Advanced Search
Turn off MathJax
Article Contents
CHENG Hongli, ZHU Shixin. A Class of Double-twisted Generalized Reed-Solomon Codes and Their Extended Codes[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251045
Citation: CHENG Hongli, ZHU Shixin. A Class of Double-twisted Generalized Reed-Solomon Codes and Their Extended Codes[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251045

A Class of Double-twisted Generalized Reed-Solomon Codes and Their Extended Codes

doi: 10.11999/JEIT251045 cstr: 32379.14.JEIT251045
Funds:  The National Natural Science Foundation of China (12171134, U21A20428)
  • Received Date: 2025-09-30
  • Accepted Date: 2025-12-29
  • Rev Recd Date: 2025-12-24
  • Available Online: 2026-01-17
  •   Objective  Twisted Generalized Reed-Solomon (TGRS) codes have attracted considerable attention in coding theory due to their flexible structural properties. However, studies on their extended codes remain limited. Existing results indicate that only a small number of works examine extended TGRS codes, leaving gaps in the understanding of their error-correcting capability, duality properties, and applications. In addition, previously proposed parity-check matrix forms for TGRS codes lack clarity and do not cover all parameter ranges. In particular, the case h = 0 is not addressed, which limits applicability in scenarios requiring diverse parameter settings. Constructing non-Generalized Reed-Solomon (non-GRS) codes is of interest because such codes resist Sidelnikov-Shestakov and Wieschebrink attacks, whereas GRS codes are vulnerable. Maximum Distance Separable (MDS) codes, self-orthogonal codes, and almost self-dual codes are valued for their error-correcting efficiency and structural properties. MDS codes achieve the Singleton bound and are essential for distributed storage systems that require data reliability under node failures. Self-orthogonal and almost self-dual codes, due to their duality structures, are applied in quantum coding, secret sharing schemes, and secure multi-party computation. Accordingly, this paper aims to: (1) characterize the MDS and Almost MDS (AMDS) properties of double-twisted GRS codes $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v}) $ and their extended codes $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v},{\boldsymbol{\infty}}) $; (2) derive explicit and unified parity-check matrices for all valid parameter ranges, including h = 0; (3) establish non-GRS properties under specific parameter conditions; (4) provide necessary and sufficient conditions for self-orthogonality of the extended codes and almost self-duality of the original codes; and (5) construct a class of almost self-dual double-twisted GRS codes with flexible parameters for secure and reliable communication systems.  Methods   The study is based on algebraic coding theory and finite field methods. Explicit parity-check matrices are derived using properties of polynomial rings over $ {F}_{q} $, Vandermonde matrix structures, and polynomial interpolation. The Schur product method is applied to determine non-GRS properties by comparing the dimensions of the Schur squares of the codes and their duals with those of GRS codes. Linear algebra and combinatorial techniques are used to characterize MDS and AMDS properties. Conditions are obtained by analyzing the nonsingularity of generator-matrix submatrices and solving systems involving symmetric sums of finite field elements. These conditions are expressed using the sets $ {S}_{k}(\boldsymbol{\alpha },\boldsymbol{\eta }) $,$ {L}_{k}(\boldsymbol{\alpha },\boldsymbol{\eta }) $, and $ {D}_{k}(\boldsymbol{\alpha },\boldsymbol{\eta }) $. Duality theory is used to study orthogonality. A code C is self-orthogonal if $ C\subseteq {C}^{\bot } $ and its generator matrix satisfies $ {\boldsymbol{G}}{{\boldsymbol{G}}}^{\rm T}=\boldsymbol{O} $. For almost self-dual codes with odd length and dimension-(n-1)/2, this condition is combined with the structure of the dual code and symmetric sum relations of αi to obtain necessary and sufficient conditions.  Results and Discussions   For MDS and AMDS properties, the following results are obtained. The extended double-twisted GRS code $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v},{\boldsymbol{\infty}}) $ is MDS if and only if $ 1\notin {S}_{k}(\boldsymbol{\alpha },\boldsymbol{\eta }) $ and $ 1\notin {L}_{k}(\boldsymbol{\alpha },\boldsymbol{\eta }) $. The double-twisted GRS code $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v}) $ is AMDS if and only if $ 1\in {S}_{k}(\boldsymbol{\alpha },\boldsymbol{\eta }) $ and $ (0,1)\notin {D}_{k}(\boldsymbol{\alpha },\boldsymbol{\eta }) $. The code $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v}) $$ (0,1)\in {D}_{k}(\boldsymbol{\alpha },\boldsymbol{\eta }) $. Unified parity-check matrices of $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v}) $ and $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v},{\boldsymbol{\infty}}) $ are derived for all $ 0\leq h\leq k-1 $, removing previous restrictions that exclude h = 0. For non-GRS properties, when $ k\geq 4 $ and $ n-k\geq 4 $, both $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v}) $ and its extended code $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v},{\boldsymbol{\infty}}) $ are non-GRS for both $ 2k\geq n $ or $ 2k \lt n $. This conclusion follows from the fact that the dimensions of their Schur squares exceed those of the corresponding GRS codes, which ensures resistance to Sidelnikov-Shestakov and Wieschebrink attacks. Regarding orthogonality, the extended code $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v},{\boldsymbol{\infty}}) $ with $ h=k-1 $ is self-orthogonal under specific algebraic conditions. The code $ {C}_{k,\boldsymbol{h},\boldsymbol{\eta }}(\boldsymbol{\alpha },\boldsymbol{v}) $ with $ h=k-1 $ and $ n=2k+1 $ is almost self-dual if and only if there exists $ \lambda \in F_{q}^{*} $ such that $ \lambda {u}_{j}=v_{j}^{2} (j=1,\cdots ,2k+1) $ together with a symmetric sum condition on $ {\alpha }_{i} $ involving $ {\eta }_{1} $ and $ {\eta }_{2} $. For odd prime power $ q $, an almost self-dual code with parameters $ [q-t-1,(q-t-2)/2,\geq (q-t-2)/2] $ is constructed using the roots of $ m(x)=({x}^{q}-x)/f(x) $ where $ f(x)={x}^{t+1}-x $. An example over $ {F}_{11} $ yields a $ [5,2,\geq 2] $ code.  Conclusions   The study advances the theory of double-twisted GRS codes and their extensions through five contributions: (1) complete characterization of MDS and AMDS properties using sets $ {S}_{k} $,$ {L}_{k} $,$ {D}_{k} $; (2) unified parity-check matrices for all $ 0\leq h\leq k-1 $; (3) non-GRS properties are established for $ k\geq 4 $, ensuring resistance to known structural attacks; (4) necessary and sufficient conditions for self-orthogonal extended codes and almost self-dual original codes are obtained; (5) a flexible construction of almost self-dual double-twisted GRS codes is proposed. These results extend the theoretical understanding of TGRS-type codes and support the design of secure and reliable coding systems.
  • loading
  • [1]
    HUFFMAN W C and PLESS V. Fundamentals of Error-Correcting Codes[M]. Cambridge: Cambridge University Press, 2003: 71–72. doi: 10.1017/CBO9780511807077.
    [2]
    THOMAS A and RAJAN B S. Binary informed source codes and index codes using certain near-MDS codes[J]. IEEE Transactions on Communications, 2018, 66(5): 2181–2190. doi: 10.1109/TCOMM.2018.2789457.
    [3]
    ZHOU Yousheng, WANG Feng, XIN Yang, et al. A secret sharing scheme based on near-MDS codes[C]. 2009 IEEE International Conference on Network Infrastructure and Digital Content, Beijing, China, 2009: 833–836. doi: 10.1109/ICNIDC.2009.5360821.
    [4]
    CADAMBE V R, HUANG Cheng, and LI Jin. Permutation code: Optimal exact-repair of a single failed node in MDS code based distributed storage systems[C]. 2011 IEEE International Symposium on Information Theory Proceedings, St. Petersburg, Russia, 2011: 1225–1229. doi: 10.1109/ISIT.2011.6033730.
    [5]
    KIM J L and LEE Y. Euclidean and Hermitian self-dual MDS codes over large finite fields[J]. Journal of Combinatorial Theory, Series A, 2004, 105(1): 79–95. doi: 10.1016/j.jcta.2003.10.003.
    [6]
    FANG Xiaolei, LIU Meiqing, and LUO Jinquan. New MDS Euclidean self-orthogonal codes[J]. IEEE Transactions on Information Theory, 2021, 67(1): 130–137. doi: 10.1109/TIT.2020.3020986.
    [7]
    WU Rongsheng and SHI Minjia. A modified Gilbert-Varshamov bound for self-dual quasi-twisted codes of index four[J]. Finite Fields and Their Applications, 2020, 62: 101627. doi: 10.1016/j.ffa.2019.101627.
    [8]
    MACWILLIAMS F J and SLOANE N J A. The Theory of Error-Correcting Codes[M]. Amsterdam: North-Holland Publishing Company, 1977: 303–305. doi: 10.1137/1022103.
    [9]
    BEELEN P, PUCHINGER S, and NIELSEN J R N. Twisted Reed-Solomon codes[C]. 2017 IEEE International Symposium on Information Theory, Aachen, Germany, 2017: 336–340. doi: 10.1109/ISIT.2017.8006545.
    [10]
    SUI Junzhen, YUE Qin, and SUN Fuqing. New constructions of self-dual codes via twisted generalized Reed-Solomon codes[J]. Cryptography and Communications, 2023, 15(5): 959–978. doi: 10.1007/s12095-023-00644-4.
    [11]
    ZHU Canze and LIAO Qunying. The (+)-extended twisted generalized Reed-Solomon code[J]. Discrete Mathematics, 2024, 347(2): 113749. doi: 10.1016/j.disc.2023.113749.
    [12]
    ZHU Canze and LIAO Qunying. A class of double-twisted generalized Reed-Solomon codes[J]. Finite Fields and Their Applications, 2024, 95: 102395. doi: 10.1016/j.ffa.2024.102395.
    [13]
    DING Yun and ZHU Shixin. New self-dual codes from TGRS codes with general $ \ell $ twists[J]. Advances in Mathematics of Communications, 2025, 19(2): 662–675. doi: 10.3934/amc.2024017.
    [14]
    BEELEN P, BOSSERT M, PUCHINGER S, et al. Structural properties of twisted Reed-Solomon codes with applications to cryptography[C]. 2018 IEEE International Symposium on Information Theory, Vail, USA, 2018: 946–950. doi: 10.1109/ISIT.2018.8437923.
    [15]
    ZHAO Chun’e, MA Wenping, YAN Tongjiang, et al. Research on the construction of maximum distance separable codes via arbitrary twisted generalized Reed-Solomon codes[J]. IEEE Transactions on Information Theory, 2025, 71(7): 5130–5143. doi: 10.1109/TIT.2025.3563664.
    [16]
    FANG Weijun and XU Jingke. Deep holes of twisted Reed-Solomon codes[C]. 2024 IEEE International Symposium on Information Theory, Athens, Greece, 2024: 488–493. doi: 10.1109/ISIT57864.2024.10619676.
    [17]
    YAN Qianqian and ZHOU Junling. Mutually disjoint Steiner systems from BCH codes[J]. Designs, Codes and Cryptography, 2024, 92(4): 885–907. doi: 10.1007/s10623-023-01319-0.
    [18]
    LI Zhuo, XING Lijuan, and WANG Xinmei. Quantum generalized Reed-Solomon codes: Unified framework for quantum maximum-distance-separable codes[J]. Physical Review A, 2008, 77(1): 012308. doi: 10.1103/PhysRevA.77.012308.
    [19]
    LI Yang, ZHU Shixin, and SUN Zhonghua. Covering radii and deep holes of two classes of extended twisted GRS codes and their applications[J]. IEEE Transactions on Information Theory, 2025, 71(5): 3516–3530. doi: 10.1109/TIT.2025.3541799.
    [20]
    SUN Zhonghua, DING Cunsheng, and CHEN Tingfang. The extended codes of some linear codes[J]. Finite Fields and Their Applications, 2024, 96: 102401. doi: 10.1016/j.ffa.2024.102401.
    [21]
    LIU Hongwei and PAN Xu. Galois hulls of linear codes over finite fields[J]. Designs, Codes and Cryptography, 2020, 88(2): 241–255. doi: 10.1007/s10623-019-00681-2.
    [22]
    LIDL R and NIEDERREITER H. Finite Fields[M]. Cambridge: Cambridge University Press, 1996: 513–516. doi: 10.1017/CBO9780511525926.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (75) PDF downloads(11) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return