite values of alphabet size $q$, read length $\ell$, and word length $n$.Consequently, we demonstrate that for $q\ge 2$ and $n\le q^{\ell/2-1}$, the number of profile vectors is at least $q^{κn}$ with $κ$ very close to one.In addition to enumeration results, we provide a set of efficient encoding and decoding algorithms for each of two particular families of profile vectors.
△ Less
Submitted 8 July, 2016;
originally announced July 2016.
-
Construction of de Bruijn Sequences from Product of Two Irreducible Polynomials
Authors:
Zuling Chang,
Martianus Frederic Ezerman,
San Ling,
Huaxiong Wang
Abstract:
We study a class of Linear Feedback Shift Registers (LFSRs) with characteristic polynomial $f(x)=p(x)q(x)$ where $p(x)$ and $q(x)$ are distinct irreducible polynomials in $\F_2[x]$. Important properties of the LFSRs, such as the cycle structure and the adjacency graph, are derived. A method to determine a state belonging to each cycle and a generic algorithm to find all conjugate pairs shared by a…
▽ More
We study a class of Linear Feedback Shift Registers (LFSRs) with characteristic polynomial $f(x)=p(x)q(x)$ where $p(x)$ and $q(x)$ are distinct irreducible polynomials in $\F_2[x]$. Important properties of the LFSRs, such as the cycle structure and the adjacency graph, are derived. A method to determine a state belonging to each cycle and a generic algorithm to find all conjugate pairs shared by any pair of cycles are given. The process explicitly determines the edges and their labels in the adjacency graph. The results are then combined with the cycle joining method to efficiently construct a new class of de Bruijn sequences. An estimate of the number of resulting sequences is given. In some cases, using cyclotomic numbers, we can determine the number exactly.
△ Less
Submitted 13 September, 2016; v1 submitted 15 April, 2016;
originally announced April 2016.
-
Xing-Ling Codes, Duals of their Subcodes, and Good Asymmetric Quantum Codes
Authors:
Martianus Frederic Ezerman,
Somphong Jitman,
Patrick Solé
Abstract:
A class of powerful $q$-ary linear polynomial codes originally proposed by Xing and Ling is deployed to construct good asymmetric quantum codes via the standard CSS construction. Our quantum codes are $q$-ary block codes that encode $k$ qudits of quantum information into $n$ qudits and correct up to $\flr{(d_{x}-1)/2}$ bit-flip errors and up to $\flr{(d_{z}-1)/2}$ phase-flip errors.. In many cases…
▽ More
A class of powerful $q$-ary linear polynomial codes originally proposed by Xing and Ling is deployed to construct good asymmetric quantum codes via the standard CSS construction. Our quantum codes are $q$-ary block codes that encode $k$ qudits of quantum information into $n$ qudits and correct up to $\flr{(d_{x}-1)/2}$ bit-flip errors and up to $\flr{(d_{z}-1)/2}$ phase-flip errors.. In many cases where the length $(q^{2}-q)/2 \leq n \leq (q^{2}+q)/2$ and the field size $q$ are fixed and for chosen values of $d_{x} \in \{2,3,4,5\}$ and $d_{z} \ge δ$, where $δ$ is the designed distance of the Xing-Ling (XL) codes, the derived pure $q$-ary asymmetric quantum CSS codes possess the best possible size given the current state of the art knowledge on the best classical linear block codes.
△ Less
Submitted 27 September, 2013; v1 submitted 17 July, 2013;
originally announced July 2013.
-
CSS-like Constructions of Asymmetric Quantum Codes
Authors:
Martianus Frederic Ezerman,
Somphong Jitman,
San Ling,
Dmitrii V. Pasechnik
Abstract:
Asymmetric quantum error-correcting codes (AQCs) may offer some advantage over their symmetric counterparts by providing better error-correction for the more frequent error types. The well-known CSS construction of $q$-ary AQCs is extended by removing the $\F_{q}$-linearity requirement as well as the limitation on the type of inner product used. The proposed constructions are called CSS-like const…
▽ More
Asymmetric quantum error-correcting codes (AQCs) may offer some advantage over their symmetric counterparts by providing better error-correction for the more frequent error types. The well-known CSS construction of $q$-ary AQCs is extended by removing the $\F_{q}$-linearity requirement as well as the limitation on the type of inner product used. The proposed constructions are called CSS-like constructions and utilize pairs of nested subfield linear codes under one of the Euclidean, trace Euclidean, Hermitian, and trace Hermitian inner products.
After establishing some theoretical foundations, best-performing CSS-like AQCs are constructed. Combining some constructions of nested pairs of classical codes and linear programming, many optimal and good pure $q$-ary CSS-like codes for $q \in {2,3,4,5,7,8,9}$ up to reasonable lengths are found. In many instances, removing the $\F_{q}$-linearity and using alternative inner products give us pure AQCs with improved parameters than relying solely on the standard CSS construction.
△ Less
Submitted 3 July, 2013; v1 submitted 27 July, 2012;
originally announced July 2012.
-
Nonbinary Quantum Codes from Two-Point Divisors on Hermitian Curves
Authors:
Martianu Frederic Ezerman,
Radoslav Kirov
Abstract:
Sarvepalli and Klappenecker showed how classical one-point codes on the Hermitian curve can be used to construct quantum codes. Homma and Kim determined the parameters of a larger family of codes, the two-point codes. In quantum error-correction, the observed presence of asymmetry in some quantum channels led to the study of asymmetric quantum codes (AQECCs) where we no longer assume that the diff…
▽ More
Sarvepalli and Klappenecker showed how classical one-point codes on the Hermitian curve can be used to construct quantum codes. Homma and Kim determined the parameters of a larger family of codes, the two-point codes. In quantum error-correction, the observed presence of asymmetry in some quantum channels led to the study of asymmetric quantum codes (AQECCs) where we no longer assume that the different types of errors are equiprobable. This paper considers quantum codes constructed from the two-point codes. In the asymmetric case, we show strict improvements over all possible finite fields for a range of designed distances. We produce large dimension pure AQECC and small dimension impure AQECC that have better parameters than AQECC from one-point codes. Numerical results for the Hermitian curves over F16 and F64 are used to illustrate the gain.
△ Less
Submitted 17 February, 2011;
originally announced February 2011.
-
Pure Asymmetric Quantum MDS Codes from CSS Construction: A Complete Characterization
Authors:
Martianus Frederic Ezerman,
Somphong Jitman,
Han Mao Kiah,
San Ling
Abstract:
Using the Calderbank-Shor-Steane (CSS) construction, pure $q$-ary asymmetric quantum error-correcting codes attaining the quantum Singleton bound are constructed. Such codes are called pure CSS asymmetric quantum maximum distance separable (AQMDS) codes. Assuming the validity of the classical MDS Conjecture, pure CSS AQMDS codes of all possible parameters are accounted for.
Using the Calderbank-Shor-Steane (CSS) construction, pure $q$-ary asymmetric quantum error-correcting codes attaining the quantum Singleton bound are constructed. Such codes are called pure CSS asymmetric quantum maximum distance separable (AQMDS) codes. Assuming the validity of the classical MDS Conjecture, pure CSS AQMDS codes of all possible parameters are accounted for.
△ Less
Submitted 14 May, 2013; v1 submitted 8 June, 2010;
originally announced June 2010.
-
From Skew-Cyclic Codes to Asymmetric Quantum Codes
Authors:
Martianus Frederic Ezerman,
San Ling,
Patrick Sole,
Olfa Yemen
Abstract:
We introduce an additive but not $\mathbb{F}_4$-linear map $S$ from $\mathbb{F}_4^{n}$ to $\mathbb{F}_4^{2n}$ and exhibit some of its interesting structural properties. If $C$ is a linear $[n,k,d]_4$-code, then $S(C)$ is an additive $(2n,2^{2k},2d)_4$-code. If $C$ is an additive cyclic code then $S(C)$ is an additive quasi-cyclic code of index $2$. Moreover, if $C$ is a module $θ$-cyclic code, a r…
▽ More
We introduce an additive but not $\mathbb{F}_4$-linear map $S$ from $\mathbb{F}_4^{n}$ to $\mathbb{F}_4^{2n}$ and exhibit some of its interesting structural properties. If $C$ is a linear $[n,k,d]_4$-code, then $S(C)$ is an additive $(2n,2^{2k},2d)_4$-code. If $C$ is an additive cyclic code then $S(C)$ is an additive quasi-cyclic code of index $2$. Moreover, if $C$ is a module $θ$-cyclic code, a recently introduced type of code which will be explained below, then $S(C)$ is equivalent to an additive cyclic code if $n$ is odd and to an additive quasi-cyclic code of index $2$ if $n$ is even. Given any $(n,M,d)_4$-code $C$, the code $S(C)$ is self-orthogonal under the trace Hermitian inner product. Since the mapping $S$ preserves nestedness, it can be used as a tool in constructing additive asymmetric quantum codes.
△ Less
Submitted 5 May, 2010;
originally announced May 2010.
-
Additive Asymmetric Quantum Codes
Authors:
Martianus Frederic Ezerman,
San Ling,
Patrick Sole
Abstract:
We present a general construction of asymmetric quantum codes based on additive codes under the trace Hermitian inner product. Various families of additive codes over $\F_{4}$ are used in the construction of many asymmetric quantum codes over $\F_{4}$.
We present a general construction of asymmetric quantum codes based on additive codes under the trace Hermitian inner product. Various families of additive codes over $\F_{4}$ are used in the construction of many asymmetric quantum codes over $\F_{4}$.
△ Less
Submitted 29 March, 2011; v1 submitted 22 February, 2010;
originally announced February 2010.
-
The Weights in MDS Codes
Authors:
Martianus Frederic Ezerman,
Markus Grassl,
Patrick Sole
Abstract:
The weights in MDS codes of length n and dimension k over the finite field GF(q) are studied. Up to some explicit exceptional cases, the MDS codes with parameters given by the MDS conjecture are shown to contain all k weights in the range n-k+1 to n. The proof uses the covering radius of the dual code
The weights in MDS codes of length n and dimension k over the finite field GF(q) are studied. Up to some explicit exceptional cases, the MDS codes with parameters given by the MDS conjecture are shown to contain all k weights in the range n-k+1 to n. The proof uses the covering radius of the dual code
△ Less
Submitted 30 July, 2010; v1 submitted 12 August, 2009;
originally announced August 2009.