Submitted:
13 February 2026
Posted:
14 February 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Literature Review
- 1.
- The algebraic foundations of linear codes, including generator matrices, parity-check matrices, and structural parameters, are classical and well established; see, for instance, [12,15,16]. These works provide the basic framework for understanding linear codes as vector spaces over finite fields and for analyzing their fundamental parameters.
- 2.
- Generalized Hamming weights (GHWs), introduced by Wei [18], extend the notion of minimum distance and have become central invariants in the structural analysis of linear codes. Subsequent developments connected GHWs with algebraic and combinatorial objects, particularly through the study of matroids and Stanley-Reisner ideals. In this direction, Johnsen and Verdure [6,7] established a deep relationship between GHWs and graded free resolutions, while García-Marco et al. [5] further explored these ideas in the binary case. These results highlight the role of GHWs as tools for understanding the internal structure of linear codes beyond error-correcting capabilities.
- 3.
- From the algebraic point of view, polynomial rings and monomial orders play an important role in the study of linear codes and their associated ideals; see, e.g., [11]. Degree-compatible monomial orders provide a natural way to organize monomials according to their weight, making them suitable for linking algebraic structures with combinatorial properties of codes.
- 4.
- Information dispersal algorithms (IDA) were introduced by Rabin [1,2,14] as a method for distributing information among multiple participants in a fault-tolerant manner. Classical constructions of IDA usually use matrices from large finite fields, such as Vandermonde or Cauchy matrices, to ensure the existence of invertible submatrices [19]. While these approaches are effective, they inherently depend on non-binary fields.
1.2. Contributions
- An algebraic method is introduced for selecting a basis of an binary linear code by combining GHWs with a degree-compatible monomial order on the polynomial ring . The resulting basis reflects the hierarchy of supports determined by the GHWs of the code.
- Under the structural assumptions and , we prove that the basis obtained through this construction yields a generator matrix containing at least one invertible submatrix. This result establishes a direct link between GHWs and the existence of invertible substructures in binary generator matrices.
- We provide a systematic procedure for identifying an invertible submatrix from the generator matrix associated with the constructed basis. The procedure is derived from the algebraic properties of the selected codewords and does not rely on probabilistic or numerical arguments.
- Based on the above structural results, we formalize an information dispersal and reconstruction scheme defined entirely over the binary field. The correctness of the reconstruction follows from the algebraic properties of the constructed basis and the imposed GHWs conditions.
2. Preliminaries
2.1. Linear Codes and Information Dispersal Algorithm
- 1.
- n, the length of the codewords;
- 2.
- k, the dimension of C as a vector space over ;
- 3.
- d, the minimum distance of C.
- 1.
- ;
- 2.
- (Generalized Singleton Bound) .
- 1.
- for all ;
- 2.
- if and , then .
- 1.
- ; or
- 2.
- and for .
- M denotes the plaintext message;
- P is the set of participants;
- t is the reconstruction threshold.
- the input consists of a subset and the corresponding shares;
- if , the algorithm reconstructs M;
- otherwise, it produces an error symbol (e.g.,ERROR).
-
(Decoding) For every subset with ,.
3. An Algebraic Framework for Code-Based IDA/IRA Schemes
- 1.
- ,
- 2.
- , where , , and if and .
- 1.
-
Compute the codewords in the subset of C defined by,where , , and whenever and .
- 2.
- Order the elements of according to the order ≺ for obtain the sequence of codewords .
- 3.
- Output: The ordered set of codewords .
- 1.
- Apply Algorithm 3.1 to the -binary linear code C to obtain a basis of C.
- 2.
- Convert the plaintext M into its binary representation, yielding a vector (or a set of vectors) .
- 3.
- Define . Multiply F (on the right) by A to obtain the dispersal vector d, i.e., .
- 4.
- Define .
- 5.
- Output: The dispersal vector d, the matrix A of size and the threshold t.
- 1.
- Consider and denote by , , the rows of A. If , remove the row . Repeat this step until all remaining rows satisfy , or until deletions are performed. If A contains no repeated rows, proceed to the next step.
- 2.
- For each , if a row in A, remove that row.
- 3.
- Suppose steps 1 and 2 result in t and s row deletions respectively, with . Identify rows of A such that for all , and remove such rows. Repeat until a total of q additional deletions is performed so that .
- 4.
- After deleting rows, rename the resulting column vectors of A as , and define the matrix .
- 5.
- Solve the linear system for d, i.e., compute .
- 6.
- Output: The dispersion vector d.
4. Analysis and Results
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Appendix A Algorithm for Computing the Generalized Hamming Weights of an [n,k]-Binary Linear Code
| Algorithm A1:Computation of the GHWs of a binary linear code |
|
References
- Auleriano, I.; Chen, A.; D’olivera, R. Optimal Computational Secret Sharing. IEEE International Symposium on Information Theory (ISIT) 2025, 1–10. [Google Scholar]
- Beimel, A. Secret-Sharing Schemes for General Access Structures: An Introduction, 1st ed.; University of the Negev, Israel, 2025; pp. 10–97. [Google Scholar]
- Dertil, R.; Eren, S. Secret Sharing Schemes Based on Linear Codes over F2RS. Asian J. Math Appl. 2025, 9. [Google Scholar]
- Deyanira, M. Evaluación de rendimiento del Algoritmo de Dispersión de Información sobre los campos finitos GF(28) y GF(216). Master of Science in Information Technology, Autonomous Metropolitan University, CDMX, 2019. [Google Scholar]
- García-Marco, I.; Márquez-Corbella, I.; Martínez-Moro, E.; Pitones, Y. Free Resolutions and Generalized Hamming Weights of Binary Linear Codes. Mathematics 2022, 10, 2079. [Google Scholar] [CrossRef]
- Johnsen, T.; Verdure, H. Hamming weights and Betti numbers of Stanley-Reisner rings associated to matroids. Appl. Algebra Eng. Commun. Comput. 2013, 24, 73–93. [Google Scholar] [CrossRef]
- Johnsen, T.; Verdure, H. Stanley-Reisner resolution of constant weight linear codes. Designs, Codes and Cryptography 2012, 72. [Google Scholar] [CrossRef]
- Ling, M.; Xing, C. Coding Theory: A First Course, 1st ed.; Cambridge University Press, USA, 2004; pp. 39–66. [Google Scholar]
- Li, Mingqiang. On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes. ArXiv 2012, abs/1206.4123. [Google Scholar]
- Lin, S. J.; Chung, W. H. An Efficient (n,k) Information Dispersal Algorithm Based on Fermat Number Transforms. IEEE 2013, 8, 1371–1383. [Google Scholar]
- Márquez-Corbella, I.; Martínez-Moro, E.; Suárez-Canedo, E. On the ideal associated to a linear code. Adv. Math. Commun. 2016, 10, 229–254. [Google Scholar] [CrossRef]
- Pless, V.; Huffman, W. C. Fundamentals of Error-Correcting Codes, 1st ed.; New York, USA, 2003; pp. 1–52. [Google Scholar]
- Qian, Q.; Yu, ZT.; Zhang, R.; Hung, CH. A multi-layer information dispersal based encryption algorithm andits application for access control. Sustainable Computing: Informatics and Systems 2018, 20, 76–87. [Google Scholar]
- Rabin, M. O. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 1989, 36, 335–348. [Google Scholar] [CrossRef]
- Ron, M. Introduction to Coding Theory, 2nd ed.; Cambridge University Press: UK, 2006; pp. 26–47. [Google Scholar]
- Van Lint, J.; Van der Geer, G. Introduction to Coding Theory and Algebraic Geometry, 1st ed.; Boston, Berlin, USA, Germany, 1998; pp. 11–28. [Google Scholar]
- Velázquez, B.; Marcelín, R. Estudio sobre el desempeño del Algoritmo de Dispersión de Información. CIAI 2018. [Google Scholar]
- Wei, V. K. Generalized Hamming weights for linear codes. IEEE Trans. Inf. Theory 1991, 37, 1412–1418. [Google Scholar] [CrossRef]
- Wijayanto, A.; Harjito, B. Reduce Rounding Off Errors in Information Dispersal Algorithm. IC3INA 2019, 36–40. [Google Scholar]
- Zaldivar, F. Introducción al álgebra lineal, 1st ed.; Universidad Nacional Autónoma de México: México, 2019; pp. 1–48. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).