Chiara Marcolla
University of Trento
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Chiara Marcolla.
Journal of Pure and Applied Algebra | 2012
Chiara Marcolla; Emmanuela Orsini; Massimiliano Sala
Abstract General error locator polynomials are polynomials able to decode any correctable syndrome for a given linear code. Such polynomials are known to exist for all cyclic codes and for a large class of linear codes. We provide some decoding techniques for affine-variety codes using some multidimensional extensions of general error locator polynomials. We prove the existence of such polynomials for any correctable affine-variety code and hence for any linear code. We propose two main different approaches, that depend on the underlying geometry. We compute some interesting cases, including Hermitian codes. To prove our coding theory results, we develop a theory for special classes of zero-dimensional ideals, that can be considered generalizations of stratified ideals. Our improvement with respect to stratified ideals is twofold: we generalize from one variable to many variables and we introduce points with multiplicities.
Finite Fields and Their Applications | 2016
Edoardo Ballico; Chiara Marcolla
We study the locally recoverable codes on algebraic curves. In the first part of this article, we provide a bound of generalized Hamming weight of these codes. Whereas in the second part, we propose a new family of algebraic geometric LRC codes, that are LRC codes from Norm-Trace curve. Finally, using some properties of Hermitian codes, we improve the bounds of distance proposed in [1] for some Hermitian LRC codes. [1] A. Barg, I. Tamo, and S. Vlladut. Locally recoverable codes on algebraic curves. arXiv preprint arXiv:1501.04904, 2015.
Journal of Symbolic Computation | 2016
Chiara Marcolla; Marco Pellegrini; Massimiliano Sala
For any affine-variety code we show how to construct an ideal whose solutions correspond to codewords with any assigned weight. We are able to obtain geometric characterizations for small-weight codewords for some families of Hermitian codes over any F q 2 . From these geometric characterizations, we obtain explicit formulas. In particular, we determine the number of minimum-weight codewords for all Hermitian codes with d ? q and all second-weight codewords for distance- 3 , 4 codes.
Finite Fields and Their Applications | 2014
Chiara Marcolla; Marco Pellegrini; Massimiliano Sala
We classify completely the intersections of the Hermitian curve with parabolas in the affine plane. To obtain our results we employ well-known algebraic methods for finite fields and geometric properties of the curve automorphisms. In particular, we provide explicit counting formulas that have also applications to some Hermitian codes.
conference on algebraic informatics | 2015
Riccardo Longo; Chiara Marcolla; Massimiliano Sala
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose a multi-authority key-policy ABE system. In our proposal, the authorities may be set up in any moment and without any coordination. A party can simply act as an ABE authority by creating its own public parameters and issuing private keys to the users. A user can thus encrypt data choosing both a set of attributes and a set of trusted authorities, maintaining full control unless all his chosen authorities collude against him. We prove our system secure under the bilinear Diffie-Hellman assumption.Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose two multi-authority key-policy ABE systems. In our first proposal, the authorities may be set up in any moment and without any coordination. A party can simply act as an ABE authority by creating its own public parameters and issuing private keys to the users. A user can thus encrypt data choosing both a set of attributes and a set of trusted authorities, maintaining full control unless all his chosen authorities collude against him. In our second system, the authorities are allowed to collaborate to achieve shorter keys and parameters, enhancing the e ciency of encryption and decryption. We prove our systems secure under algebraic assumptions on the bilinear groups: the bilinear Di e-Hellmann assumption and an original variation of the former.
Applicable Algebra in Engineering, Communication and Computing | 2014
Franca Marinelli; Riccardo Aragona; Chiara Marcolla; Massimiliano Sala
The correctness in decrypting a ciphertext after some operations in the DGVH scheme depends heavily on the dimension of the secret key. In this paper we compute two bounds on the size of the secret key for the DGHV scheme to decrypt correctly a ciphertext after a fixed number of additions and a fixed number of multiplication. Moreover we improve the original bound on the dimension of the secret key for a general circuit.
arXiv: Commutative Algebra | 2015
Chiara Marcolla; Margherita Roggero
arXiv: Commutative Algebra | 2012
Chiara Marcolla; Marco Pellegrini; Massimiliano Sala
WCC 2011 - Workshop on coding and cryptography | 2011
Marco Pellegrini; Chiara Marcolla; Massimiliano Sala
arXiv: Commutative Algebra | 2016
Chiara Marcolla; Margherita Roggero