Citation: | JIANG Niu, ZHAO Min, YANG Zhiyao, ZHUO Zepeng, CHEN Guolong. Characterization and Properties of Bent-Negabent Functions[J]. Chinese Journal of Electronics, 2022, 31(4): 786-792. DOI: 10.1049/cje.2021.00.417 |
Throughout this paper,
⟨a,x⟩={a⋅x,whenVn=Fn2Trn1(ax),whenVn=F2n |
where
Trnk(x)=nk−1∑i=0x2ik=x+x2k+x22k+⋯+x2n−1,x∈F2n |
Boolean bent functions were introduced by Rothaus in 1976[1], which play an important role in both symmetric cryptography and error-correcting codes. An
Wf(a)=2−n2∑x∈Vn(−1)f(x)+⟨a,x⟩ |
It is a powerful tool for analyzing Boolean functions. A function
In Ref.[3], the concept of a bent function is extended to some generalized bent criteria for a Boolean function by analyzing Boolean functions that have flat spectrum with respect to one or more transforms from a specified set of unitary transforms.The transforms chosen by Riera and Parker are
I=(1001),H=(111−1),N=(1i1−i) |
The Walsh-Hadamard transform can be described as the tensor product of several
Nf(a)=2−n2∑x∈Vn(−1)f(x)+s(x)i⟨1n,x⟩(−1)⟨a,x⟩ |
where
s(x)={σ2(x)=∑0≤i<j≤n−1x2ix2j,ifx∈F2ns2(x)=∑1≤i<j≤nxixj,ifx∈Fn2 |
which is a generalization of Walsh-Hadamard transform. A function
The nega-Hadamard transform is also a powerful tool for analyzing Boolean functions. Recently, some interesting topic focus on the construction methods and characterizations for (bent-) negabent functions[4-9]. In Ref.[10], Sarkar presented a necessary and sufficient condition such that the quadratic monomial
f(x)=Trn1(λx2k+1) | (1) |
is bent-negabent. In Ref.[11], Huang et al. further proposed the quadratic polynomial form and proved that the quadratic polynomial
f(x)=n2−1∑i=1Trn1(cix2i+1)+Trn21(cn2x2n2+1) | (2) |
where
Inspired by Refs.[10, 11], our first contribution is to provide the necessary and sufficient condition such that the quadratic polynomial
In addition, Gupt et al.[12] presented a generalization of the convolution theorem for two
The rest of this paper is organized as follows. Section Ⅱ, we give a necessary and sufficient condition such that the quadratic Boolean function defined as Eq.(2) is bent-negabent. Section Ⅲ, we first present a new characterization of negabent functions. Further, a generalized nega-convolution theorem and the composition nega-Hadamard transform are presented and the nega-Hadamard transform of a class of generalized Carlet’s construction is calculated. Section Ⅳ gives some conclusions.
In this section, we will give a necessary and sufficient condition for a class of quadratic Boolean functions to be bent-negabent. First of all, let us recall a characterization of bent-negabent functions as follows.
Lemma 1[10] The function
∑x∈F2n(−1)f(x)+f(x+a)+Trn1(ax)=0,foralla∈F∗2n | (3) |
It is known that the function
∑x∈F2n(−1)f(x)+f(x+a)=0,foralla∈F∗2n | (4) |
A function for which both Eqs.(3) and (4) hold is a bent-negabent function.
Similar to the method proposed in Ref.[11], we prove that the function
Theorem 1 Let
L(a)=a+n2−1∑i=1cia2i+c2n−iia2n−i+cn2a2n2,foralla∈F∗2n |
is a linearized permutation polynomial, that is,
Proof Since
∑x∈F2n(−1)∑n2−1i=1Trn1(cix2i+1)+Trn1(c′n2x2n2+1)×(−1)∑n2−1i=1Trn1(ci(x+a)2i+1)+Trn1(c′n2(x+a)2n2+1)+Trn1(ax)=0 |
from Lemma 1. For simplicity, we denote
h(x)=n2−1∑i=1Trn1(cix2i+1)+Trn1(c′n2x2n2+1)+n2−1∑i=1Trn1(ci(x+a)2i+1)+Trn1(c′n2(x+a)2n2+1)+Trn1(ax) |
It follows from the properties of trace functions that
h(x)=Trn1(n2−1∑i=1cix2i+1+c′n2x2n2+1+n2−1∑i=1ci(x+a)2i+1+c′n2(x+a)2n2+1+ax)=Trn1(n2−1∑i=1(cia2i+c2n−iia2n−i+cn2a2n2+a)x+n2−1∑i=1cia2i+1+c′n2a2n2+1) |
Then one can easily see that
∑x∈F2n(−1)Trn1(∑n2−1i=1(cia2i+c2n−iia2n−i+cn2a2n2+a)x)×(−1)Trn1(∑n2−1i=1cia2i+1+c′n2a2n2+1)=0 |
hold if and only if
L(a)=a+n2−1∑i=1(cia2i+c2n−iia2n−i)+cn2a2n2 |
has no nonzero root in
From Theorem 1, we have the following result immediately.
Theorem 2 Let
Lf(a)=n2−1∑i=1(cia2i+c2n−iia2n−i)+cn2a2n2 |
is a complete mapping polynomial.
Proof From the proof of Theorem 1, we denote
L(a)=a+n2−1∑i=1(cia2i+c2n−iia2n−i)+cn2a2n2=a+Lf(a) |
From the result in Ref.[11] we know that
In this section, we present the characterization of negabent functions, by dividing the vector
Lemma 2 Let
1) If
2) If
In the following, we give a new characterization of negabent functions.
Theorem 3 Let
(Xe,Xo)={(0,±2n2)or(±2n2,0),ifniseven(±2n−12,±2n−12),ifnisodd |
where
Xe=∑x∈En(−1)f(x)+s2(x)+a⋅x,Xo=∑x∈On(−1)f(x)+s2(x)+a⋅x |
Proof By dividing the vector
Xe=∑x∈En(−1)f(x)+s2(x)+a⋅xXo=∑x∈On(−1)f(x)+s2(x)+a⋅x |
The nega-Hadamard transform of
Nf(a)=2−n2∑x∈Fn2(−1)f(x)+s2(x)+a⋅xi1n⋅x=2−n2(Xe+iXo) | (5) |
where
It follows from Eq.(5) that
(Xe,Xo)=(0,±2n2)or(±2n2,0) |
and if
By Theorem 3, we reprove the Lemma 1 of Ref.[14] by a simpler method.
Proposition 1 Let
Nf(a)=Wf+s2(a)+Wf+s2(¯a)2+iWf+s2(a)−Wf+s2(¯a)2 |
Proof Let
Nf(a)=2−n2∑x∈Fn2(−1)f(x)+s2(x)+a⋅xi1n⋅x=2−n2(Xe+iXo)=2−n2[(Xe+Xo)+(Xe−Xo)2+i(Xe+Xo)−(Xe−Xo)2]=Wf+s2(a)+Wf+s2(¯a)2+iWf+s2(a)−Wf+s2(¯a)2 |
The proposition follows.
In the following, we further describe the generalized nega-convolution theorem. Let
Wh(u)=2−n2∑v∈Fn2Wf(v)Wg(u+v) |
A general result of Walsh-convolution transform theorem has been given in Ref.[12].
Inspired by Ref.[12], we have the following theorem.
Theorem 4 Let
Nh(u)=2−m2∑v∈Fm2Nf1(v1)k∏i=2Wfi(vi+vi−1) | (6) |
where
Proof We show Eq.(6) by inducting on
Nh(u)=2−n2∑vk−1∈Fn2Nf(vk−1)Wfk(u+vk−1)=2−n2∑vk−1∈Fn2Nf(vk−1)Wfk(vk+vk−1) |
Now we invoke the induction hypothesis for
Nh(u)=2−n2∑vk−1∈Fn2Wfk(u+vk−1)×(2−(k−2)n2∑(v1,…,vk−1)∈Fm−12Nf1(v1)k−1∏i=2Wfi(vi+vi−1))=2−m2∑v∈Fm2Nf1(v1)k∏i=2Wfi(vi+vi−1) |
The theorem follows.
The mappings from
Theorem 5 Let
NK∘G(u)=2−m2∑v∈Fm2WK(v)NLv∘G(u) | (7) |
where
Proof It follows from the inverse Walsh-Hadamard transform that
(−1)K(x)=2−m2∑v∈Fm2WK(v)(−1)v⋅x |
Let
(−1)(K∘G)(x)=(−1)K(G(x))=(−1)K(y)=2−m2∑v∈Fm2WK(v)(−1)v⋅y=2−m2∑v∈Fm2WK(v)(−1)v⋅G(x)=2−m2∑v∈Fm2WK(v)(−1)(Lv∘G)(x) |
Therefore
N(K∘G)(u)=2−n2∑x∈Fn2(−1)(K∘G)(x)+u⋅xiwt(x)=2−n2∑x∈Fn22−m2∑v∈Fm2WK(v)(−1)(Lv∘G)(x)+u⋅xiwt(x)=2−m2∑v∈Fm2WK(v)2−n2∑x∈Fn2(−1)(Lv∘G)(x)+u⋅xiwt(x)=2−m2∑v∈Fm2WK(v)NLv∘G(u) |
The theorem follows.
Theorem 5 provides a new method to derive the nega-Hadamard transform of secondary construction.
In the following, we present the nega-Hadamard transform of the Boolean function
Lemma 3[15] For any
∑x∈Fn2(−1)u⋅xiwt(x)=2n2ωni−wt(u) |
where
Theorem 6 If
Nh(u,v)=12(ωn+mi−wt(u)−wt(v)+ωni−wt(u)Ng(v)+ωmi−wt(v)Nf(u)−Nf(u)Ng(v)) | (8) |
where
Proof Let
Nh(u,v)=12∑x∈F22WK(v)Nv1f+v2g(u,v)=12(N0(u,v)+Ng(u,v)+Nf(u,v)−Nf(u)Ng(v))=12(ωn+mi−wt(u)−wt(v)+ωni−wt(u)Ng(v)+ωmi−wt(v)Nf(u)−Nf(u)Ng(v)) |
The theorem follows.
Remark 2 In Ref.[8], with the same notation as in Theorem 6, it is proved that
Nh(u,v)=2−m2(Nf(u)Ag1(v)+ωni−wt(u)Ag0(v)) | (9) |
where
Ag0(v)=∑y∈Fm2,g(y)=0(−1)y⋅viwt(y)=∑y∈Fm2(−1)y⋅viwt(y)1+(−1)g(y)2=12(∑y∈Fm2(−1)y⋅viwt(y)+∑y∈Fm2(−1)g(y)+y⋅viwt(y))=2m2−1ωmi−wt(v)+2m2−1Ng(v) |
Ag1(v)=∑y∈Fm2,g(y)=1(−1)y⋅viwt(y)=∑y∈Fm2(−1)y⋅viwt(y)1−(−1)g(y)2=12(∑y∈Fm2(−1)y⋅viwt(y)−∑y∈Fm2(−1)g(y)⊕y⋅viwt(y))=2m2−1ωmi−wt(v)−2m2−1Ng(v) |
Thus, the right of Eq.(9) can be rewritten as
Nh(u,v)=2−m2(Nf(u)Ag1(v)+ωni−wt(u)Ag0(v))=2−m2Nf(u)(2m2−1ωmi−wt(v)−2m2−1Ng(v))+ωni−wt(u)(2m2−1ωmi−wt(v)+2m2−1Ng(v))=12(ωn+mi−wt(u)−wt(v)+ωni−wt(u)Ng(v)+ωmi−wt(v)Nf(u)−Nf(u)Ng(v)) |
It means that the result in Eq.(9) is equal to Eq.(8).
The secondary construction is an efficient way to generate more Boolean (or bent) functions[1, 16, 17]. An important secondary construction of bent functions is the classical Carlet’s construction (or called the indirect sum)[16] which defined as
h(x,y)=f1(x)+g1(y)+(f1+f2)(x)(g1+g2)(y) |
and a class of the generalized indirect sum defined as
h(x,y)=f1(x)+g1(y)+(f1+f2)(x)(g1+g2)(y)+(f2+f3)(x)(g2+g3)(y) | (10) |
which was introduced by Ref.[17]. In the following, based on the generalized composition theorem, the nega-Hadamard transform of this generalized indirect sum can be obtained easily.
Theorem 7 Let
Nh(u,v)=14Ng1(v)(Nf1(u)+Nf2(u)+Nf3(u)+Nf1+f2+f3(u))+14Ng2(v)(Nf1(u)−Nf2(u)−Nf3(u)+Nf1+f2+f3(u))+14Ng3(v)(Nf1(u)−Nf2(u)+Nf3(u)−Nf1+f2+f3(u))+14Ng1+g2+g3(v)(Nf1(u)+Nf2(u)−Nf3(u)−Nf1+f2+f3(u)) |
Proof Let
K(x1,x2,x3,x4)=x1+x4+(x1+x2)(x4+x5)+(x2+x3)(x5+x6) |
Then we have
WK(100100)=WK(010100)=WK(001100)=WK(111100)=WK(100010)=WK(111010)=WK(100001)=WK(001001)=WK(100111)=WK(010111)=2,WK(010010)=WK(001010)=WK(010001)=WK(111001)=WK(001111)=WK(111111)=−2 |
From Eq.(7) of Theorem 5, we can obtain
Nh(u,v)=18∑v∈F62WK(v)Nv1f1+v2f2+v3f3+v4g1+v5g2+v6g3(u,v)=18(2Nf1+g1(u,v)+2Nf2+g1(u,v)+2Nf3+g1(u,v)+2Nf1+f2+f3+g1(u,v)+2Nf1+g2(u,v)−2Nf2+g2(u,v)−2Nf3+g2(u,v)+2Nf1+f2+f3+g2(u,v)+2Nf1+g3(u,v)−2Nf2+g3(u,v)+2Nf3+g3(u,v)−2Nf1+f2+f3+g3(u,v)+2Nf1+g1+g2+g3(u,v)+2Nf2+g1+g2+g3(u,v)−2Nf3+g1+g2+g3(u,v)−2Nf1+f2+f3+g1+g2+g3(u,v))=14Ng1(v)(Nf1(u)+Nf2(u)+Nf3(u)+Nf1+f2+f3(u))+14Ng2(v)(Nf1(u)−Nf2(u)−Nf3(u)+Nf1+f2+f3(u))+14Ng3(v)(Nf1(u)−Nf2(u)+Nf3(u)−Nf1+f2+f3(u))+14Ng1+g2+g3(v)×(Nf1(u)+Nf2(u)−Nf3(u)−Nf1+f2+f3(u)) |
The theorem follows.
By Theorem 7, a sufficient condition for function
Theorem 8 Let
Proof For simplicity, set
4z=z4(z1+z2+z3+z7)+z5(z1−z2−z3+z7)+z6(z1−z2+z3−z7)+z8(z1+z2−z3−z7) | (11) |
and
4ˉz=ˉz4(ˉz1+ˉz2+ˉz3+ˉz7)+ˉz5(ˉz1−ˉz2−ˉz3+ˉz7)+ˉz6(ˉz1−ˉz2+ˉz3−ˉz7)+ˉz8(ˉz1+ˉz2−ˉz3−ˉz7) | (12) |
Combining Eqs.(11) and (12), since
If
Corollary 1 Let the notations be same as in Theorem 7. If
Nh(u,v)=12Ng1(v)[Nf1(u)+Nf2(u)]+12Ng2(v)[Nf1(u)−Nf2(u)] | (13) |
The necessary and sufficient condition that
In this paper, we have provided a necessary and sufficient condition for a class of quadratic Boolean functions to be bent-negabent, and presented another characterization of negabent functions. Furthermore, we give the generalized nega-convolution theorem, and present the composition nega-Hadamard transform for a Boolean function and a vectorial Boolean function. It would be interesting to study more efficient constructions using this composition method.
[1] |
O. S. Rothaus, “On “bent” functions,” Journal of Combinatorial Theory, Series A, vol.20, no.3, pp.300–305, 1976. DOI: 10.1016/0097-3165(76)90024-8
|
[2] |
C. Carlet and S. Mesnager, “Four decades of research on bent functions,” Designs, Codes and Cryptography, vol.78, no.1, pp.5–50, 2016. DOI: 10.1007/s10623-015-0145-8
|
[3] |
C. Riera and M. G. Parker, “Generalized bent criteria for Boolean functions (I),” IEEE Transactions on Information Theory, vol.52, no.9, pp.4142–4159, 2006. DOI: 10.1109/TIT.2006.880069
|
[4] |
P. Stănică, B. Mandal, and S. Maitra, “The connection between quadratic bent-negabent functions and the Kerdock code,” Applicable Algebra in Engineering, Communication and Computing, vol.30, no.5, pp.387–401, 2019. DOI: 10.1007/s00200-019-00380-4
|
[5] |
F. Zhang, Y. Wei, and E. Pasalic, “Constructions of bent-Negabent functions and their relation to the completed maiorana—McFarland class,” IEEE Transactions on Information Theory, vol.61, no.3, pp.1496–1506, 2015. DOI: 10.1109/TIT.2015.2393879
|
[6] |
Y. Zhou and L. Qu, “Constructions of negabent functions over finite fields,” Cryptography and Communications, vol.9, no.2, pp.165–180, 2017. DOI: 10.1007/s12095-015-0167-0
|
[7] |
B. Mandal, S. Maitra, and P. Stănică, “On the existence and non-existence of some classes of bent-negabent functions,” Applicable Algebra in Engineering, Communication and Computing, vol.33, no.3, pp.237–260, 2022. DOI: 10.1007/s00200-020-00444-w
|
[8] |
P. Stanica, S. Gangopadhyay, A. Chaturvedi, et al., “Investigations on bent and negabent functions via the nega-hadamard transform,” IEEE Transactions on Information Theory, vol.58, no.6, pp.4064–4072, 2012. DOI: 10.1109/TIT.2012.2186785
|
[9] |
M. G. Parker and A. Pott, “On Boolean functions which are bent and negabent,” in Proceedings of the 2007 International Conference on Sequences, Subsequences, and Consequences, Los Angeles, CA, USA, pp.9–23, 2007.
|
[10] |
S. Sarkar, “Characterizing negabent Boolean functions over finite fields,” Sequences and Their Applications - SETA 2012, Berlin, Germany, pp.77–88, 2012.
|
[11] |
D. Huang, C. Tang, Y. Qi, et al., “New quadratic bent functions in polynomial forms with coefficients in extension fields,” Applicable Algebra in Engineering, Communication and Computing, vol.30, no.4, pp.333–347, 2019. DOI: 10.1007/s00200-018-0376-9
|
[12] |
K. C. Gupta and P. Sarkar, “Toward a general correlation theorem,” IEEE Transactions on Information Theory, vol.51, no.9, pp.3297–3302, 2005. DOI: 10.1109/TIT.2005.853326
|
[13] |
Y. Yuan, Y. Tong, and H. Zhang, “Complete mapping polynomials over finite field F16,” in Proceedings of the 1st International Workshop on Arithmetic of Finite Fields, Madrid , Spain, pp.147–158, 2007.
|
[14] |
W. Su, A. Pott, and X. Tang, “Characterization of negabent functions and construction of bent-negabent functions with maximum algebraic degree,” IEEE Transactions on Information Theory, vol.59, no.6, pp.3387–3395, 2013. DOI: 10.1109/TIT.2013.2245938
|
[15] |
K. U. Schmidt, M. G. Parker, and A. Pott. “Negabent functions in the Maiorana–McFarland class.” Sequences and Their Applications-SETA 2008. Springer, Berlin, Heidelberg, pp.390–402, 2008.
|
[16] |
C. Carlet, “On the Secondary Constructions of Resilient and Bent Functions,” Coding, Cryptography and Combinatorics, Birkhäuser Verlag, Basel, pp.3–28, 2004.
|
[17] |
C. Carlet, F. R. Zhang, Y. P. Hu, et al., “Secondary constructions of bent functions and their enforcement,” Advances in Mathematics of Communications, vol.6, no.3, pp.305–314, 2012. DOI: 10.3934/amc.2012.6.305
|
[18] |
S. Mesnager, B. ben Moussat, and Z. P. Zhuo, “Further results on bent-negabent Boolean functions,” Lecture Notes in Electrical Engineering, Springer, Singapore, pp.47–66, 2021.
|
[1] | YANG Zhiyao, KE Pinhui, CHEN Zhixiong. New Secondary Constructions of Generalized Bent Functions[J]. Chinese Journal of Electronics, 2021, 30(6): 1022-1029. DOI: 10.1049/cje.2021.08.003 |
[2] | SUN Tianfeng, HU Bin. Boolean Functions with Multiple-Valued Walsh Spectra[J]. Chinese Journal of Electronics, 2019, 28(6): 1165-1169. DOI: 10.1049/cje.2019.07.004 |
[3] | PANG Shanqi, WANG Jing, WANG Xunan, WANG Xiaoli. Application of Orthogonal Array and Walsh Transform in Resilient Function[J]. Chinese Journal of Electronics, 2018, 27(2): 281-286. DOI: 10.1049/cje.2017.09.011 |
[4] | RAO Yanyi, ZHANG Xianda. The Characterizations of Hyper-Star Graphs Induced by Linearly Separable Boolean Functions[J]. Chinese Journal of Electronics, 2018, 27(1): 19-25. DOI: 10.1049/cje.2017.08.015 |
[5] | ZHUO Zepeng, CHONG Jinfeng, WEI Shimin. Some Properties of Correlation Function on Generalized Boolean Functions[J]. Chinese Journal of Electronics, 2015, 24(1): 166-169. |
[6] | ZHENG Dabin, YU Long, HU Lei. Quadratic Bent and Semi-bent Functions over Finite Fields of Odd Characteristic[J]. Chinese Journal of Electronics, 2014, 23(4): 767-772. |
[7] | ZHUO Zepeng, CHONG Jinfeng, CAO Hao, XIAO Guozhen. Spectral Analysis of Two Boolean Functions and Their Derivatives[J]. Chinese Journal of Electronics, 2011, 20(4): 747-749. |
[8] | JIANG Jie, GUO Baolong, LAI Changcai, MO Wei. Line Prediction and Transform for Intra Coding[J]. Chinese Journal of Electronics, 2011, 20(3): 516-520. |
[9] | ZHUO Zepeng, ZHANG Weiguo, GAO Sheng, XIAO Guozhen. On Correlation Properties of Boolean Functions[J]. Chinese Journal of Electronics, 2011, 20(1): 143-146. |
[10] | SUN Guanghong, WU Chuankun. Construction of Semi-Bent Boolean Functions in Even Number of Variables[J]. Chinese Journal of Electronics, 2009, 18(2): 231-237. |
1. | Singh, D., Mohanta, B.B., Paul, A. et al. Some Cryptographic Properties of Functions Based on their 2q-Nega-Hadamard Transform. International Journal of Mathematical, Engineering and Management Sciences, 2024, 9(6): 1382-1393. DOI:10.33889/IJMEMS.2024.9.6.074 | |
2. | Singh, D., Chawla, A., Bhogta, P. et al. A Characterization of Generalized Boolean Functions Employed in CDMA Communications. International Journal of Mathematical, Engineering and Management Sciences, 2024, 9(2): 352-365. DOI:10.33889/IJMEMS.2024.9.2.019 | |
3. | Zhao, H., Li, W., Wei, Y. Construction of Negabent Function Based on Trace Function over Finite Field | [基于迹函数的negabent函数构造]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46(1): 335-343. DOI:10.11999/JEIT230001 |