May 2018, 12(2): 303-315. doi: 10.3934/amc.2018019

Several infinite families of p-ary weakly regular bent functions

1. 

School of Science, Hangzhou Dianzi University, Hangzhou, Zhejiang 310018, China

2. 

School of Mathematics and Information, China West Normal University, Sichuan Nanchong, 637002, China

3. 

School of Mathematics, Southwest Jiaotong University, Chengdu 610031, China

* Corresponding author: Chunming Tang

Received  November 2016 Published  March 2018

Fund Project: This work is supported by the National Natural Science Foundation of China (Grant No. 11401480, 11701129, 11571285, 11531002). C. Tang also acknowledges support from 14E013, CXTD2014-4 and the Meritocracy Research Funds of China West Normal University. Z. Zhou and C. Fan are in part supported by the National Cryptography Development Fund under Grant MMJJ20170119. Y. Qi also acknowledges support from Zhejiang provincial Natural Science Foundation of China (LQ17A010008, LQ16A010005).

As an optimal combinatorial object, bent functions have been an interesting research object due to their important applications in cryptography, coding theory, and sequence design. The characterization and construction of bent functions are challenging problems in general. The objective of this paper is to present a construction of p-ary weakly regular bent functions from known weakly regular bent functions. This generalizes some earlier constructions of Boolean bent functions and p-ary bent functions, and produces several infinite families of p-ary weakly regular bent functions from known ones. Some infinite families of p-ary rotation symmetric bent functions are obtained as well.

Citation: Yanfeng Qi, Chunming Tang, Zhengchun Zhou, Cuiling Fan. Several infinite families of p-ary weakly regular bent functions. Advances in Mathematics of Communications, 2018, 12 (2) : 303-315. doi: 10.3934/amc.2018019
References:
[1]

R. Calderbank and W. M. Kantor, The geometry of two-weight codes, Bull. London Math. Soc., 18 (1986), 97-122. doi: 10.1112/blms/18.2.97.

[2]

C. Carlet, Boolean functions for cryptography and error correcting codes, in Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Y. Crama and P. L. Hammer, Eds. Cambridge, U.K.: Cambridge Univ. Press, 2010,257–397.

[3]

C. Carlet, Open problems on binary bent functions, Open Problems in Mathematics and Computational Science 2014, 2014 (2014), 203-241.

[4]

G. Cohen, I. Honkala, S. Litsyn and A. Lobstein, Covering Codes, Amsterdam, The Netherlands: North Holland, 1997.

[5]

J. Dillon, Elementary Hadamard Difference Sets, Ph. D. dissertation, Netw. Commun. Lab., Univ. Maryland, College Park, MD, USA, 1974

[6]

J. F. Dillon and H. Dobbertin, New cyclic difference sets with Singer parameters, Finite Fields Their Appl., 10 (2004), 342-389. doi: 10.1016/j.ffa.2003.09.003.

[7]

C. Ding, Linear codes from some 2-designs, IEEE Trans. Inform. Theory, 61 (2015), 3265-3275. doi: 10.1109/TIT.2015.2420118.

[8]

C. DingC. Fan and Z. Zhou, The dimension and minimum distance of two classes of primitive BCH codes, Finite Fields and Their Applications, 45 (2017), 237-263. doi: 10.1016/j.ffa.2016.12.009.

[9]

H. DobbertinG. LeanderA. CanteautC. CarletP. Felke and P. Gaborit, Construction of bent functions via Niho power functions, J. Combinat. Theory, Ser. A, 113 (2006), 779-798. doi: 10.1016/j.jcta.2005.07.009.

[10]

K. Feng and J. Luo, Value distributions of exponential sums from perfect nonlinear functions and their applications, IEEE Trans. Inform. Theory, 53 (2007), 3035-3041. doi: 10.1109/TIT.2007.903153.

[11]

E. Filiol and C. Fontaine, Highly nonlinear balanced Boolean functions with a good correlationimmunity, Proceedings of EUROCRYPT '98. Lecture Notes in Computer Science, 1403 (1998), 475-488.

[12]

C. Fontaine, On some cosets of the first-order Reed-Muller code with high minimum weight, IEEE Trans. Inform. Theory, 45 (1999), 1237-1243. doi: 10.1109/18.761276.

[13]

R. Gold, Maximal recursive sequences with 3-valued recursive crosscorrelation functions (Corresp.), IEEE Trans. Inf. Theory, 14 (1968), 154-156.

[14]

T. Helleseth and A. Kholosha, Monomial and quadratic bent functions over the finite fields of odd characteristic, IEEE Trans. Inf. Theory, 52 (2006), 2018-2032. doi: 10.1109/TIT.2006.872854.

[15]

T. Helleseth and A. Kholosha, New binomial bent functions over the finite fields of odd characteristic, IEEE Trans. Inf. Theory, 56 (2010), 4646-4652. doi: 10.1109/TIT.2010.2055130.

[16]

P. V. KumarR. A. Scholtz and L. R. Welch, Generalized bent functions and their properties, J. Combin. Theory Ser. A, 40 (1985), 90-107. doi: 10.1016/0097-3165(85)90049-4.

[17]

N. LiT. HellesethX. Tang and A. Kholosha, Several new classes of bent functions from Dillon exponents, IEEE Trans. Inf. Theory, 59 (2013), 1818-1831. doi: 10.1109/TIT.2012.2229782.

[18]

S. C. Liu and J. J. Komo, Nonbinary Kasami sequences over GF(p), IEEE Trans. Inf. Theory, 38 (1992), 1409-1412. doi: 10.1109/18.144728.

[19]

S. Mesnager, Several new infinite families of bent functions and their duals, IEEE Trans. Inf. Theory, 60 (2014), 4397-4407. doi: 10.1109/TIT.2014.2320974.

[20]

S. Mesnager, Bent Functions: Fundamentals and Results, Springer Verlag, New York, 2016.

[21]

J. D. OlsenR. A. Scholtz and L. R. Welch, Bent-function sequences, IEEE Trans. Inf. Theory, 28 (1982), 858-864. doi: 10.1109/TIT.1982.1056589.

[22]

J. Pieprzyk and C. Qu, Fast Hashing and rotation symmetric functions, J. Univ. Comput. Sci., 5 (1999), 20-31.

[23]

A. PottY. Tan and T. Feng, Strongly regular graphs associated with ternary bent functions, J. Combinat. Theory, Ser. A, 117 (2010), 668-682. doi: 10.1016/j.jcta.2009.05.003.

[24]

A. PottY. TanT. Feng and S. Ling, Association schemes arising from bent functions, Des., Codes Cryptography, 59 (2011), 319-331. doi: 10.1007/s10623-010-9463-z.

[25]

O. Rothaus, On bent functions, J. Combinat. Theory, Ser. A, 20 (1976), 300-305. doi: 10.1016/0097-3165(76)90024-8.

[26]

S. Su and X. Tang, Construction of rotation symmetric boolean functions with optimal algebraic immunity and high nonlinearity, Des., Codes Cryptography, 71 (2014), 183-199. doi: 10.1007/s10623-012-9727-x.

[27]

C. TangN. LiY. QiZ. Zhou and T. Helleseth, Linear codes with two or three weights from weakly regular bent functions, IEEE Trans. Inf. Theory., 62 (2016), 1166-1176. doi: 10.1109/TIT.2016.2518678.

[28]

G. XuX. Cao and S. Xu., Several new classes of Boolean functions with few Walsh transform values, Applicable Algebra in Engineering, Communication and Computing, 28 (2017), 155-176. doi: 10.1007/s00200-016-0298-3.

[29]

G. Xu and X. Cao, Several classes of bent, near-bent and 2-plateaued functions over finite fields of odd characteristic, arXiv: 1508.03415.

[30]

N. Y. Yu and G. Gong, Construction of quadratic bent functions in polynomial forms, EEE Trans. Inf. Theory, 52 (2006), 3291-3299. doi: 10.1109/TIT.2006.876251.

[31]

Z. ZhouN. LiC. Fan and T. Helleseth, Linear codes with two or three weights from quadratic Bent functions, Des. Codes Cryptography, 81 (2016), 283-295. doi: 10.1007/s10623-015-0144-9.

show all references

References:
[1]

R. Calderbank and W. M. Kantor, The geometry of two-weight codes, Bull. London Math. Soc., 18 (1986), 97-122. doi: 10.1112/blms/18.2.97.

[2]

C. Carlet, Boolean functions for cryptography and error correcting codes, in Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Y. Crama and P. L. Hammer, Eds. Cambridge, U.K.: Cambridge Univ. Press, 2010,257–397.

[3]

C. Carlet, Open problems on binary bent functions, Open Problems in Mathematics and Computational Science 2014, 2014 (2014), 203-241.

[4]

G. Cohen, I. Honkala, S. Litsyn and A. Lobstein, Covering Codes, Amsterdam, The Netherlands: North Holland, 1997.

[5]

J. Dillon, Elementary Hadamard Difference Sets, Ph. D. dissertation, Netw. Commun. Lab., Univ. Maryland, College Park, MD, USA, 1974

[6]

J. F. Dillon and H. Dobbertin, New cyclic difference sets with Singer parameters, Finite Fields Their Appl., 10 (2004), 342-389. doi: 10.1016/j.ffa.2003.09.003.

[7]

C. Ding, Linear codes from some 2-designs, IEEE Trans. Inform. Theory, 61 (2015), 3265-3275. doi: 10.1109/TIT.2015.2420118.

[8]

C. DingC. Fan and Z. Zhou, The dimension and minimum distance of two classes of primitive BCH codes, Finite Fields and Their Applications, 45 (2017), 237-263. doi: 10.1016/j.ffa.2016.12.009.

[9]

H. DobbertinG. LeanderA. CanteautC. CarletP. Felke and P. Gaborit, Construction of bent functions via Niho power functions, J. Combinat. Theory, Ser. A, 113 (2006), 779-798. doi: 10.1016/j.jcta.2005.07.009.

[10]

K. Feng and J. Luo, Value distributions of exponential sums from perfect nonlinear functions and their applications, IEEE Trans. Inform. Theory, 53 (2007), 3035-3041. doi: 10.1109/TIT.2007.903153.

[11]

E. Filiol and C. Fontaine, Highly nonlinear balanced Boolean functions with a good correlationimmunity, Proceedings of EUROCRYPT '98. Lecture Notes in Computer Science, 1403 (1998), 475-488.

[12]

C. Fontaine, On some cosets of the first-order Reed-Muller code with high minimum weight, IEEE Trans. Inform. Theory, 45 (1999), 1237-1243. doi: 10.1109/18.761276.

[13]

R. Gold, Maximal recursive sequences with 3-valued recursive crosscorrelation functions (Corresp.), IEEE Trans. Inf. Theory, 14 (1968), 154-156.

[14]

T. Helleseth and A. Kholosha, Monomial and quadratic bent functions over the finite fields of odd characteristic, IEEE Trans. Inf. Theory, 52 (2006), 2018-2032. doi: 10.1109/TIT.2006.872854.

[15]

T. Helleseth and A. Kholosha, New binomial bent functions over the finite fields of odd characteristic, IEEE Trans. Inf. Theory, 56 (2010), 4646-4652. doi: 10.1109/TIT.2010.2055130.

[16]

P. V. KumarR. A. Scholtz and L. R. Welch, Generalized bent functions and their properties, J. Combin. Theory Ser. A, 40 (1985), 90-107. doi: 10.1016/0097-3165(85)90049-4.

[17]

N. LiT. HellesethX. Tang and A. Kholosha, Several new classes of bent functions from Dillon exponents, IEEE Trans. Inf. Theory, 59 (2013), 1818-1831. doi: 10.1109/TIT.2012.2229782.

[18]

S. C. Liu and J. J. Komo, Nonbinary Kasami sequences over GF(p), IEEE Trans. Inf. Theory, 38 (1992), 1409-1412. doi: 10.1109/18.144728.

[19]

S. Mesnager, Several new infinite families of bent functions and their duals, IEEE Trans. Inf. Theory, 60 (2014), 4397-4407. doi: 10.1109/TIT.2014.2320974.

[20]

S. Mesnager, Bent Functions: Fundamentals and Results, Springer Verlag, New York, 2016.

[21]

J. D. OlsenR. A. Scholtz and L. R. Welch, Bent-function sequences, IEEE Trans. Inf. Theory, 28 (1982), 858-864. doi: 10.1109/TIT.1982.1056589.

[22]

J. Pieprzyk and C. Qu, Fast Hashing and rotation symmetric functions, J. Univ. Comput. Sci., 5 (1999), 20-31.

[23]

A. PottY. Tan and T. Feng, Strongly regular graphs associated with ternary bent functions, J. Combinat. Theory, Ser. A, 117 (2010), 668-682. doi: 10.1016/j.jcta.2009.05.003.

[24]

A. PottY. TanT. Feng and S. Ling, Association schemes arising from bent functions, Des., Codes Cryptography, 59 (2011), 319-331. doi: 10.1007/s10623-010-9463-z.

[25]

O. Rothaus, On bent functions, J. Combinat. Theory, Ser. A, 20 (1976), 300-305. doi: 10.1016/0097-3165(76)90024-8.

[26]

S. Su and X. Tang, Construction of rotation symmetric boolean functions with optimal algebraic immunity and high nonlinearity, Des., Codes Cryptography, 71 (2014), 183-199. doi: 10.1007/s10623-012-9727-x.

[27]

C. TangN. LiY. QiZ. Zhou and T. Helleseth, Linear codes with two or three weights from weakly regular bent functions, IEEE Trans. Inf. Theory., 62 (2016), 1166-1176. doi: 10.1109/TIT.2016.2518678.

[28]

G. XuX. Cao and S. Xu., Several new classes of Boolean functions with few Walsh transform values, Applicable Algebra in Engineering, Communication and Computing, 28 (2017), 155-176. doi: 10.1007/s00200-016-0298-3.

[29]

G. Xu and X. Cao, Several classes of bent, near-bent and 2-plateaued functions over finite fields of odd characteristic, arXiv: 1508.03415.

[30]

N. Y. Yu and G. Gong, Construction of quadratic bent functions in polynomial forms, EEE Trans. Inf. Theory, 52 (2006), 3291-3299. doi: 10.1109/TIT.2006.876251.

[31]

Z. ZhouN. LiC. Fan and T. Helleseth, Linear codes with two or three weights from quadratic Bent functions, Des. Codes Cryptography, 81 (2016), 283-295. doi: 10.1007/s10623-015-0144-9.

[1]

Ayça Çeşmelioǧlu, Wilfried Meidl, Alexander Pott. On the dual of (non)-weakly regular bent functions and self-dual bent functions. Advances in Mathematics of Communications, 2013, 7 (4) : 425-440. doi: 10.3934/amc.2013.7.425

[2]

Sihem Mesnager, Fengrong Zhang, Yong Zhou. On construction of bent functions involving symmetric functions and their duals. Advances in Mathematics of Communications, 2017, 11 (2) : 347-352. doi: 10.3934/amc.2017027

[3]

Jacques Wolfmann. Special bent and near-bent functions. Advances in Mathematics of Communications, 2014, 8 (1) : 21-33. doi: 10.3934/amc.2014.8.21

[4]

Claude Carlet, Fengrong Zhang, Yupu Hu. Secondary constructions of bent functions and their enforcement. Advances in Mathematics of Communications, 2012, 6 (3) : 305-314. doi: 10.3934/amc.2012.6.305

[5]

Sihem Mesnager, Fengrong Zhang. On constructions of bent, semi-bent and five valued spectrum functions from old bent functions. Advances in Mathematics of Communications, 2017, 11 (2) : 339-345. doi: 10.3934/amc.2017026

[6]

Claude Carlet, Juan Carlos Ku-Cauich, Horacio Tapia-Recillas. Bent functions on a Galois ring and systematic authentication codes. Advances in Mathematics of Communications, 2012, 6 (2) : 249-258. doi: 10.3934/amc.2012.6.249

[7]

Samir Hodžić, Enes Pasalic. Generalized bent functions -sufficient conditions and related constructions. Advances in Mathematics of Communications, 2017, 11 (3) : 549-566. doi: 10.3934/amc.2017043

[8]

Joan-Josep Climent, Francisco J. García, Verónica Requena. On the construction of bent functions of $n+2$ variables from bent functions of $n$ variables. Advances in Mathematics of Communications, 2008, 2 (4) : 421-431. doi: 10.3934/amc.2008.2.421

[9]

Jyrki Lahtonen, Gary McGuire, Harold N. Ward. Gold and Kasami-Welch functions, quadratic forms, and bent functions. Advances in Mathematics of Communications, 2007, 1 (2) : 243-250. doi: 10.3934/amc.2007.1.243

[10]

Kanat Abdukhalikov, Sihem Mesnager. Explicit constructions of bent functions from pseudo-planar functions. Advances in Mathematics of Communications, 2017, 11 (2) : 293-299. doi: 10.3934/amc.2017021

[11]

Natalia Tokareva. On the number of bent functions from iterative constructions: lower bounds and hypotheses. Advances in Mathematics of Communications, 2011, 5 (4) : 609-621. doi: 10.3934/amc.2011.5.609

[12]

Xiwang Cao, Hao Chen, Sihem Mesnager. Further results on semi-bent functions in polynomial form. Advances in Mathematics of Communications, 2016, 10 (4) : 725-741. doi: 10.3934/amc.2016037

[13]

Patricia Bauman, Daniel Phillips. Analysis and stability of bent-core liquid crystal fibers. Discrete & Continuous Dynamical Systems - B, 2012, 17 (6) : 1707-1728. doi: 10.3934/dcdsb.2012.17.1707

[14]

Tiziana Giorgi, Feras Yousef. Analysis of a model for bent-core liquid crystals columnar phases. Discrete & Continuous Dynamical Systems - B, 2015, 20 (7) : 2001-2026. doi: 10.3934/dcdsb.2015.20.2001

[15]

Xiao-Hong Liu, Wei Wu. Coerciveness of some merit functions over symmetric cones. Journal of Industrial & Management Optimization, 2009, 5 (3) : 603-613. doi: 10.3934/jimo.2009.5.603

[16]

Chihiro Matsuoka, Koichi Hiraide. Special functions created by Borel-Laplace transform of Hénon map. Electronic Research Announcements, 2011, 18: 1-11. doi: 10.3934/era.2011.18.1

[17]

Leon Ehrenpreis. Special functions. Inverse Problems & Imaging, 2010, 4 (4) : 639-647. doi: 10.3934/ipi.2010.4.639

[18]

Heping Liu, Yu Liu. Refinable functions on the Heisenberg group. Communications on Pure & Applied Analysis, 2007, 6 (3) : 775-787. doi: 10.3934/cpaa.2007.6.775

[19]

M.T. Boudjelkha. Extended Riemann Bessel functions. Conference Publications, 2005, 2005 (Special) : 121-130. doi: 10.3934/proc.2005.2005.121

[20]

Peter Giesl, Sigurdur Hafstein. Computational methods for Lyapunov functions. Discrete & Continuous Dynamical Systems - B, 2015, 20 (8) : i-ii. doi: 10.3934/dcdsb.2015.20.8i

2017 Impact Factor: 0.564

Metrics

  • PDF downloads (62)
  • HTML views (265)
  • Cited by (0)

[Back to Top]