Academia.eduAcademia.edu

Some ternary cubic two-weight codes

2016, arXiv (Cornell University)

We study trace codes with defining set L, a subgroup of the multiplicative group of an extension of degree m of the alphabet ring F 3 + uF 3 + u 2 F 3 , with u 3 = 1. These codes are abelian, and their ternary images are quasi-cyclic of co-index three (a.k.a. cubic codes). Their Lee weight distributions are computed by using Gauss sums. These codes have three nonzero weights when m is singly-even and |L| = 3 3m −3 2m 2. When m is odd, and |L| = 3 3m −3 2m 2 , or |L| = 3 3m − 3 2m and m is a positive integer, we obtain two new infinite families of two-weight codes which are optimal. Applications of the image codes to secret sharing schemes are also given.

arXiv:1612.00914v1 [cs.IT] 3 Dec 2016 SOME TERNARY CUBIC TWO-WEIGHT CODES Minjia Shi∗ School of Mathematical Sciences, Anhui University, Anhui, 230601, P. R. China, National Mobile Communications Research Laboratory, Southeast University, 210096, Nanjing, P. R. China Daitao Huang School of Mathematical Sciences, Anhui University, Anhui, 230601, P. R. China Patrick Solé CNRS/LAGA, University Paris 8, 93 526 Saint-Denis, France Abstract. We study trace codes with defining set L, a subgroup of the multiplicative group of an extension of degree m of the alphabet ring F3 + uF3 + u2 F3 , with u3 = 1. These codes are abelian, and their ternary images are quasi-cyclic of co-index three (a.k.a. cubic codes). Their Lee weight distributions are computed by using Gauss sums. These codes have three nonzero weights when m is 3m 2m 3m 2m singly-even and |L| = 3 −3 . When m is odd, and |L| = 3 −3 , 2 2 or |L| = 33m − 32m and m is a positive integer, we obtain two new infinite families of two-weight codes which are optimal. Applications of the image codes to secret sharing schemes are also given. Keywords: three-weight codes, two-weight codes, Gauss sums, trace codes 1. Introduction Linear codes with few weights are of special interest in secret sharing schemes, as the associated access structures can be completely determined analytically [12, 21]. Due to their connections with strongly regular graphs, association schemes [6] and difference sets [3, 5], two-weight codes and three-weight codes have been studied in many articles, see for instance [7, 8, 9, 13, 22]. However, most constructions, so far, have used cyclic codes [9, 22]. A recent study introduced trace codes over rings. In a series of papers [17, 18, 20], the authors have extended the notion of trace codes from fields to rings. The 1991 Mathematics Subject Classification. Primary: 94 B25; Secondary: 05 E30. The first author is supported by NNSF of China (61672036), Technology Foundation for Selected Overseas Chinese Scholar, Ministry of Personnel of China (05015133) and the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (2015D11) and Key projects of support program for outstanding young talents in Colleges and Universities (gxyqZD2016008). ∗∗ Corresponding author. 1 2 MINJIA SHI, DAITAO HUANG, AND PATRICK SOLÉ alphabet ring we consider here is R = F3 + uF3 + u2 F3 with u3 = 1. This ring is instrumental in constructing quasi-cyclic codes of co-index 3 [2, 14], called cubic codes in [2]. While the construction we use here is not exactly the cubic construction of [14], the ternary codes we construct here are still cubic. In [19], the authors constructed optimal ternary codes from one-Lee-weight codes and two-Lee-weight codes over the ring R. In the present paper, we construct a trace code with a defining set L = {d1 , d2 , · · · , dn } ⊆ R∗ , by the formula CL = {(T r(ax))x∈L | a ∈ R}, where R denotes an extension of R of degree m, and T r() denotes a linear function from R down to R. This code has two or three weights, depending on the choice of the parameters L and m. By varying L and R, various codes can be constructed. Compared with the linear codes in [19], the two-weight codes we construct here are different, and the method is also different. The localizing set of our abelian code is not a cyclic group, but it is an abelian group. It is related to quadratic residues in an extension of degree m of F3 , which makes quadratic Gauss sums appear naturally in the weight distribution analysis. When m is odd, L = L′ , or L = R∗ and m is an integer, we obtain an infinite family of two-weight codes which satisfy the optimality. We show that, both in the three-weight and two-weight cases, the ternary image has a very nice support inclusion structure which makes it suitable for use in a Massey secret sharing scheme [10, 21]. Indeed, we can show that all nonzero codewords of the ternary images are minimal for the partial order on codewords defined by inclusion of supports. The paper is organized as follows. Section 2 collects the basic notions and notations needed. Section 3 shows that the trace codes are abelian. Section 4 recalls and reproves some results on Gaussian periods. Section 5 computes the weight distribution of our codes, building on the character sum evaluation of the preceding section. Section 6 discusses the optimality of the ternary linear codes. The minimum distance of the dual codes is discussed in Section 7. Section 8 determines the support structure of the ternary image and describes an application to secret sharing schemes. Section 9 concludes this paper. 2. Basic notions and notation 2.1. Rings. We consider the ring R = F3 + uF3 + u2 F3 with u3 = 1. Note that, by Fermat little theorem, u3 − 1 = (u − 1)3 . This implies that R is a local ring with the following lattice of ideals: 0 ⊆ h1 + u + u2 i = {0, 1 + u + u2 , 2 + 2u + 2u2 } ⊆ hu − 1i = {(u − 1)a : a ∈ R} ⊆ R. Hence, hu−1i is the unique maximum ideal of R. Given a positive integer m, we can construct the ring extension of R of degree m given by R = F3m + uF3m + u2 F3m . There is a Frobenius operator F which maps a + ub + u2 c onto a3 + ub3 + u2 c3 , for all a, b, c ∈ F3m . The Trace function, denoted by T r, is defined as Tr = m−1 X F j. j=0 It is easy to check that T r(a + ub + u2 c) = tr(a) + utr(b) + u2 tr(c) for a, b, c ∈ F3m . Here tr() denotes the standard trace of F3m . SOME TERNARY CUBIC TWO-WEIGHT CODES 3 The ring R is local with maximal ideal M = hu − 1i and R/M ∼ = F3m . The group of units R∗ = F∗3m × F3m × F3m , as a multiplicative group, is isomorphic to the product of a cyclic group of order 3m − 1 by two elementary abelian groups of order 3m . Denoting by Q, and N , respectively, the squares and the nonsquares of F3m . For simplicity, L′ = Q × F3m × F3m . Thus L′ is a subgroup of R∗ , of index 2. 2.2. Gray map. The Gray map φ from R to F33 is defined by φ(a′ + ub′ + u2 c′ ) = (a′ , b′ , c′ ), for a′ , b′ , c′ ∈ F3 . It is a one to one map from R to F33 . The Lee weight of a vector a + ub + u2 c is defined as the Hamming weight of its Gray image. That is to say, wL (a + ub + u2 c) = wH (a) + wH (b) + wH (c), for a, b, c ∈ Fn3 . The Lee distance of x, y ∈ Rn is defined as wL (x − y). So the Gray map is, by construction, a linear isometry from (Rn , dL ) to (F3n 3 , dH ), where dL , dH means Lee distance and Hamming distance, respectively. For simplicity, we let throughout N = 3n. For future use, we note that scalars of weight one in R comprize αuj , α ∈ F∗3 , j = 0, 1, 2. 2.3. Codes. A linear code C over R of length n is an R-submodule of Rn . If x = (x1 , x2 , · · · , xn ) and y = (y1 , y2 , · ·P · , yn ) are two elements of Rn , their Euclidean n inner product is defined by hx, yi = i=1 xi yi , where the operation is performed in R. The dual code of C is denoted as C ⊥ = {y ∈ Rn |hx, yi = 0, ∀x ∈ C}. By definition, C ⊥ is also a linear code over R. Given a finite abelian group G, a code over R is said to be abelian if it is an ideal of the group ring R[G]. Namely, the coordinates of C are indexed by elements of G and G acts regularly on this set. In the special case when G is cyclic, the code is a cyclic code in the usual sense [15]. A code of length ℓm, is said to be quasi-cyclic of index ℓ and co-index m, if it is linear and invariant under a shift of ℓ places. In particular, if the co-index is equal to three the code is said to be cubic [2]. 3. Symmetry For a ∈ R, the vector ev(a) is defined by the following evaluation map ev(a) = (T r(ax))x∈L , ′ ∗ where L = L or L = R . Define the code C(m) by the formula C(m) = {ev(a)|a ∈ R}. Thus C(m) is a 3m 2m code of length |L| over R. Note that |L′ | = 3 −3 and |R∗ | = 33m − 32m . 2 Lemma 3.1. If for all x ∈ L, we have T r(ax) = 0, then a = 0. Proof. When L = L′ , write x = x1 + x2 (u − 1) + x3 (u − 1)2 and a = a1 + a2 (u − 1) + a3 (u − 1)2 with x1 ∈ Q, x2 , x3 , a1 , a2 , a3 in F3m . By a simple calculation we get ax = a1 x1 − a1 x2 + a1 x3 − a2 x1 + a2 x2 + a3 x1 +(u − 1)(a1 x2 + a1 x3 + a2 x1 + a2 x2 + a3 x1 ) +(u − 1)2 (a1 x3 + a2 x2 + a3 x1 ) =: A1 + (u − 1)A2 + (u − 1)2 A2 and T r(ax) = 0 is equivalent to tr(Ai ) = 0, where i = 1, 2, 3. The trace function tr() [15] is nondegenerate, so we have aj = 0 where j = 1, 2, 3. Consequently, a = 0. The case of L = R∗ is similar to that of L = L′ . Thus the proof is proved.  4 MINJIA SHI, DAITAO HUANG, AND PATRICK SOLÉ Proposition 3.2. The subgroup L of the group of units R∗ acts regularly on the coordinates of C(m). Proof. For any v, v ′ ∈ L, the change of variables x 7→ (v ′ /v)x permutes the coordinates of C(m), and maps v to v ′ . This defines a transitive action of L on itself. Such a permutation is unique, given v, v ′ . This shows that the action is regular.  The code C(m) is thus an abelian code with respect to the group L. In other words, it is an ideal of the group ring R[L]. As observed in the previous section that neither R∗ , nor L′ are a cyclic group, hence C(m) may be not cyclic. It is immediate to see that, by the definition of Gray map, the ternary code φ(C(m)) is quasi-cyclic of co-index 3. 4. Character sums This section is similar to that in [20]. For completeness, we collect it here. Let χ denote an arbitrary multiplicative character of Fq . Assume q is odd. Denote by η the quadratic multiplicative character defined by η(x) = 1, if x is a square and η(x) = −1, if not. Let ψ denote the canonical additive character of Fq . The classical Gauss sum can be defined by X G(χ) = ψ(x)χ(x). x∈F∗ q Now, we give the following character sums X X Q= ψ(x), N = ψ(x). x∈Q x∈N By orthogonality of characters [15, Lemma 9, p. 143], it is not difficult to check that Q + N = −1. Since the characteristic function of Q is 1+η 2 , we obtain then G(η) − 1 −G(η) − 1 , N= . 2 2 It is well known [11], that if q = 3m , the quadratic Gauss sum evaluates as Q= √ G(η) = (−1)m−1 im q. In particular, if m is singly-even, these formulas can be simplified to G(η) = (3+1) √ ǫ(3) q, with ǫ(3) = (−1) 2 = 1, which implies √ √ q−1 q+1 , N =− . Q= 2 2 In fact Q and N are examples of Gaussian periods, and these relations could have been deduced from [11, Lemma 11]. 5. Weight distributions of trace codes Before we calculate the weight distribution of the trace code, let us first introduce N a correlation lemma. Let ω = exp( 2πi 3 ). If y = (y1 , y2 , · · · , yN ) ∈ F3 , let Θ(y) = N X ω yj . j=1 For convenience, we let θ(a) = Θ(φ(ev(a))). By linearity of the Gray map, and of the evaluation map, we see that θ(sa) = Θ(φ(ev(sa))) for any s ∈ F∗3 . SOME TERNARY CUBIC TWO-WEIGHT CODES 5 Lemma 5.1 ([20], Lemma 1). For all y = (y1 , y2 , · · · , yN ) ∈ FN 3 , we have 2 X s=1 Θ(sy) = 2N − 3wH (y). 5.1. The case when L = L′ . From Lemma 5.1, for ev(a) ∈ C(m), by the definition of the Gray map, we have P2 P2 2N − s=1 Θ(φ(ev(a))) 2N − s=1 θ(sa) (1) wL (ev(a)) = = . 3 3 According to the value of m, we can obtain ternary codes with different weights. Now we present the weights of codewords of C(m) by using Equation (1). The following theorem tells us that when L = L′ and m is singly-even, φ(C(m)) is a three-weight ternary linear code. 5.1.1. m is singly-even. Theorem 5.2. Assume m is singly-even. For a ∈ R, the Lee weight of codewords of C(m) is given below: (a) If a = 0, then wL (ev(a)) = 0; (b) If a = (u − 1)2 a3 , then if a3 ∈ Q, then wL (ev(a)) = 33m − 35m/2 , a3 ∈ N , then wL (ev(a)) = 33m + 35m/2 ; (c) If a ∈ R\h(u − 1)2 i, then wL (ev(a)) = 33m − 32m . Proof. Let a = a1 + a2 (u − 1) + a3 (u − 1)2 with a1 , a2 , a3 ∈ F3m , x = x1 + x2 (u − 1) + x3 (u − 1)2 with x1 ∈ Q, x2 , x3 ∈ F3m , by a direct calculation we get ax = a1 x1 − a1 x2 + a1 x3 − a2 x1 + a2 x2 + a3 x1 +(a1 x2 + a1 x3 + a2 x1 + a2 x2 + a3 x1 )u + (a1 x3 + a2 x2 + a3 x1 )u2 =: b1 + b2 u + b3 u2 . Thus we have φ(ev(a)) = θ(a) = (tr(b1 ), tr(b2 ), tr(b3 ))x1 ,x2 ,x3 , X X ω tr(b2 ) + ω tr(b1 ) + x1 ,x2 ,x3 F∗3 x1 ,x2 ,x3 X ω tr(b3 ) . x1 ,x2 ,x3 Since m is singly-even, s ∈ is a square in F , we have θ(sa) = θ(a) for any s ∈ F∗3 . (a) If a = 0, then T r(ax) = 0. So wL (ev(a)) = 0. (b) When a = (u−1)2a3 with a3 ∈ Q, then θ(a) = 32m+1 Q. Thus wL (ev(a)) = 33m − 35m/2 by Equation (1). When a = (u − 1)2 a3 with a3 ∈ N , θ(a) = 32m+1 N . Then we deduce from the Equation (1) that wL (ev(a)) = 33m + 35m/2 . (c) When a ∈ R\h(u − 1)2 i, θ(a) = 0. Then we have wL (ev(a)) = 33m − 32m by Equation (1).  3m Remark 5.1 By the point of Lemma 3.1 and Theorem 5.2, a family of ternary linear code of length N = (33m+1 − 32m+1 )/2, dimension 3m, with three nonzero weights w1 < w2 < w3 of values has been constructed. In detail, we list the weight distribution of φ(Cm ) in Table I. Notice that the parameters are different from those 6 MINJIA SHI, DAITAO HUANG, AND PATRICK SOLÉ in [7, 9, 20]. Thus, the obtained code in Theorem 5.2 are new. Table I. weight distribution of φ(Cm ) Weight Frequency 0 1 m w1 = 33m − 35m/2 f1 = 3 2−1 w2 = 33m − 32m f2 = 33m − 3m m 3m 5m/2 w3 = 3 + 3 f3 = 3 2−1 Example 5.1 Let m = 2. We obtain a ternary code of parameters [972, 6, 486]. The nonzero weights are 486, 648 and 972, of frequencies 4, 720 and 4, respectively. 5.1.2. m is odd. Note that G(η) is imaginary, which implies that ℜ(Q) = ℜ(N ) = − 21 . The following lemma is a special case of Lemma 2 in [20]. P2 Lemma 5.3 ([20], Lemma 2). s=1 θ(sa) = 2ℜ(θ(a)). By a similar approach in the proof of Theorem 5.2 and combining Lemma 5.3, it is not difficult to obtain the following theorem. Theorem 5.4. Assume m is odd. For a ∈ R, the Lee weight of codewords of C(m) is given below: (a) If a = 0, then wL (ev(a)) = 0; (b) If a = (u − 1)2 a3 , with a3 ∈ F∗3m ,then wL (ev(a)) = 33m ; (c) If a ∈ R\h(u − 1)2 i, then wL (ev(a)) = 33m − 32m . Proof. The proofs of the cases (a) and (c) are similar to that of Theorem 5.2. The case (b) follows from Lemma 5.3 applied to the correlation lemma. Thus ℜ(θ(a)) = −32m+1 /2, and 3wL (ev(a)) = 2N − 2ℜ(θ(a)), which implies wL (ev(a)) = 33m . The result follows.  Example 5.2 Let m = 1. We obtain a ternary code of parameters [27, 3, 18]. The nonzero weights are 18 and 27, of frequencies 24 and 2, respectively. 5.2. The case when L = R∗ . In this subsection, we will construct an infinite family of two-weight codes on the condition that L = R∗ . Theorem (a) If (b) If (c) If 5.5. For a ∈ R, the Lee weight of codewords of C(m) is given below: a = 0, then wL (ev(a)) = 0; a = (u − 1)2 a3 , with a3 ∈ F∗3m , then wL (ev(a)) = 2 · 33m ; a ∈ R\h(u − 1)2 i, then wL (ev(a)) = 2(33m − 32m ). Proof. By a similar approach in the proof of Theorem 5.2, the result follows, so we omit the details here.  Example 5.3 Let m = 1. We obtain a ternary code of parameters [54, 3, 36]. The nonzero weights are 36 and 54, of frequencies 24 and 2, respectively. Example 5.4 Let m = 2. We obtain a ternary code of parameters [1944, 6, 1296]. The nonzero weights are 1296 and 1458, of frequencies 720 and 8, respectively. Remark 5.2 Comparing with [4, 19, 20], we obtain two new families of ternary two-weight codes based on the obtained trace codes over R in Theorem 5.4 and Theorem 5.5. The weight distribution is listed in Table II. SOME TERNARY CUBIC TWO-WEIGHT CODES 7 Table II. weight distribution of φ(Cm ) from Theorems 5.4 and 5.5 Weight Frequency 0 1 f1′ = 33m − 3m w1′ = 33m − 32m w2′ = 33m f2′ = 3m − 1 0 1 f1′′ = 33m − 3m w1′′ = 2(33m − 32m ) w2′′ = 2 · 33m f2′′ = 3m − 1 6. Optimality of the image codes In the previous section, we have constructed two new infinite families of ternary two-weight codes and a new family of three-weight ternary codes. Now we study their optimality. Theorem 6.1. The image codes φ(C(m)) of length 3|L| are optimal based on the following cases (i) m is odd and L = L′ in Theorem 5.4; (ii) m is a positive integer and L = R∗ in Theorem 5.5. Proof. Recall the 3-ary version of the Griesmer bound. If [N, K, d] are the parameters of a linear ternary code. Then K−1 Xldm ≤ N. 3j j=0 In the case of (i), N = (33m+1 − 32m+1 )/2, K = 3m, d = 33m − 32m . The ceiling function takes two values depending on the position of j. 3m−j • 0 ≤ j ≤ 2m ⇒ ⌈ d+1 − 32m−j + 1. 3j ⌉ = 3 d+1 • 2m < j ≤ 3m − 1 ⇒ ⌈ 3j ⌉ = 33m−j . K−1 Xl j=0 d + 1m 3j = 2m X j=0 = (3 (33m−j − 32m−j + 1) + 3m+1 −3 2m+1 3m−1 X 33m−j j=2m+1 )/2 + 2m − 1 > N, which collapses to m ≥ 1. Thus, this completed the proof of the case (i). For case (ii), we have N = (33m+1 − 32m+1 ), K = 3m, d = 2(33m − 32m ). By a simple calculation, we can easily obtain that K−1 3m−1 2m X ld + 1m X X 3m−j 2m−j 2 · 33m−j (2(3 − 3 ) + 1) + = j 3 j=0 j=2m+1 j=0 = which collapses to m ≥ 1. 33m+1 − 32m+1 + 2m − 1 > N,  7. The dual Lee distance of the trace code Similar to Lemma 3 and Theorem 4 in [20], we can calculate the dual distance of the obtained trace code. We still prove them for completeness. Lemma 7.1. If for all a ∈ R, we have that T r(ax) = 0, then x = 0. Proof. The proof is similar to that of Lemma 3.1, we omit it here.  8 MINJIA SHI, DAITAO HUANG, AND PATRICK SOLÉ Theorem 7.2. For all m ≥ 1, the dual Lee distance d′ of C(m) is 2. Proof. First, we check that d′ ≥ 2. The approach is the same as Theorem 7.2 in [20]. Now we will prove it by showing that C(m)⊥ does not contain a codeword of Lee weight one. If it does, let us assume first that it has value αuj 6= 0 at some x ∈ L, where j = 0, 1, 2. This implies that ∀a ∈ R, αuj T r(ax) = 0, or, T r(aαuj x) = 0, and by Lemma 7.1, we have x = 0, which contradicts the assumption. So d′ ≥ 2. Next, we show that d′ < 3. If not, we can apply the sphere-packing bound to φ(C(m)⊥ ). Naturally, we obtain 33m ≥ 1 + |L|(3 − 1), where |L| = |L′ | or |L| = |R∗ |. That implies (3 − 2 · 3m )32m ≥ 1 or 32m+1 (2 − 5 · 3m−1 ) ≥ 1, respectively. It is a contradiction when m ≥ 1. In summary, d = 2.  8. Application to secret sharing schemes 8.1. Determining minimal vectors. It is interesting to determine minimal vectors of a given p-ary linear code. Minimal vectors in linear codes arise in numerous applications, particularly, in studying linear secret sharing schemes (SSS). We say that a minimal vector of a linear code C is a nonzero codeword that does not cover any other nonzero codeword. The basic property minimal vector of a given p-ary linear code was described by the following lemma [1]. Lemma 8.1. (Ashikhmin-Barg) Denote by w0 and w∞ the minimum and maximum nonzero weights of a p-ary linear code C, respectively. If p−1 w0 > , w∞ p then every nonzero codeword of C is minimal. Next, under Lemma 8.1, we investigate the minimal vectors of the three-weight and two-weight codes which constructed in Section 5. Proposition 8.2. All the nonzero codewords of the image codes φ(C(m)) are minimal based on the following three cases (i) m(≥ 6) is singly-even and L = L′ in Theorem 5.2. (ii) m(≥ 1) is odd and L = L′ in Theorem 5.4. (iii) m is a positive integer and L = R∗ in Theorem 5.5. Proof. In the case of (1), by the preceding lemma with w0 = w1 , and w∞ = w3 . Rewriting the inequality of the lemma as 3w1 > (3 − 1)w3 , we end up with the condition 3 · 33m − 3 · 35m/2 > 2 · 33m + 2 · 35m/2 . Since m is singly-even. The condition follows from the fact that 3m/2 ≥ 5. The proof of other cases are similar to those of the case (1), we omit them here.  SOME TERNARY CUBIC TWO-WEIGHT CODES 9 8.2. Secret sharing schemes. The purpose of determining minimal vectors is to determine the sets of all minimal access sets of a secret sharing scheme (SSS). An SSS were first introduced by Blakly and Shamir at the end of 70s twentieth antury. Massey’s scheme is one of the famous SSS. Massey’s scheme is a construction of such a scheme where a code C of length N over Fp . On the other hand, it is worth mentioning when all nonzero codewords are minimal, it was shown in [10] that there is the following alternative, depending on d′ : • If d′ ≥ 3, then the SSS is “democratic”: every user belongs to the same number of coalitions. • If d′ = 2, then there are users who belong to every coalition: the “dictators”. Depending on the application, one or the other situation might be more suitable. By Proposition 8.2 and Theorem 7.2, we see that three Secret Sharing Schemes built on the image codes φ(C(m)) in Theorems 5.2, 5.4 and 5.5 are dictatorial. 9. Conclusion This paper is devoted to the study of trace codes with defining set L included in an extension of degree m of the alphabet, the local ring F3 + uF3 + u2 F3 with u3 = 1. These codes are abelian, and their ternary images are quasi-cyclic of coindex three (a.k.a. cubic codes). Their Lee weight distributions are computed by using Gauss sums (see Table I and Table II). These codes have three nonzero weights 3m 2m 3m 2m . When m is odd, and |L| = 3 −3 , or when m is singly-even and |L| = 3 −3 2 2 |L| = 33m − 32m and m is a positive integer, we obtain two new infinite family of two-weight codes. Both are shown to be optimal, by application of the Griesmer bound. Applications of the image codes to secret sharing schemes are also given. It would be interesting to replace our Gaussian periods Q, N by other character sums that are amenable to exact evaluation, in the vein of the sums which appear in the study of irreducible cyclic codes [11, 16]. This would lead to other enumerative results of codes with few weights. The parameters of the two-weight codes we constructed are different from those in the classic paper [4], and also from more recent constructions like [12, 17, 18]. Writing a new survey on two-weight codes seems like a challenging but very useful project. 10. Acknowledgement This research is supported by National Natural Science Foundation of China (61672036), the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (2015D11), Technology Foundation for Selected Overseas Chinese Scholar, Ministry of Personnel of China (05015133) and Key Projects of Support Program for outstanding young talents in Colleges and Universities (gxyqZD2016008). References [1] Ashikhmin, A., Barg, A.: Minimal vectors in linear codes, IEEE Transactions on Information Theory, 44, 2010–2017 (1998) [2] Bonnecaze, A., Bracco, A.D., Dougherty, S.T., Nochefranca, L.R., Solé, P.: Cubic self-dual binary codes, IEEE Transactions on Information Theory, 49, 2253–2259 (2003) 10 MINJIA SHI, DAITAO HUANG, AND PATRICK SOLÉ [3] Calderbank, A.R., Goethals, J.M.: Three weight codes and association schemes, Philips J. Res. 39, 143–152 (1984) [4] Calderbank, R., Kantor, W.M.: The geometry of two-weight codes, Bull. London Math. Soc., 18, 97–122 (1986) [5] Courteau, B., Wolfmann, J.: On triple sum sets and three weight codes, Discrete Mathematics 50, 179–191 (1984) [6] Delsarte, P.: Weights of linear codes and strongly regular normed spaces, Discrete Mathematics 3, 47–64 (1972) [7] Ding, C., Gao, Y., Zhou, Z.: Five families of three-weight ternary cyclic codes and their duals, IEEE Transactions on Information Theory, 59, 7940–7946 (2013) [8] Ding, C., Kløve, T., Sica, F.: Two classes of ternary codes and their weight distributions, Discrete Applied Mathematics, 111, 37–53 (2001) [9] Ding, C., Li, C., Li, N., Zhou, Z.: Three weight cyclic codes and their weight distribution, Discrete Mathematics, 339, 415–427 (2016) [10] Ding, C., Yuan, J.: Covering and secret sharing with linear codes, Springer LNCS 2731, 11–25 (2003) [11] Ding, C., Yang, J.: Hamming weights in irreducible cyclic codes, Discrete Mathematics, 313, 434–446 (2015) [12] Ding, K., Ding, C.: A class of two-weight and three-weight codes and their applications in secret sharing, IEEE Transactions on Information Theory, 61, 5835–5842 (2015) [13] Li, N., Li, C., Helleseth, T., Tang, X.: Optimal ternary cyclic codes with minimum distance four and five, Finite Fields and Their Applications, 30, 100–120 (2013) [14] Ling, S., Solé, P.: On the algebraic structure of quasi-cyclic codes I, Finite fields, IEEE Transtions on Information Theory, 47 2751–2760 (2001) [15] MacWilliams, F. J., Sloane, N.J.A.: The theory of error-correcting codes, North-Holland (1977) [16] McEliece, R.J., Rumsey, H.Jr.: Euler products, cyclotomy, and coding, J. Number Theory, 4, 302–311 (1972) [17] Shi, M., Liu, Y., Solé, P.: Optimal two weight codes from trace codes over a non-chain ring, Discrete Applied Mathematics, (Accepted). [18] Shi, M., Liu, Y., Solé, P.: Optimal two weight codes from trace codes over F2 + uF2 , IEEE Communications Letters, http://ieeexplore.ieee.org/document/7582413/ [19] Shi, M., Wang, D., Solé, P.: Linear codes over F3 + uF3 + u2 F3 , MacWilliams identities, optimal ternary codes from one-Lee weight codes and two-Lee weight codes, Journal of Applied Mathematics and Computing, 51, 527–544 (2016) [20] Shi, M., Wu, R., Liu, Y., Solé, P.: Two and three weight codes over Fp + uFp , Cryptography and Communications-Discrete Structures, Boolean Functions and Sequences, DOI 10.1007/s12095-016-0206-5 [21] Yuan, J., Ding, C.: Secret sharing schemes from three classes of linear codes, IEEE Transactions on Information Theory, 52, 206–212 (2006) [22] Zhou, Z., Ding C.: Seven classes of three-weight cyclic codes, IEEE Transactions on Communications, 25, 4120–4126 (2013) E-mail address: [email protected] E-mail address: [email protected] E-mail address: [email protected]