Next Article in Journal
On the Accurate Estimation of Information-Theoretic Quantities from Multi-Dimensional Sample Data
Previous Article in Journal
Cascade Residual Multiscale Convolution and Mamba-Structured UNet for Advanced Brain Tumor Image Segmentation
Previous Article in Special Issue
Optimal Quaternary Hermitian LCD Codes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Dimensions of Hermitian Subfield Subcodes from Higher-Degree Places

by
Sabira El Khalfaoui
1,† and
Gábor P. Nagy
2,3,*,†
1
Institut de Recherche Mathématique de Rennes-IRMAR-UMR 6625, University Rennes, F-35000 Rennes, France
2
Bolyai Institute, University of Szeged, Aradi Vértanúk tere 1, H-6720 Szeged, Hungary
3
HUN-REN-ELTE Geometric and Algebraic Combinatorics Research Group, Pázmány Péter Sétány 1/C, H-1117 Budapest, Hungary
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2024, 26(5), 386; https://doi.org/10.3390/e26050386
Submission received: 12 March 2024 / Revised: 28 April 2024 / Accepted: 29 April 2024 / Published: 30 April 2024
(This article belongs to the Special Issue Discrete Math in Coding Theory)

Abstract

:
The focus of our research is the examination of Hermitian curves over finite fields, specifically concentrating on places of degree three and their role in constructing Hermitian codes. We begin by studying the structure of the Riemann–Roch space associated with these degree-three places, aiming to determine essential characteristics such as the basis. The investigation then turns to Hermitian codes, where we analyze both functional and differential codes of degree-three places, focusing on their parameters and automorphisms. In addition, we explore the study of subfield subcodes and trace codes, determining their structure by giving lower bounds for their dimensions. This presents a complex problem in coding theory. Based on numerical experiments, we formulate a conjecture for the dimension of some subfield subcodes of Hermitian codes. Our comprehensive exploration seeks to deepen the understanding of Hermitian codes and their associated subfield subcodes related to degree-three places, thus contributing to the advancement of algebraic coding theory and code-based cryptography.

1. Introduction

The advent of quantum computers presents significant threats to classical cryptographic schemes, requiring the development of post-quantum cryptographic primitives that resist quantum attacks. In this regard, algebraic geometry (AG) codes have gained considerable attention due to their error-correcting capabilities and potential applications in secure communication and cryptographic protocols. Among various classes of AG codes, subfield subcodes stand out against structural attacks, making them good candidates for deployment in post-quantum cryptography.
Within linear codes over finite field extensions, the process of generating subfield subcodes, commonly referred to as restriction, entails converting a given linear code C over a large field extension F q n into a code that is defined over a subfield F q m , where m divides n. This strategic approach restricts the codewords of C to elements found within the smaller field F q m , effectively concealing the details about the structure inherent in C. A classic example of this concept is the Reed–Solomon codes, which are algebraic geometry (AG) codes constructed over a projective line. They are widely used in practical applications, with their subfield subcodes represented by Goppa codes. In particular, in cryptography, especially within a McEliece cryptosystem, subfield subcodes play a crucial role in hiding the code structure, thus enhancing its resilience against distinguishing attacks [1,2]. The long-lasting security of the McEliece cryptosystem based on Goppa codes [3] emphasizes its effectiveness in preventing such attacks. Despite subsequent proposals exploring Reed–Solomon codes [4], AG codes, and their subcodes [5], all have been susceptible to structural attacks. By imposing restrictions, cryptographic systems can enhance their security by minimizing the risk of potential attacks aimed at distinguishing the chosen subfield subcode. With growing interest in AG codes, particularly Hermitian codes, they are being evaluated as feasible alternatives to Reed–Solomon codes in specific applications [6]. Hermitian codes have been extensively studied in prior research [7,8,9,10,11,12], particularly those associated with the point at infinity of the Hermitian curve. However, in [13,14], the authors introduced an alternative construction of Hermitian codes associated with higher-degree places on the Hermitian curve.
Our contribution involves conducting further research on Hermitian codes associated with degree-three places, deriving additional properties, and establishing explicit bases for the corresponding Riemann–Roch spaces; additionally, this should align with previous findings in [13]. The stabilizer of a degree-three place has order 3 ( q 2 q + 1 ) ; the action of this group and the associated quotient curve has been studied by Cossidente, Korchmáros, and Torres [15]. We make heavy use of their approach which relates the Hermitian curve with the curve projective curve X Y q + Y Z q + Z X q = 0 . Beelen, Montanucci, and Vicino [16] studied another class of Hermitian quotient curves, which are obtained by automorphisms stabilizing a degree-three place of the Hermitian curve.
One-point Hermitians of degree-three places have improved minimum distances, as shown by the Matthews–Michel bound [14], and have been further strengthened by Korchmáros and Nagy in [13]. Moreover, we explore the properties of their subfield subcodes, with a particular focus on determining their true dimensions through explicit constructions. This investigation aims to provide a precise understanding of the codes’ capabilities for our future work. Since the family of subfield subcodes of Hermitian codes associated with degree-three places holds promise for the construction of an improved and secure McEliece cryptosystem, the aforementioned investigation will enable a comparison of these parameters with those of other existing codes (see [12], Table 1), such as Goppa codes, to assess the potential improvement in the key size of the McEliece cryptosystem. This suggests that such a proposal could reduce the key size and meet the security level required by NIST [17]. Using bounds on the dimensions offers only an estimate of the code’s performance, which means that this will not help us accurately decide whether these codes can achieve the required security level with an improved key size.
The paper is structured as follows. In Section 2, we introduce the essential background of AG codes constructed from a Hermitian curve, including Hermitian curves, divisors, and the Riemann–Roch space. In Section 3, we provide some facts on the geometry of degree 3 places of the Hermitian curve, and the unitary transformations which stabilize the given degree-three place. Our main tool is the Hermitian sesquilinear form u , v = u 1 v 1 q u 2 v 3 q u 3 v 2 q and the Frobenius map Fr q 2 . Section 4 deals with their corresponding Riemann–Roch spaces. We explore their structure and give explicit and practical bases over F q 6 , and a decomposition into invariant subspaces over F q 2 (Theorem 3). In Section 5, we study the functional and differential Hermitian codes of a degree 3 place, where we explicitly give the monomial equivalence between them (Theorem 4). In Section 6, we give the main result on the dimensions of the subfield subcodes of degree 3 place Hermitian codes (Theorem 5). This result consists of a theorem that provides a lower bound on the dimensions of the underlying codes, while the conjecture suggests a possible equality based on numerical experiments.
The computational results were obtained using the HERmitian package [18] within the GAP [19] computer algebra system. This involved implementing higher-degree places of Hermitian curves, their divisors and the associated Hermitian codes. This package employs a generic method for computing the bases of Riemann–Roch spaces, independent of the results presented in this paper. Specifically, we acquired computational evidence supporting Conjecture 1 without relying on the theoretical findings of this work.

2. Algebraic Geometry (AG) Codes

2.1. Hermitian Curves and Their Divisors

For more details, we refer the reader to [15,20,21]. The Hermitian curve, denoted as H q , over the finite field F q 2 in affine coordinates is given by the equation:
H q : Y q + Y = X q + 1 .
This curve has a genus g = q ( q 1 ) 2 , classifying it as a maximal curve because it achieves the maximum number of F q 2 -rational points, which is # H q ( F q 2 ) = q 3 + 1 . Furthermore, H q has a unique point at infinity, denoted Q .
A divisor on H q is a formal sum D = n 1 Q 1 + + n k Q k , where n 1 , , n k are integers and Q 1 , , Q k are points on H q . The degree of the divisor D is defined as deg ( D ) = i = 1 k n i . The valuation of D at a point Q i is v Q i ( D ) = n i , and the support of D is the set { Q i n i 0 } .
The Frobenius automorphism, denoted as Fr q 2 , is defined over the algebraic closure F ¯ q 2 and acts on elements as follows:
Fr q 2 : F ¯ q 2 F ¯ q 2 , x x q 2 .
It acts on the points of H q by applying Fr q 2 to their coordinates. A point Q on H q is F q 2 -rational if and only if it is fixed by Fr q 2 ( Q ) . Over F ¯ q 2 , the points in H q correspond one-to-one to the places in the function field F ¯ q 2 ( H q ) .
For a divisor D, its Frobenius image is given by
Fr q 2 ( D ) = n 1 Fr q 2 ( Q 1 ) + + n k Fr q 2 ( Q k ) .
and D is F q 2 -rational if D = Fr q 2 ( D ) . In particular, if all points Q 1 , , Q k are in H q ( F q 2 ) , then D is inherently F q 2 -rational.

2.2. Riemann–Roch Spaces

For a non-zero function g in the function field F ¯ q 2 and a place P, v P ( g ) stands for the order of g at P. If v P ( g ) > 0 , then P is a zero of g, while if v P ( g ) < 0 , then P is a pole of g with multiplicity v P ( g ) . The principal divisor of a non-zero function g is ( g ) = P v P ( g ) P .
The Riemann–Roch space associated with an F q 2 -rational divisor G is the F q 2 vector space
L ( G ) : = { g F q 2 ( H q ) ( g ) + G 0 } 0 .
From ([20], Riemann’s Theorem 1.4.17), we have
dim L ( G ) deg ( G ) + 1 g ,
with equality if deg ( G ) 2 g 1 .
In this work, our primary focus is on an F q 2 -rational divisor G of the form s P , where P is a degree r place in F q 2 ( H q ) and s is a positive integer. In the extended constant field F q 6 ( H q ) of F q 2 ( H q ) with degree r, let P 1 , P 2 , , P r be the extensions of P. These points are degree-one places in F q 2 r ( H q ) , and, after appropriately labeling the indices, P i = Fr q 2 i ( P 1 ) , where the indices are considered modulo r.

2.3. Hermitian Codes

Here, we outline the construction of an AG code from the Hermitian curve.
In algebraic coding theory, Hermitian codes stand out as a significant class of algebraic geometry (AG) codes, renowned for their distinctive properties. These codes are constructed from Hermitian curves defined over finite fields. These codes are typically viewed as functional AG codes, denoted by C L ( D , G ) . In this standard approach, the divisor G is usually a multiple of a single place of degree one. The set P , which encompasses all the rational points in H q , is listed as { Q 1 , , Q n } . This approach gives rise to a structure known as a one-point code. However, it is important to note that recent research in the field suggests that the use of a more varied selection for the divisor G can result in the creation of better AG codes [13,14].
Consider a divisor D = Q 1 + Q 2 + + Q n , where all Q i are distinct rational points, and an F q 2 -rational divisor G such that Supp ( G ) Supp ( D ) = . By numbering the places in the support of D, we define an evaluation map ev D such that ev D ( g ) = ( g ( Q 1 ) , , g ( Q n ) ) for g L ( G ) .
The functional AG code associated with the divisor G is
C L ( D , G ) : = { ( g ( Q 1 ) , g ( Q 2 ) , , g ( Q n ) ) g L ( G ) } = ev D ( L ( G ) ) ,
Theorem 1 
([20], Theorem 2.2.2). C L ( D , G ) is an [ n , k , d ] code with parameters
k = dim L ( G ) dim L ( G D ) and d n deg G .
The dual of an AG code can be described as a residue code (see [20] for more details), i.e.,
C L ( D , G ) = C Ω ( D , G ) .
Furthermore, the differential code C Ω ( D , G ) is monomially equivalent to the functional code
C L ( D , W + D G ) ,
where W represents a canonical divisor of F ¯ q 2 ( H q ) . The notion of monomial equivalence of codes is defined as follows. Let C F q n be linear subspaces and μ = ( μ 1 , , μ n ) ( F q * ) n with non-zero entries. We define the Schur product
μ C = { ( μ 1 x 1 , , μ n x n ) ( x 1 , , x n ) C } .
The vector μ is also called a multiplier. Clearly, μ C F q n . Two linear codes C 1 , C 2 F q n are monomially equivalent if C 2 = μ C 1 for some multiplier μ . Monomially equivalent codes share identical dimensions and minimum distances; however, this correspondence does not preserve all crucial properties of the code.

2.4. Subfield Subcodes and Trace Codes

For the efficient construction of codes over F q , one approach involves working with codes originally defined over an extension field F q m . When considering a code C within F q m n , a subfield subcode of C is its restriction to the field F q . This process, often employed in the definition of codes such as BCH codes, Goppa codes, and alternant codes, plays a fundamental role.
Let q be a prime power and m be a positive integer. Let C denote a linear code of parameters [ n , k ] defined over the finite field F q m . The subfield subcode of C over F q , represented as C | F q , is the set
C | F q = C F q n ,
which consists of all codewords in C that have their components in F q .
The subfield subcode C | F q is a linear code over F q with parameters [ n , k 0 , d 0 ] , satisfying the inequalities d d 0 n and n k n k 0 m ( n k ) . Moreover, a parity check matrix for C over F q provides up to m ( n k ) linearly independent parity check equations over F q for the subfield subcode C | F q . Typically, the minimum distance d 0 of the subfield subcode exceeds that of the original code C.
Let Tr F q m / F q denote the trace function from F q m down to F q , expressed as
Tr F q m / F q ( x ) = x + x q + x q 2 + + x q m 1 .
For any vector c = ( c 1 , c 2 , , c n ) F q n , we define
Tr F q m / F q ( c ) = Tr F q m / F q ( c 1 ) , Tr F q m / F q ( c 2 ) , , Tr F q m / F q ( c n ) .
Furthermore, for a linear code C of length n and dimension k over F q m , the code
Tr F q m / F q ( C ) = { Tr F q m / F q ( c ) c C }
is a linear code of length n and dimension k 1 over F q .
A seminal result by Delsarte connects subfield subcodes with trace codes:
Theorem 2 
([22]). Let C be an [ n , k ] linear code over F q . Then, the dual of the subfield subcode of C is the trace code of the dual code of C, i.e.,
( C | F q ) = Tr F q m / F q ( C ) .
Finding the exact dimension of a subfield subcode of a linear code is typically a hard problem. However, a basic estimation can be obtained by applying Delsarte’s theorem [22]:
dim C | F q n m ( n k ) .
In [20] (Chapter 9), various results are discussed with respect to the subfield subcodes and trace codes of AG codes. This motivated us to formulate the following propositions on the dimension of the subfield subcodes of AG codes, which are useful for the case G = s P with a place P of higher degree.
Proposition 1. 
Let G 1 be a positive divisor of the Hermitian curve H q and D = Q 1 + + Q n be the sum of F q 2 -rational places such that Supp ( G ) Supp ( D ) = . Assume that deg G 1 < n / q . Then,
dim C L ( D , G 1 ) F q = 1 .
Proof. 
Let f be a function in L ( G 1 ) such that f ( Q i ) F q for i = 1 , , n . Then, f q f L ( q G 1 ) (since L ( G 1 ) q L ( q G 1 ) ), and hence f q f L ( q G 1 D ) , where
L ( q G 1 D ) = ker ev D = x L ( q G 1 ) v P i ( x ) > 0 for i = 1 , , n .
Since deg ( q G 1 D ) < 0 , it follows that L ( q G 1 D ) = 0 and f q f = 0 , which implies that f F q . Consequently, dim C L ( D , G 1 ) | F q = 1 . □

3. The Geometry of Hermitian Degree-Three Places

In this section, we collect useful facts on degree-three places of the Hermitian curve, their stabilizer subgroups, and Riemann–Roch spaces.

3.1. The Hermitian Sesquilinear Form

The Hermitian curve H q has the affine equation X q + 1 = Y + Y q . The Hermitian function field F ¯ q 2 ( H q ) is generated by x , y so that x q + 1 = y + y q holds. The Frobenius field automorphism Fr q 2 : x x q 2 of the algebraic closure F ¯ q 2 includes an action on rational functions, places, divisors, and curve automorphisms. For this action, we continue to use the notation Fr q 2 in the exponent: P Fr q 2 , f Fr q 2 , D Fr q 2 , etc.
Let K be a field extension of F q 2 . An affine point is a pair ( a , b ) K 2 . A projective point ( a : b : c ) is a one-dimensional subspace { ( a t , b t , c t ) t K } of K 3 . If c 0 , then the projective point ( a : b : c ) is identified with the affine point ( a / c , b / c ) . For u = ( u 1 , u 2 , u 3 ) , v = ( v 1 , v 2 , v 3 ) K 3 , we define the Hermitian form
u , v = u 1 v 1 q u 2 v 3 q u 3 v 2 q .
Clearly, u , v is additive in u and v, α u , β v = α β q u , v , and
u , v q = v Fr q 2 , u .
The point u is self-conjugate if
0 = u , u = u 1 q + 1 u 2 u 3 q u 2 q u 3 .
This is the projective equation X q + 1 Y Z q Y q Z = 0 of the Hermitian curve H q .
Let u = ( u 1 : u 2 : u 3 ) be a projective point. The polar line of u has equation
u : ( X 1 , X 2 , X 3 ) , u = u 1 q X 1 u 3 q X 2 u 2 q X 3 = 0 .
If u is on H q , then u is the tangent line at u. More precisely, u intersects H q at u and u Fr q 2 with multiplicities q and 1, respectively. If u is F q 2 -rational, then u = u Fr q 2 , and the intersection multiplicity is q + 1 .

3.2. Unitary Transformations and Curve Automorphism

Let A be a 3 × 3 matrix. The linear map u u A will also be denoted by A. If A is invertible, then it induces a projective linear transformation, denoted by A ^ : ( u 1 : u 2 : u 3 ) ( u 1 : u 2 : u 3 ) = ( u 1 : u 2 : u 3 ) A ^ , where
u 1 = a 11 u 1 + a 21 u 2 + a 31 u 3 , u 2 = a 12 u 1 + a 22 u 2 + a 32 u 3 , u 3 = a 13 u 1 + a 23 u 2 + a 33 u 3 .
We use the same notation A ^ : ( X , Y ) ( X , Y ) = ( X , Y ) A ^ for the partial affine map:
( X , Y ) ( X , Y ) = a 11 X + a 21 Y + a 31 a 13 X + a 23 Y + a 33 , a 12 X + a 22 Y + a 32 a 13 X + a 23 Y + a 33 .
The action f ( X , Y ) f ( ( X , Y ) A ^ 1 ) of A ^ on rational functions will be indicated by A * . The following lemma is straightforward.
Lemma 1. 
Let f ( X , Y ) be a polynomial of total degree n. Define the degree n homogeneous polynomial F ( X , Y , Z ) = Z n f ( X / Z , Y / Z ) . Then,
f A * ( X , Y ) = F ( ( X , Y , 1 ) A 1 ) ( a 13 X + a 23 Y + a 33 ) n .
We remark that the line a 13 X + a 23 Y + a 33 = 0 can be seen as the pre-image of the line at infinity under A ^ .
The linear transformation A is unitary if
u A , v A = u , v
holds for all u , v . Since . , . is non-degenerate, unitary transformations are invertible. Moreover, for all u , v , one has
( v Fr q 2 ) A , u A = v Fr q 2 , u = u , v q = u A , v A q = ( v A ) Fr q 2 , u A .
This implies ( v Fr q 2 ) A = ( v A ) Fr q 2 for all v, that is, A and Fr q 2 commute. This shows that unitary transformations are defined over F q 2 . They form a group which is denoted by G U ( 3 , q ) . A useful fact is that if b 1 , b 2 , b 3 is a basis and
b i A , b j A = b i , b j
for all i , j { 1 , 2 , 3 } , then A is unitary.
Let A G U ( 3 , q ) . If ( x , y ) is a generic point of H q , then ( x , y ) = ( x , y ) A ^ satisfies
( x ) q + 1 y ( y ) q = x , y = x , y = 0 .
Therefore, ( x , y ) is a generic point of H q , and A * induces an automorphism of the function field F ¯ q 2 ( H q ) . If A is defined over F q 2 , then A * is an automorphism of F q 2 ( H q ) .

3.3. Places of Degree Three and Their Lines

Let a 1 , b 1 F q 6 F q 2 be scalars such that a 1 q + 1 = b 1 + b 1 q . In other words, ( a 1 , b 1 ) is an affine point of H q : X q + 1 = Y + Y q , defined over F q 6 . Write a 2 = a 1 q 2 , b 2 = b 1 q 2 , a 3 = a 2 q 2 , b 3 = b 2 q 2 , and p i = ( a i , b i , 1 ) . Then, p i + 1 = p i Fr q 2 , p i , p i = 0 , and
0 = p i , p i q = p i Fr q 2 , p i = p i + 1 , p i
hold for i = 1 , 2 , 3 , with the indices taking modulo three. Since . , . is non-trivial, γ i = p i , p i + 1 F q 6 { 0 } . More precisely,
γ 1 q 3 = p 1 , p 2 q 3 = p 2 Fr q 2 , p 1 q 2 = p 2 ( Fr q 2 ) 2 , p 1 Fr q 2 = p 1 , p 2 = γ 1 ,
which shows γ i F q 3 { 0 } . Clearly, γ i + 1 = γ i q 2 and γ i + 2 = γ i q . By γ i 0 , the vectors p 1 , p 2 , p 3 are linearly independent over F q 6 .
Let K be a field containing F q 6 . Since p 1 , p 2 , p 3 is a basis in K 3 , any u K 3 can be written as
u = x 1 p 1 + x 2 p 2 + x 3 p 3 ,
with x i K . Computing
u , p i + 1 = x 1 p 1 + x 2 p 2 + x 3 p 3 , p i + 1 = x i p i , p i + 1 ,
we obtain x i = u , p i + 1 / γ i . In the basis p 1 , p 2 , p 3 , the Hermitian form has the shape
u , v = x 1 p 1 + x 2 p 2 + x 3 p 3 , y 1 p 1 + y 2 p 2 + y 3 p 3 = x 1 y 2 q p 1 , p 2 + x 2 y 3 q p 2 , p 3 + x 3 y 1 q p 3 , p 1 = γ 1 x 1 y 2 q + γ 1 q 2 x 2 y 3 q + γ 1 q 4 x 3 y 1 q .
In this coordinate frame, the Hermitian curve has projective equation
γ 1 X 1 X 2 q + γ 1 q 2 X 2 X 3 q + γ 1 q 4 X 3 X 1 q = 0 .
Let x , y be the generators of the function field F ¯ q 2 ( H q ) such that x q + 1 = y + y q . Write
i = ( x , y , 1 ) , p i = a i q x y b i q .
Then,
( x , y , 1 ) = 2 γ 1 p 1 + 3 γ 2 p 2 + 1 γ 3 p 3
and
0 = x q + 1 y y q = ( x , y , 1 ) , ( x , y , 1 ) = 1 2 q γ 1 q + 2 3 q γ 2 q + 3 1 q γ 3 q .
The Hermitian curve H q is non-singular, the places of F ¯ q 2 ( H q ) correspond to the projective points over the algebraic closure F ¯ q 2 . Let P i denote the place corresponding to ( a i : b i : 1 ) . P i is defined over F q 6 , P i + 1 = P i Fr q 2 , and
P = P 1 + P 2 + P 3
is an F q 2 -rational place of degree three.
The line a i q X Y b i q = 0 is tangent to H q at p i ; the intersection multiplicities are q and 1 at p i and p i + 1 , respectively. This implies that the zero divisor ( i ) 0 is q P i + P i + 1 , and the principal divisor of i is
( i ) = q P i + P i + 1 ( q + 1 ) Q .

3.4. The Stabilizer of a Degree-Three Place

Let β 1 F q 6 be an element such that β 1 q 3 + 1 = 1 . Define β 2 = β 1 q 2 , β 3 = β 2 q 2 . Then,
β i β i + 1 q = β i q 3 + 1 = 1 .
For p i = β i p i , this implies that
p i , p i + 1 = β i β i + 1 q p i , p i + 1 = p i , p i + 1 .
Hence, for all i , j { 1 , 2 , 3 } ,
p i , p j = p i , p j .
This shows that we can extend the map p i p i to a unitary linear map B = B ( β 1 ) : u u in the following way. Write
u = x 1 p 1 + x 2 p 2 + x 3 p 3 ,
with x i = u , p i + 1 / γ i , and define
u = x 1 p 1 + x 2 p 2 + x 3 p 3 = x 1 β 1 p 1 + x 2 β 2 p 2 + x 3 β 3 p 3 .
The extension B is a unique unitary transformation. As we have seen in Section 3.2, this implies that B = B ( β 1 ) is a well-defined element of the general unitary group G U ( 3 , q ) . The set
B = { B ( β 1 ) β 1 F q 6 , β 1 q 3 + 1 = 1 }
is a cyclic subgroup of G U ( 3 , q ) , whose order is | B | = q 3 + 1 .
In the projective plane, B induces a projective linear transformation B ^ . B ^ is trivial if and only if β 1 = β 2 = β 1 q 2 , that is, if and only if β i F q 2 . As gcd ( q 3 + 1 , q 2 1 ) = q + 1 , B ^ is trivial if and only if β 1 q + 1 = 1 . The set B ^ = { B ^ B B } is a cyclic group of unitary projective linear transformations, whose order is | B ^ | = q 2 q + 1 .
In a similar way, we fix the elements
δ i = γ i q 3 q 2 .
since γ 1 F q 3 , δ i F q 3 . Moreover,
δ i q 3 + 1 = δ i 2 = γ i q 3 q = γ i 1 q .
As before, the map
Δ : p i p i = δ i p i 1
preserves the Hermitian form:
p i , p i + 1 = δ i p i 1 , δ i + 1 p i = δ i q 3 + 1 p i 1 , p i = γ i 1 q γ i 1 = γ i .
Hence, Δ extends to a unitary linear map, which commutes with Fr q 2 and normalizes B . Indeed,
p i Δ 1 B Δ = ( δ i + 1 1 p i + 1 ) B Δ = ( δ i + 1 1 β i + 1 p i + 1 ) Δ = β i + 1 p i ,
and hence, Δ 1 B Δ = B q 2 . Δ 3 maps p i to δ 1 δ 2 δ 3 p i , and
δ 1 δ 2 δ 3 = δ 1 1 + q + q 2 = γ 1 q 3 q 2 1 + q + q 2 = γ 1 q 3 1 ( q + 1 ) q 2 = 1 .
Therefore, Δ has order 3.
As introduced in Section 3.2, the unitary transformations B and Δ induce automorphisms B * and Δ * of the function field.
Proposition 2. 
The group B * = { B * B B } of curve automorphisms has order q 2 q + 1 , and Δ * normalizes B * by
( Δ * ) 1 B * Δ * = ( B * ) q 2 = ( B * ) q 1 .
Both B * and Δ * stabilize the degree-three place P.
Proposition 3. 
Let β 1 F q 6 be an element such that β 1 q 3 + 1 = 1 . Define β 2 = β 1 q 2 , β 3 = β 2 q 2 , and the unitary map B = B ( β 1 ) B . Then,
i i + 1 B * = β i q + 1 i i + 1 .
Proof. 
By Lemma 1,
i B * = ( x , y , 1 ) B 1 , p i w = ( x , y , 1 ) , p i B w = ( x , y , 1 ) , β i p i w = β i q i w ,
where the linear w = w 1 x + w 2 y + w 3 over F q 2 depends only on B. Therefore,
i i + 1 B * = β i q β i + 1 q i i + 1 = β i q q 3 i i + 1 = β i q + 1 i i + 1 .

4. Riemann–Roch Spaces Associated with a Degree-Three Place

In this section, we keep using the notation of the previous section: P i is a degree-one place of F q 6 ( H q ) associated with the projective point ( a i : b i : 1 ) . P i Fr q 2 = P i + 1 ; the index i = 1 , 2 , 3 always takes modulo three. P = P 1 + P 2 + P 3 is an F q 2 -rational place of degree three of F q 2 ( H q ) . The generators x , y of F ¯ q 2 ( H q ) satisfy x q + 1 = y + y q . The rational function i = a i q x y b i q is obtained from the tangent line of H q at P i .

4.1. Basis and Decomposition of the Riemann–Roch Space

Let s , u , v be positive integers such that v q and s = u ( q + 1 ) v . Clearly, u , v are uniquely defined by s. In [13], the Riemann–Roch space associated with the divisor s P is given as
L ( s P ) = f ( 1 2 3 ) u f F q 2 [ X , Y ] , deg f 3 u , v P i ( f ) v { 0 } .
The Weierstrass semigroup H ( P ) consists of the integers s 0 such that the pole divisor ( f ) = s P for some f F q 2 ( H q ) , see [20] (Section 6.5) and [16]. If s H ( P ) , then it is called a Weierstrass gap; the set of Weierstrass gaps is denoted by G ( P ) . By [13] (Theorem 3.1), we have
G ( P ) = { u ( q + 1 ) v 0 v q , 0 < 3 u v } .
By the Weierstrass Gap Theorem ([20], Theorem 1.6.8), | G ( P ) | = g for a place of degree one. In our case, P has degree three and the situation is slightly more complicated.
Lemma 2. 
3 | G ( P ) | = g if q 0 , 1 ( mod 3 ) , g 1 if q 2 ( mod 3 ) .
Proof. 
The lemma follows from
| G ( P ) | = 1 u q / 3 | { 3 u , , q } | = i = 1 q / 3 q + 1 3 u = q / 3 ( 2 q 1 3 q / 3 ) 2 .
The following proposition gives an explicit basis for the Riemann–Roch space L ( s P ) over the extension field F q 6 .
Proposition 4. 
Let t , u , v be positive integers such that v q and t = u ( q + 1 ) v . Define the rational functions
U t , i = i 2 u v i + 1 v u i + 2 u = i i + 2 u i + 1 i v u , i = 1 , 2 , 3 .
Define U 0 , i = 1 as the constant function for i = 1 , 2 , 3 . Then, the following holds:
(i) 
( U t , i ) Fr q 2 = U t , i + 1 .
(ii) 
The principal divisor of U t , i is
( U t , i ) = t P + ( 3 u v 1 ) q + ( q v ) P i + v ( q 2 ) + 3 u P i + 1 .
In particular, if 3 u v + 1 , then ( U t , i ) t P .
(iii) 
The elements U t , i , t 0 , i = 1 , 2 , 3 are linearly independent with the following exception: q 2 ( mod 3 ) , t = ( q 2 q + 1 ) / 3 ,
U t , 1 γ 1 q + U t , 2 γ 2 q + U t , 3 γ 3 q = 0 .
(iv) 
The set
U ( s ) = { U t , i t H ( P ) , t s , i = 1 , 2 , 3 , ( 3 t , i ) ( q 2 q + 1 , 3 ) }
of rational functions is a basis of L ( s P ) over F q 6 .
Proof. 
Note first that u , v are uniquely defined by t; therefore, U t , i is well defined. (i) is trivial and (ii) is straightforward from (3). To show (iii), let us write a linear combination in the form
α 1 U t , 1 + α 2 U t , 2 + α 3 U t , 3 = r < t i = 1 , 2 , 3 λ r , i U r , i
such that ( α 1 , α 2 , α 3 ) ( 0 , 0 , 0 ) . The right-hand side has a valuation of at least t + 1 at P 1 , P 2 , P 3 . If t ( q 2 q + 1 ) / 3 and α i 0 , then the right-hand side has valuation t at P i + 2 . Hence, α i = 0 for all i = 1 , 2 , 3 , a contradiction. Assume t = ( q 2 q + 1 ) / 3 . Then,
U t , i = i i + 1 q ( 1 2 3 ) q + 1 3 ,
and (5) follows from (2). We can use (5) to eliminate U t , 3 from (6); that is, we can assume α 3 = 0 . Then, again, the only term that has a valuation t at P i + 2 is α i U t , i with α i 0 . Since the left- and right-hand sides of (6) must have the same valuations at P 1 , P 3 , α 1 = α 2 = 0 must hold, a contradiction.
(iv) By (iii), U ( s ) consists of linearly independent elements. To show that it is a basis of L ( s P ) , it suffices to show that | U ( s ) | = dim ( L ( s P ) ) for 3 s 2 g 2 . On the one hand, in this case, dim ( L ( s P ) ) = 3 s + 1 g . On the other hand,
| U ( s ) | = 1 + 3 ( s | G ( P ) | ) ε = 3 s + 1 ( 3 | G ( P ) | + ε ) ,
where ε = 0 if q 0 , 1 ( mod 3 ) , and ε = 1 if q 2 ( mod 3 ) . By Lemma 2, 3 | G ( P ) | + ε = g , and the claim follows. □
It is useful to have a decomposition of L ( s P ) over F q 2 .
Theorem 3. 
For a t 0 integer and α F q 6 , define the F q 2 -rational function
W t , α = α U t , 1 + α q 2 U t , 2 + α q 4 U t , 3
and the F q 2 -linear space
W t = { W t , α α F q 6 } .
For t H ( P ) , we have
dim ( W t ) = 1 if t = 0 , 2 if q 2 ( mod 3 ) and t = ( q 2 q + 1 ) / 3 , 3 otherwise .
The F q 2 -rational Riemann–Roch space L ( s P ) has the direct sum decomposition
L ( s P ) = t H ( P ) , t s W t .
Proof. 
For t H ( P ) , W t is the set of F q 2 -rational functions in the space spanned by U t , 1 , U t , 2 , U t , 3 . The claims follow from Proposition 4. □

4.2. Invariant Subspaces of L ( s P )

Lemma 3. 
Let b F q 6 such that b q 3 + 1 = 1 . Then, ( b q + 1 ) q 2 = ( b q + 1 ) q 1 and ( b q + 1 ) q 4 = ( b q + 1 ) q .
Proof. 
By assumption, b q + 1 has order q 2 q + 1 . The claim follows from the facts that q 2 ( q 1 ) and q 4 q are divisible by q 2 q + 1 . □
The following lemma shows that the basis elements in U ( s ) are eigenvectors of B * .
Lemma 4. 
Let β 1 F q 6 be an element such that β 1 q 3 + 1 = 1 . Define β 2 = β 1 q 2 , β 3 = β 2 q 2 , and the unitary map B = B ( β 1 ) B . Then,
( U t , i ) B * = β i t ( q + 1 ) U t , i .
Proof. 
Proposition 3 implies
i i + 2 B * = 1 β i + 2 q + 1 i i + 2
and
i + 1 i B * = 1 β i q + 1 i + 1 i .
By Lemma 3, 1 β i + 2 q + 1 = ( β i q + 1 ) q 4 = ( β i q + 1 ) q . Write t = u ( q + 1 ) v with 0 v q . Then,
B * : i i + 2 u i + 1 i v u ( β i q + 1 ) q u i i + 2 u ( β i q + 1 ) v + u i + 1 i v u
The result follows from the definition of u and v. □
Proposition 5. 
(i) 
Let β 1 F q 6 be an element such that β 1 q 3 + 1 = 1 , and B = B ( β 1 ) B . Then,
( W t , α ) B * = W t , β 1 t ( q + 1 ) α .
(ii) 
The subspaces W t , t H ( P ) are B * -invariant.
(iii) 
The F q 2 B * -modules W t and W s are isomorphic if and only if one of the following holds:
(a) 
s t ( mod q 2 q + 1 ) ;
(b) 
s ( q 1 ) t ( mod q 2 q + 1 ) ;
(c) 
s q t ( mod q 2 q + 1 ) .
Proof. 
(i) and (ii) follow from Lemma 4. (iii) Let Φ : W t W s be an F q 2 B * -module isomorphism between W t and W s . It can be written as
( W t , α ) Φ = W t , α φ ,
where φ : F q 6 F q 6 is an F q 2 -linear bijection. Moreover,
( W t , α ) B * Φ = ( W t , β 1 t ( q + 1 ) α ) Φ = W s , ( β 1 t ( q + 1 ) α ) φ , ( W t , α ) Φ B * = ( W s , α φ ) B * = W s , β 1 s ( q + 1 ) ( α φ ) .
Since b = β 1 q + 1 satisfies b q 2 q + 1 = 1 , this means that for any α , b F q 6 , b q 2 q + 1 = 1 , we have
( b t α ) φ = b s ( α φ ) .
Let b be an element of order q 2 q + 1 in F q 6 . If b t or b s is in F q 2 , then b t = b s and a) hold. Assume that neither b t nor b s is in F q 2 . Then, F q 6 = F q 2 ( b t ) = F q 2 ( b s ) , and over F q 2 , the minimal polynomial of b t has the degree three. Assume b 3 t + c 1 b 2 t + c 2 b t + c 3 = 0 with c 0 , c 1 , c 2 F q 2 . Then,
0 = ( b 3 t + c 1 b 2 t + c 2 b t + c 3 ) φ = ( b 3 t φ ) + c 1 ( b 2 t φ ) + c 2 ( b t φ ) + c 3 ( 1 φ ) = ( b 3 s + c 1 b 2 s + c 2 b s + c 3 ) ( 1 φ ) .
As φ is bijective, 1 φ 0 , 0 = b 3 s + c 1 b 2 s + c 2 b s + c 3 follows. This means that b s has the same minimal polynomial and b t b s extends to a field automorphism of F q 6 over F q 2 . This implies b s = b t , b s = ( b t ) q 2 or b s = ( b t ) q 4 , and the claim follows. □

5. Hermitian Codes of Degree-Three Places and Their Duals

In this section, we explore the one-point Hermitian codes of degree-three places and their dual codes. Let P be a degree-three place on the Hermitian curve H q ; Q 1 , , Q n , Q are its F q 2 -rational places, where n = q 3 . We define the divisors D = Q 1 + Q 2 + + Q n , D ˜ = D + Q , and G = s P for a positive integer s.

5.1. Functional Hermitian Codes of Degree-Three Places

Given a divisor D and G, we define the degree-three place functional Hermitian code C L ( D , s P ) as:
C L ( D , G ) : = g ( Q 1 ) , g ( Q 2 ) , , g ( Q n ) | g L ( G ) ,
This code forms an [ n , k ] AG code, where k 3 s g + 1 , achieving equality when 2 g 2 3 < s < n / 3 . Furthermore, the code has a minimum distance d d * = q 3 3 s , where d * is the designed minimum distance.
Furthermore, another degree-three place functional Hermitian code associated with G, denoted by C L ( D ˜ , G ) , is constructed by evaluating the functions in L ( G ) at all rational points Q 1 , Q 2 , , Q n and the point at infinity Q as follows:
C L ( D ˜ , G ) : = g ( Q 1 ) , g ( Q 2 ) , , g ( Q n ) , g ( Q ) | g L ( G ) ,
Clearly, C L ( D ˜ , G ) has a length of n + 1 . Concerning the dimensions, we have the following result.
Proposition 6. 
If s < q 3 / 3 , then L ( s P ) , C L ( D , G ) and C L ( D ˜ , G ) have the same dimensions.
Proof. 
If f ker ev D , then f L ( s P D ) , which is trivial if s < q 3 / 3 . In this case, ker ev D ˜ is also trivial. □
Remark 1. 
Numerical experiments show that L ( s P ) , C L ( D , G ) and C L ( D ˜ , G ) have the same dimension if s < ( q 3 + 1 ) / 3 + q 1 .
In the study of the divisors D and D ˜ , we make use of the polynomial
R ( X , Y ) = X c F q 2 c q + c 0 ( Y c ) .
As shown in [13] (Section 2), the principal divisor of R ( x , y ) F q 2 ( H q ) is
( R ( x , y ) ) = D q 3 Q .
Further properties of R ( x , y ) are given in the following proposition.
Proposition 7. 
In the function field, we have
x q R ( x , y ) = y q 2 y and R ( x , y ) = x q 2 x .
The differential of R ( x , y ) is
d ( R ( x , y ) ) = d x .
Proof. 
Clearly,
c F q 2 c q + c = 0 ( Y c ) = Y q + Y ,
and
c F q 2 c q + c 0 ( Y c ) = c F q 2 ( Y c ) c F q 2 c q + c = 0 ( Y c ) = Y q 2 Y Y q + Y .
Hence, by x q + 1 = y + y q ,
x q R ( x , y ) = x q + 1 c F q 2 c q + c 0 ( y c ) = x q + 1 y q 2 y y q + y = y q 2 y .
Using this, we obtain
x q ( x q 2 x ) = ( x q + 1 ) q x q + 1 = y q + y q 2 ( y + y q ) = y q 2 y = x q R ( x , y ) .
Canceling by x q , we get R ( x , y ) = x q 2 x , and d ( R ( x , y ) ) = d x follows immediately. □

5.2. Differential Hermitian Codes of Degree-Three Places

Differential Hermitian codes of degree-three places are essential counterparts to functional codes on the Hermitian curve H q . The dual code C Ω ( D , G ) of C L ( D , G ) is called the differential code. It constitutes an [ n , ( G D ) ( G ) + deg D , d ] code, where d deg ( G ) ( 2 g 2 ) , with deg ( G ) ( 2 g 2 ) being its designed distance.
Ref. [20] (Proposition 8.1.2) provides an explicit description of the differential code as a functional code
C Ω ( D , G ) = C L ( D G + ( d t ) ( t ) ) ,
where t is an element of F q 2 ( H q ) such that v Q i ( t ) = 1 for all i { 1 , , q 3 , } . If G = s P and D = Q 1 + + Q q 3 , then t = R ( x , y ) is a good choice, with
( d t ) = ( d x ) = ( 2 g 2 ) Q = ( q 2 ) ( q + 1 ) Q ,
see [20] (Lemma 6.4.4). Then, (8) implies the following proposition:
Proposition 8. 
C Ω ( D , s P ) = C L ( D , ( q 3 + q 2 q 2 ) Q s P ) .
The computation of C Ω ( D ˜ , s P ) is more complicated. We claim the next results for the prime powers q 2 ( mod 3 ) , since the proofs are rather transparent in this case. We are certain that they hold for q 1 ( mod 3 ) as well. Our opinion is supported by numerical experiments with q 8 .
Lemma 5. 
Assume q 2 ( mod 3 ) and define the F q 2 -rational function
T = 1 3 1 q 2 2 + 2 q 2 3 + 3 q 2 1 .
Then,
d R ( 1 2 3 ) q 2 q + 1 3 = T ( 1 2 3 ) q 2 q + 1 3 d x .
Proof. 
We have d i = ( a i x ) q d x , and
i q 2 i + 1 = a i q 3 x q 2 y q 2 b i q 3 ( a i + 1 q x y b i + 1 q ) = a i + 1 q ( x q 2 x ) ( y q 2 y ) = a i + 1 q R ( x , y ) x q R ( x , y ) = ( a i + 1 x ) q R ( x , y ) .
In one line,
( a i + 1 x ) ) q i + 1 = 1 q 2 / 2 1 R ( x , y ) .
Hence,
d ( 1 2 3 ) = 1 2 3 · ( a 1 x ) q 1 + ( a 2 x ) q 2 + ( a 3 x ) q 3 d x = 1 2 3 · 1 q 2 / 2 1 R + 2 q 2 / 3 1 R + 3 q 2 / 1 1 R d x = 1 2 3 R ( 3 T 3 ) d x .
This implies
d R ( 1 2 3 ) q 2 + q 1 3 = ( 1 2 3 ) q 2 + q 1 3 d x + R 1 3 ( 1 2 3 ) q 2 + q 4 3 1 2 3 R ( 3 T 3 ) d x .
By easy cancellation
d R ( 1 2 3 ) q 2 + q 1 3 = ( 1 2 3 ) q 2 + q 1 3 d x + 1 3 ( 1 2 3 ) q 2 + q 1 3 ( 3 T 3 ) d x = T ( 1 2 3 ) q 2 q + 1 3 d x .
Lemma 6. 
Assume q 2 ( mod 3 ) and define the F q 2 -rational functions
T = 1 3 1 q 2 2 + 2 q 2 3 + 3 q 2 1 a n d R 1 = R ( 1 2 3 ) q 2 q + 1 3 .
Let G be a divisor of F q 2 ( H q ) whose support is disjoint from the support of D ˜ . Then,
L ( D ˜ G + ( d R 1 ) ( R 1 ) ) = L ( q 2 1 ) ( q + 1 ) 3 P G · ( 1 2 3 ) q 2 1 3 T .
Proof. 
We have
D ˜ G + ( d R 1 ) ( R 1 ) = D ˜ G + ( T ) q 2 q + 1 3 ( 1 2 3 ) + ( d x ) ( R ) + q 2 q + 1 3 ( 1 2 3 ) = D ˜ G + ( T ) + ( d x ) ( R ) = Q + q 3 Q + ( 2 g 2 ) Q G + ( T ) = ( q 2 1 ) ( q + 1 ) Q G + ( T ) = ( q 2 1 ) ( q + 1 ) 3 P ( 1 2 3 ) q 2 1 3 G + ( T ) .
For Riemann–Roch spaces, the results follow. □
Lemma 7. 
For any i , j { 1 , 2 , 3 } , we have
i j ( Q ) = 1 .
Proof. 
We use the local expansion τ ( t ) = ( t : 1 : t q + 1 + ) of H q at Q . The dots represent terms of a higher degree.
i j ( τ ( t ) ) = a i q t 1 b i q ( t q + 1 + ) a j q t 1 b j q ( t q + 1 + ) ,
which implies
i j ( Q ) = i j ( τ ( 0 ) ) = 1 .
Lemma 8. 
Assume q 0 ( mod 3 ) and define the F q 2 -rational functions
T = 1 3 1 q 2 2 + 2 q 2 3 + 3 q 2 1 and T 1 = ( 1 2 3 ) q 2 1 3 T .
Then, T 1 ( Q ) = 1 .
Proof. 
Since
i q 2 i + 1 ( 1 2 3 ) q 2 1 3
is the product of terms such as i / j , it takes the value of 1 at Q . This implies ( 1 / T 1 ) ( Q ) = 1 . □
Before stating our main result on differential codes, we remind the reader that two linear codes C 1 , C 2 are monomially equivalent if C 2 = μ C 1 for some multiplier vector μ .
Theorem 4. 
Assume q 2 ( mod 3 ) and define the F q 2 -rational functions
T = 1 3 1 q 2 2 + 2 q 2 3 + 3 q 2 1 and T 1 = ( 1 2 3 ) q 2 1 3 T .
Let G be a divisor of F q 2 ( H q ) , whose support is disjoint from the support of D ˜ . Define μ i = T 1 ( Q i ) for i { 1 , , q 3 , } and write μ = ( μ i ) . Then, all entries μ i F q 2 * , and
C Ω ( D ˜ , G ) = μ C L ( D ˜ , ( q 2 1 ) ( q + 1 ) 3 P G ) .
Proof. 
If i { 1 , , q 3 } , then i q 2 ( Q i ) = i + 1 ( Q i ) . Therefore, T ( Q i ) = 1 and T 1 ( Q i ) is a well-defined non-zero element in F q . Lemma 8 implies T 1 ( Q ) = 1 . The theorem follows from Lemma 6. □
Corollary 1. 
C Ω ( D ˜ , s P ) = μ C L D ˜ , ( q 2 1 ) ( q + 1 ) 3 s P .

6. Hermitian Subfield Subcodes from Degree-Three Places

In this section, we study the subfield subcodes of C L ( D , s P ) . As before, q is a prime power, s 0 integer, and P is a place of degree three of the Hermitian curve H q . The divisor D = Q 1 + + Q n , n = q 3 , is defined as the sum of the F q 2 -rational affine places of H q . The rational place at infinity is Q and D ˜ = D + Q .

6.1. Trace Maps of Hermitian Functions and Hermitian Codes

We collect properties of the maps z z q + z and z z q z , where z is either a field element, a function, or a vector. We refer to z q + z as the trace of z, and to the map itself as the trace map Tr = Tr F q 2 / F q . Clearly, Tr is linear over F q .
Lemma 9. 
Consider a positive divisor G 1 . The trace map satisfies the following properties:
(i) 
For any function f L ( G 1 ) , its trace lies within L ( q G 1 ) , implying Tr ( L ( G 1 ) ) L ( q G 1 ) .
(ii) 
Similarly, for any codeword c C L ( D , G 1 ) , its trace resides in C L ( D , q G 1 ) .
(iii) 
Tr ( C L ( D , G 1 ) ) is an F q -linear subspace of C L ( D , q G 1 ) F q n .
Proof. 
Since G 1 0 , we have L ( G 1 ) , L ( G 1 ) q L ( q G 1 ) ; hence, (i) holds. Then, (i) implies (ii), and (iii) follows trivially. □
Proposition 9. 
Let G 1 be a positive divisor that satisfies deg G 1 < n / q . Then, Tr ( C L ( D , G 1 ) ) is an F q -linear subfield subcode of C L ( D , q G 1 ) . Its dimension is
dim F q ( Tr ( C L ( D , G 1 ) ) ) = 2 dim F q 2 ( L ( G 1 ) ) 1 .
Proof. 
Tr ( C L ( D , G 1 ) ) is an F q -linear subfield subcode by Lemma 9. The trace map Tr and the evaluation map ev D commute, and by deg ( G 1 ) < n , ev D is injective. Define the F q -linear map
τ : L ( G 1 ) C L ( D , q G 1 ) F q n , f ev D ( Tr ( f ) ) .
On the one hand,
dim F q ( L ( G 1 ) ) = 2 dim F q 2 ( L ( G 1 ) ) = dim Im ( τ ) + dim ker ( τ ) .
We have to show that ker ( τ ) = 1 . Define ε F q 2 such that ε = 1 if q is even and ε = g ( q + 1 ) / 2 if q is odd and g is a primitive element in F q 2 . Then, ε q 1 = 1 . For the rational function f F q 2 ( H ( q ) ) , we have
f ker ( τ ) f q + f = 0 ( ε f ) q = ε f ε f F q f ε 1 F q .
This finishes the proof. □

6.2. An Explicit Subfield Subcode

In this subsection, we study a subfield subcode of C L ( D , ( q 2 q + 1 ) P ) . As q 2 q + 1 = ( q 1 ) ( q + 1 ) ( q 1 ) , one has
U q 2 q + 1 , i = i q i + 2 i + 1 i + 2 q .
The vector space W q 2 q + 1 L ( ( q 2 q + 1 ) P ) consists of the functions
W q 2 q + 1 , α = α 1 q 3 2 3 q + α q 2 2 q 1 3 1 q + α q 4 3 q 2 1 2 q , α F q 6 .
For rational functions f , g F q 6 ( H q ) , we introduce the relation
f g f ( Q i ) = g ( Q i ) for all i { 1 , , q 3 , } .
This is clearly an equivalence relation, which can be also written in terms of the principal divisor
f g ( f g ) D ˜ ,
or in terms of the evaluation map
f g ev D ˜ ( f ) = ev D ˜ ( g ) .
Lemma 10. 
(i) 
( U q 2 q + 1 , i ) q U q 2 q + 1 , i + 2 .
(ii) 
( W q 2 q + 1 , α ) q W q 2 q + 1 , α q 3 .
Proof. 
Lemma 7 implies U q 2 q + 1 , i ( Q ) = 1 . In the proof of Lemma 5, we have seen that i q 2 i + 1 = ( a i + 1 x ) q R ( x , y ) . Therefore, ( i q 2 i + 1 ) ( Q i ) = 0 for all i { 1 , , q 3 } . This shows
( U q 2 q + 1 , i ) q ( Q i ) = i q 2 i + 2 q i + 1 q i + 2 q 2 ( Q i ) = i + 1 i + 2 q i + 1 q i ( Q i ) = U q 2 q + 1 , i + 2 ( Q i )
This proves (i). For (ii):
( W q 2 q + 1 , α ) q = ( α U q 2 q + 1 , 1 + α q 2 U q 2 q + 1 , 2 + α q 4 U q 2 q + 1 , 3 ) q α q U q 2 q + 1 , 3 + α q 3 U q 2 q + 1 , 1 + α q 5 U q 2 q + 1 , 2 = α q 3 U q 2 q + 1 , 1 + ( α q 3 ) q 2 U q 2 q + 1 , 2 + ( α q 3 ) q 4 U q 2 q + 1 , 3 = W q 2 q + 1 , α q 3 .
Proposition 10. 
The set
W ˜ = { ev D ( W q 2 q + 1 , α ) α F q 3 }
is a three-dimensional F q -linear subfield subcode of C L ( D , ( q 2 q + 1 ) P ) .
Proof. 
Lemma 10(ii) implies that ev D ( W q 2 q + 1 , α ) has F q -entries if and only if α q 3 = α . □

6.3. Main Result and a Conjecture

Theorem 5. 
Let q 3 be a prime power, n = q 3 , D = Q 1 + + Q n be the sum of rational affine places of F q 2 ( H q ) , and P be a place of degree three. The dimension of the subfield subcode of the one-point Hermitian code is
dim C L ( D , s P ) | F q 7 for s = 2 g = q ( q 1 ) , 10 for s = 2 g + 1 = q 2 q + 1 .
Proof. 
Set G 1 = ( q 1 ) P . By Proposition 9,
T = ev D ( Tr ( L ( G 1 ) ) )
is an F q -linear subspace in C L ( D , q ( q 1 ) P ) | F q . Since dim ( L ( ( q 1 ) P ) ) = 4 , T has dimension seven. This proves dim C L ( D , q ( q 1 ) P ) | F q 7 .
Let W ˜ be the three-dimensional F q -linear subfield subcode of C L ( D , ( q 2 q + 1 ) P ) given in Proposition 10. We show that T W ˜ = { 0 } ; the inequality dim C L ( D , ( q 2 q + 1 ) P ) | F q 10 will follow. On the one hand,
W ˜ ev D ( W q 2 q + 1 ) .
On the other hand, using Theorem 3, we have
T ev D ( L ( q ( q 1 ) P ) ) = ev D t H ( P ) , t q ( q 1 ) W t .
As ev D is injective on L ( ( q 2 q + 1 ) P ) , and
t H ( P ) , t q ( q 1 ) W t W q 2 q + 1 = { 0 } ,
we obtain T W ˜ = { 0 } . This completes the proof. □
Our proof was constructive, we used the subfield subcodes given explicitly in the previous subsections. Based on computer calculations for small q, we have the following conjecture.
Conjecture 1. 
If q 4 , then equalities hold in Theorem 5.
The claim of the conjecture has some equivalent formulations.
Proposition 11. 
The following are equivalent.
(i) 
dim C L ( D , ( q 2 q ) P ) | F q = 7 .
(ii) 
dim C L ( D , ( q 2 q 1 ) P ) | F q = 1 .
(iii) 
dim C L ( D , s P ) | F q = 1 for all 0 s 2 g 1 = q 2 q 1 .
Proof. 
We use the notation of the proof of Theorem 5. Assume (i). We have L ( ( q 1 ) P ) = W 0 W q 1 . Moreover, T is an F q B -module that decomposes into the direct sum of a one-dimensional submodule and a six-dimensional submodule. Note that any non-trivial irreducible F q B -module has dimension six. Since T C L ( D , ( q 2 q 1 ) P ) is a proper submodule, the only possibility is that it is one-dimensional over F q . (ii) follows. Trivially, (ii) implies (iii). Let us now assume (iii).
dim F q C L ( D , ( q 2 q ) P ) / C L ( D , ( q 2 q 1 ) P ) = 6 ,
and therefore,
dim F q C L ( D , ( q 2 q ) P ) | F q / C L ( D , ( q 2 q 1 ) P ) | F q 6 .
This implies dim C L ( D , ( q 2 q ) P ) | F q 7 . Together with Theorem 5, we have (i). □
We have a partial result related to case (iii) of Proposition 11.
Proposition 12. 
dim C L ( D , s P ) | F q = 1 for all 0 s 2 3 g .
Proof. 
Fix an arbitrary integer s in the range 0 s < 2 3 g and consider a generic element ( c 1 , , c q 3 ) C q ( s ) . This corresponds to a function g in L ( s P ) such that c i = g ( Q i ) is an element of F q for each i = 1 , , q 3 . We note that there exists a γ F q such that at least q 2 of the c i values is equal to γ . In other words, the function g γ is in L ( s P ) and has at least q 2 zeros on H q . However, a non-zero function in L ( s P ) cannot have more than deg ( G ) 2 g = q ( q 1 ) zeros, leading us to conclude that g γ must be the zero function. This implies that every c i is equal to γ , and hence C L ( D , s P ) | F q consists of constant vectors. This completes the proof. □

7. Conclusions

In summary, our research has uncovered important properties of the family of Hermitian subfield subcodes associated with degree-three places. We achieved this by precisely determining the dimension of these codes for certain parameters and providing explicit bases for the corresponding Riemann–Roch spaces. Moreover, we conducted experiments aimed at calculating the exact dimension of the underlying family of codes across a broad spectrum of parameters. This process has contributed to the reformulation of certain conjectures, with some being proven. Additionally, we have established lower bounds on the dimension of Hermitian subfield subcodes associated with the divisor s P , where P is a degree-three Hermitian place, for specific cases such as 0 s 2 3 g , s = 2 g , and s = 2 g + 1 , utilizing the bases of the underlying family of codes. Our motivation to explore the properties of Hermitian subfield subcodes stems from their potential as a family of AG codes for post-quantum cryptography use. In our future work, we anticipate using the parameters of subfield subcodes of degree-three Hermitian codes to enhance and secure the McEliece cryptosystem.

Author Contributions

Software, S.E.K. and G.P.N.; Investigation, S.E.K. and G.P.N.; Writing—original draft, S.E.K. and G.P.N. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by French National Research Agency grant number ANR Barracuda (ANR-21-CE39-0009), French government Investissements d’Avenir program grant number ANR-11-LABX-0020-01, Quantum Information National Laboratory of Hungary grant umber 2022-2.1.1-NL-2022-00004, and National Research, Development and Innovation Office grant number SNN 132625.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

No relevant new data were created in this research.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Sendrier, N. On the security of the McEliece public-key cryptosystem. In Information, Coding and Mathematics: Proceedings of Workshop Honoring Prof. Bob McEliece on His 60th Birthday; Springer: Berlin/Heidelberg, Germany, 2002; pp. 141–163. [Google Scholar]
  2. Faugere, J.C.; Gauthier-Umana, V.; Otmani, A.; Perret, L.; Tillich, J.P. A distinguisher for high-rate McEliece cryptosystems. IEEE Trans. Inf. Theory 2013, 59, 6830–6844. [Google Scholar] [CrossRef]
  3. McEliece, R.J. A public-key cryptosystem based on algebraic. Coding Thv. 1978, 4244, 114–116. [Google Scholar]
  4. Couvreur, A.; Gaborit, P.; Gauthier-Umaña, V.; Otmani, A.; Tillich, J.P. Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes. Des. Codes Cryptogr. 2014, 73, 641–666. [Google Scholar] [CrossRef]
  5. Couvreur, A.; Márquez-Corbella, I.; Pellikaan, R. Cryptanalysis of McEliece cryptosystem based on algebraic geometry codes and their subcodes. IEEE Trans. Inf. Theory 2017, 63, 5404–5418. [Google Scholar] [CrossRef]
  6. Macdonald, T.G.; Pursley, M.B. Hermitian codes for frequency-hop spread-spectrum packet radio networks. IEEE Trans. Wirel. Commun. 2003, 2, 529–536. [Google Scholar] [CrossRef]
  7. Stichtenoth, H. A note on Hermitian codes over GF (q/sup 2/). IEEE Trans. Inf. Theory 1988, 34, 1345–1348. [Google Scholar] [CrossRef]
  8. Little, J.; Saints, K.; Heegard, C. On the structure of Hermitian codes. J. Pure Appl. Algebra 1997, 121, 293–314. [Google Scholar] [CrossRef]
  9. Yang, K.; Kumar, P.V. On the true minimum distance of Hermitian codes. In Proceedings of the Coding Theory and Algebraic Geometry: Proceedings of the International Workshop, Luminy, France, 17–21 June 1991; Springer: Berlin/Heidelberg, Germany, 1992; pp. 99–107. [Google Scholar]
  10. Korchmáros, G.; Nagy, G.P.; Timpanella, M. Codes and gap sequences of Hermitian curves. IEEE Trans. Inf. Theory 2019, 66, 3547–3554. [Google Scholar] [CrossRef]
  11. Ren, J. On the structure of Hermitian codes and decoding for burst errors. IEEE Trans. Inf. Theory 2004, 50, 2850–2854. [Google Scholar] [CrossRef]
  12. Lhotel, M.; Khalfaoui, S.E.; Nardi, J. Goppa-like AG codes from C_{a,b} curves and their behaviour under squaring their dual. arXiv 2023, arXiv:2303.08687. [Google Scholar]
  13. Korchmáros, G.; Nagy, G.P. Hermitian codes from higher degree places. J. Pure Appl. Algebra 2013, 217, 2371–2381. [Google Scholar] [CrossRef]
  14. Matthews, G.L.; Michel, T.W. One-point codes using places of higher degree. IEEE Trans. Inf. Theory 2005, 51, 1590–1593. [Google Scholar] [CrossRef]
  15. Cossidente, A.; Korchmáros, G.; Torres, F. On curves covered by the Hermitian curve. J. Algebra 1999, 216, 56–76. [Google Scholar] [CrossRef]
  16. Beelen, P.; Montanucci, M.; Vicino, L. Weierstrass semigroups and automorphism group of a maximal curve with the third largest genus. arXiv 2023, arXiv:2303.00376. [Google Scholar] [CrossRef]
  17. Post-Quantum Cryptography. Available online: http://csrc.nist.gov/projects/post-quantum-cryptography (accessed on 6 February 2024).
  18. Nagy, G.P.; El Khalfaoui, S. HERmitian, HERmitian/Computing with Divisors, Riemann-Roch Spaces and AG-Odes of Hermitian Curves, Version 0.3. 2024. GAP Package. Available online: https://github.com/nagygp/Hermitian (accessed on 11 March 2024).
  19. GAP—Groups, Algorithms, and Programming, Version 4.12.2pre. Available online: https://www.gap-system.org (accessed on 11 March 2024).
  20. Stichtenoth, H. Algebraic Function Fields and Codes; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009; Volume 254. [Google Scholar]
  21. Stepanov, S.A. Codes on Algebraic Curves; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  22. Delsarte, P. On subfield subcodes of modified Reed-Solomon codes. IEEE Trans. Inf. Theory 1975, 21, 575–576. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

El Khalfaoui, S.; Nagy, G.P. On the Dimensions of Hermitian Subfield Subcodes from Higher-Degree Places. Entropy 2024, 26, 386. https://doi.org/10.3390/e26050386

AMA Style

El Khalfaoui S, Nagy GP. On the Dimensions of Hermitian Subfield Subcodes from Higher-Degree Places. Entropy. 2024; 26(5):386. https://doi.org/10.3390/e26050386

Chicago/Turabian Style

El Khalfaoui, Sabira, and Gábor P. Nagy. 2024. "On the Dimensions of Hermitian Subfield Subcodes from Higher-Degree Places" Entropy 26, no. 5: 386. https://doi.org/10.3390/e26050386

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop