You are on page 1of 11

IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27

______________________________________________________________________________________

Linear Codes over the Ring


Z4 +uZ4 +v Z4 +wZ4 +uv Z4 +uwZ4 +vwZ4 +uvwZ4
Bustomi, Aditya Purwa Santika, and Djoko Suprijanto∗ , Member, IAENG

Abstract—We investigate linear codes over the ring Z4 +uZ4 + codes over Z4 remain a special topic of interest in the field of
vZ4 + wZ4 + uvZ4 + uwZ4 + vwZ4 + uvwZ4 , with conditions algebraic coding theory because of their relation to lattices,
u2 = u, v 2 = v, w2 = w, uv = vu, uw = wu and vw = wv. designs, cryptography and their many applications”1 [20].
We first analyze the structure of the ring and then define linear
codes over this ring. The Lee weight and the Gray map for Recently, several new families of rings, namely the non-
these codes are defined and MacWilliams relations for complete, chain Frobenius rings, have been studied in connection with
symmetrized, and Lee weight enumerators are derived. The coding theory. These rings have rich mathematical theory,
Singleton bound as well as maximum distance separable codes in particular algebraic structures. Yildiz and Karadeniz [20]
are also considered. Furthermore, cyclic and quasi-cyclic codes derived algebraic structures related to linear codes over the
are discussed, and as an application some new linear codes
over Z4 with the highest known minimum Lee distance are ring Z4 + uZ4 , with u2 = 0. They [20] also constructed
also obtained. several good formally self-dual codes over Z4 from the codes
over Z4 + uZ4 . Bandi and Bhaintwal ( [2], [3]) considered
Index Terms—Linear codes, MacWilliams relations, Maxi-
mum distance separable codes, Cyclic codes, Quasi-cyclic codes, codes over the ring Z4 + vZ4 , with v 2 = v, and Z4 + wZ4 ,
optimal codes. with w2 = 1, 2w, respectively and derived several algebraic
structures including the MacWilliams relation with respect
to Rosenbloom-Tsfasman metric over the ring Z4 + vZ4 and
I. I NTRODUCTION the properties as well as a construction method of self-dual
We, as a human being, cannot not communicate to each codes over the ring Z4 + wZ4 . Moreover, Dian, Detiena,
other. The transmission of information is the heart of com- Suprijanto, and Barra [15] have also obtained some results
munication. Although reliable communication has been an on linear codes over the ring Z2m + vZ2m , with v 2 = v.
unavoidable problem with the human life, it is still a kind Recently, Li, Guo, Zhu, and Kai [14] generalized the ring
of mystery for a long time. It was in 1948, when Claude E. considered by Bandi and Bhaintwal [2] by adding two new
Shannon [16] showed that, if it is given a noisy communi- terms uZ4 and uvZ4 , with the conditions u2 = u, v 2 = v,
cation channel, there is a number called the capacity of the and uv = vu, and derived some properties corresponding to
channel such that reliable communication can be achieved at the linear codes over the ring Z4 + uZ4 + vZ4 + uvZ4 .
any rate below the channel capacity (see Section 13 in [16]). In this paper, we further generalized the ring considered
In other word, the existence of good codes is guarantied, by Li, Guo, Zhu, and Kai [14] to the ring Z4 + uZ4 + vZ4 +
theoretically. This seminal paper [16] has marked the birth wZ4 + uvZ4 + uwZ4 + vwZ4 + uvwZ4 with the conditions
of information theory and coding theory. u2 = u, v 2 = v, w2 = w, uv = vu, uw = wu and
Unfortunately, the proof of Shannon on the existence of vw = wv. We study linear codes over this ring and derive
good codes is not constructive: he proved only the existence some corresponding properties. The paper is organized as
of such codes but did not construct the codes itself. One follows. In Section 2, we study main properties of the ring
main problem in coding theory is to construct good codes Z4 + uZ4 + vZ4 + wZ4 + uvZ4 + uwZ4 + vwZ4 + uvwZ4 .
that satisfy the Shannon’s noisy-channel coding theorem. We then define linear codes, Lee weight, and also a Gray
Codes over finite rings have become an active research map for the linear codes over Z4 + uZ4 + vZ4 + wZ4 +
area in classical coding theory over the recent decades. In uvZ4 + uwZ4 + vwZ4 + uvwZ4 . A Singleton bound as
particular, after the appearance of the work of Hammons, well as maximum distance separable codes are slightly
Kumar, Calderbank, Sloane, and Solé [12], a lot of research considered. In Section 3, several types of weight enumerators
went towards studying (linear) codes over Z4 . Although ”the are defined and related MacWilliams relations are derived.
results were generalized to many different types of rings, the Finally, in Section 4, cyclic and quasi-cyclic codes over
Z4 + uZ4 + vZ4 + wZ4 + uvZ4 + uwZ4 + vwZ4 + uvwZ4
Manuscript received June 6, 2020; revised November 8, 2020. This are investigated. As an application, several examples of cyclic
research was supported by Institut Teknologi Bandung (ITB) and the
Ministry of Research, Technology and Higher Education (Kementerian Riset codes over Z4 with the highest known minimum Lee distance
dan Teknologi/ Badan Riset dan Inovasi Nasional (Kemenristek/ BRIN)), are obtained.
Republic of Indonesia. Throughout this paper, we follow standard definitions for
Bustomi is a lecturer in the Department of Mathematics, Faculty of
Sciences and Technology, Universitas Airlangga, Campus C Jl. Mulyorejo undefined terms as used in many coding theory books (e.g.
Surabaya, 60115 INDONESIA. (email: bustomi@fst.unair.ac.id) [13]).
A.P. Santika is an assistant professor in the Combinatorial Mathematics
Research Group, Faculty of Mathematics and Natural Sciences, Institut
Teknologi Bandung, Jl. Ganesha 10, Bandung, 40132, INDONESIA. (email: II. S TRUCTURES OF LINEAR CODES OVER R
aditps@math.itb.ac.id)
D. Suprijanto is an associate professor in the Combinatorial Mathe-
Throughout this paper, R denotes the ring Z4 + uZ4 +
matics Research Group, Faculty of Mathematics and Natural Sciences, vZ4 + wZ4 + uvZ4 + uwZ4 + vwZ4 + uvwZ4 with u2 = u,
Institut Teknologi Bandung, Jl. Ganesha 10, Bandung, 40132, INDONESIA.
∗ Corresponding author, email: djoko@math.itb.ac.id 1 [20], pp. 25.

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

v 2 = v, w2 = w, uv = vu, uw = wu dan vw = wv. We can easily see that φ is isomorphic. Finally, the Gray
The ring R can also be regarded as the quotient ring Z4 , map in R is defined as an extension of the map φ on Rn as
namely Z4 [u, v, w]/hu2 − u, v 2 − v, w2 − wi. This ring is
commutative and has identity. Φ : Rn −→ Z8n 4
The element η ∈ R is called idempotent if η 2 = η. The (c0 , c1 , . . . , cn−1 ) 7−→ (r1,0 , r1,1 , . . . , r1,n−1 ,
elements x and y of R is called orthogonal if xy = 0.
. . . , r8,0 , r8,1 , . . . , r8,n−1 ),
A. Structures of the ring R and a Gray map 8
P
First, we consider a decomposition of R then define a Gray where ci ∈ R and rji ∈ Z4 satisfying ci = rji ηj .
j=1
map from the ring R to Z84 . The Lee weight on Z4 , denoted by wL , is defined as
Consider the idempotent elements of R below 
η1 = 1 − u − v − w + uv + uw + vw − uvw 0, x = 0,

= (1 − u)(1 − v)(1 − w), wL (x) := 2, x = 2,

1, x = 1 or 3.

η2 = u − uv − uw + uvw = u(1 − v)(1 − w),
η3 = v − uv − vw + uvw = (1 − u)v(1 − w), From the map φ : r 7−→ (rP 1 , r2 , . . . , r8 ), we define the Lee
8
η4 = w − uw − vw + uvw = (1 − u)(1 − v)w, weight on R as wL (r) = i=1 wL (ri ). The Lee weight of
η5 = uv − uvw = uv(1 − w), a vector c = (c0 , c1 , . . . , cn−1 ) ∈ Rn is defined to be a
η6 = uw − uvw = u(1 − v)w, rational sum of the Lee weight of its components, that is
Pn−1
wL (c) = i=0 wL (ci ). We also defined the Lee distance
η7 = vw − uvw = (1 − u)vw, between c and d ∈ Rn , as dL (c, d) = wL (c − d).
η8 = uvw. We also have another kind of weight and distance called
The above eight elements are also pairwise orthogonal, since a Hamming weight and a Hamming distance, and they are:
8
P wH (r) = |{j : rj 6= 0, 0 ≤ j ≤ n − 1}| and dH (r, s) =
ηi ηj = 0 for i 6= j, and satisfy ηi = 1. Hence, by Chinese wH (r − s), for all r, s ∈ Rn , respectively.
i=1
Remainder Theorem, we have
R = Rη1 ⊕ Rη2 ⊕ Rη3 ⊕ Rη4 ⊕ Rη5 ⊕ Rη6 ⊕ Rη7 ⊕ Rη8
B. Linear Codes over R
= Z4 η1 ⊕ Z4 η2 ⊕ Z4 η3 ⊕ Z4 η4 ⊕ Z4 η5 ⊕ Z4 η6 ⊕ Z4 η7
⊕ Z4 η8 . A nonempty subset C ⊆ Rn is called a linear code over
R if C is a submodule of R. To define a dual of the code
Moreover, for any r = a + bu + cv + dw + euv + f uw + C, let us first define the Euclidean inner product on Rn . Let
gvw + huvw ∈ R with a, b, c, d, e, f, g, h ∈ Z4 , we have x = (x0 , x1 , . . . , xn−1 ) and y = (y0 , y1 , . . . , yn−1 ) be two
8
X vectors in Rn . The Euclidean inner product of x and y is
r=r ηi defined as
i=1 Xn
= rη1 + rη2 + rη3 + rη4 + rη5 + rη6 + rη7 + rη8 hx, yi := xj yj ,
j=1
= aη1 + (a + b)η2 + (a + c)η3 + (a + d)η4
+ (a + b + c + e)η5 + (a + b + d + f )η6 where the operations are performed in the ring R.
+ (a + c + d + g)η7 Dual of the code C ⊆ Rn is the code
+ (a + b + c + d + e + f + g + h)η8
C ⊥ = {x ∈ Rn : hx, yi = 0, for all y ∈ C}.
= r1 η1 + r2 η2 + r3 η3 + r4 η4 + r5 η5
+ r6 η6 + r7 η7 + r8 η8 Clearly, C ⊥ is also linear if C is linear over R. Since R is
a Frobenius ring, we also have |C| · |C ⊥ | = 48n [22].
with
Denote r = (r(0) , r(1) , . . . , r(n−1) ) ∈ Rn , and r(i) =
r1 =a ri1 η1 + ri2 η2 + · · · + ri8 η8 , for 0 ≤ i ≤ n − 1. Then r
r2 =a+b can be uniquely expressed as
r3 =a+c
r = r1 η1 + r2 η2 + · · · + r8 η8 ,
r4 =a+d
r5 =a+b+c+e where rj = (r0j , r1j , . . . , rn−1,j ) ∈ Zn4 , for 1 ≤ j ≤ 8. By
r6 =a+b+d+f using this expression, the inner product of any two vectors
x, y ∈ Rn can be written as
r7 =a+c+d+g
r8 = a + b + c + d + e + f + g + h, x · y = (x1 · y1 )η1 + (x2 · y2 )η2 + · · · + (x8 · y8 )η8 ,
and hence r1 , r2 , r3 , r4 , r5 , r6 , r7 , r8 ∈ Z4 . It is clear that the
where x = x1 η1 + x2 η2 + · · · + x8 η8 , xj =
expression r = r1 η1 + r2 η2 + r3 η3 + r4 η4 + r5 η5 + r6 η6 +
(x0j , x1j , . . . , xn−1,j ) ∈ Zn4 , and y = y1 η1 + y2 η2 + · · · +
r7 η7 + r8 η8 is unique. Define the map φ from R to Z84 by n
y 8 , yj = (y0j , y1j , . . . , yn−1,j ) ∈ Z4 , and xj · yj =
P8 ηn−1
r 7−→ (r1 , r2 , r3 , r4 , r5 , r6 , r7 , r8 ). k=0 xkj ykj , for 1 ≤ j ≤ n.

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

Now, define the codes Ci , 1 ≤ i ≤ 8, as follows:


C1 = {a ∈ Zn4 : aη1 + bη2 + · · · + hη8 , 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 3 0 0 0 0 0 0 0
00000000200000000000000020000000
for some b, c, . . . , h ∈ Zn4 },  00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 20 01 00 00 00 00 00 00 20 03 00 00 00 00 00 00 
0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0
C2 = {b ∈ Zn4 : aη1 + bη2 + · · · + hη8 ,
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0
0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 3 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0
for some a, c, . . . , h ∈ Zn4 }, 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0
0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 3 0 0 0 0
.. 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0
. 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 3 0 0 0.
0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0
C8 = {h ∈ Zn4 : aη1 + bη2 + · · · + hη8 , 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0
0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 3 0 0
for some a, b, . . . , g ∈ Zn4 }.
0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0
0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 3 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0
We can easily see that Ci , 1 ≤ i ≤ 8, is a linear code of 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0
00000001000000010000000100000003
length n over Zn . The code C can be uniquely decomposed 00000000000000020000000000000002
00000000000000000000000200000002
into C = C1 η1 ⊕C2 η2 ⊕· · ·⊕C8 η8 , and hence we have |C| =
Q 8
i=1 |Ci |. Furthermore, we have the following property. ♦
n
Theorem II.1. Let C ⊆ R be a linear code. Then we have
the following unique decomposition:
C. Singleton bound and MDS codes
1) C = C1 η1 ⊕ C2 η2 ⊕ · · · ⊕ C8 η8 , a linear code of length
n over Z4 . Singleton bound is among the famous bound in Coding
2) C ⊥ = C1⊥ η1 ⊕ C2⊥ η2 ⊕ · · · ⊕ C8⊥ η8 , for 1 ≤ i ≤ 8. Theory. It was proved in 1964 by Singleton [19] that if C ⊆
Rn is a code over R, then we have
Proof: Similar to [14].
It is well-known (see for instance [12]) that the code Cj , dH (C) ≤ n − log|R| |C| + 1,
1 ≤ i ≤ 8, is permutation-equivalent to a code generated by
  where dH (C) = min{wH (x − y) : x, y ∈ C, x 6= y}. The
Ikj1 Aj Bj
Gj = , code C is called a maximum distance separable (MDS) if it
0 2Ikj2 2Cj
attains the Singleton bound mentioned above.
where Aj and Cj are Z2 -matrices and B is a Z4 -matrix, and It has been proven by Guenda and Gulliver [11, Proposi-
hence C is permutation-equivalent to a linear code generated tion 2.2] that the only MDS codes over Z4 is the trivial one.
by   Moreover, it is also known that C ⊥ is an MDS code if C
η1 G1 is an MDS code (see [18, Theorem 1]). Hence, we have the
η2 G2  following.
 ..  .
 
 .  Lemma II.3. Let C be a linear code of length n over Z4 .
η8 G8 Then C is an MDS codes if and only if C is either Zn4 of
parameters [n, 4n , 1], h1i of parameters [n, 4, n], or h1i⊥ of
Moreover, by the result in [12], the dual Cj⊥ has a
parameters [n, 4n−1 , 2], where 1 denotes the all-one vector.
generator
Let us look at the MDS codes over R. By considering a
−BiT − CiT ATi CiT In−ki1 −ki2
 
G0j = , for 1 ≤ i ≤ 8, linear code C of length n over R as C = C1 η1 ⊕ C2 η2 ⊕
2ATi 2Iki2 0
· · · ⊕ C8 η8 , where Ci , 1 ≤ i ≤ 8, is a linear code of length
and hence C ⊥ is permutation-equivalent to a linear code n over Z4 , the Singleton bound can be written as
generated by 8
η1 G01 1X
 
η2 G02  d H (C) ≤ n − log4 |Ci | + 1,
8 i=1
 ..  ,
 
 . 
where dH (C) = min{dH (Ci ) : 1 ≤ i ≤ 8}, and dH (Ci ) is
η8 G08
a Hamming distance of Ci , for 1 ≤ i ≤ 8.
a parity check matrix of the code C. Then we have the following theorem.
Example II.2. Let Cj be a linear code over Z4 with Theorem II.4. Let C be an MDS codes of length n over R. If
generator matrix Gj , for 1 ≤ j ≤ 8, as follows dH = 1, dH = 2, and dH = n, then for 1 ≤ i ≤ 8, the code
  Ci is an MDS code of parameters [n, 4n , 1], [n, 4n−1 , 2],
1 1 1 3
and [n, 4, n], respectively.
Gj = 0 2 0 2 .
0 0 2 2 Proof: We can use the proof of Theorem 5 in [14] with
appropriate but minimal modifications.
The code Cj contains 22kj1 +kj2 = 22+2 = 16. Since 44 =
|C|·|C ⊥ | = 42 ·|C ⊥ |, then |C ⊥ | = 42 = |C|. The linear code Theorem II.5. C is an MDS code of length n over R if and
M8 only if for 1 ≤ i ≤ 8, Ci is an MDS code over Z4 with the
C = Cj ηj over R is of cardinality |C| = 168 = 42·8 , same parameters.
j=1
while the generator matrix of Φ(C) is Proof: The proof is similar to Theorem 6 in [14].

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

III. W EIGHT ENUMERATORS AND M AC W ILLIAMS B. The Symmetrized Lee weight, Hamming weight and Lee
RELATIONS weight enumerator
In this section we consider several weight enumerators for In the ring Z4 , we know that wL (1) = 1 = wL (3) and
a linear codes C. We also derived the related MacWilliams the symmetrized Lee weight enumerator for codes over Z4
relations. is defined as
SLW EC (X0 , X1 , X2 ) = CW EC (X0 , X1 , X2 , X1 ).
A. The complete weight enumerator and MacWilliams rela-
tion We define the symmetrized Lee weight enumerator of codes
We knew that the number of elements of R is 65536. over R using similar idea as above. For that purpose, we
The complete weight enumerator (CWE) of a linear code first decompose R into Di = {x ∈ R : wL (x) = i}, for
C ⊆ Rn is defined as 0 ≤ i ≤ 16. Then we have
X 65535 |D0 | = |D16 | = 1,
Y naj (c)  
CW EC (X0 , X1 , . . . , X65535 ) = Xj , 8
c∈C j=0
|D1 | = |D15 | = 2 = 16,
1
where nai (c) denotes the number of appearances of ai ∈ R
   
8 8
in the vector c. |D2 | = |D14 | = 22 + = 120,
2 1
    
Remark 1. Remember that CW EC (X0 , X1 , . . . , X65535 ) is 8 8 7
|D3 | = |D13 | = 23 +2 = 560,
a homogeneous polynomial in 65536 variables with total 3 1 1
      
degree of each monomial being the length of the code C, 8 8 6 8
n. Since the code C is linear, then C always contains |D4 | = |D12 | = 24 + 22 + = 1820,
4 2 1 2
the vector 0. It implies that the term X0n always appears  
8
  
8 5
  
8 7
in CW EC (X0 , X1 , . . . , X65535 ). From the complete weight |D5 | = |D11 | = 25 + 23 +2 = 4368,
5 3 1 1 2
enumerator we may obtain a lot of information related to the        
8 8 4 8 6
code, such as the size of the code: |D6 | = |D10 | = 26 + 24 + 22
6 4 1 2 2
X  
CW EC (1, 1, . . . , 1) = 1 = |C|. 8
+ = 8008,
c∈C 3
       
7 8 5 8 3 3 8 5
|D7 | = |D9 | = 2 +2 +2
7 5 1 3 2
As the ring R is a Frobenius ring, the MacWilliams   
relation for the complete weight enumerator holds (see [22]). 8 7
+2 = 11440,
To find the exact relation we define the following character 1 3
       
on R. 8 8 2 8 4
|D8 | = 28 + 26 + 24
Let I be a non-zero ideal in R. Define χ : I → C∗ by 8 6 1 4 2
    
χ(a + bu + cv + dw + euv + f uw + gvw + huvw) = ih 8 6 8
+ 22 + = 12870.
2 3 4
with C∗ is a unit group in complex number. We know that
χ is a non-trivial character on R. By looking at the elements that have the same Lee weights,
we can define the symmetrized Lee weight enumerator.
Defining the Hadamard transform by Symmetrized Lee weight enumerator (SLWE) of a linear code
X C over R is defined as
fˆ(c) = χ(c · d)f (d),
d∈Rn SLW EC (X0 , X1 , . . . , X16 )
we obtain the following equation = CLW EC (X0 , X1 , . . . , X1 , X2 , . . . , X2 , X3 , . . . , X3 ,
X X | {z } | {z } | {z }
fˆ(c) = |C| f (d). (1) 16 120 560

c∈C d∈C ⊥
X4 , . . . , X4 , X5 , . . . , X5 , X6 , . . . , X6 , X7 , . . . , X7 ,
| {z } | {z } | {z } | {z }
We have the MacWilliams relation for the complete weight 1820 4368 8008 11440

enumerator as follows. X8 , . . . , X8 , X9 , . . . , X9 , X10 , . . . , X10 , X11 , . . . , X11 ,


| {z } | {z } | {z } | {z }
12870 11440 8008 4368
Theorem III.1. Let C be a linear code of length n over R.
X ,...,X ,X ,...,X ,X ,...,X ,
Then | 12 {z 12} | 13 {z 13} | 14 {z 14}
1820 560 120

CW EC (X0 , X1 , . . . , X65535 ) X , . . . , X , X ) (2)
1 | 15 {z 15} 16
= CW EC (M (X0 , X1 , . . . , X65535 )T ), 16
|C| where X0 , X1 , X2 , . . . , X16 denote the element of weight
with M is a matrix of size 65536 × 65536 defined by Mij = 0, 1, 2, 3, . . . , 16, respectively. Then we have
χ(ai aj ).
65535
SLW EC (X0 , X1 , X2 , . . . , X16 )
Q nai (x)
Proof: Let f (x) = Xi
X n (c) n (c) n (c) n (c)
. The result follows = X0 0 X1 1 X2 2 . . . X1616 , (3)
i=0
from Theorem 8.1 in [22]. c∈C

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

where B4 = X0 + 8X1 + 24X2 + 24X3 − 36X4 − 120X5


− 88X6 + 88X7 + 198X8 + 88X9 − 88X10
17
X − 120X11 − 36X12 + 24X13 + 24X14 + 8X15 + X16 ,
n0 = na1 (c), n1 = nai (c), B5 = X0 + 6X1 + 10X2 − 10X3 − 50X4 − 34X5 + 66X6
i=2
137 697 + 110X7 − 110X9 − 66X10 + 34X11 + 50X12
X X
n2 = nai (c), n3 = nai (c), + 10X13 − 10X14 − 6X15 − X16 ,
i=18 i=138 B6 =X0 + 4X1 − 20X3 − 20X4 + 36X5 + 64X6
2517 6885
− 20X7 − 90X8 − 20X9 + 64X10 + 36X11
X X
n4 = nai (c), n5 = nai (c),
i=698 i=2518 − 20X12 − 20X13 + 4X15 + X16 ,
14893 26333
X X B7 =X0 + 2X1 − 6X2 − 14X3 + 14X4 + 42X5
n6 = nai (c), n7 = nai (c),
i=6886 i=15434
− 14X6 − 70X7 + 70X9 + 14X10 − 42X11
39203
X 50643
X − 14X12 + 14X13 + 6X14 − 2X15 − X16 ,
n8 = nai (c), n9 = nai (c), B8 =X0 − 8X2 + 28X4 − 56X6 + 70X8 − 56X10
i=26334 i=39204
58651 64839 + 28X12 − 8X14 + X16 ,
X X
n10 = nai (c), n11 = nai (c), B9 =X0 − 2X1 − 6X2 + 14X3 + 14X4 − 42X5
i=50644 i=58652 − 14X6 + 70X7 − 70X9 + 14X10 + 42X11
64799 65399
n12 =
X
nai (c), n13 =
X
nai (c), − 14X12 − 14X13 + 6X14 + 2X15 − X16 ,
i=64840 i=64800 B10 =X0 − 4X1 + 20X3 − 20X4 − 36X5 + 64X6
65519 65535
X X + 20X7 − 90X8 + 20X9 + 64X10 − 36X11
n14 = nai (c), n15 = nai (c),
− 20X12 + 20X13 − 4X15 + X16 ,
i=65400 i=65520
n16 = na65536 (c). B11 =X0 − 6X1 + 10X2 + 10X3 − 50X4 + 34X5
+ 66X6 − 110X7 + 110X9 − 66X10 − 34X11
+ 50X12 − 10X13 − 10X14 + 6X15 − X16 ,
The MacWilliams relation with respect to the symmetrized
Lee weight enumerator is as follows. B12 =X0 − 8X1 + 24X2 − 24X3 − 36X4 + 120X5
− 88X6 − 88X7 + 198X8 − 88X9 − 88X10
Theorem III.2. Let C be a linear code of length n over R.
+ 120X11 − 36X12 − 24X13 + 24X14 − 8X15
Then
+ X16 ,
B13 =X0 − 10X1 + 42X2 − 90X3 + 78X4 + 78X5
− 286X6 + 286X7 − 286X9 + 286X10 − 78X11
SLW EC ⊥ (X0 , X1 , . . . , X16 ) = − 78X12 + 90X13 − 42X14 + 10X15 − X16 ,
1
SLW EC (B0 , B1 , . . . , B16 ), B14 =X0 − 12X1 + 64X2 − 196X3 + 364X4 − 364X5
|C|
+ 572X7 − 858X8 + 572X9 − 364X11 + 364X12
− 196X13 + 64X14 − 12X15 + X16 ,
where
B15 =X0 − 14X1 + 90X2 − 350X3 + 910X4 − 1638X5
+ 2002X6 − 1430X7 + 1430X9 − 2002X10
B0 = X0 + 16X1 + 120X2 + 560X3 + 1280X4 + 4368X5
+ 1638X11 − 910X12 + 350X13 − 90X14
+ 8008X6 + 11440X7 + 12870X8 + 11440X9
+ 14X15 − X16 ,
+ 8008X10 + 4368X11 + 1280X12 + 560X13
B16 =X0 − 16X1 + 120X2 − 560X3 + 1280X4 − 4368X5
+ 120X14 + 16X15 + X16 ,
+ 8008X6 − 11440X7 + 12870X8 − 11440X9
B1 = X0 + 14X1 + 90X2 + 350X3 + 910X4 + 1638X5
+ 8008X10 − 4368X11 + 1280X12
+ 2002X6 + 1430X7 − 1430X9 − 2002X10
− 560X13 + 120X14 − 16X15 + X16 ,
− 1638X11 − 910X12 − 350X13 − 90X14
− 14X15 − X16 ,
B2 = X0 + 12X1 + 64X2 + 196X3 + 364X4 + 364X5
− 572X7 − 858X8 − 572X9 + 364X11 + 364X12
+ 196X13 + 64X14 + 12X15 + X16 ,
B3 = X0 + 10X1 + 42X2 + 90X3 + 78X4 − 78X5
− 286X6 − 286X7 + 286X9 + 286X10
+ 78X11 − 78X12 − 90X13 − 42X14
− 10X15 − X16 ,

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

P Proof: For i, j = 0, 1, 2, . . . , 16, we determine Proof: Similar to the proof of Theorem 9 in [14].
χ(rs) for r ∈ Di . By definition, we have We also have the MacWilliams relation with respect to the
s∈Dj
Hamming weight enumerator.
SLW EC ⊥ (X0 , X1 , . . . , X16 ) Theorem III.4. Let C be a linear code of length n over R.
= CW EC ⊥ (X0 , X1 , . . . , X1 , X2 , . . . , X2 , X3 , . . . , X3 , Then
| {z } | {z } | {z }
16 120 560 1
HamC ⊥ (X, Y ) = HamC (X + 65536Y, X − Y ).
X4 , . . . , X4 , X5 , . . . , X5 , X6 , . . . , X6 , X7 , . . . , X7 , |C|
| {z } | {z } | {z } | {z }
1820 4368 8008 11440
Proof: Similar to the proof of Theorem 10 in [14].
X8 , . . . , X8 , X9 , . . . , X9 , X10 , . . . , X10 , X11 , . . . , X11 ,
| {z } | {z } | {z } | {z } Next, we consider the other weight enumerator with
12870 11440 8008 4368
respect to the Lee weight, called Lee weight enumerator.
X12 , . . . , X12 , X13 , . . . , X13 , X14 , . . . , X14 , For a linear code C, define Ai as a number of elements
| {z } | {z } | {z }
1820 560 120 of C having Lee weight i. The sequence A0 , A1 , . . . , A16n
X15 , . . . , X15 , X16 ) is called weight distribution in C with respect to the Lee
weight. The Lee weight enumerator for C is defined by
| {z }
16

16 X 16 X 16n
1 X X
= CW EC  χ(a1 s)Xj , χ(a2 s)Xj ,
X X
|C| LeeC (X, Y ) = X 16n−wL (c) Y wL (c) = Ai X 16n−i Y i
j=0 s∈Dj j=0 s∈Dj c∈C i=0

16 X
...,
X
χ(a65536 s)Xj  . Then we have the following property.
j=0 s∈Dj Theorem III.5. Let C be a linear code of length n over R.
Since for aj , ak ∈ Dj we have Then
16 X 16 X
X X LeeC (X, Y ) = SLW EC (X 16 , X 15 Y, X 14 Y 2 , X 13 Y 3 ,
χ(aj s)Xj = χ(ak s)Xj ,
j=0 s∈Dj j=0 s∈Dj X 12 Y 4 , X 11 Y 5 , X 10 Y 6 , X 9 Y 7 , X 8 Y 8 , X 7 Y 9 ,
then X 6 Y 10 , X 5 Y 11 , X 4 Y 12 , X 3 Y 13 , X 2 Y 14 , XY 15 , Y 16 ).

16
SLW EC ⊥ (X0 , X1 , . . . , X16 ) Proof: Denote wL (c) =
P
ini (c). Then we have

16 X i=0
1 X X
= SLW EC  χ(ai s)Xj , . . . , 16 16 16
|C| X X X
ai ∈D0
j=0 s∈Dj 16n−wL (c) = 16ni (c)− ini (c) = (16−i)ni (c).

16 X
X X i=0 i=0 i=0
χ(ai s)Xj  .
By definition, we obtain
ai ∈D16 j=0 s∈Dj
X
By direct calculation, we obtain LeeC (X, Y ) = X 16n−wL (c) Y wL (c)
16 X c∈C
X X 16 16
χ(ai s)Xj = Bk X P
(16−i)ni
P
ini
ai ∈Dk j=0 s∈Dj = X i=0 Y i=0
c∈C
for k = 1, 2, . . . , 16. Hence, we have 16
XY
= X 16−i Y i
SLW EC ⊥ (X0 , X1 , . . . , X16 ) c∈C i=0
1 = SLW EC (X 16 , X 15 Y, . . . , Y 16 ).
= SLW EC (B0 , B1 , . . . , B16 ).
|C|

Another weight enumerator of a linear code C, called a The following result gives us a MacWilliams relation with
Hamming weight enumerator, respect to the Lee weight enumerator.

HamC (X, Y )
X
X n−wH (c) Y wH (c) , Theorem III.6. Let C be a linear code of length n over R.
c∈C
Then

where wH (c) denotes the Hamming weight of the codeword 1


LeeC ⊥ (X, Y ) = LeeC (X + Y, X − Y ).
c. We have the following. |C|

Theorem III.3. Let C be a linear code of length n over R. Proof: By Theorem III.2 dan Theorem III.5, we obtain
Then
LeeC ⊥ (X, Y ) = SLW EC ⊥ (X 16 , X 15 Y, . . . , Y 16 )
HamC (X, Y ) = SLW EC (X, Y, Y, . . . , Y ). 1
| {z } = SLW EC (E0 , E1 , E2 , . . . , E16 )
16 |C|

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

with E9 = X 16 − 2X 15 Y − 6X 14 Y 2 + 14X 13 Y 3 + 14X 12 Y 4


E0 = X 16 + 16X 15 Y + 120X 14 Y 2 + 560X 13 Y 3 − 42X 11 Y 5 − 14X 10 Y 6 + 70X 9 Y 7 − 70X 7 Y 9
+ 1280X 12 Y 4 + 4368X 11 Y 5 + 8008X 10 Y 6 + 14X 6 Y 10 + 42X 5 Y 11 − 14X 4 Y 12 − 14X 3 Y 13
+ 11440X 9 Y 7 + 12870X 8 Y 8 + 11440X 7 Y 9 + 6X 2 Y 14 + 2XY 15 − Y 16
+ 8008X 6 Y 10 + 4368X 5 Y 11 + 1280X 4 Y 12 = (X + Y )7 (X − Y )9 ,
+ 560X 3 Y 13 + 120X 2 Y 14 + 16XY 15 + Y 16 E10 = X 16 − 4X 15 Y + 20X 13 Y 3 − 20X 12 Y 4 − 36X 11 Y 5
= (X + Y )16 , + 64X 10 Y 6 + 20X 9 Y 7 − 90X 8 Y 8 + 20X 7 Y 9
E1 = X 16 + 14X 15 Y + 90X 14 Y 2 + 350X 13 Y 3 + 64X 6 Y 10 − 36X 5 Y 11 − 20X 4 Y 12 + 20X 3 Y 13
+ 910X 12 Y 4 + 1638X 11 Y 5 + 2002X 10 Y 6 − 4XY 15 + Y 16
+ 1430X 9 Y 7 − 1430X 7 Y 9 − 2002X 6 Y 10 = (X + Y )6 (X − Y )10 ,
− 1638X 5 Y 11 − 910X 4 Y 12 − 350X 3 Y 13 E11 = X 16 − 6X 15 Y + 10X 14 Y 2 + 10X 13 Y 3 − 50X 12 Y 4
2 14 15 16
− 90X Y − 14XY −Y + 34X 11 Y 5 + 66X 10 Y 6 − 110X 9 Y 7 + 110X 7 Y 9
= (X + Y )15 (X − Y ), − 66X 6 Y 10 − 34X 5 Y 11 + 50X 4 Y 12 − 10X 3 Y 13
E2 = X 16 + 12X 15 Y + 64X 14 Y 2 + 196X 13 Y 3 − 10X 2 Y 14 + 6XY 15 − Y 16
+ 364X 12 Y 4 + 364X 11 Y 5 − 572X 9 Y 7 − 858X 8 Y 8 = (X + Y )5 (X − Y )11 ,
− 572X 7 Y 9 + 364X 5 Y 11 + 364X 4 Y 12 + 196X 3 Y 13 E12 = X 16 − 8X 15 Y + 24X 14 Y 2 − 24X 13 Y 3 − 36X 12 Y 4
2 14 15 16
+ 64X Y + 12XY +Y + 120X 11 Y 5 − 88X 10 Y 6 − 88X 9 Y 7 + 198X 8 Y 8
14 2
= (X + Y ) (X − Y ) , − 88X 7 Y 9 − 88X 6 Y 10 + 120X 5 Y 11 − 36X 4 Y 12
E3 = X 16 + 10X 15 Y + 42X 14 Y 2 + 90X 13 Y 3 − 24X 3 Y 13 + 24X 2 Y 14 − 8XY 15 + Y 16
+ 78X 12 Y 4 − 78X 11 Y 5 − 286X 10 Y 6 − 286X 9 Y 7 = (X + Y )4 (X − Y )12 ,
+ 286X 7 Y 9 + 286X 6 Y 10 + 78X 5 Y 11 − 78X 4 Y 12 E13 = X 16 − 10X 15 Y + 42X 14 Y 2 − 90X 13 Y 3 + 78X 12 Y 4
3 13 2 14 15 16
− 90X Y − 42X Y − 10XY −Y + 78X 11 Y 5 − 286X 10 Y 6 + 286X 9 Y 7 − 286X 7 Y 9
13 3
= (X + Y ) (X − Y ) , + 286X 6 Y 10 − 78X 5 Y 11 − 78X 4 Y 12 + 90X 3 Y 13
E4 = X 16 + 8X 15 Y + 24X 14 Y 2 + 24X 13 Y 3 − 36X 12 Y 4 − 42X 2 Y 14 + 10XY 15 − Y 16
11 5
− 120X Y − 88X Y + 88X Y + 198X Y 10 6 9 7 8 8
= (X + Y )3 (X − Y )13 ,
+ 88X 7 Y 9 − 88X 6 Y 10 − 120X 5 Y 11 − 36X 4 Y 12 E14 = X 16 − 12X 15 Y + 64X 14 Y 2 − 196X 13 Y 3
3 13 2 14 15 16
+ 24X Y + 24X Y + 8XY +Y + 364X 12 Y 4 − 364X 11 Y 5 + 572X 9 Y 7 − 858X 8 Y 8
12 4
= (X + Y ) (X − Y ) , + 572X 7 Y 9 − 364X 5 Y 11 + 364X 4 Y 12 − 196X 3 Y 13
E5 = X 16 + 6X 15 Y + 10X 14 Y 2 − 10X 13 Y 3 − 50X 12 Y 4 + 64X 2 Y 14 − 12XY 15 + Y 16
− 34X 11 Y 5 + 66X 10 Y 6 + 110X 9 Y 7 − 110X 7 Y 9 = (X + Y )2 (X − Y )14 ,
6 10 5 11 4 12 3 13
− 66X Y + 34X Y + 50X Y + 10X Y
E15 = X 16 − 14X 15 Y + 90X 14 Y 2 − 350X 13 Y 3
2 14 15 16
− 10X Y − 6XY −Y
+ 910X 12 Y 4 − 1638X 11 Y 5 + 2002X 10 Y 6
= (X + Y )11 (X − Y )5 ,
− 1430X 9 Y 7 + 1430X 7 Y 9 − 2002X 6 Y 10
E6 = X 16 + 4X 15 Y − 20X 13 Y 3 − 20X 12 Y 4 + 36X 11 Y 5 + 1638X 5 Y 11 − 910X 4 Y 12 + 350X 3 Y 13
+ 64X 10 Y 6 − 20X 9 Y 7 − 90X 8 Y 8 − 20X 7 Y 9 − 90X 2 Y 14 + 14XY 15 − Y 16
6 10 5 11 4 12
+ 64X Y + 36X Y − 20X Y = (X + Y )(X − Y )15 ,
3 13 15 16
− 20X Y + 4XY +Y
10 6
E16 = X 16 − 16X 15 Y + 120X 14 Y 2 − 560X 13 Y 3
= (X + Y ) (X − Y ) ,
+ 1280X 12 Y 4 − 4368X 11 Y 5 + 8008X 10 Y 6
16 15 14 2 13 3 12 4
E7 = X + 2X Y − 6X Y − 14X Y + 14X Y − 11440X 9 Y 7 + 12870X 8 Y 8 − 11440X 7 Y 9
+ 42X 11 Y 5 − 14X 10 Y 6 − 70X 9 Y 7 + 70X 7 Y 9 + 8008X 6 Y 10 − 4368X 5 Y 11 + 1280X 4 Y 12
6 10 5 11 4 12 3 13
+ 14X Y − 42X Y − 14X Y + 14X Y − 560X 3 Y 13 + 120X 2 Y 14 − 16XY 15 + Y 16
2 14 15 16
+ 6X Y − 2XY −Y = (X − Y )16 .
9 7
= (X + Y ) (X − Y ) , Hence, we have
16 14 2 12 4 10 6 8 8
E8 = X − 8X Y + 28X Y − 56X Y + 70X Y 1
6 10 4 12 2 14 16
LeeC ⊥ (X, Y ) = Lee(X + Y, X − Y ).
− 56X Y + 28X Y − 8X Y +Y |C|
8 8
= (X + Y ) (X − Y ) ,

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

IV. C YCLIC AND QUASI - CYCLIC C ODES there exist polynomials ft (x), gt (x), pt (x) ∈ Z4 [x] such that
Now, let us look at an important class of linear codes, Ct = hft (x) + 2pt (x), 2gt (x)i, then
namely cyclic codes. We mainly consider the structural
* 8 8 8
+
X X X
properties of cyclic codes over the ring R. C= ηt ft (x) + 2 ηt pt (x), 2 ηt gt (x) .
The notion of cyclic codes is standard for codes over all t=1 t=1 t=1
rings. A cyclic shift on Rn is a permutation T such that Furthermore, if n is odd, then
* 8 8
+
T (c0 , c1 , c2 , . . . , cn−1 ) = (cn−1 , c0 , c1 , . . . , cn−2 ). X X
C= ηt ft (x) + 2 ηt gt (x) .
A linear code C over R is called a cyclic code if C is t=1 t=1
invariant under the cyclic shift T, namely T (C) = C. We use * 8 8
the usual ideas of identifying vectors in Rn and polynomials
X X
Proof: Let D = ηt ft (x) + 2 ηt pt (x),
in the residue class ring R[x]/hxn − 1i as follows: + t=1 t=1
8
X
c = (c0 , c1 , c2 , . . . , cn−1 ) ←→ 2 ηt gt (x) . It is obvious that D ⊆ C. Let c(x) ∈ C.
t=1
c(x) = c0 + c1 x + c2 x2 + · · · + cn−1 xn−1 + hxn − 1i. Because C = ⊕8t=1 ηt Ct and Ct = hft (x) + 2pt (x), 2gt (x)i,
We can see that T (c) is identified by x · c(x) ∈ R[x]/hxn − then there exist ut (x), vt (x) ∈ Z2 [x] such that
1i. This implies that cyclic codes over R are identified by 8
X
ideals in the residue class ring R[x]/hxn −1i. So, we have to c(x) = ηt ((ft (x) + 2pt (x))ut (x) + 2gt (x)vt (x))
understand the structure of the residue class ring R[x]/hxn − t=1
1i in order to understand cyclic codes over the ring R. X8 8
X
The first theorem below is a straightforward generalization = ηt (ft (x) + 2pt (x))ut (x) + ηt 2gt (x)vt (x)
of Theorem 13 proven by Li, Guo, Zhu, and Kai [14]. t=1 t=1
X8 8
X
Theorem IV.1. Let C = C1 η1 ⊕ C2 η2 ⊕ · · · ⊕ C8 η8 . Then C = ηt ut (x) ηt (ft (x) + 2pt (x))
is a cyclic code over R if and only if one of following three t=1 t=1
conditions is satisfied: 8
X X8

(1) For t ∈ {1, 2, . . . , 8}, Ct is a cyclic code over Z4 . + ηt vt (x) 2ηt gt (x).
t=1 t=1
(2) For t ∈ {1, 2, . . . , 8}, Ct⊥ is a cyclic code over Z4 .
(3) C ⊥ is a cyclic code over R. So we have C ⊆ D and hence C = D.
8
By using Theorem IV.2 and the similar technique as in
Proof: Let c =
X
ηt ct ∈ C, and write ct = proof of Theorem IV.3, we obtain generator polynomials for
t=1
the dual of cyclic codes as given in the theorem below.
(ct,0 , ct,1 , . . . , ct,n−1 ) ∈ Ct , for 1 ≤ t ≤ 8. Since C is a
Theorem IV.4. Let C = hf (x) + 2p(x), 2g(x)i be a cyclic
cyclic code, we also have
code over Z4 . Then
8 8 8
!
X X X * 8 8
ηt ct,n−1 , ηt ct,0 , . . . , ηt ct,n−2 ∈ C. X X
C⊥ = ηt gbt (x)∗ + 2 ηt xdeg(bgt (x))−deg(ut (x)) ut (x)∗ ,
t=1 t=1 t=1
t=1 t=1
So, (ct,n−1 , ct,0 , . . . , ct,n−2 ) ∈ Ct , for 1 ≤ t ≤ 8, and hence, 8
X
+
Ct is cyclic for 1 ≤ t ≤ 8. The reverse also holds, so the 2 fbt (x)∗ .
first condition is proven. t=1
If Ct is cyclic over Z4 , then Ct⊥ is also cyclic ( [21], Now, let us turn to the special class of cyclic codes called
Proposition 7.9). From condition (1), C ⊥ is a cyclic code a quasi-cyclic codes.
over R, so C is a cyclic code over R. Let σ be a cyclic shift operator over Zn4 . For any positive
We start to observe the generator polynomials of cyclic integer s, let σs be the quasi-shift defined by
code and its dual over R. For that purpose, we need the  
following theorem proven by Li, Guo, Zhu, and Kai [14]. σs a(1) | a(2) | · · · | a(s)
Theorem IV.2 ( [14], Theorem 15). Let C = hf (x) +
      
= σ a(1) | σ a(2) | · · · | σ a(s) ,
2p(x), 2g(x)i be a cyclic code over Z4 . Then
with a(1) , a(2) , . . . , a(s) ∈ Zn4 and ”|” is a vector concate-
C ⊥ = hb
g (x)∗ + 2xdeg(bg(x))−deg(u(x)) u(x)∗ , 2fb(x)∗ i
 n  n nation. A quaternary quasi-cyclic code C of index s and
length ns is a subset of (Zn4 )s such that σs (C) = C. If
 
x −1 x −1
with fb(x) := , gb(x) := , and 8
f(x) g(x) X
1 R = ⊕8t=1 ηt Rt , we can write any r ∈ R as r = ηt rt
f (x)∗ := xdeg(f (x)) f . t=1
x with rt ∈ Rt , for 1 ≤ t ≤ 8. We define the mapping
The following two theorems provide generator polynomi-  3 n
als of cyclic code and its dual over R. Φ: Rn −→ Z24
×n−1
i=0 ri 7−→ ×8t=1 ×n−1
i=0 rt,i
Theorem IV.3. Let C = C1 η1 ⊕ C2 η2 ⊕ · · · ⊕ C8 η8 be a
cyclic code of length n over R. If for every t ∈ {1, 2, . . . , 8}, with ri = ×8t=1 rt,i for i = 0, 1, . . . , n − 1 and rt,i ∈ Rt .

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

Then we have a similar theorem of Theorem 17 in [14]. Then we have C = ⊕8t=1 Ct ηt is a cyclic code over R.
Parameters of Φ(C) is [56, 432 224 , 2].
Theorem IV.5. Let C = C1 η1 ⊕ C2 η2 ⊕ · · · ⊕ C8 η8 be a
If we choose another set of Ci with
cyclic code of length n over R. Then Φ(C) is a quasi-cyclic
code of index 8 and length 8n over Z4 . Ci = h(x3 + x + 1)(x3 + x2 + 1) + 2i, i = 1, 2, . . . , 8,
Proof: Let ×n−1 8
i=0 ci ∈ C. Let ci = ×t=1 ct,i for i = then we have C = ⊕8t=1 Ct ηt is also a cyclic code over R.
0, 1, . . . , n − 1 and ct,i ∈ Ct . Since C is a cyclic code, we
Parameters of Φ(C) is [56, 48 248 , 6]. Let us choose
have Ct is cyclic for 1 ≤ t ≤ 8. This means that for every
t ∈ {1, 2, . . . , 8}, we have σ(×n−1 n−1
i=0 rt,i ) ∈ Ct , if ×i=0 rt,i ∈ C1 = C2 = C3 = h(x + 1)(x3 + x + 1)(x3 + x2 + 1)
n−1 8 n−1
Ct . Write Φ(×i=0 ci ) = ×t=1 ×i=0 rt,i . Then
+ 2(x3 + x + 1)i,
σ8 (×8t=1 ×n−1
i=0 rt,i ) = ×8t=1 σ(×n−1
i=0 rt,i ) ∈ Φ(C). C4 = C5 = C6 = C7 = C8 = h(x3 + x2 + 1) + 2i.
So we have Φ(C) is a quasi-cyclic code C of index 8 and
We have C = ⊕8t=1 Ct ηt is also a cyclic code over R.
length 8n over Z4 .
Parameters of Φ(C) is [56, 423 227 , 2]. J
Furthermore, by using the Theorem 18 of [14] below, we
obtain directly the type of Φ(C) as given in Corollary IV.7. Example IV.11. Let n = 9. In Z4 [x], x9 − 1 = (x + 1)(x2 +
x + 1)(x6 + x3 + 1). Choose
Theorem IV.6 ( [14], Theorem 18). Let Ct , t ∈ {1, 2, . . . , 8}
be a cyclic code of length n (n is odd) over Z4 . Write Ci = h(x2 + x + 1)(x6 + x3 + 1) + 2(x6 + x3 + 1)i, i =
Ct = hf1,t (x)+2f2,t (x)i with f1,t (x) and f2,t (x) are monic 1, 2, . . . , 8,
factors of xn − 1 over Z4 and f2,t (x) | f1,t (x). Then the
cardinality of Ct , for 1 ≤ t ≤ 8, is then C = ⊕8t=1 Ct ηt is a cyclic code over R. Parameters of
Φ(C) is [72, 48 216 , 6].
4n−deg(f1,t (x)) 2deg(f1,t (x)−deg(f2,t (x)) . If we choose
The corollary below follows directly. Ci = h(x2 +x+1)(x6 +x3 +1)+2(x2 +x+1)i, i = 1, 2, . . . , 8,
8
We have C = ⊕8t=1 Ct ηt is a cyclic code over R. Parameters
Y
Corollary IV.7. Let Φ(C) = Ct be a linear code of
t=1 of Φ(C) is [72, 48 232 , 3]. J
length 8n (n is odd) over Z4 and Ct is a cyclic code over
Z4 for every t ∈ {1, 2, . . . , 8}. Then the cardinality of Φ(C) Example IV.12. Let n = 15. In Z4 [x], x15 − 1 = (x +
is 1)(x2 + x + 1)(x4 + x + 1)(x4 + x3 + 1)(x4 + x3 + x2 + 1).
P8 P8 Choose
4 t=1 (n−deg(f1,t (x))) 2 t=1 (deg(f1,t (x)−deg(f2,t (x)) .
8
Y Ci = h(x4 + x + 1)(x4 + x3 + 1)(x4 + x3 + x2 + 1)
Now, consider a linear code Φ(C) = Ct of length 8n + 2(x4 + x + 1)(x4 + x3 + 1)i, for 1 ≤ i ≤ 4,
t=1
(n is odd) over Z4 and let dL be the Lee distance of Φ(C). Ci = h(x4 + x + 1)(x4 + x3 + 1)(x4 + x3 + x2 + 1)
Let min1≤t≤8 dL (Ct ) = dL (Cj ), for some j, and let c ∈ Cj + 2(x4 + x3 + 1)(x4 + x3 + x2 + 1)i, for 5 ≤ i ≤ 8.
such that wL (c) = dL (Cj ). Then
We have C = ⊕8t=1 Ct ηt is a cyclic code over R. Parameters
−1
dL (Φ (0, . . . , 0, c, 0, . . . , 0)) = dL (Cj ), of Φ(C) is [120, 424 232 , 10].
and hence dL = min1≤t≤8 dL (Ct ). If we choose

Ci = h(x2 + x + 1)(x4 + x + 1)(x4 + x3 + 1)


A. Some examples + 2(x4 + x + 1)(x4 + x3 + 1)i, for 1 ≤ i ≤ 4,
Here we provide some examples of cyclic codes of odd Ci = h(x2 + x + 1)(x4 + x3 + 1)(x4 + x3 + x2 + 1)
length over R and their Z4 -images with parameters [n, k, dL ].
+ 2(x4 + x3 + 1)(x4 + x3 + x2 + 1)i for 5 ≤ i ≤ 8.
Example IV.8. Let n = 3. In Z4 [x], x3 − 1 = (x − 1)(x2 +
x + 1). then C = ⊕8t=1 Ct ηt is a cyclic code over R. Parameters of
Choose Ci = h(x2 + x + 1) + 2i for i = 1, 2, . . . , 8. We Φ(C) is [120, 440 216 , 8]. J
have C = ⊕8t=1 Ct ηt . Parameters of Φ(C) is [24, 48 216 , 2].
Example IV.13. Let n = 31. In Z4 [x], x31 − 1 =
J
F1 (x)F2 (x)F3 (x)F4 (x)F5 (x)F6 (x)F7 (x) with
Example IV.9. Let n = 5. In Z4 [x], x5 − 1 = (x − 1)(x4 +
x3 + x2 + x + 1). Choose Ci = h(x4 + x3 + x2 + x + 1) + 2i F1 (x) = x + 1
for i = 1, 2, . . . , 8. We have C = ⊕8t=1 Ct ηt . Parameters of F2 (x) = x5 + x2 + 1
Φ(C) is [40, 48 232 , 2]. J F3 (x) = x5 + x3 + 1
Example IV.10. Let n = 7. In Z4 [x], x7 − 1 = (x + 1)(x3 + F4 (x) = x5 + x3 + x2 + x + 1
x + 1)(x3 + x2 + 1). Choose F5 (x) = x5 + x4 + x2 + x + 1
C1 = C2 = C3 = h(x3 + x + 1) + 2i, F6 (x) = x5 + x4 + x3 + x + 1
C4 = C5 = C6 = C7 = C8 = h(x3 + x2 + 1) + 2i. F7 (x) = x5 + x4 + x3 + x2 + 1.

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

Choose [4] Database of Z4 codes, available from


http://www.asamov.com/Z4Codes/CODES/ShowCODESTablePage.aspx.
C1 = C2 = hF1 (x)F2 (x)F3 (x) + 2F1 (x)F2 (x)i, (accessed at April 2019).
[5] Y. Cengellenmis, A. Dertli, and S.T. Dougherty, ”Codes over an
C3 = hF1 (x)F3 (x)F4 (x) + 2F1 (x)F3 (x)i, Infinite Family of Rings with a Gray Map,” Designs, Codes, and
C4 = hF1 (x)F4 (x)F5 (x) + 2F1 (x)F4 (x)i, Cryptography, 72(3) 2014, 559-580.
[6] H. Q. Dinh, B. T. Nguyen, and S. Sriboonchitta, ”Skew constacyclic
C5 = hF1 (x)F5 (x)F6 (x) + 2F1 (x)F5 (x)i, codes over finite fields and finite chain rings,” Mathematical Problems
in Engineering, Vol. 2016, Article ID 3965789, 17 pages.
C6 = hF1 (x)F6 (x)F7 (x) + 2F1 (x)F6 (x)i, [7] S.T. Dougherty, Algebraic coding theory over finite commutative rings,
C7 = C8 = hF1 (x)F2 (x)F7 (x) + 2F1 (x)F7 (x)i. (Springer briefs in Mathematics), Springer, 2017.
[8] S.T. Dougherty, J.L. Kim, H. Kulosman, and H. Liu, ”Self-dual
We have C = ⊕8t=1 Ct ηt is a cyclic code over R. Parameters codes over commutative Frobenius rings,” Finite Fields and Their
Applications 16(1) 2010, 14-26.
of Φ(C) is [248, 4160 240 , 8]. [9] S.T. Dougherty, and H. Liu, ”Independence of vectors in codes over
For another set of Ci such as rings,” Design, Codes, and Cryptography, 51(1) 2009, 55-68.
[10] S.T. Dougherty, J.-L. Kim, and H. Kulosman, ”MDS codes over finite
C1 = C2 = C3 = hF1 (x)F2 (x)F3 (x)F4 (x)F5 (x) principal ideal rings,” Design, Codes, and Cryptography 50(1) 2009,
77-92.
+ 2F1 (x)F2 (x)F3 (x)i, [11] K. Guenda and T.A. Gulliver, ”MDS and self-dual codes over rings,”
C4 = C5 = C6 = hF1 (x)F3 (x)F4 (x)F5 (x)F6 (x) Finite Fields Appl. 18(6), 2012, 1061-1075.
[12] A.R. Hammons, P.V. Kumar, A.R. Calderbank, N.J.A. Sloane, and P.
+ 2F1 (x)F3 (x)F4 (x)i, Solé, ”The Z4 -linearity of Kerdock, Preparata, Goethals and Related
Codes,” IEEE Transactions on Information Theory 40, 1994, 301-319
C7 = C8 = hF1 (x)F4 (x)F5 (x)F6 (x)F7 (x) [13] W. Huffman, and V. Pless, Fundamentals of Error Correcting Codes,
+ 2F1 (x)F4 (x)F5 (x)i, Cambridge University Press, 2003.
[14] P. Li, X. Guo, S. Zhu, and X. Kai, ”Some results on linear codes over
we have C = ⊕8t=1 Ct ηt is a cyclic code over R. Parameters the ring Z4 + uZ4 + vZ4 + uvZ4 ,” Journal of Applied Mathematics
and Computing 54(1-2) 2017, 307-324.
of Φ(C) is [248, 480 280 , 12]. [15] S. Rosdiana, M.I. Detiena, D. Suprijanto, and A. Barra, ”On linear
Let us choose another set of Ci : codes over Z2m + vZ2m ,” IAENG International Journal of Applied
Mathematics 51(1) 2021, 133-141.
C1 = C2 = C3 = C4 = hF2 (x)F3 (x)F4 (x)F5 (x)F6 (x) [16] C.E. Shannon, ”Mathematical theory of communication,” Bell System
Technical Journal 27 (1948), 379-423 and 623-656.
+ 2F3 (x)F4 (x)F5 (x)F6 (x)i, [17] K. Shiromoto, ”Singleton bounds for codes over finite rings,” Journal
C5 = C6 = C7 = C8 = hF3 (x)F4 (x)F5 (x)F6 (x)F7 (x) of Algebraic Combinatorics 12(1) 2000, 95-99.
[18] K. Shiromoto, ”Note on MDS codes over the integers modulo pm ,”
+ 2F4 (x)F5 (x)F6 (x)F7 (x)i. Hokkaido Math. J. 29(1) (2000), 149-157.
[19] R.C. Singleton, ”Maximum distance q-nary codes,” IEEE Trans.
We have C = ⊕8t=1 Ct ηt is a cyclic code over R. Parameters Information Theory IT-10, 1964, 116-118.
of Φ(C) is [248, 448 232 , 22]. J [20] B. Yildiz and S. Karadeniz, ”Linear codes over Z4 + uZ4 :
MacWilliams identities, projections, and formally self-dual codes,”
Remark 2. We compare our results on linear codes over Finite Fields Appl. 27 (2014), 24-40.
[21] Z.-X. Wan, Quaternary codes, World Scientific Publishing, 1997.
Z4 with the database of Z4 codes available online [4]. We [22] J. Wood, ”Duality for Modules over Finite Rings and Applications to
conclude that the resulting linear codes are all new with Coding Theory,” American Journal of Mathematics 121 1999, 555-
the highest known minimum Lee distances. These examples 575.
show that some good linear codes over Z4 can be obtained
by our Gray map, namely as a Gray image of linear codes
over R.

V. C ONCLUSION BUSTOMI received the M.S. degree in math-


emathics from the Department of Mathematics,
In this paper we derive structural properties of linear codes Institut Teknologi Bandung, Indonesia, in 2016.
over the ring R := Z4 + uZ4 + vZ4 + wZ4 + uvZ4 + uwZ4 + His main research interest is linear codes over
finite rings.
vwZ4 + uvwZ4 . We also obtained some new and optimal Since 2018, he has been a lecturer in the De-
linear codes having parameters which are unknown to exist partment of Mathematics, Airlangga University,
before. Surabaya, Indonesia.
There are several directions to further research on the
codes over the ring. We are now observing the self-duality
as well as polycyclic codes over the ring R. We obtained
structural properties regarding self-dual codes as well as con-
stacyclic codes over R. The results, which are not included
here, will be published elsewhere in separate papers.
ADITYA PURWA SANTIKA received the PhD
degree in Mathematics from the Department of
R EFERENCES Mathematics, Institut Teknologi Bandung, Ban-
dung, Indonesia, in 2015. His main research in-
[1] T. Abualrub and I. Siap, ”Reversible cyclic codes over Z4 ,” Aus- terests cover category theory, coding theory, and
tralasian Journal of Combinatorics 38 2007, 195-205. association schemes.
[2] R.K. Bandi and M. Bhaintwal, ”Codes over Z4 + uZ4 with respect Since 2018, he has been a lecturer in the Depart-
to Rosenbloom-Tsfasman metric,” 2013 International Conference on ment of Mathematics, Institut Teknologi Bandung,
Advances in Computing, Communications and Informatics (ICACCI), Bandung, Indonesia.
2014, 37-41.
[3] R.K. Bandi and M. Bhaintwal, ”Self-dual codes over Z4 +wZ4 ,” Dis-
crete Mathematics, Algorithms and Applications 7(2) 2015, 1550014
(10 pages).

Volume 48, Issue 3: September 2021


IAENG International Journal of Computer Science, 48:3, IJCS_48_3_27
______________________________________________________________________________________

DJOKO SUPRIJANTO received the M.Math.


and PhD degrees in Mathematics from Gradu-
ate School of Mathematics, Kyushu University,
Japan, in 2004 and 2007, respectively. His main
research interests cover linear codes over finite
rings, quantum error-correcting codes, algebraic
combinatorics, and also algebraic graph theory.
Since 1998, he has been with the Department
of Mathematics, Institut Teknologi Bandung, Ban-
dung, Indonesia, where he is currently an Asso-
ciate Professor.

Volume 48, Issue 3: September 2021

You might also like