Information, Coding and Mathematics 2002
DOI: 10.1007/978-1-4757-3585-7_8
|View full text |Cite
|
Sign up to set email alerts
|

Reducible Rank Codes and Applications to Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 22 publications
(37 citation statements)
references
References 1 publication
0
36
0
Order By: Relevance
“…We have obtained lower bounds on their generalized rank weights (GRWs) that extend the known lower bound on their minimum rank distance [9] and which give exact values for cartesian products, and we have obtained upper bounds that are always reached for the minimum rank distance and some reduction. We have obtained maximum rank distance (MRD) reducible codes with MRD main components for new parameters, extending the families of MRD codes for n > m considered in [9] and [23].…”
Section: Conclusion and Open Problemsmentioning
confidence: 80%
See 2 more Smart Citations
“…We have obtained lower bounds on their generalized rank weights (GRWs) that extend the known lower bound on their minimum rank distance [9] and which give exact values for cartesian products, and we have obtained upper bounds that are always reached for the minimum rank distance and some reduction. We have obtained maximum rank distance (MRD) reducible codes with MRD main components for new parameters, extending the families of MRD codes for n > m considered in [9] and [23].…”
Section: Conclusion and Open Problemsmentioning
confidence: 80%
“…After some preliminaries in Section II, the paper is organized as follows: In Section III, we give lower and upper bounds on the GRWs of reducible codes, extending the lower bound on the minimum rank distance given in [9], and see that the given upper bound on the minimum rank distance can be reached by some reduction. In Section IV, we obtain new parameters for which reducible codes are MRD (or close to MRD) and with MRD components, and obtain explicit estimates on their GRWs, including those MRD codes found in [9] and considered for secure network coding in [23].…”
Section: B Organization Of the Papermentioning
confidence: 99%
See 1 more Smart Citation
“…In Section 5, we apply Gabidulin codes [8,21] to obtain coding schemes with optimal information rates and communication overheads for n ≤ m, which can be seen as a rank-metric analog of the constructions in [2,13]. However, our method allows us to correct errors, and not only erasures as in the secret sharing case [2,13], and can be applied to other families of maximum rank distance codes, such as those in [7] for n > m. Finally, in Section 6, we discuss the applications in universal secure linear network coding and secure distributed storage with crisscross errors and erasures.…”
Section: Introductionmentioning
confidence: 99%
“…Gibson was the first to prove the weakness of the system through a series of successful attacks [Gib95,Gib96]. Following these failures, the first works which modified the GPT scheme to avoid Gibson's attack were published in [GO01,GOHA03]. The idea is to hide further the structure of Gabidulin code by considering isometries for the rank metric.…”
Section: Introductionmentioning
confidence: 99%