Research article

On the construction of constacyclically permutable codes from constacyclic codes

  • Received: 28 February 2024 Revised: 25 March 2024 Accepted: 29 March 2024 Published: 03 April 2024
  • MSC : 94B15, 94B60

  • In this paper, we propose a way to partition any constacyclic code over a finite field in its equivalence classes according to the algebraic structure of the code. Such a method gives the generalization of cyclically permutable codes (CPCs), which are called constacyclically permutable codes (CCPCs), and it is useful to derive a CCPC from a given constacyclic code. Moreover, we present an enumerative formula for the code size of such a CCPC, with all of the terms being positive integers, and we provide an algebraic method to produce such a CCPC.

    Citation: Guanghui Zhang, Shuhua Liang. On the construction of constacyclically permutable codes from constacyclic codes[J]. AIMS Mathematics, 2024, 9(5): 12852-12869. doi: 10.3934/math.2024628

    Related Papers:

    [1] Wei Qi . The polycyclic codes over the finite field $ \mathbb{F}_q $. AIMS Mathematics, 2024, 9(11): 29707-29717. doi: 10.3934/math.20241439
    [2] Xiying Zheng, Bo Kong, Yao Yu . Quantum codes from $ \sigma $-dual-containing constacyclic codes over $ \mathfrak{R}_{l, k} $. AIMS Mathematics, 2023, 8(10): 24075-24086. doi: 10.3934/math.20231227
    [3] Fatma Zehra Uzekmek, Elif Segah Oztas, Mehmet Ozen . $ (\theta_i, \lambda) $-constacyclic codes and DNA codes over $ \mathbb{Z}_{4}+u\mathbb{Z}_{4}+u^{2}\mathbb{Z}_{4} $. AIMS Mathematics, 2024, 9(10): 27908-27929. doi: 10.3934/math.20241355
    [4] Hongfeng Wu, Li Zhu . Repeated-root constacyclic codes of length $ p_1p_2^t p^s $ and their dual codes. AIMS Mathematics, 2023, 8(6): 12793-12818. doi: 10.3934/math.2023644
    [5] Irwansyah, Intan Muchtadi-Alamsyah, Fajar Yuliawan, Muhammad Irfan Hidayat . Generalized Reed-Solomon codes over number fields and exact gradient coding. AIMS Mathematics, 2024, 9(4): 9508-9518. doi: 10.3934/math.2024464
    [6] Yanyan Gao, Yangjiang Wei . Group codes over symmetric groups. AIMS Mathematics, 2023, 8(9): 19842-19856. doi: 10.3934/math.20231011
    [7] Ted Hurley . Ultimate linear block and convolutional codes. AIMS Mathematics, 2025, 10(4): 8398-8421. doi: 10.3934/math.2025387
    [8] Yuezhen Ren, Ruihu Li, Guanmin Guo . New entanglement-assisted quantum codes constructed from Hermitian LCD codes. AIMS Mathematics, 2023, 8(12): 30875-30881. doi: 10.3934/math.20231578
    [9] Chaofeng Guan, Ruihu Li, Hao Song, Liangdong Lu, Husheng Li . Ternary quantum codes constructed from extremal self-dual codes and self-orthogonal codes. AIMS Mathematics, 2022, 7(4): 6516-6534. doi: 10.3934/math.2022363
    [10] Shakir Ali, Amal S. Alali, Kok Bin Wong, Elif Segah Oztas, Pushpendra Sharma . Cyclic codes over non-chain ring $ \mathcal{R}(\alpha_1, \alpha_2, \ldots, \alpha_s) $ and their applications to quantum and DNA codes. AIMS Mathematics, 2024, 9(3): 7396-7413. doi: 10.3934/math.2024358
  • In this paper, we propose a way to partition any constacyclic code over a finite field in its equivalence classes according to the algebraic structure of the code. Such a method gives the generalization of cyclically permutable codes (CPCs), which are called constacyclically permutable codes (CCPCs), and it is useful to derive a CCPC from a given constacyclic code. Moreover, we present an enumerative formula for the code size of such a CCPC, with all of the terms being positive integers, and we provide an algebraic method to produce such a CCPC.



    Cyclically permutable codes (CPCs), originally introduced by Gilbert in the early 1960s [1], make up a binary block code of code length n such that each codeword has a cyclic order n and the codewords are cyclically distinct. CPCs have many applications in communication networks, for example, as protocol sequences [2,3], and in watermarking systems [4]. Additionally, non-binary CPCs have applications in direct sequence code division multiple access systems with asynchronous base stations [5], as well as in the construction of frequency-hopping sequence sets [6,7,8,9]. Therefore, they are the focus of great theoretical interest and have practical significance in the study and exploration of q-ary CPCs [5,6,10,11,12,13,14].

    Cyclic codes are considered important in theoretical studies because they posses a very rich mathematical structure. So, it seems possible to provide a useful framework to generate CPCs by choosing the codewords that are cyclically distinct and have maximal cyclic order. More specifically, one has an equivalence relationship for any cyclic code C: Two codewords of C are said to be equivalent if one can be obtained from the other by applying the cyclic shift a certain number of times. The equivalence class whose elements have full cyclic order is called a nonperiodic cyclic equivalence class (see [15] or [8]). Picking up exactly one member from each of the nonperiodic cyclic equivalence classes of C yields a CPC, which is denoted by C. Note that C is certainly not unique by its very definition, and that C is a CPC that is derived from C with the largest possible code size. There are two basic questions that are attractive for mathematical investigations and practical applications: Q1: how to determine the exact value of |C| for a given arbitrary cyclic code C where |C| denotes the size of C; Q2: how to find a general construction scheme that produces C for an arbitrary cyclic code C.

    Making use of a combinatorial technique known as the Möbius inversion formula, a group of authors, first in [16] and consequently in [17], found enumerative formulas for the value of |C|, where C is a binary simple-root cyclic code. Song et al. [8] also utilized the Möbius function to obtain an enumerative formula for the size of C, where C is a Reed-Solomon (RS) code. Combining the Möbius inversion formula with some elementary properties of cyclic codes, Xia and Fu [18] determined the value of |C|, where C is a q-ary simple-root cyclic code.

    Compared with Q1, it seems that the method for deriving CPCs from a general cyclic code is still a challenging problem, even for the binary case. Maracle and Wolverton [13] provided an efficient algorithm to generate cyclically inequivalent subsets. In [18], Xia and Fu presented several algebraic constructions of subcodes of C, where the codes C are particular classes of cyclic codes. Here, by using the check polynomial approach, Xia and Fu obtained subcodes of C from special classes of cyclic codes C, all of which have code sizes that are strictly less than |C|. Kuribayashi and Tanaka [19] first provided an efficient and systematic method to construct a C from a binary cyclic code C when the code length n is a Mersenne prime, i.e., n is a prime number in the form 2m1 for some m. Lemos-Neto and da Rocha [12] gave a necessary and sufficient condition on the generator polynomial of a cyclic code C under which any nonzero codeword of C has full cyclic order; further, in the same paper [12], the authors continued to provide an effective method to find CPCs from C, where C is a cyclic code of length n=qm1. Nguyen et al. [3] proposed a novel procedure to obtain CPCs from RS codes of lengths p1 and p+1, respectively, where p is a prime number. Using the discrete Fourier transform, Yang et al. [20] developed an efficient algorithm to produce a CPC from a p-ary cyclic code, where p is a prime number. Extending the results of [3,20], Cho et al. [21] proposed an effective algorithm to generate CPCs from a prime-length cyclic code. Recently, Bastos and Lemos-Neto [22] presented a method to obtain a CPC from a simple-root cyclic code by using the x-cyclotomic coset. More specifically, the determinant of codewords of C is dependent on that of the x-cyclotomic coset modulo h(x), where h(x) is a divisor of xn1.

    In this paper, we aim to give the generalization of CPCs, which are called constacyclically permutable codes (CCPCs), and to introduce a method to derive a CCPC from a given constacyclic code. More specifically, let C be a given λ-constacyclic code of length n over F, where λ is a nonzero element of F with order t, and ϕ be the cyclic shift of C. Two codewords c1,c2 of C are said to be equivalent if there is an integer r such that ϕr(c1)=c2. In other words, the cyclic subgroup ϕ of the automorphism group of C generated by the cyclic shift ϕ acts naturally on the constacyclic code C; then, c1 and c2 are equivalent if and only if they are in the same orbit. For an element c of C, if the length of the orbit containing c is nt, that is, nt is the least positive integer satisfying that ϕnt(c)=c, then we state that c has full constacyclic order. The orbit of size nt is called the nonperiodic constacyclic equivalence class. A CCPC generated from C is formed by taking exactly one element from each nonperiodic constacyclic equivalence class of C, denoted still as C. Similar to the case of CPCs, we focus on solving the following problem: For a given arbitrary constacyclic code C, we want to determine the exact value of |C|, where |C| denotes the size of C, and to find a general construction scheme that produces C. To this end, we use the language of group actions to reinterpret that C is merely a representative of the n-length orbits of ϕ on C, where ϕ is the cyclic subgroup of the automorphism group of C generated by the cyclic shift ϕ. One of the advantages of our new approach lies in that the codewords of C are presented in terms of the primitive idempotents of C. Based on this approach, we present a new enumerative formula for the code size of such a CCPC with all of the terms being positive integers. On the other hand, we provide an algebraic method to produce such a CCPC.

    This paper is organized as follows. We provide the basic notation and some results about constacyclic codes in Section 2. An enumerative formula for the exact value of |C| is given in Section 3. Section 4 proposes an effective method to generate C, where C is any simple-root constacyclic code, and presents an example to illustrate our main results.

    Let q be a prime power and n be a positive integer that is coprime with q. Let Fq denote a finite field with q elements and F×q denote the set of all nonzero elements of Fq, that is, F×q=Fq{0}. Let x be an indeterminate over Fq and Fq[x] be the polynomial ring in variable x with coefficients in Fq. Let Z be the set of integers, Z+ be the set of the positive integers, and N be the set of non-negative integers. For sN, let [0,s] denote the set {0,1,2,,s}. For any finite number of integers a1,a2,,aν which are not all equal to 0, we denote their greatest common divisor by gcd(a1,a2,,aν); for any finite number of integers a1,a2,,aν, none of which is equal to 0, denote their least common multiple by lcm(a1,a2,,aν), where ν2 is a positive integer. We use the notation HG to indicate that H is a subgroup of G. For the set S, let |S| denote the number of elements of S. For a,bZ, we use a|b to denote that a divides b.

    Let us review the definition of a constacyclic code. Let λ be a nonzero element of Fq, that is, λF×q. Let ϕ be the cyclic shift, as follows:

    c=(c0,c1,,cn1)ϕ(c)=(λcn1,c0,,cn2).

    A linear code C is λ-constacyclic if cC implies that ϕ(c)C. When λ=1, the λ-constacyclic code is the usual cyclic code. Since we may associate each codeword (c0,c1,,cn1) in C with a polynomial c0+c1x++cn1xn1 in the quotient ring Fq[x]/xnλ, a λ-constacyclic code of length n over Fq is an ideal of the quotient ring Fq[x]/xnλ. Write R=Fq[x]/xnλ. If c=(c0,c1,,cn1) is regarded as a polynomial c(x)=c0+c1x++cn1xn1, then ϕ(c)=ϕ(c(x))=xc(x) in R. Note that R is a principal ideal domain. Hence there is a unique monic polynomial g(x) of minimum degree in the constacyclic code C. This polynomial generates C, that is, C=g(x), and it is called the generator polynomial for C (e.g., see [23,24]).

    In this section, we explore another approach to describe constacyclic codes, involving a different type of generating polynomial other than the generator polynomial. A polynomial e(x)R is said to be idempotent in R if e2(x)=e(x). Since gcd(n,q)=1, any constacyclic code C is generated by an idempotent, that is, there exists an idempotent e(x) in R such that C=e(x)=Re(x) (see [23]). Two idempotents e(x) and f(x) are called orthogonal if e(x)f(x)=0 in R. A nonzero idempotent e(x) in R is called primitive if it cannot be written as the sum of two nonzero orthogonal idempotents in R.

    Let t be the multiplication order of λ. Then, t|(q1), which implies that gcd(q,t)=1. Noting that gcd(q,n)=1, we have that gcd(q,nt)=1. Let m be the least integer such that (nt)|(qm1) and Fqm be the finite field with qm elements. Then, there exists a primitive (nt)th root η of unity in F×qm such that λ=ηn. Thus, xnλ=n1j=0(xη1+tj). Let

    C0={(1+ti0)qj|jZ}={1,q,q2,,qk01};C1={(1+ti1)qj|jZ}={1+ti1,(1+ti1)q,(1+ti1)q2,,(1+ti1)qk11};Cs={(1+tis)qj|jZ}={1+tis,(1+tis)q,(1+tis)q2,,(1+tis)qks1},

    where 0=i0<i1<i2<<isn1 and kj is the smallest positive integer such that 1+tij(1+tij)qkj(modnt) for 0js. Therefore, C0,C1,,Cs are all distinct q-cyclotomic cosets modulo nt and form a partition of the set {1+ti|i=0,1,,n1}. Clearly, |Cj|=qkj,j=0,1,,s.

    Now, consider the factorization

    xnλ=sv=0mv(x)

    of xnλ as irreducible factors over Fq, where for v=0,1,,s,

    mv(x)=jCv(xηj).

    According to the Chinese remainder theorem, we have that

    RFq[x]/m0(x)Fq[x]/m1(x)Fq[x]/ms(x).

    For v=0,1,,s, we let Mv(x)=xnλmv(x) and Iv=Fq[x]/mv(x). Then,

    Iv=Fq[x]/mv(x)Mv(x),v=0,1,,s.

    Hence, Iv is a minimal code in R with the generator polynomial Mv(x), as well as a finite field with qkv elements for v=0,1,,s.

    Let θ0(x),θ1(x),,θs(x) be all primitive idempotents in R (see, for example, [25]). In fact, θv(x) is the generating idempotent of minimal code Iv, that is, Iv=θv(x)=Rθv(x). All of the primitive idempotents in R have the following property: For 0i,js,

    θi(x)θj(x)={θi(x),i=j;0,ij.

    Let f(x)=n1i=0aixiR, and let

    f(x)=mv(x)ψ(x)+r(x),

    where deg(r(x))<kv and 0vs. Then since there exists a polynomial φ(x) such that θv(x)=φ(x)Mv(x) (please see [26,Theorem 7.4.9]), we obtain that

    f(x)θv(x)=mv(x)θv(x)ψ(x)+r(x)θv(x)=mv(x)φ(x)Mv(x)ψ(x)+r(x)θv(x)=(xnλ)φ(x)ψ(x)+r(x)θv(x)=r(x)θv(x).

    Hence, for v=0,1,,s,

    Iv=Rθv(x)={f(x)θv(x)|f(x)R}={kv1j=0ajxjθv(x)|ajFq}. (2.1)

    In addition, the representation of each element in Iv is unique; thus |Iv|=qkv.

    For the quotient ring Fqm[x]/xnλ, there are n primitive idempotents (see, for example, [25]):

    e1+tj(x)=1nn1u=0ηu(1+tj)xu,j=0,1,,n1. (2.2)

    Then, for every u with 0un1,

    n1j=0ηu(1+tj)e1+tj(x)=n1j=0ηu(1+tj)1nn1v=0ηv(1+tj)xv=1nn1j=0n1v=0η(uv)(1+tj)xv=xu.

    This shows that

    xu=n1j=0ηu(1+tj)e1+tj(x). (2.3)

    In what follows, we determine the explicit formula for the primitive idempotents θv(x)s. Assume that θv(x)=n1u=0buxu. Then,

    1nn1j=0θv(η1+tj)ηu(1+tj)=1nn1j=0n1κ=0bκη(1+tj)κηu(1+tj)=1nn1j=0n1κ=0bκη(1+tj)(uκ)=1nn1κ=0bκn1j=0η(1+tj)(κu)=bu.

    That is to say,

    bu=1nn1j=0θv(η1+tj)ηu(1+tj). (2.4)

    On the other hand, since θv(x) is idempotent, we have that θ2v(x)=θv(x) in R; thus θ2v(ηj)=θv(ηj) for j1. Therefore, θv(ηj)=0 or 1. But, according to [26, Theorem 7.4.12], θv(x) and Mv(x) have the same zeros among the n-th roots of λ; thus

    θv(ηj)={0,ifjCv;1,ifjCv.

    Therefore,

    bu=1njCvηuj. (2.5)

    Thus, by (2.2) and (2.5), we deduce that

    θv(x)=n1u=0buxu=1nn1u=0jCvηujxu=jCvej(x). (2.6)

    Hence, we can use θv(x) to determine all of the elements of Iv in (2.1), as follows:

    kv1j=0ajxjθv(x)=kv1j=0ajn1κ=0ηj(1+tκ)e1+tκ(x)uCveu(x)=kv1j=0ajs=0κCηjκeκ(x)uCveu(x)=kv1j=0ajs=0κCηjκuCveκ(x)eu(x)=kv1j=0ajκCvηjκeκ(x)=kv1j=0ajkv1u=0ηj(1+tiv)que(1+tiv)qu(x)=kv1j=0kv1u=0ajηj(1+tiv)que(1+tiv)qu(x).

    Therefore, we get that

    R=Rθ0(x)Rθ1(x)Rθs(x), (2.7)

    where

    Rθv(x)={kv1j=0kv1u=0ajηj(1+tiv)que(1+tiv)qu(x)|ajFq}, (2.8)

    for v=0,1,,s.

    Let C be a λ-constacyclic code. Then, we can write

    C=jJRθj(x), (2.9)

    where J is a nonempty subset of [0,s], and further denote the following:

    C=jJRθj(x){0}. (2.10)

    In this section, we aim to obtain a closed formula for the exact value of |C| for a given constacyclic code C. To this end, we explore the characterization of codewords of C with full constacyclic orders.

    Lemma 3.1. Let a,b,iv,uN and ab(modn). Then, as two elements of R we have

    ηa(1+tiv)quxa=ηb(1+tiv)quxb.

    Proof. Assume that b=ns+a(sZ). Then,

    ηb(1+tiv)quxb=η(ns+a)(1+tiv)quxns+a=ηa(1+tiv)quxaηns(1+tiv)quxns.

    Notice that xn=λ=ηn and λ is an element of order t; we have

    ηns(1+tiv)quxns=ηns(1+tiv)quηns=ηnstivqu=λtivqu=1.

    This proves the result.

    Lemma 3.2. Assume that r is a positive integer and v[0,s]. Let

    a(x)=kv1j=0kv1u=0ajηj(1+tiv)que(1+tiv)qu(x)Rθv(x),

    where ajFq for 0jkv1. Then,

    (1)ϕr(e(1+tiv)qu(x))=ηr(1+tiv)que(1+tiv)qu(x);

    (2)ϕr(a(x))=kv1j=0kv1u=0ajη(j+r)(1+tiv)que(1+tiv)qu(x);

    (3)ϕr(a(x))=a(x) if and only if ntgcd(n,1+tiv)|r.

    Proof. (1) By (2.2) and Lemma 3.1, we have

    ϕr(e(1+tiv)qu(x))=xre(1+tiv)qu(x)=xr1nn1j=0ηj(1+tiv)quxj=ηr(1+tiv)qu1nn1j=0η(j+r)(1+tiv)quxj+r=ηr(1+tiv)que(1+tiv)qu(x).

    This proves part (1).

    (2) From (1) above, it follows that

    ϕr(a(x))=kv1j=0kv1u=0ajηj(1+tiv)quϕr(e(1+tiv)qu(x))=kv1j=0kv1u=0ajηj(1+tiv)quηr(1+tiv)que(1+tiv)qu(x)=kv1j=0kv1u=0ajη(j+r)(1+tiv)que(1+tiv)qu(x).

    This proves part (2).

    (3) By part (2), we see that ϕr(a(x))=a(x) if and only if ηr(1+tiv)qu=1. Notice that gcd(nt,qu)=1, gcd(t,1+tiv)=1, and gcd(ntgcd(nt,1+tiv),1+tivgcd(nt,1+tiv))=1. It follows that

    ϕr(a(x))=a(x)(nt)|r(1+tiv)qu(nt)|r(1+tiv)ntgcd(nt,1+tiv)|r1+tivgcd(nt,1+tiv)ntgcd(n,1+tiv)|r.

    This concludes the proof.

    Based on the preliminaries above, the next two results can be used to characterize the codewords with full constacyclic order for a given constacyclic code, which are discussed for the irreducible and reducible cases. These can be attributed to some number theory conditions.

    Lemma 3.3. Let v[0,s] and C=Rθv(x) be an irreducible constacyclic code generated by the primitive idempotent θv(x) as shown in (2.8). Then, we have the following:

    (1) If gcd(n,1+tiv)=1, then every nonzero element of C has full constacyclic order.

    (2) If gcd(n,1+tiv)1, then none of the nonzero elements of C has full constacyclic order.

    Proof. (1) Suppose that gcd(n,1+tiv)=1. Let a(x) be an arbitrary element in C and r0 be the least positive integer such that ϕr0(a(x))=a(x). Since ϕnt(a(x))=a(x), we have that r0|(nt). On the other hand, by Lemma 3.2(3), we get that (nt)|r0. Therefore, r0=nt, i.e., every nonzero element of C has full constacyclic order.

    (2) Suppose that gcd(n,1+tiv)1. Set r0=ntgcd(nt,1+tiv). Then, r0<nt and, by Lemma 3.2(3), it follows that ϕr0(a(x))=a(x) for every nonzero element a(x), which implies that none of the nonzero elements of C has full constacyclic order.

    Lemma 3.4. Let u2 be an integer, and let J={j1,j2,,ju}[0,s] with 0j1<j2<<jus. Let C be a constacyclic code, as shown in (2.9), and C be as in (2.10). Then, we have the following:

    (1) If gcd(n,1+tij1,1+tij2,,1+tiju)=1, then every nonzero element of C has full constacyclic order.

    (2) If gcd(n,1+tij1,1+tij2,,1+tiju)1, then none of the nonzero elements of C has full constacyclic order.

    Proof. Let a(x)=a1(x)+a2(x)++au(x) be an arbitrary element in C, where a(x)Rθj(x) for =0,1,,u, and s0 be the least positive integer such that ϕs0(a(x))=a(x). Since ϕnt(a(x))=a(x), we have that s0|(nt). On the other hand, we see that ϕs0(a(x))=a(x) if and only if ϕs0(a(x))=a(x) for =0,1,,u. By Lemma 3.2(3), we get that ϕs0(a(x))=a(x) for =0,1,,u if and only if

    ntgcd(nt,1+tij)|s0,

    for =0,1,,u. Further, ntgcd(nt,1+tij)|s0 for =0,1,,u if and only if

    lcm(ntgcd(nt,1+tij1),ntgcd(nt,1+tij2),,ntgcd(nt,1+tiju))|s0.

    By induction on u, we can easily prove the equality, as follows:

    lcm(ntgcd(nt,1+tij1),ntgcd(nt,1+tij2),,ntgcd(nt,1+tiju))=ntgcd(n,1+tij1,1+tij2,,1+tiju).

    Therefore, ntgcd(nt,1+tij)|s0 for =0,1,,u if and only if

    ntgcd(n,1+tij1,1+tij2,,1+tiju)|s0.

    (1) Suppose that gcd(n,1+tij1,1+tij2,,1+tiju)=1. Then, we get (nt)|s0. Hence, s0=nt. Therefore, every nonzero element of C has full constacyclic order.

    (2) Suppose that gcd(n,1+tij1,1+tij2,,1+tiju)1. Set

    s0=ntgcd(n,1+tij1,1+tij2,,1+tiju).

    Then, s0<nt. According to the above proof, we can see that ϕr(a(x))=a(x) for a(x)C if and only if

    ntgcd(n,1+tij1,1+tij2,,1+tiju)|r.

    So ϕs0(a(x))=a(x). Since s0<nt, a(x) has no full constacyclic order. a(x) is arbitrary, implying that none of the nonzero elements of C has full constacyclic order.

    Let C be a constacyclic code, as shown in (2.9) with J={j1,j2,,ju}[0,s], where 0j1<j2<<jus. That is,

    C=Rθj1(x)Rθj2(x)Rθju(x). (3.1)

    Then,

    C=Rθj1(x){0}Rθj2(x){0}Rθju(x){0}. (3.2)

    For 1vu, let

    Θv={{j1,j2,,jv}|11<2<<vu,gcd(n,1+tij1,1+tij2,,1+tijv)=1}. (3.3)

    For {j1,j2,,jv}Θv, set

    C1,2,,v=Rθj1(x){0}Rθj2(x){0}Rθjv(x){0}. (3.4)

    Thus according to the characterization conditions above about the codewords with full constacyclic order, the following result is easily obtained, which determines the exact value of |C| for a given arbitrary constacyclic code C.

    Theorem 3.5. Let the notation be as above. Let C be a constacyclic code, as shown in (3.1). Then, the following holds:

    (1) The elements of C with full constacyclic order are given by

    uv=1{j1,j2,,jv}ΘvC1,2,,v.

    (2) |C| is given as follows:

    |C|=1ntuv=1{j1,j2,,jv}Θvvρ=1(qkjρ1).

    Proof. (1) It follows from Lemmas 3.3 and 3.4.

    (2) According to the definition of C, and based on the result of (1), we have

    (nt)|C|=uv=1{j1,j2,,jv}Θv|C1,2,,v|.

    Since

    |C1,2,,v|=vρ=1(qkjρ1),

    we obtain the desired result.

    In this section, we delve more deeply into the structure of CCPCs, paying particular attention to the elements of C for a given constacyclic code C. First, we describe the observation. Recall that, for v[0,s] the irreducible code Rθv(x) is given by

    Rθv(x)={kv1j=0kv1u=0ajηj(1+tiv)que(1+tiv)qu(x)|ajFq}.

    Notice the following fact about the element of Rθv(x):

    kv1j=0kv1u=0ajηj(1+tiv)que(1+tiv)qu(x)=kv1u=0(kv1j=0ajηj(1+tiv))que(1+tiv)qu(x).

    And, when aj runs through Fq, kv1j=0ajηj(1+tiv) just runs through finite field Fqkv. Then, Rθv(x) can be expressed, as follows:

    Rθv(x)={kv1u=0ωque(1+tiv)qu(x)|ωFqkv}. (4.1)

    For every v[0,s], Rθv(x)=Fqkv is a finite field; we can denote its primitive element by γv, which generates the cyclic group F×qkv=Fqkv{0}. If gcd(n,1+tiv)=1, then there is the decomposition of the left cosets of η1+tiv=η in F×qkv=Fqkv{0}, as follows:

    F×qkv=η1+tivγvη1+tivγqkv1nt1vη1+tiv. (4.2)

    We first consider irreducible constacyclic codes.

    Theorem 4.1. Let C=Rθv(x) be an irreducible constacyclic code over Fq, where v[0,s]. Suppose that gcd(n,1+tiv)=1, and keep the notation as in (4.2). Then,

    C={kv1u=0γquve(1+tiv)qu(x)|0qkv1nt1}.

    is a CCPC of size qkv1nt.

    Proof. By Lemma 3.3, every nonzero element of C has full constacyclic order. Suppose that

    a(x)=kv1u=0ωqu1e(1+tiv)qu(x)Rθv(x){0};
    b(x)=kv1u=0ωqu2e(1+tiv)qu(x)Rθv(x){0},

    where ω1,ω2Fqkv. If there exists r such that ϕr(a(x))=b(x), then, by Lemma 3.2(2), we see that

    ϕr(a(x))=kv1u=0(ηr(1+tiv)ω1)que(1+tiv)qu(x)=b(x)=kv1u=0ωqu2e(1+tiv)qu(x).

    Therefore, ϕr(a(x))=b(x) if and only if ηr(1+tiv)ω1=ω2, which implies that ω1 and ω2 make up the same left coset of η1+tiv=η in F×qkv=Fqkv{0}. Therefore, according to (4.2), we obtain the desired result.

    In what follows, we consider the case when C is a reducible constacyclic code. Let C be as in (3.1), where u2. For simplicity, we write

    ακ=jκ,κ=1,2,,v.
    mκ=(qkακ1)gcd(n,1+tiακ)nt,κ=1,2,,v;
    nκ=ntgcd(n,1+tiα1,1+tiα2,,1+tiακ)gcd(n,1+tiα1,1+tiα2,,1+tiακ1)gcd(n,1+tiακ),κ=2,3,,v.

    We set

    G1=vκ=1Rθακ(x){0}=vκ=1Fqακ{0}=vκ=1F×qακ.G2=vκ=1η1+tiακ=η1+tiα1η1+tiα2η1+tiαv.G3=vκ=1η1+tiακ=η1+tiα1+η1+tiα2++η1+tiαv.

    Then G3G2G1.

    Suppose that γακ is the primitive element of the finite field Fqkακ=Fqkjκ, that is to say, F×qkακ=γακ for κ=1,2,,v.

    Our goal now is to construct a coset decomposition of G3 in G1. First, for κ=1,2,,v,

    F×qkακ=mκ1εκ=0γεκακη1+tiακ.

    Then, there exists a coset decomposition of the subgroup G2 in G1:

    G1=m11ε1=0m21ε2=0mv1εv=0(vκ=1γεκακ)G2.

    Next, the routine check shows that there is a coset decomposition of the subgroup G3 in G2:

    G2=n21σ2=0nv1σv=0{(θ1+tiα1+θσ2(1+tiα2)++θσv(1+tiαv))G3}=n21σ2=0nv1σv=0{(vj=1θσj(1+tiαj))G3}, (4.3)

    where σ1=1.

    Therefore, the coset decomposition of the subgroup G3 in G1 is given as follows:

    G1=m11ε1=0m21ε2=0mv1εv=0n21σ2=0nv1σv=0{(vκ=1γεκακ)(vj=0θσj(1+tiαj))G3}=m11ε1=0m21ε2=0mv1εv=0n21σ2=0nv1σv=0{vκ=1vj=1(γεκακθσj(1+tiαj))G3}. (4.4)

    We are now in a position to determine a CCPC from a given constacyclic code.

    Theorem 4.2. Apply the notation as above. Let C be a constacyclic code with the decomposition of the form as in (3.1). Then,

    C=uv=1{j1,j2,,jv}Θvm11ε1=0m21ε2=0mv1εv=0n21σ2=0nv1σv=0{vϵ=1vκ=1vj=1kαϵ1u=0(γεκακθσj(1+tiαj))que(1+tiαϵ)qu(x)}. (4.5)

    is a CCPC of size

    1ntuv=1{j1,j2,,jv}Θvvρ=1(qkjρ1)

    where Θv is as shown in (3.3).

    Proof. Let {j1,j2,,jv}Θv, where 1vu. Now, we only need to consider the following subcode:

    Rθj1(x)Rθj2(x)Rθjv(x).

    Note that, for 1ϵv,

    Rθαϵ(x)=Rθjϵ(x)={kαϵ1u=0ωque(1+tiαϵ)qu(x)|ωFqkαϵ}.

    Assume that

    f(x)=vϵ=1aϵ(x)vϵ=1Rθαϵ(x);g(x)=vϵ=1bϵ(x)vϵ=1Rθαϵ(x),

    where

    aϵ(x)=kαϵ1u=0ωqu1ϵe(1+tiαϵ)qu(x)Rθαϵ(x),ω1εFqkαϵ,1ϵv;
    bϵ(x)=kαϵ1u=0ωqu2ϵe(1+tiαϵ)qu(x)Rθαϵ(x),ω2εFqkαϵ,1ϵv.

    Then, for any rZ+, ϕr(f(x))=g(x) if and only if

    g(x)=vϵ=1kαϵ1u=0ωqu2εe(1+tiαϵ)qu(x)=ϕr(f(x))=vϵ=1kαϵ1u=0(ηr(1+tiαϵ)ω1ϵ)que(1+tiαϵ)qu(x),

    which holds if and only if

    ηr(1+tiαϵ)ω1ϵ=ω2ϵ,ϵ=1,2,,v,

    which shows that both vϵ=1ω1ϵ and vϵ=1ω2ϵ are in the same coset of

    vκ=1η1+tiακ=η1+tiα1+η1+tiα2++η1+tiαv=G3

    in the group

    vκ=1Rθακ(x){0}=vκ=1Fqακ{0}=vκ=1F×qακ=G1.

    By virtue of the result shown in (4.4), we immediately obtain this theorem.

    At the end of this section, we present an example to illustrate our main results.

    Example 4.3. Let q=5,n=18, and λ=4. All 5-cyclotomic cosets are as follows:

    C0={1,5,25,17,13,29},C1={3,15},C2={7,35,31,11,19,23},C3={9},C4={21,33},C5={27}.

    Then, t=2 and

    i0=0,i1=1,i2=3,i3=4,i4=10,i5=13;
    k0=6,k1=2,k2=6,k3=1,k4=2,k5=1.

    Assume that five constacyclic codes C1,C2,C3,C4,C5 are as follows:

    C1=Rθ1(x);C2=Rθ2(x);C3=Rθ3(x)Rθ4(x);
    C4=Rθ1(x)Rθ2(x);C5=Rθ0(x)Rθ2(x).

    Set F×52=γ1 and F×56=γ2. Then, we have the following:

    (1) According to Lemma 3.3, since gcd(n,1+ti1)=gcd(18,3)=31, none of the nonzero elements of C1 has full constacyclic order.

    (2) According to Lemma 3.3, the fact that gcd(n,1+ti2)=gcd(18,7)=1 shows that every nonzero element of C2 has full constacyclic order; thus

    |C2|=qk71nt=56136=434.

    By using Theorem 4.1, we get that

    C2={5u=0γ5u1e75u|0433}.

    (3) According to Lemmas 3.3 and 3.4, since

    gcd(n,1+ti3)=gcd(18,9)=91;
    gcd(n,1+ti4)=gcd(18,21)=31;
    gcd(n,1+ti3,1+ti4)=gcd(18,9,21)=31,

    none of the nonzero elements of C3 has full constacyclic order.

    (4) Since

    gcd(n,1+ti1)=gcd(18,3)=31;
    gcd(n,1+ti2)=gcd(18,7)=1;
    gcd(n,1+ti1,1+ti2)=gcd(18,3,7)=1,

    then,

    Θ1={{2}};Θ2={{1,2}}.

    By Theorem 3.5, we get that

    |C4|=1nt[(qk21)+(qk11)(qk21)]=1ntqk1(qk21)=13652(561)=10850.

    In addition,

    m1=(qk11)gcd(n,1+ti1)nt=(521)gcd(18,3)36=2.
    m2=(qk21)nt=56136=434.
    n2=ntgcd(n,1+ti1,1+ti2)gcd(n,1+ti1)gcd(n,1+ti2)=36gcd(18,3,7)gcd(18,3)gcd(18,7)=12.

    By Theorem 4.2, we have that

    C4=433ε2=0{24u=0(γε21θ1+ti2)que(1+ti2)qu(x)}1ε1=0433ε2=011σ2=0{2ϵ=12κ=12j=124u=0(γεκ2θσj(1+tij))que(1+tiϵ)qu(x)}=433ε2=0{24u=0(γε21θ7)5ue75u(x)}1ε1=0433ε2=011σ2=0{2ϵ=12κ=12j=124u=0(γεκ2θσj(1+2ij))5ue(1+2iϵ)5u(x)}.

    Here, from the formula of C4, we can also get that

    |C4|=434+2×434×12=10850,

    which is the same as the above result provided by Theorem 3.5.

    (5) Since

    gcd(n,1+ti0)=gcd(18,1)=1;
    gcd(n,1+ti2)=gcd(18,7)=1;
    gcd(n,1+ti0,1+ti2)=gcd(18,1,7)=1,

    then

    Θ1={{0},{2}};Θ2={{0,2}}.

    By Theorem 3.5, we get that

    |C5|=1nt[(qk01)+(qk21)+(qk01)(qk21)]=136[(561)+(561)+(561)(561)]=6781684.

    In addition,

    m1=(qk01)gcd(n,1+ti0)nt=(561)gcd(18,1)36=434.
    m2=(qk21)gcd(n,1+ti2)nt=(561)gcd(18,7)36=434.
    n2=ntgcd(n,1+ti0,1+ti2)gcd(n,1+ti0)gcd(n,1+ti2)=36gcd(18,1,7)gcd(18,1)gcd(18,7)=36.

    By Theorem 4.2, we have that

    C5=433ε1=0{15624u=0(γε11θ1+ti0)que(1+ti0)qu(x)}433ε2=0{15624u=0(γε22θ1+ti2)que(1+ti2)qu(x)}433ε1=0433ε2=035σ2=0{2ϵ=12κ=12j=115624u=0(γεκ2θσj(1+tij))que(1+tiϵ)qu(x)}=433ε1=0{15624u=0(γε11θ)5ue15u(x)}433ε2=0{15624u=0(γε22θ7)5ue75u(x)}433ε1=0433ε2=035σ2=0{2ϵ=12κ=12j=115624u=0(γεκκθσj(1+2ij))5ue(1+2iϵ)5u(x)}.

    Here, from the formula of C5, we can also get that

    |C5|=434+434+434×434×36=6781684,

    which is the same as the above result provided by Theorem 3.5.

    In this paper, we have introduced the definition of CCPCs and mainly focused on the construction of such a class of codes. First, we proposed a new and explicit enumerative formula for the code size of such CCPCs. Next, we provided an effective method to obtain such a CCPC by using an algebraic tool. A possible direction for future work is to consider the problem of constructing CCPCs with the largest possible code size from a given repeated-root constacyclic code.

    The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.

    We sincerely thank the Associate Editor and the anonymous referees for their carefully reading and helpful suggestions that led to the improvement of the paper.

    G. Zhang was supported by the Guiding Science and Technology Plan Project of Suqian City in 2023.

    The authors declare no conflicts of interest.



    [1] E. N. Gilbert, Cyclically permutable error-correcting codes, IEEE T. Inform. Theory, 9 (1963), 175–182. https://doi.org/10.1109/TIT.1963.1057840 doi: 10.1109/TIT.1963.1057840
    [2] L. Györfi, I. Vajda, Constructions of protocol sequence for multiple access collision channel without feedback, IEEE T. Inform. Theory, 39 (1993), 1762–1765. https://doi.org/10.1109/18.259673 doi: 10.1109/18.259673
    [3] Q. A. Nguyen, L. Györfi, J. L. Massey, Constructions of binary constant-weight cyclic codes and cyclically permutable codes, IEEE T. Inform. Theory, 38 (1992), 940–949. https://doi.org/10.1109/18.135636 doi: 10.1109/18.135636
    [4] S. Katzenbeisser, F. A. P. Petitcolas, Information hiding techniques for steganography and digital watermarking, Norwood, MA: Artech House, 2000.
    [5] S. Sriram, S. Hosur, Cyclically permutable codes for rapid acquisition in DS-CDMA systems with asynchronous base stations, IEEE J. Sel. Area. Comm., 19 (2001), 83–94. https://doi.org/10.1109/49.909611 doi: 10.1109/49.909611
    [6] B. Chen, L. Lin, S. Ling, H. Liu, Three new classes of optimal frequency-hopping sequence sets, Design. Code. Cryptogr., 83 (2017), 219–232. https://doi.org/10.1007/s10623-016-0220-9 doi: 10.1007/s10623-016-0220-9
    [7] C. Ding, R. Fuji-Hara, Y. Fujiwara, M. Jimbo, M. Mishima, Sets of frequency hopping sequences: Bounds and optimal constructions, IEEE T. Inform. Theory, 55 (2009), 3297–3304. https://doi.org/10.1109/TIT.2009.2021366 doi: 10.1109/TIT.2009.2021366
    [8] H. Y. Song, I. S. Reed, S. W. Golomb, On the nonperiodic cyclic equivalence classes of Reed-Solomon codes, IEEE T. Inform. Theory, 39 (1993), 1431–1434. https://doi.org/10.1109/18.243465 doi: 10.1109/18.243465
    [9] S. B. Wicker, V. K. Bhargava, Reed-Solomon codes and their applications, IEEE Press, New York, 1994.
    [10] S. Bitan, T. Etzion, Constructions for optimal binary constant-weight cyclically permutable codes and difference families, IEEE T. Inform. Theory, 41 (1995), 77–87. https://doi.org/10.1109/18.370117 doi: 10.1109/18.370117
    [11] Q. A. Nguyen, L. Györfi, J. L. Massey, Constructions of binary constant-weight cyclic codes and cyclically permutable codes, IEEE T. Inform. Theory, 38 (1992), 940–949. https://doi.org/10.1109/18.135636 doi: 10.1109/18.135636
    [12] J. S. Lemos-Neto, V. C. da Rocha Jr., Cyclically permutable codes specified by roots of generator polynomial, Electron. Lett., 50 (2014), 1202–1204. https://doi.org/10.1049/el.2014.0296 doi: 10.1049/el.2014.0296
    [13] D. E. Maracle, C. T. Wolverton, Generating cyclically permutable codes, IEEE T. Inform. Theory, 20 (1974), 554–555. https://doi.org/10.1109/TIT.1974.1055243 doi: 10.1109/TIT.1974.1055243
    [14] D. H. Smith, S. Perkins, Cyclically permutable representations of cyclic codes, Discrete Appl. Math., 156, 76–81, 2008. https://doi.org/10.1016/j.dam.2007.08.038 doi: 10.1016/j.dam.2007.08.038
    [15] F. Fu, S. Shen, On the nonperiodic cyclic equivalence classes of Hamming codes and BCH codes, J. Stat. Plan. Infer., 140 (2001), 205–209. https://doi.org/10.1016/S0378-3758(00)00253-6 doi: 10.1016/S0378-3758(00)00253-6
    [16] S. E. Tavares, P. E. Allard, S. G. S. Shiva, On decomposition of cyclic codes into cyclic classes, Inf. Control, 18 (1971), 342–354. https://doi.org/10.1016/S0019-9958(71)90446-3 doi: 10.1016/S0019-9958(71)90446-3
    [17] P. E. Allard, S. G. S. Shiva, S. E. Tavares, A note on the decomposition of cyclic codes into cyclic classes, Inf. Control, 22 (1973), 100–106. https://doi.org/10.1016/S0019-9958(73)90518-4 doi: 10.1016/S0019-9958(73)90518-4
    [18] S. Xia, F. Fu, Nonperiodic cyclic equivalence classes of cyclic codes and algebraic constructions of cyclically permutable codes, Proc. 12th Int. Symp. Applied Algebra, Algebraic Algorithms, Error-Correcting Codes, 1997,341–352. https://doi.org/10.1007/3-540-63163-1_27
    [19] M. Kuribayashi, H. Tanaka, How to generate cyclically permutable codes from cyclic codes, IEEE T. Inform. Theory, 52 (2006), 4660–4663. https://doi.org/10.1109/TIT.2006.881834 doi: 10.1109/TIT.2006.881834
    [20] T. Y. Yang, H. Chen, K. C. Chung, Generation of cyclically permutable codes by Galois field Fourier transform, Int. Conf. on Ubiquitous and Future Networks (ICUFN 2016), 2016,322–325. https://doi.org/10.1109/ICUFN.2016.7537041
    [21] K. P. Cho, C. L. Lin, H. Chen, T. Y. Yang, Construction of cyclically permutable codes from prime length cyclic codes, 2020 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Auckland, New Zealand, 2020, 1448–1452.
    [22] G. T. Bastos, J. S. de Lemos-Neto, On the cyclic order distribution and partitioning of linear cyclic codes, São Paulo J. Math. Sci., 15 (2021), 404–418. https://doi.org/10.1007/s40863-020-00197-x doi: 10.1007/s40863-020-00197-x
    [23] W. C. Huffman, V. Pless, Fundamentals of error-correcting codes, Cambridge University Press, Cambridge, 2003. https://doi.org/10.1017/CBO9780511807077
    [24] F. J. MacWilliams, N. J. A. Sloane, The theory of error-correcting codes, North-Holland Publishing Company, 1997.
    [25] B. Chen, H. Liu, G. Zhang, Some minimal cyclic codes over finite fields, Discrete Math., 331 (2014), 142–150. https://doi.org/10.1016/j.disc.2014.05.007 doi: 10.1016/j.disc.2014.05.007
    [26] S. Roman, Coding and information theory, Springer-Verlag, 1992.
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(916) PDF downloads(80) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog