Skip to main content

Showing 1–21 of 21 results for author: Weger, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.17801  [pdf, ps, other

    cs.IT

    Weighted-Hamming Metric for Parallel Channels

    Authors: Sebastian Bitzer, Alberto Ravagnani, Violetta Weger

    Abstract: Independent parallel q-ary symmetric channels are a suitable transmission model for several applications. The proposed weighted-Hamming metric is tailored to this setting and enables optimal decoding performance. We show that some weighted-Hamming-metric codes exhibit the unusual property that all errors beyond half the minimum distance can be corrected. Nevertheless, a tight relation between the… ▽ More

    Submitted 15 February, 2024; v1 submitted 31 January, 2024; originally announced January 2024.

    Comments: Minor update with additional citations of weighted-Hamming-metric code constructions

  2. arXiv:2307.06079  [pdf, ps, other

    cs.IT cs.DM

    Better bounds on the minimal Lee distance

    Authors: Jessica Bariffi, Violetta Weger

    Abstract: This paper provides new and improved Singleton-like bounds for Lee metric codes over integer residue rings. We derive the bounds using various novel definitions of generalized Lee weights based on different notions of a support of a linear code. In this regard, we introduce three main different support types for codes in the Lee metric and analyze their utility to derive bounds on the minimum Lee… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

  3. arXiv:2305.05763  [pdf, ps, other

    cs.IT cs.DM cs.DS

    On the Number of $t$-Lee-Error-Correcting Codes

    Authors: Nadja Willenborg, Anna-Lena Horlemann, Violetta Weger

    Abstract: We consider $t$-Lee-error-correcting codes of length $n$ over the residue ring $\mathbb{Z}_m := \mathbb{Z}/m\mathbb{Z}$ and determine upper and lower bounds on the number of $t$-Lee-error-correcting codes. We use two different methods, namely estimating isolated nodes on bipartite graphs and the graph container method. The former gives density results for codes of fixed size and the latter for any… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

  4. arXiv:2303.08882  [pdf, ps, other

    cs.CR cs.IT

    Generic Decoding of Restricted Errors

    Authors: Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, Violetta Weger

    Abstract: Several recently proposed code-based cryptosystems base their security on a slightly generalized version of the classical (syndrome) decoding problem. Namely, in the so-called restricted (syndrome) decoding problem, the error values stem from a restricted set. In this paper, we propose new generic decoders, that are inspired by subset sum solvers and tailored to the new setting. The introduced alg… ▽ More

    Submitted 8 June, 2023; v1 submitted 15 March, 2023; originally announced March 2023.

  5. arXiv:2212.09568  [pdf, ps, other

    cs.IT

    On the Density of Codes over Finite Chain Rings

    Authors: Anna-Lena Horlemann, Violetta Weger, Nadja Willenborg

    Abstract: We determine the asymptotic proportion of free modules over finite chain rings with good distance properties and treat the asymptotics in the code length n and the residue field size q separately. We then specialize and apply our technique to rank metric codes and to Hamming metric codes.

    Submitted 19 December, 2022; originally announced December 2022.

  6. The Subfield Metric and its Application to Quantum Error Correction

    Authors: Markus Grassl, Anna-Lena Horlemann, Violetta Weger

    Abstract: We introduce a new weight and corresponding metric over finite extension fields for asymmetric error correction. The weight distinguishes between elements from the base field and the ones outside of it, which is motivated by asymmetric quantum codes. We set up the theoretic framework for this weight and metric, including upper and lower bounds, asymptotic behavior of random codes, and we show the… ▽ More

    Submitted 23 May, 2024; v1 submitted 1 December, 2022; originally announced December 2022.

    Journal ref: Journal of Algebra and Its Applications Vol. 23, No. 7 (2024) 2550063

  7. arXiv:2205.14068  [pdf, other

    cs.IT cs.CR

    Interleaved Prange: A New Generic Decoder for Interleaved Codes

    Authors: Anmoal Porwal, Lukas Holzbaur, Hedongliang Liu, Julian Renner, Antonia Wachter-Zeh, Violetta Weger

    Abstract: Due to the recent challenges in post-quantum cryptography, several new approaches for code-based cryptography have been proposed. For example, a variant of the McEliece cryptosystem based on interleaved codes was proposed. In order to deem such new settings secure, we first need to understand and analyze the complexity of the underlying problem, in this case the problem of decoding a random interl… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

  8. arXiv:2205.12903  [pdf, ps, other

    cs.IT cs.CR

    Information Set Decoding for Lee-Metric Codes using Restricted Balls

    Authors: Jessica Bariffi, Karan Khathuria, Violetta Weger

    Abstract: The Lee metric syndrome decoding problem is an NP-hard problem and several generic decoders have been proposed. The observation that such decoders come with a larger cost than their Hamming metric counterparts make the Lee metric a promising alternative for classical code-based cryptography. Unlike in the Hamming metric, an error vector that is chosen uniform at random of a given Lee weight is exp… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

  9. arXiv:2205.12738  [pdf, ps, other

    cs.IT cs.CR

    Generic Decoding in the Cover Metric

    Authors: Sebastian Bitzer, Julian Renner, Antonia Wachter-Zeh, Violetta Weger

    Abstract: In this paper, we study the hardness of decoding a random code endowed with the cover metric. As the cover metric lies in between the Hamming and rank metric, it presents itself as a promising candidate for code-based cryptography. We give a polynomial-time reduction from the classical Hamming-metric decoding problem, which proves the NP-hardness of the decoding problem in the cover metric. We the… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

    MSC Class: 11T71; 94B35

  10. arXiv:2201.07119  [pdf, ps, other

    cs.CR cs.IT

    A Survey on Code-Based Cryptography

    Authors: Violetta Weger, Niklas Gassner, Joachim Rosenthal

    Abstract: The improvements on quantum technology are threatening our daily cybersecurity, as a capable quantum computer can break all currently employed asymmetric cryptosystems. In preparation for the quantum-era the National Institute of Standards and Technology (NIST) has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-encapsulation mechanisms (KEM) and digital si… ▽ More

    Submitted 1 February, 2024; v1 submitted 18 January, 2022; originally announced January 2022.

    Comments: This book chapter is a part of the Springer Lecture Notes in Mathematics: Coding Theory and Applications V, Applications of Coding Theory in Quantum Computing and Cryptography

  11. arXiv:2112.06635  [pdf, ps, other

    cs.IT

    Bounds in the Lee Metric and Optimal Codes

    Authors: Eimear Byrne, Violetta Weger

    Abstract: In this paper we investigate known Singleton-like bounds in the Lee metric and characterize optimal codes, which turn out to be very few. We then focus on Plotkin-like bounds in the Lee metric and present a new bound that extends and refines a previously known, and out-performs it in the case of non-free codes. We then compute the density of optimal codes with regard to the new bound. Finally we f… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    MSC Class: 94B05; 94B65

  12. arXiv:2106.09403  [pdf, ps, other

    cs.IT math.CO

    Density of Free Modules over Finite Chain Rings

    Authors: Eimear Byrne, Anna-Lena Horlemann, Karan Khathuria, Violetta Weger

    Abstract: In this paper we focus on modules over a finite chain ring $\mathcal{R}$ of size $q^s$. We compute the density of free modules of $\mathcal{R}^n$, where we separately treat the asymptotics in $n,q$ and $s$. In particular, we focus on two cases: one where we fix the length of the module and one where we fix the rank of the module. In both cases, the density results can be bounded by the Andrews-Gor… ▽ More

    Submitted 8 February, 2022; v1 submitted 17 June, 2021; originally announced June 2021.

    MSC Class: 13C10; 11T71; 11P84

  13. arXiv:2103.07749  [pdf, ps, other

    cs.IT

    On Bounds for Ring-Based Coding Theory

    Authors: Niklas Gassner, Marcus Greferath, Joachim Rosenthal, Violetta Weger

    Abstract: Coding Theory where the alphabet is identified with the elements of a ring or a module has become an important research topic over the last 30 years. Such codes over rings had important applications and many interesting mathematical problems are related to this line of research. It has been well established, that with the generalization of the algebraic structure to rings there is a need to also… ▽ More

    Submitted 16 March, 2021; v1 submitted 13 March, 2021; originally announced March 2021.

  14. arXiv:2008.06417  [pdf, ps, other

    cs.IT

    On single server private information retrieval in a coding theory perspective

    Authors: Gianira N. Alfarano, Karan Khathuria, Violetta Weger

    Abstract: In this paper, we present a new perspective of single server private information retrieval (PIR) schemes by using the notion of linear error-correcting codes. Many of the known single server schemes are based on taking linear combinations between database elements and the query elements. Using the theory of linear codes, we develop a generic framework that formalizes all such PIR schemes. Further,… ▽ More

    Submitted 14 August, 2020; originally announced August 2020.

    MSC Class: 68P20; 94B99

  15. arXiv:2008.06403  [pdf, ps, other

    cs.CR cs.IT

    A New Path to Code-based Signatures via Identification Schemes with Restricted Errors

    Authors: Marco Baldi, Massimo Battaglioni, Franco Chiaraluce, Anna-Lena Horlemann-Trautmann, Edoardo Persichetti, Paolo Santini, Violetta Weger

    Abstract: In this paper we introduce a variant of the Syndrome Decoding Problem (SDP), that we call Restricted SDP (R-SDP), in which the entries of the searched vector are defined over a subset of the underlying finite field. We prove the NP-completeness of R-SDP, via a reduction from the classical SDP, and describe algorithms which solve such new problem. We study the properties of random codes under this… ▽ More

    Submitted 30 January, 2021; v1 submitted 14 August, 2020; originally announced August 2020.

  16. arXiv:2002.12785  [pdf, other

    cs.IT cs.CR

    On the Hardness of the Lee Syndrome Decoding Problem

    Authors: Violetta Weger, Karan Khathuria, Anna-Lena Horlemann, Massimo Battaglioni, Paolo Santini, Edoardo Persichetti

    Abstract: In this paper we study the hardness of the syndrome decoding problem over finite rings endowed with the Lee metric. We first prove that the decisional version of the problem is NP-complete, by a reduction from the $3$-dimensional matching problem. Then, we study the complexity of solving the problem, by translating the best known solvers in the Hamming metric over finite fields to the Lee metric o… ▽ More

    Submitted 1 April, 2022; v1 submitted 27 February, 2020; originally announced February 2020.

    Comments: Part of this work appeared as preliminary results in arXiv:2001.08425

  17. arXiv:2001.08425   

    cs.CR cs.IT

    Information set decoding of Lee-metric codes over finite rings

    Authors: Violetta Weger, Massimo Battaglioni, Paolo Santini, Franco Chiaraluce, Marco Baldi, Edoardo Persichetti

    Abstract: Information set decoding (ISD) algorithms are the best known procedures to solve the decoding problem for general linear codes. These algorithms are hence used for codes without a visible structure, or for which efficient decoders exploiting the code structure are not known. Classically, ISD algorithms have been studied for codes in the Hamming metric. In this paper we switch from the Hamming metr… ▽ More

    Submitted 18 February, 2021; v1 submitted 23 January, 2020; originally announced January 2020.

    Comments: This is a preliminary result, which we have included in a new paper with new authors and thus not considered it as a replacement

  18. Encryption Scheme Based on Expanded Reed-Solomon Codes

    Authors: Karan Khathuria, Joachim Rosenthal, Violetta Weger

    Abstract: We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it by considering its shortened expanded code over the base field. Considering shortened expanded codes provides a safeguard against distinguisher attacks based on the Schur product. Moreover, without using a cyclic or a quasi-cyclic structure we obtain a key siz… ▽ More

    Submitted 26 November, 2019; v1 submitted 3 June, 2019; originally announced June 2019.

    MSC Class: 14G50; 94A60; 11T71

  19. arXiv:1903.07692  [pdf, ps, other

    cs.CR

    Information Set Decoding in the Lee Metric with Applications to Cryptography

    Authors: Anna-Lena Horlemann-Trautmann, Violetta Weger

    Abstract: We convert Stern's information set decoding (ISD) algorithm to the ring $\mathbb{Z}/4 \mathbb{Z}$ equipped with the Lee metric. Moreover, we set up the general framework for a McEliece and a Niederreiter cryptosystem over this ring. The complexity of the ISD algorithm determines the minimum key size in these cryptosystems for a given security level. We show that using Lee metric codes can drastica… ▽ More

    Submitted 27 April, 2020; v1 submitted 18 March, 2019; originally announced March 2019.

  20. arXiv:1812.10955  [pdf, ps, other

    cs.IT cs.CR

    Generalization of the Ball-Collision Algorithm

    Authors: Carmelo Interlando, Karan Khathuria, Nicole Rohrer, Joachim Rosenthal, Violetta Weger

    Abstract: In this paper we generalize the Ball-Collision Algorithm by Bernstein, Lange, Peters from the binary field to a general finite field. We also provide a complexity analysis and compare the asymptotic complexity to other generalized information set decoding algorithms.

    Submitted 28 December, 2018; originally announced December 2018.

  21. On the algebraic structure of $E_p^{(m)}$ and applications to cryptography

    Authors: Karan Khathuria, Giacomo Micheli, Violetta Weger

    Abstract: In this paper we show that the $\mathbb Z/p^{m}\mathbb Z$-module structure of the ring $E_p^{(m)}$ is isomorphic to a $\mathbb Z/p^{m}\mathbb Z$-submodule of the matrix ring over $\mathbb Z/p^{m}\mathbb Z$. Using this intrinsic structure of $E_p^{(m)}$, solving a linear system over $E_p^{(m)}$ becomes computationally equivalent to solving a linear system over $\mathbb Z/p^{m}\mathbb Z$. As an appl… ▽ More

    Submitted 14 December, 2019; v1 submitted 6 October, 2018; originally announced October 2018.

    Comments: To appear in Applicable Algebra in Engineering, Communication and Computing