{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T23:58:09Z","timestamp":1776297489054,"version":"3.50.1"},"reference-count":40,"publisher":"American Institute of Mathematical Sciences (AIMS)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AMC"],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:p xml:lang=\"fr\">&lt;p style='text-indent:20px;'&gt;In this paper, we give a geometric characterization of minimal linear codes. In particular, we relate minimal linear codes to cutting blocking sets, introduced in a recent paper by Bonini and Borello. Using this characterization, we derive some bounds on the length and the distance of minimal codes, according to their dimension and the underlying field size. Furthermore, we show that the family of minimal codes is asymptotically good. Finally, we provide some geometrical constructions of minimal codes as cutting blocking sets.&lt;\/p&gt;<\/jats:p>","DOI":"10.3934\/amc.2020104","type":"journal-article","created":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T08:47:10Z","timestamp":1598258830000},"page":"115","source":"Crossref","is-referenced-by-count":35,"title":["A geometric characterization of minimal codes and their asymptotic performance"],"prefix":"10.3934","volume":"16","author":[{"given":"Gianira N.","family":"Alfarano","sequence":"first","affiliation":[]},{"given":"Martino","family":"Borello","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Neri","sequence":"additional","affiliation":[]}],"member":"2321","reference":[{"key":"key-10.3934\/amc.2020104-1","doi-asserted-by":"publisher","unstructured":"E. Agrell.On the Voronoi neighbor ratio for binary linear block codes, <i>IEEE Transactions on Information Theory<\/i>, <b>44<\/b> (1998), 3064-3072.","DOI":"10.1109\/18.737535"},{"key":"key-10.3934\/amc.2020104-2","doi-asserted-by":"publisher","unstructured":"A. Alahmadi, C. G\u00fcneri, H. Shoaib and P. Sol\u00e9, Long quasi-polycyclic $t$-CIS codes, <i>Adv. Math. Commun.<\/i>, <b>12<\/b> (2018), 189\u2013198, arXiv: 1703.03109.","DOI":"10.3934\/amc.2018013"},{"key":"key-10.3934\/amc.2020104-3","doi-asserted-by":"publisher","unstructured":"A. Alahmadi, F. \u00d6zdemir, P. Sol\u00e9.On self-dual double circulant codes, <i>Designs, Codes and Cryptography<\/i>, <b>86<\/b> (2018), 1257-1265.","DOI":"10.1007\/s10623-017-0393-x"},{"key":"key-10.3934\/amc.2020104-4","doi-asserted-by":"publisher","unstructured":"A. Ashikhmin, A. Barg.Minimal vectors in linear codes, <i>IEEE Transactions on Information Theory<\/i>, <b>44<\/b> (1998), 2010-2017.","DOI":"10.1109\/18.705584"},{"key":"key-10.3934\/amc.2020104-5","doi-asserted-by":"publisher","unstructured":"E. Assmus.The category of linear codes, <i>IEEE Transactions on information theory<\/i>, <b>44<\/b> (1998), 612-629.","DOI":"10.1109\/18.661508"},{"key":"key-10.3934\/amc.2020104-6","doi-asserted-by":"publisher","unstructured":"S. Ball., <i>Finite Geometry and Combinatorial Applications, volume 82.<\/i>, <b>${ref.volume}<\/b> (2015).","DOI":"10.1017\/CBO9781316257449"},{"key":"key-10.3934\/amc.2020104-7","doi-asserted-by":"publisher","unstructured":"S. Ball, A. Blokhuis.On the size of a double blocking set in ${\\rm PG}(2, q)$, <i>Finite Fields and their Applications<\/i>, <b>2<\/b> (1996), 125-137.","DOI":"10.1006\/ffta.1996.9999"},{"key":"key-10.3934\/amc.2020104-8","doi-asserted-by":"publisher","unstructured":"D. Bartoli, M. Bonini.Minimal linear codes in odd characteristic, <i>IEEE Transactions on Information Theory<\/i>, <b>65<\/b> (2019), 4152-4155.","DOI":"10.1109\/TIT.2019.2891992"},{"key":"key-10.3934\/amc.2020104-9","unstructured":"D. Bartoli, M. Bonini and B. G\u00fcne\u0219, An inductive construction of minimal codes, arXiv preprint, arXiv: 1911.09093, 2019."},{"key":"key-10.3934\/amc.2020104-10","doi-asserted-by":"publisher","unstructured":"A. Bishnoi, S. Mattheus and J. Schillewaert, Minimal multiple blocking sets, <i>The Electronic Journal of Combinatorics<\/i>, <b>25<\/b> (2018), 14pp.","DOI":"10.37236\/7810"},{"key":"key-10.3934\/amc.2020104-11","doi-asserted-by":"publisher","unstructured":"G. R. Blakley.Safeguarding cryptographic keys, <i>Proceedings of the 1979 AFIPS National Computer Conference<\/i>, <b>48<\/b> (1979), 313-317.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"key-10.3934\/amc.2020104-12","doi-asserted-by":"publisher","unstructured":"M. Bonini and M. Borello, Minimal linear codes arising from blocking sets, <i>Journal of Algebraic Combinatorics<\/i>, 2020, 1\u201315.","DOI":"10.1007\/s10801-019-00930-6"},{"key":"key-10.3934\/amc.2020104-13","doi-asserted-by":"publisher","unstructured":"M. Borello and W. Willems, Group codes over fields are asymptotically good, <i>Finite Fields and Their Applications<\/i>, <b>68<\/b> (2020), 101738.","DOI":"10.1016\/j.ffa.2020.101738"},{"key":"key-10.3934\/amc.2020104-14","doi-asserted-by":"publisher","unstructured":"W. Bosma, J. Cannon, C. Playoust.The Magma algebra system I: The user language, <i>J. Symbol. Comput.<\/i>, <b>24<\/b> (1997), 235-265.","DOI":"10.1006\/jsco.1996.0125"},{"key":"key-10.3934\/amc.2020104-15","doi-asserted-by":"publisher","unstructured":"C. Carlet, C. Ding, J. Yuan.Linear codes from highly nonlinear functions and their secret sharing schemes, <i>IEEE Trans. Inf. Theory<\/i>, <b>51<\/b> (2005), 2089-2102.","DOI":"10.1109\/TIT.2005.847722"},{"key":"key-10.3934\/amc.2020104-16","doi-asserted-by":"publisher","unstructured":"H. Chabanne, G. Cohen and A. Patey, Towards secure two-party computation from the wire-tap channel, <i>Information security and cryptology\u2014ICISC 2013, <\/i>  34\u201346, Lecture Notes in Comput. Sci., 8565, Springer, Cham, 2014.","DOI":"10.1007\/978-3-319-12160-4_3"},{"key":"key-10.3934\/amc.2020104-17","doi-asserted-by":"publisher","unstructured":"S. Chang, J. Y. Hyun.Linear codes from simplicial complexes, <i>Designs, Codes and Cryptography<\/i>, <b>86<\/b> (2018), 2167-2181.","DOI":"10.1007\/s10623-017-0442-5"},{"key":"key-10.3934\/amc.2020104-18","doi-asserted-by":"publisher","unstructured":"C. Chen, W. W. Peterson, E. Weldon Jr.Some results on quasi-cyclic codes, <i>Information and Control<\/i>, <b>15<\/b> (1969), 407-423.","DOI":"10.1016\/S0019-9958(69)90497-5"},{"key":"key-10.3934\/amc.2020104-19","doi-asserted-by":"publisher","unstructured":"G. D. Cohen, S. Mesnager and A. Patey, On minimal and quasi-minimal linear codes, <i>Cryptography and Coding, <\/i>  85\u201398, Lecture Notes in Comput. Sci., 8308, Springer, Heidelberg, 2013.","DOI":"10.1007\/978-3-642-45239-0_6"},{"key":"key-10.3934\/amc.2020104-20","doi-asserted-by":"publisher","unstructured":"C. Ding.Linear codes from some 2-designs, <i>IEEE Transactions on Information Theory<\/i>, <b>61<\/b> (2015), 3265-3275.","DOI":"10.1109\/TIT.2015.2420118"},{"key":"key-10.3934\/amc.2020104-21","doi-asserted-by":"publisher","unstructured":"C. Ding, D. R. Kohel, S. Ling.Secret-sharing with a class of ternary codes, <i>Theoretical Computer Science<\/i>, <b>246<\/b> (2000), 285-298.","DOI":"10.1016\/S0304-3975(00)00207-3"},{"key":"key-10.3934\/amc.2020104-22","doi-asserted-by":"publisher","unstructured":"C. Ding, C. Li, N. Li, Z. Zhou.Three-weight cyclic codes and their weight distributions, <i>Discrete Mathematics<\/i>, <b>339<\/b> (2016), 415-427.","DOI":"10.1016\/j.disc.2015.09.001"},{"key":"key-10.3934\/amc.2020104-23","doi-asserted-by":"publisher","unstructured":"J. H. Griesmer.A bound for error-correcting codes, <i>IBM J. Research Develop.<\/i>, <b>4<\/b> (1960), 532-542.","DOI":"10.1147\/rd.45.0532"},{"key":"key-10.3934\/amc.2020104-24","doi-asserted-by":"publisher","unstructured":"Z. Heng, C. Ding, Z. Zhou.Minimal linear codes over finite fields, <i>Finite Fields and Their Applications<\/i>, <b>54<\/b> (2018), 176-196.","DOI":"10.1016\/j.ffa.2018.08.010"},{"key":"key-10.3934\/amc.2020104-25","doi-asserted-by":"publisher","unstructured":"W. C. Huffman, V. Pless., <i>Fundamentals of error-correcting codes<\/i>, <b>${ref.volume}<\/b> (2003).","DOI":"10.1017\/CBO9780511807077"},{"key":"key-10.3934\/amc.2020104-26","doi-asserted-by":"publisher","unstructured":"E. Karnin, J. Greene, M. Hellman.On secret sharing systems, <i>IEEE Transactions on Information Theory<\/i>, <b>29<\/b> (1983), 35-41.","DOI":"10.1109\/TIT.1983.1056621"},{"key":"key-10.3934\/amc.2020104-27","unstructured":"W. Lu, X. Wu and X. Cao, The parameters of minimal linear codes, arXiv preprint, arXiv: 1911.07648, 2019."},{"key":"key-10.3934\/amc.2020104-28","unstructured":"J. L. Massey, Minimal codewords and secret sharing, In <i>Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory<\/i>, pages 276\u2013279. Citeseer, 1993."},{"key":"key-10.3934\/amc.2020104-29","unstructured":"J. L. Massey, Some applications of coding theory in cryptography, <i>Codes and Ciphers: Cryptography and Coding IV<\/i>, 1995, 33\u201347."},{"key":"key-10.3934\/amc.2020104-30","doi-asserted-by":"publisher","unstructured":"R. J. McEliece, D. V. Sarwate.On sharing secrets and Reed-Solomon codes, <i>Communications of the ACM<\/i>, <b>24<\/b> (1981), 583-584.","DOI":"10.1145\/358746.358762"},{"key":"key-10.3934\/amc.2020104-31","doi-asserted-by":"publisher","unstructured":"S. Mesnager.Linear codes with few weights from weakly regular bent functions based on a generic construction, <i>Cryptogr. Commun.<\/i>, <b>9<\/b> (2017), 71-84.","DOI":"10.1007\/s12095-016-0186-5"},{"key":"key-10.3934\/amc.2020104-32","doi-asserted-by":"publisher","unstructured":"S. Mesnager, F. \u00d6zbudak, A. S\u0131nak.Linear codes from weakly regular plateaued functions and their secret sharing schemes, <i>Des. Codes Cryptogr.<\/i>, <b>87<\/b> (2019), 463-480.","DOI":"10.1007\/s10623-018-0556-4"},{"key":"key-10.3934\/amc.2020104-33","doi-asserted-by":"publisher","unstructured":"S. Mesnager, A. S\u0131nak.Several classes of minimal linear codes with few weights from weakly regular plateaued functions, <i>IEEE Trans. Inf. Theory<\/i>, <b>66<\/b> (2019), 2296-2310.","DOI":"10.1109\/TIT.2019.2956130"},{"key":"key-10.3934\/amc.2020104-34","doi-asserted-by":"publisher","unstructured":"B. Segre.Curve razionali normali e $k$-archi negli spazi finiti, <i>Annali di Matematica Pura ed Applicata<\/i>, <b>39<\/b> (1955), 357-379.","DOI":"10.1007\/BF02410779"},{"key":"key-10.3934\/amc.2020104-35","doi-asserted-by":"publisher","unstructured":"A. Shamir.How to share a secret, <i>Communications of the ACM<\/i>, <b>22<\/b> (1979), 612-613.","DOI":"10.1145\/359168.359176"},{"key":"key-10.3934\/amc.2020104-36","doi-asserted-by":"publisher","unstructured":"R. C. Singleton.Maximum distance $q$-ary codes, <i>IEEE Transactions on Information Theory<\/i>, <b>10<\/b> (1964), 116-118.","DOI":"10.1109\/tit.1964.1053661"},{"key":"key-10.3934\/amc.2020104-37","unstructured":"C. Tang, Y. Qiu, Q. Liao and Z. Zhou, Full characterization of minimal linear codes as cutting blocking sets, arXiv preprint, arXiv: 1911.09867, 2019."},{"key":"key-10.3934\/amc.2020104-38","doi-asserted-by":"publisher","unstructured":"M. A. Tsfasman and S. G. Vl\u01cedu\u0163, Algebraic-Geometric Codes, volume 58 of <i>Mathematics and its Applications (Soviet Series)<\/i>, Kluwer Academic Publishers Group, Dordrecht, 1991. Translated from the Russian by the authors.","DOI":"10.1007\/978-94-011-3810-9"},{"key":"key-10.3934\/amc.2020104-39","unstructured":"O. Veblen and J. W. Young, <i>Projective Geometry, Vol. 1<\/i>, Blaisdell Publishing Co. Ginn and Co. New York-Toronto-London, 1965."},{"key":"key-10.3934\/amc.2020104-40","doi-asserted-by":"publisher","unstructured":"J. Yuan, C. Ding.Secret sharing schemes from three classes of linear codes, <i>IEEE Transactions on Information Theory<\/i>, <b>52<\/b> (2005), 206-212.","DOI":"10.1109\/TIT.2005.860412"}],"container-title":["Advances in Mathematics of Communications"],"original-title":[],"link":[{"URL":"https:\/\/www.aimsciences.org\/article\/exportPdf?id=d52e2e3a-722a-406f-b487-bf13dfc59caf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T11:44:27Z","timestamp":1640864667000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.aimsciences.org\/article\/doi\/10.3934\/amc.2020104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022]]}},"alternative-id":["1930-5346_2022_1_115"],"URL":"https:\/\/doi.org\/10.3934\/amc.2020104","relation":{},"ISSN":["1930-5346","1930-5338"],"issn-type":[{"value":"1930-5346","type":"print"},{"value":"1930-5338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}