Skip to main content

A general theory of codes, II: Paradigms and homomorphisms

  • Special Lecture
  • Conference paper
  • First Online:
Information Security (ISW 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1396))

Included in the following conference series:

Abstract

When two competing paradigms bear on a single area of study, investigators have more choices at their disposal. This is not always an advantage.

This paper, like its predecessor, adopts a paradigm for codes. This paradigm ignores the purposes which might have given rise to a code, the size of the code, or the arithmetic used in implementing the code. It concentrates solely on the (set-theoretic) structure of that code. Once adopted, this structure-oriented paradigm leads naturally to a theory of homomorphisms for the general theory of codes. Code homomorphisms satisfy the standard isomorphism theorems, respect certain important properties of codes, are compatible with products and quotients, and possess other desirable features. Thus, codes fit into general algebra alongside such familiar objects as groups, graphs and posets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G.R. Blakley and Catherine Meadows, Information theory without the finiteness assumption, III: Data compression and codes whose rates exceed unity, in H.J. Beker and E.C. Piper (Editors), Cryptography and Coding, Proceedings of the IMA Conference on Cryptography and Coding at the Royal Agricultural College, Cirencester, December, 1986, Clarendon Press, Oxford (1989), pp. 67–93.

    Google Scholar 

  2. G.R. Blakley, Management of secret information: An abstract theory of codes, some implications for PKCs and secret sharing, and homomorphisms of relations and codes, in Proceedings, JAIST International Forum on Multimedia and Information Security, Japan Advanced Institute of Science and Technology, Tatsunokuchi, Ishikawa, Japan, 1–2 November (1995), pp. 55–83.

    Google Scholar 

  3. G.R. Blakley and I. Borosh, Codes, in Pragocrypt, '96, Part 1, Proceedings of the First International Conference on the Theory and Applications of Cryptography, Pragocrypt '96, CTU Publishing House, Zikova 4, Prague 6, Czech Republic (1996), pp. 253–271.

    Google Scholar 

  4. G.R. Blakley and I. Borosh, A general theory of codes, I: Basic concepts, in Contributions to General Algebra, 10, Proceedings of the Klagenfurt Conference on General Algebra, May 29–June 1, 1997, (1998) in press.

    Google Scholar 

  5. R. Godement, Algebra, Hermann, Paris, and Houghton Mifflin, New York (1968).

    Google Scholar 

  6. G. Grätzer, Universal Algebra, Van Nostrand, Princeton, New Jersey (1968).

    Google Scholar 

  7. D. Kahn, The Codebreakers, Macmillan, New York (1967).

    Google Scholar 

  8. A.N. Kolmogorov, On the Shannon Theory of Information in the Case of Continuous Signals, IEEE Transactions on Information Theory, vol. IT-2 (1956), pp. 102–108, Reprinted as pages 238–244 in D. Slepian (Editor) Key Papers in the Development of Information Theory, IEEE Press, New York (1974).

    Google Scholar 

  9. A.I. Mal'cev, Algebraic Systems, Springer-Verlag, New York (1973).

    Google Scholar 

  10. Catherine Meadows, Three paradigms in computer security, Proceedings of the 1997 New Security Paradigms Workshop, ACM (1998), in press.

    Google Scholar 

  11. H. Paley and P.M. Weichsel, A First Course in Abstract Algebra, Holt, Rinehart and Winston, New York (1966).

    Google Scholar 

  12. E.N. Tufte, The Visual Display of Quantitative Information, Graphics Press, Cheshire, Connecticut (1983).

    Google Scholar 

  13. E.N. Tufte, Envisioning Information, Graphics Press, Cheshire, Connecticut (1990).

    Google Scholar 

  14. E.N. Tufte, Visual Explanations: Images and Quantities, Evidence and Narrative, Graphics Press, Cheshire Connecticut (1996).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Eiji Okamoto George Davida Masahiro Mambo

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blakley, G.R., Borosh, I. (1998). A general theory of codes, II: Paradigms and homomorphisms. In: Okamoto, E., Davida, G., Mambo, M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030405

Download citation

  • DOI: https://doi.org/10.1007/BFb0030405

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64382-1

  • Online ISBN: 978-3-540-69767-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics