On nested code pairs from the Hermitian curve

https://doi.org/10.1016/j.ffa.2020.101742Get rights and content

Abstract

Nested code pairs play a crucial role in the construction of ramp secret sharing schemes [15] and in the CSS construction of quantum codes [14]. The important parameters are (1) the codimension, (2) the relative minimum distance of the codes, and (3) the relative minimum distance of the dual set of codes. Given values for two of them, one aims at finding a set of nested codes having parameters with these values and with the remaining parameter being as large as possible. In this work we study nested codes from the Hermitian curve. For not too small codimension, we present improved constructions and provide closed formula estimates on their performance. For small codimension we show how to choose pairs of one-point algebraic geometric codes in such a way that one of the relative minimum distances is larger than the corresponding non-relative minimum distance.

Introduction

In this paper we study improved constructions of nested code pairs from the Hermitian curve. Here the phrase ‘improved construction’ refers to optimizing those parameters important for the corresponding linear ramp secret sharing schemes as well as stabilizer asymmetric quantum codes. Our work is a natural continuation of [7], where improved constructions of nested code pairs were defined from Cartesian product point sets. The analysis in the present paper includes a closed formula estimate on the dimension of order bound improved Hermitian codes, which is of interest in its own right, i.e. also without the above mentioned applications.

A linear ramp secret sharing scheme is a cryptographic method to encode a secret message in Fq into n shares from Fq. These shares are then distributed among a group of n parties and only specified subgroups are able to reconstruct the secret. A secret sharing scheme is characterized by its privacy number t and its reconstruction number r. The first is defined as the largest number such that no subgroup of this size can obtain any information on the secret. The second is defined to be the smallest number such that any subgroup of this size can reconstruct the entire secret. A linear ramp secret sharing scheme can be understood as the following coset construction. Consider linear codes C2C1Fqn. Let {b1,,bk2} be a basis for C2 and extend it to a basis {b1,,bk2,bk2+1,,bk2+} for C1. Here, of course, is the codimension of C1 and C2. Choose elements a1,,ak2 uniformly and independent at random and encode the secret s=(s1,,s) as the codeword c=(c1,,cn)=a1b1++ak2bk2+s1bk2+1++sbk2+. Then use c1,,cn as the shares. The crucial parameters for the construction are the codimension of the pair of nested codes and their relative minimum distances d(C1,C2) and d(C2,C1). Recall that these are defined asd(C1,C2)=min{wH(c)|cC1\C2} and similar for the dual codes. The following well-known theorem (see for instance [15]) shows how to determine the privacy number and the reconstruction number.

Theorem 1

Given Fq-linear codes C2C1 of length n and codimension ℓ, the corresponding ramp secret sharing scheme encodes secrets sFq into a set of n shares from Fq. The privacy number equals t=d(C2,C1)1, and the reconstruction number is r=nd(C1,C2)+1.

A linear q-ary asymmetric quantum error-correcting code is a qk dimensional subspace of the Hilbert space Cqn where error bases are defined by unitary operators Z and X, the first representing phase-shift errors, and the second representing bit-flip errors [2], [21], [14]. In [13] it was identified that in some realistic models phase-shift errors occur more frequently than bit-flip errors, and the asymmetric codes were therefore introduced [13], [19], [5], [16], [25] to balance the error correcting ability accordingly. For such codes we write the set of parameters as [[n,k,dz/dx]]q where dz is the minimum distance related to phase-shift errors and dx is the minimum distance related to bit-flip errors. The CSS construction transforms a pair of nested classical linear codes C2C1Fqn into an asymmetric quantum code. From [19] we have

Theorem 2

Consider linear codes C2C1Fqn. Then the corresponding asymmetric quantum code defined using the CSS construction has parameters[[n,=dimC1dimC2,dz/dx]]q where dz=d(C1,C2) and dx=d(C2,C1).

Quantum codes with d(C1,C2)>d(C1) or d(C2,C1)>d(C2) are called impure, and they are desirable due to the fact that one can take advantage of this property in connection with the error-correction. More precisely, one can tolerate (d(C1,C2)1)/2 phase-shift errors and (d(C2,C1)1)/2 bit-flip errors, respectively, but in the decoding algorithms it is only necessary to correct up to (d(C1)1)/2 and (d(C2)1)/2 errors, respectively. Despite this observation, only few impure codes have been presented in the literature.

With the above two applications in mind, the challenge is to find nested codes C2C1 such that two of the parameters , d(C1,C2), d(C2,C1) attain given prescribed values, and the remaining parameter is as large as possible. In this paper we analyse two good constructions from the Hermitian function field. In the first we consider code pairs such that C1 is an order bound improved primary code [1], [10] and such that C2 is the dual of an order bound improved dual code [12]. Considering in this case the minimum distances rather than the relative distances is no restriction due to the optimized choice of codes – the minimum distances d(C1) and d(C2) being so good that there is essentially no room for d(C1,C2)>d(C1) or d(C2,C1)>d(C2) to hold. For this construction to work, the codimension cannot be very small. For small codimension when d(C1) and d(C2) are far from each other we then show how to choose ordinary one-point algebraic geometric codes such that one of the relative distances becomes larger than the corresponding ordinary minimum distance. In particular, this construction leads to impure asymmetric quantum codes.

The paper is organized as follows. In Section 2 we collect material from the literature on how to determine parameters of primary and dual codes coming from the Hermitian curve, and we introduce the order bound improved codes.1 In Section 3 we establish closed formula lower bounds on the dimension of order bound improved Hermitian codes of any designed minimum distance. We then continue in Section 4 by determining the pairs (δ1, δ2){1,,n}×{1,,n} for which the order bound improved primary code C1 of designed distance δ1 contains C2, the dual of an order bound improved dual code of designed distance δ2. This and the information from Section 3 is then translated into information on improved nested code pairs of not too small codimension in Section 5. Next, in Section 6 we determine parameters of nested one-point algebraic geometric code pairs of small codimension for which one of the relative distances is larger than the non-relative. Finally, in Section 7 samples of the given constructions are compared with known asymmetric quantum codes, with existence bounds on asymmetric quantum codes, and with non-existence bounds on linear ramp secret sharing schemes. Section 8 is the conclusion.

Section snippets

Hermitian codes and their parameters

Given an algebraic function field over a finite field, let =P1,,Pn,Q be rational places. By H(Q) we denote the Weierstrass semigroup of Q, and we writeH(Q)={λH(Q)|CL(D,λQ)CL(D,(λ1)Q)} where D=P1++Pn. Recall that the dual code of CL(D,λQ) is written CΩ(D,λQ). The order bound [12], [4] then tells us that ifcCΩ(D,(λ1)Q)\CΩ(D,λQ) (which can only happen if λH(Q)), then the Hamming weight of c satisfieswH(c)μ(λ) whereμ(λ)=#{ηH(Q)|ληH(Q)}. The similar bound for the primary case [8],

The dimension of improved codes

As explained in the previous section, the dimension of E˜(δ) can be determined from well-known methods as long as δ>q2q. In this section we present closed formula lower bounds on the dimension in the remaining cases. We start with an important lemma.

Lemma 6

Let δq2. The number of integer points(x,y){q2q,,q21}×{0,,q1} with (q2x)(qy)δ is at leastq2δ+δln(q2/δ). If δ<q, then the number of integer points is at leastq2δ+δln(δ), which is stronger than (10).

Proof

The number of integer points in

Inclusion of improved codes

As already mentioned our first construction of improved nested code pairs consists of choosing C˜(δ2) and E˜(δ1) such that C˜(δ2)E˜(δ1). To treat this construction we therefore need a clear picture of the pairs (δ1,δ2) of minimum distances that imply this inclusion. We establish this in the present section. As it turns out, the formulas for σ and μ given in Proposition 3 mean that several cases must be considered, and each case is presented as a separate proposition.

In the following,

Improved nested codes of not too small codimension

Based on our findings in Sections 3 and 4, we are now able to describe the parameters of our first construction of nested code pairs, namely the one where the codimension is not too small. If δ1,δ2H(Q) satisfy the conditions in one of the Proposition 11, Proposition 15, it follows that C˜(δ2)E˜(δ1). By the bounds (4) and (5) and the observation following Proposition 3, the relative distance of this code pair is exactly d(E˜(δ1))=δ1, and the relative distance of its dual is d(C˜(δ2))=δ2.

For

Improved information on nested codes of small codimension

We will now consider a second construction which in general gives nested code pairs of smaller codimension than the construction in Section 5. This construction bears some resemblance to the one given in [7, Sec. IV], but in the setting of Hermitian codes.

From the definition of the codes, CL(D,λ2Q)CL(D,λ1Q) whenever λ2<λ1 and both λ1 and λ2 belongs to H(Q). Our second construction is captured by the following two propositions.

Proposition 20

Let λ1=iq+j(q+1)H(Q) where ij<q, and define λ2=jq+i(q+1)1. Then

Comparison with bounds and existing constructions

Having presented two improved constructions of nested code pairs in Sections 5 and 6, this section is devoted to the comparison between the corresponding asymmetric quantum codes and codes that already exist in the literature. The codes are also compared with the Gilbert-Varshamov bound for asymmetric quantum codes. Moreover, we compare the corresponding secret sharing schemes with a recent lower bound on the threshold gap [3]. When presenting code parameters we give the actual codimension

Concluding remarks

In this paper we presented two improved constructions of nested code pairs from the Hermitian curve, and gave a detailed analysis of their performance when applied to the concepts of secret sharing and asymmetric quantum codes. Regarding information leakage in secret sharing we studied the reconstruction number r and the privacy number t, which give information on full recovery and full privacy, respectively. We note that it is possible to obtain information about partial information leakage by

Acknowledgements

The authors would like to thank Ignacio Cascudo for helpful discussions.

References (26)

  • H.E. Andersen et al.

    Evaluation codes from order domain theory

    Finite Fields Appl.

    (2008)
  • I.M. Duursma et al.

    Coset bounds for algebraic geometric codes

    Finite Fields Appl.

    (2010)
  • O. Geil

    On codes from norm-trace curves

    Finite Fields Appl.

    (2003)
  • A.R. Calderbank et al.

    Quantum error correction via codes over GF(4)

    IEEE Trans. Inf. Theory

    (1998)
  • I. Cascudo et al.

    Improved bounds on the threshold gap in ramp secret sharing

    IEEE Trans. Inf. Theory

    (2019)
  • M.F. Ezerman et al.

    CSS-like constructions of asymmetric quantum codes

    IEEE Trans. Inf. Theory

    (2013)
  • M.F. Ezerman et al.

    Xing–Ling codes, duals of their subcodes, and good asymmetric quantum codes

    Des. Codes Cryptogr.

    (2015)
  • C. Galindo et al.

    Improved constructions of nested code pairs

    IEEE Trans. Inf. Theory

    (2018)
  • O. Geil et al.

    Relative generalized Hamming weights of one-point algebraic geometric codes

    IEEE Trans. Inf. Theory

    (2014)
  • O. Geil et al.

    On the order bounds for one-point AG codes

    Adv. Math. Commun.

    (2011)
  • M. Grassl

    Code tables: bounds on the parameters of various types of codes

  • T. Høholdt et al.

    Algebraic Geometry Codes

    (1998)
  • L. Ioffe et al.

    Asymmetric quantum error-correcting codes

    Phys. Rev. A

    (2007)
  • View full text