Open Access
Issue
Wuhan Univ. J. Nat. Sci.
Volume 30, Number 3, June 2025
Page(s) 289 - 301
DOI https://doi.org/10.1051/wujns/2025303289
Published online 16 July 2025

© Wuhan University 2025

Licence Creative CommonsThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

0 Introduction

Random linear network coding, first introduced in Ref. [1], is a strong tool for effective data transmission over noisy and lossy networks. It was proved in Ref. [1] that the information rate of a network can be improved by using coding at the nodes of the network, instead of simply routing the received inputs. An algebraic approach to random network coding was provided by Koetter and Kschischang in Ref. [2]. They proposed transmitting information by means of the subspaces of finite fields Fqn and defined subspace codes as a class of codes well suited for error correction. In the case that all the codewords in a subspace code have the same dimension, the subspace code is said to be a constant dimension subspace code. The theory of constant dimension subspace code has received a lot of attention in recent years (see Refs. [3-9]). As we know, the approach of constructing good constant dimension subspace codes is an interesting research field. In Ref. [9], Trautmann et al introduced the concept of orbit codes as subspace codes obtained from the action of subgroups of the general linear group GL(n,q) on the set of subspaces of Fqn. When the acting group is cyclic, the code is called a cyclic orbit code. Because of the simplicity of their algebraic structure and the existence of efficient encoding/decoding algorithms, this family of codes has attracted great interest. Gluesing-Luerssen and Lehmann[3] presented a detailed study of cyclic orbit codes based on the stabilizer subfield. Later, Gluesing-Luerssen et al[4] investigated the structure of the distance distribution for cyclic orbit codes, which are subspace codes generated by the action of Fqn on an Fq-subspace u of Fqn. Ref. [10] gave a systematic construction of subspace codes using subspace polynomials. By using Ben-Sasson’s idea, Chen et al[6] also provided some constructions of cyclic subspace codes. Roth et al[11] and Zhang et al[12] generalized and improved their result, so that one can obtain larger codes for fixed parameters and increase the density of some possible parameters.

Linear codes over finite rings have played a very important role in the theory of error correcting codes and practice (see Refs. [13-19]). On the one hand, by means of linear codes over finite rings, one can obtain good linear codes over finite fields (see Refs. [20-22]). On the other hand, new quantum codes and entanglement-assisted quantum codes can be obtained from linear codes over finite rings (see Refs. [23-27]).

Inspired by these works, in this paper, we first generalize subspace codes over finite fields to submodule codes over finite chain rings, and generalize constant dimension codes over finite fields to constant rank codes over finite chain rings. Under suitable conditions, we give a characterization of the constant rank codes over finite chain rings. We give a sufficient condition for which an orbit submodule code over a finite chain ring is a constant rank code.

This paper is organized as follows. In Section 1, we recall the necessary background materials of linear codes over finite chain rings. In Section 2, we first generalize the constant dimension codes over finite fields to constant rank codes over finite chain rings. Then, we give a relationship between constant rank codes over finite chain rings and constant dimension codes over the residue fields. By means of this relationship, we obtain a method to construct constant rank codes over finite chain rings. In Section 3, we collect concepts of orbit codes over finite fields, which are generalized to the orbit submodule codes over finite chain rings. Then we study orbit submodule constant rank codes over finite chain rings. We give two new examples of the open problem proposed by Gluesing-Luerssen et al in Ref. [4] (see Examples 1 and 2). In Section 4, we define a Gray map Φ from (Fq+γFq)n to Fq2n, and we give a method for constructing an optimum distance constant dimension code over Fq by using cyclic codes over Fq+γFq. Finally, a brief summary of this work is described in Section 5.

1 Linear Codes over Chain Rings

Throughout this paper will denote a finite chain ring. In this section, we recall some basic concepts and results of linear codes over , necessary for the development of this work. For more details, we refer to Refs. [16, 19, 28-30].

It is well known that has the unique maximal ideal, denoted by m. Let γ be a generator of the unique maximal ideal m, i.e., m=γ. Its chain of ideals is

= γ 0 γ 1 γ t - 1 γ t = { 0 } .

The integer t is called the nilpotency index of m. Let Fq=/m be the residue field with characteristic p, where q=pe and p is a prime number. There is a natural homomorphism from onto Fq=/m, i.e.,

¯ : F q = / m , rr+m=r¯, for any r.

This natural homomorphism from onto Fq=/m can be extended naturally to a homomorphism from n onto Fqn. For an element cn, let c¯ be its image under this homomorphism.

Let * denote the group of units of . * is just the set of non-nilpotent elements of i.e., *=-m. The subgroup 1+m of * is a p-group.

It is well known that the group of units * of contains a unique cyclic subgroup T* of order q-1. T=T*{0} is called the Teichmüller set of and forms a system of coset representatives of Fq=/m. More precisely, contains a unit element ζ with multiplicative order q-1 such that T={0, 1, ζ, ζ2,, ζq-2}. We call ζ the generator of T. Since the set T modulo γ equals Fq, we do not make distinction between T and Fq. Every element r can be written as r=i=0t-1riγi, where r0,r1,,rt-1T (see Refs. [7,18]).

Lemma 1   Let notations be as above. We have

* = T * ( 1 + m ) T * × ( 1 + m ) .

A nonempty subset Cn is called a linear code of length n over if it is an -submodule of n. All codes are assumed to be linear. We say that a linear code C over is free if C is isomorphic as a module to μ for some positive lnteger μ, denoted by Cμ.

For two vectors a=(a1, a2,, an) and b=(b1, b2,, bn) in n, we define the Euclidean inner product as [a, b] to be [a, b]=i=1naibi.

Let C be a linear code over n. We define the Euclidean dual code of C as

C = { a n | [ a ,   b ] = 0   f o r   a l l   b C } .

The following lemma is well-known in Ref. [30].

Lemma 2   Let C be a linear code of length n over (or an -submodule of n). Then

| C | | C | = | | n .

One of the most important tools in coding theory is finding a generator matrix for a code. In general, we want not only a matrix that generates code by rows, but also a matrix that generates code by a minimum number of rows. To describe the generator matrix for a code over , we introduce the following two definitions and lemmas which come from Refs. [16, 28].

Definition 1   Let w1, ,wk be nonzero vectors in n. Then w1, , wk are -independent if j=1kδiwi=0 implies that δjwj=0 for all j, where δj.

Following Definition 1, we can easily get the following lemma.

Lemma 3   If the nonzero vectors w1, , ws in n are -independent and j=1sδiwi=0, then δjγ for all j.

Let w1, , ws be vectors in n. As usual, we denote the set of all linear combinations of w1, , ws by w1, , ws.

Lemma 4   If the nonzero vectors w1, , ws in n are -independent, then none of the vectors w1, , ws is a linear combination of the other vectors.

With the help of the above definition and two lemmas, we give a definition of a generator matrix for a code over .

Definition 2   Let C{0} be a linear code over (or an -submodule of n). The nonzero codewords c1, c2,, ck are called a basis of C if they are -independent and generate C. Let GC be a k×n matrix where c1, c2,, ck are rows of GC. Then GC is a generator matrix of C.

Definition 3   A parity-check matrix HD for a linear code D over is a generator matrix for the dual code D.

Let Mm×l() be the set of all m×l matrices over . For AMm×l(), AT denotes the transpose of the matrix A. We also let 0 denote the zero matrix, where the size will either be obvious from the context or specified whenever necessary. Similarly, we denote the m×m identity matrix by Im, or simply I if the size is clear from the context.

Let AMm×l(), and let Arowl and Acolm be the submodules generated by the rows of A and the columns of A, respectively. Now, we introduce the definition of the row-rank (or column-rank) of the matrix from Ref. [31].

Definition 4   The parameter log|||Arow| is called the row-rank of the matrix A and denoted by rkr(A), and similarly log|||Acol| is called the column-rank of the matrix A and denoted by rkc(A).

Obviously, when is a finite field, the above definition coincides with the usual rank of a matrix. We need the following two lemmas which can be found in Ref. [31].

Lemma 5   Let AMm×l(). Then rkr(A)=rkc(A).

In , we define rkr(A) or rkc(A) as the rank of the matrix A, denoted by rk(A). The following two concepts and a result about matrices over finite chain rings appear in Ref. [32].

Let A=(aij)Mm×m(). If there is an m×m matrix B over such that AB=BA=I, then A is invertible and B is an inverse of A. If the determinant det(A) is a unit of , then A is non-singular.

Lemma 6   Let A be an m×m matrix over . The following statements are equivalent: (1) A is invertible; (2) A is non-singular; (3) rk(A)=m.

Lemma 7   Let AMm×l() and BMl×s(). Then rk(AB)min{rk(A), rk(B)}.

Corollary 1   Let AMm×l(). If PMm×m and QMl×l are non-singular, then rk(A)=rk(PA)=rk(AQ)=rk(PAQ).

Proof   Let B=PA. Then, by Lemma 7, we have rk(B)=rk(PA)rk(A). On the other hand, considering the matrix P is non-singular, we obtain A=P-1B. Again by Lemma 7, we have rk(A)=rk(P-1B)rk(B). Therefore, rk(A)=rk(PA).

Similarly, we can show that rk(A)=rk(AQ)=rk(PAQ).

Definition 5   Let G be a generator matrix of a linear code C over . Then the rank of the code C, denoted by rank(C), is defined as rank(C)=rk(G).

Let C be a code of length n over . We define C¯={c¯|cC} and (C:r)={an|raC}, where r is an element of . The following two definitions can be found in Ref. [22].

Definition 6   To any code C over , we associate the tower of codes C=(C:γ0)(C:γ)(C:γt-1) over and its projection to Fq ,

C ¯ = ( C : γ 0 ) ¯ ( C : γ ) ¯ ( C : γ t - 1 ) ¯ .

Definition 7   Let C be a linear code over . A generator matrix G for C is said to be in standard form if, after a suitable permutation of the coordinates, G can be written as the following block matrix:

G = ( I k 0 A 0,1 A 0,2 A 0,3 A 0 , t - 1 A 0 , t 0 γ I k 1 γ A 1,2 γ A 1,3 γ A 1 , t - 1 γ A 1 , t 0 0 γ 2 I k 2 γ 2 A 2,3 γ 2 A 1 , t - 1 γ 2 A 2 , t 0 0 0 0 γ t - 1 I k t - 1 γ t - 1 A t - 1 , t ) = ( A 0 γ A 1 γ t - 1 A t - 1 )   . (1)

We associate the following matrix with G

A = ( A 0 A 1 A t - 1 )   .   (2)

For any constant r and any cn, we denote by rc the usual multiplication of a vector by a scalar. We say that a vector cn is divisible by a constant r, and write as rc, if there exists a vector an such that c=ra, i.e., all entries of c are divisible by r.

Let C be a linear code over . For i=1,2,,t-1, we denote by ki the number of row vectors of G that are divisible by γi but not by γi+1. A code with generator matrix of this form is said to have type {k0, k1,, kt-1}. It is immediate that the number of elements in a code C with this generator matrix is

| C | = | / m | i = 0 t - 1 ( t - i ) k i = | F q | i = 0 t - 1 ( t - i ) k i

Thus, we have rank(C)=1ti=0t-1(t-i)ki. This means that the rank of a linear code over could be a fraction.

2 Constant Rank Codes over Chain Rings

In this section, we first generalize the constant dimension and orbit codes over finite fields to the constant rank and orbit codes over finite chain rings. Then, a method of constructing the constant rank code over is given.

In order to give the definition of the rank distance of a submodule code over finite chain rings, we need the following lemma.

Lemma 8   Let C and D be two linear codes of length n over . Then we have

r a n k ( C + D ) = r a n k ( C ) + r a n k ( D ) - r a n k ( C D )

Proof   Let uC+D. Then there are aC, bD such that u=a+b. Obviously, for any wCD, we have

u = ( a + w ) + ( b - w ) .

Thus, there are |CD| such expressions for u. This means that |C+D|=|C||D||CD|. So,

r a n k ( C + D ) = l o g | | | C + D | = l o g | | | C | + l o g | | | D | - l o g | | | C D |

i.e., rank(C+D)=rank(C)+rank(D)-rank(CD).

Definition 8   Let C be a set of submodules (or linear codes) of length n over . Then C is called a submodule code of length n over . The submodule code C is called a constant rank code if all submodules have the same rank. If every submodule of C has the same type {k0, k1,, kt-1}, then the submodule code C is called a constant rank code of type {k0, k1,, kt-1}.

Definition 9   Let u and v be two submodules over . Then the rank distance is defined as

d M ( u   , v ) : = r a n k ( u + v ) - r a n k ( u v ) .

The minimum rank distance of a submodule code C is definite as

d M ( C ) : = m i n { d M ( u , v ) | ,   u v ,   u ,   v C } .

Remark 1   By Lemma 8, we have

d M ( u , v ) = r a n k ( u ) + r a n k ( v ) - 2 r a n k ( u v ) = 2 r a n k ( u + v ) - ( r a n k ( u ) + r a n k ( v ) ) .

As a consequence, suppose that C is a constant rank code of rank k and length n, then its minimum submodule distance is even integer and it is upper bounded by

d M ( C ) { 2 k                 i f    2 k n , 2 ( n - k )        i f    2 k n .

This bound is attained by submodule code in which the intersection of every two different submodules has rank of max{0, 2k-n} .

Remark 2   When =Fq, the submodule code C is a subspace code. In this case, the distance between two subspace is dM(u,v)=dS(u,v)=dimFq(u)+dimFq(v)-2dimFq(uv). This means that the distance of subspace code over Fq is a special case of the rank distance of submodule code over .

Let C be a constant rank code of rank k and length n over . If it attains bound dM(C)=min{2k, 2(n-k)}, then C is called an optimum distance constant rank code.

A code C is called an (n,|C|,d;K)q submodule code over if the ranks of the codewords of C are contained in a set K{0, 1, 2,, n}. In the case K={k}, i.e., C is a constant rank code, we denote its parameters by (n,|C|,d;k)q, where q is the number of elements of the residue field Fq. If all codewords do not have the same rank, then C is called a mixed rank code. Such submodule code is denoted by (n, |C|, d)q. Constant rank codes are the most well-studied submodule codes, being the analogues of classical codes over finite rings.

Remark 3   When =Fq, the submodule code C is a subspace code. In this case, the distance between two subspace is dM(u, v)=dS(u, v). This means that the parameters of submodule codes over are generalizations of the parameters of subspace codes over Fq.

In order to connect a constant rank code of rank k and length n over with a constant dimension code of dimension k and length n over Fq, we need the following lemma, which can be found in Ref. [19].

Lemma 9   (Lemma 9 in Ref. [19]) Suppose that C is a linear code of length n over with a generator matrix G in standard form (1) and let A be as in (2). Then, for 0it-1, (C:γi)¯ has a generator matrix

G i ¯ = ( A 0 A i ¯ ¯ )

In addition, dimF(C:γi)¯=k0+k1++ki.

Lemma 10   Let C and D be two linear codes over . Then, for i=0,1,,t-1, we have

( C D : γ i ) ¯ ( C : γ i ) ¯ ( D : γ i ) ¯ . (3)

( C : γ i ) ¯ + ( D : γ i ) ¯ ( C + D : γ i ) ¯ . (4)

Proof   1) We first prove that

( C D : γ i ) ¯ = ( C : γ i ) ( D : γ i ) ¯ . (5)

In fact, for any a(CD:γi), we have γiaCD. So, γiaC and γiaD, which implies that a(C:γi) and a(D:γi). Thus, a(C:γi)(D:γi), i. e.,

( C D : γ i ) ( C : γ i ) ( D : γ i ) . (6)

On the other hand, let b(C:γi)(D:γi). Then γibC and γibD. This means that γibCD,i. e., b(CD:γi). Thus,

( C D : γ i ) ( C : γ i ) ( D : γ i ) . (7)

Combining Eqs. (6) and (7), we have (CD:γi)=(C:γi)(D:γi). So, the Eq. (5) holds.

Next, let u¯(CD:γi)¯=(C:γi)(D:γi)¯, where u(C:γi)(D:γi). Then u(C:γi) and u(D:γi). Therefore, u¯(C:γi)¯ and u¯(D:γi)¯, which implies that u¯(C:γi)¯(D:γi)¯. Thus, we complete the proof of Eq. (3).

2) For any w(C:γi)¯+(D:γi)¯, there are u(C:γi)¯ and v(D:γi)¯ such that w=u+v. Thus, we can find that a(C:γi) and b(D:γi) with u=a¯ and v=b¯. This means that γiaC and γibD. Therefore, γi(a+b)C+D, i.e., a+b(C+D:γi). Hence, a+b¯(C+D:γi)¯. Since ¯ is a homomorphism from n onto Fqn, we have w=u+v=a¯+b¯=a+b¯(C+D:γi)¯. This prove that (C:γi)¯+(D:γi)¯(C+D:γi)¯, i.e., we complete the proof of Eq. (4).

Let C be submodule code of length n over . In the following, we denote by (C:γt-1)¯ the set {(u : γt-1)¯|uC}.

Combining Lemmas 9 and 10, we give the following theorem.

Theorem 1   Let C be a submodule code of length n over with type {k0,k1,,kt-1} and the minimum rank distance dM(C). Then

1 ) ( C   :   γ t - 1 ) ¯ is a constant dimension code over Fq of dimension l=k0+k1++kt-1 and length n. In addition,dS((C : γt-1)¯)dM(C).

2 ) In particular, write k=1ti=0t-1(t-i)ki. If 2kn and C is an optimum distance constant rank code, then (C :γt-1)¯ is also an optimum distance constant dimension code with the minimum distance 2l.

Proof   1) By assumptions, for any u, vC, we have rank(u)=rank(v)=1ti=0t-1(t-i)ki.

According to Lemma 9, for any (u :γt-1)¯,(v :γt-1)¯(C :γt-1)¯, we obtain dimFq(u :γt-1¯)=dimFq(v :γt-1¯)=i=0t-1ki.

Thus, (C :γt-1)¯ is a constant dimension code over Fq of dimension k0+k1++kt-1 and length n.

On the other hand, by Lemmas 9 and 10, for any u,vC, we obtain

d M ( u ,   v ) = r a n k ( u ) + r a n k ( v ) - 2 r a n k ( u v ) = d i m F q ( u   : γ t - 1 ) ¯ + d i m F q ( v   : γ t - 1 ) ¯ - 2 d i m F q ( u v   : γ t - 1 ) ¯ d i m F q ( u   : γ t - 1 ) ¯ + d i m F q ( v   : γ t - 1 ) ¯ - 2 d i m F q ( ( u   : γ t - 1 ) ¯ ( v   : γ t - 1 ) ¯ ) = d S ( ( u   : γ t - 1 ) ¯ , ( v   : γ t - 1 ) ¯ ) .

This gives that dS((C :γt-1)¯)dM(C).

2) In particular, if 2kn and C is an optimum distance constant rank code, for any u,vC, we have uv={0}.

Let (u :γt-1)¯ and (v :γt-1)¯ be any two different elements of (C :γt-1)¯. We prove that (u :γt-1)¯(v :γt-1)¯={0} by contradiction as follows.

Otherwise, there exists 0aFqn such that a(u :γt-1)¯(v :γt-1)¯. Hence, we can find that b(u :γt-1) and c(v :γt-1) satisfy a=b¯=c¯.

We assume that b=b0+b1γ++bt-1γt-1 and c=c0+c1γ++ct-1γt-1 with b0,b1,,bt-1,c0,c1,,ct-1Tn, where T is the Teichmu¨ller set of . Then, by γt-1bu and γt-1cv, we have γt-1b0u and γt-1c0v. Thus, we obtain γt-1a=γt-1b¯=γt-1b0u, and γt-1a=γt-1c¯=γt-1c0v. This gives that γt-1auv. Obviously, γt-1a0. This is a contradiction. Thus, for any (u :γt-1)¯,(u :γt-1)¯(C :γt-1)¯, we have dS((u :γt-1)¯,(u :γt-1)¯)=2(k0+k1++kt-1)=2l, which implies that (C :γt-1)¯ is an optimum distance constant dimension code with the minimum distance 2l.

A linear code C over of length n is said to be cyclic if the following holds:

( c 0 , c 1 , , c n - 1 ) C ( c n - 1 , c 0 , , c n - 2 ) C .

It is well-known that a cyclic code of length n over can be identified with an ideal in the residue ring [x]xn-1 via the -module isomorphism φ:n[x]xn-1 given by (a0,a1,,an-1)a0+a1x++an-1xn-1(mod(xn-1)).

Customarily, for a polynomial f(x)=i=0laixi of degree l (al0 and a0 is a unit) over , its monic reciprocal polynomial a0-1xlf(1x) is denoted by f*(x), i.e.,

f * ( x ) = a 0 - 1 x l f ( 1 x ) = a 0 - 1 i = 0 l a i x l - i .

A polynomial f(x) is self-reciprocal, if f(x)=f*(x).

The homomorphism from to Fq extends naturally to a homomorphism [x]Fq[x], where [x] and Fq[x] are the corresponding polynomial rings; for any f[x] we denote by f¯ its image under this homomorphism; moreover, for a set C[x] we define C¯={f¯ | fC}.

It is well known that any f[x] which is not divisible by γ can be written as f=uf1, where u[x] is a unit and f1 is monic. We will therefore restrict our attention to monic polynomials.

The following is basic result of cyclic codes over .

Theorem 2   (Theorem 4.5 in Ref. [19]) Let C=γa0ga0(x), γa1ga1(x),, γasgas(x) be a cyclic code of length n over , where gai(x)[x] are monic. Then

1) 0a0<a1<<as<t, and a0,a1,,as are unique.

2) gas(x)|gas-1(x)||ga1(x)|ga0(x)|xn-1, deg(gai(x))>deg(gai+1(x)) for i=0,,s-1, and ga0(x),ga1(x),,gas(x) are unique.

3) If i<a0, then (C:γi)¯={0}, otherwise (C:γi)¯={gaj¯(x)}, where aj is maximal with the property aji.

4) dimFq((C:γi)¯)=n-deg(gaj(x)), where aj is maximal with the property aji.

Combining Theorems 1 and 2, we obtain the following corollary.

Corollary 2   For 1ir, let Ci=g0(i)(x), γg1(i)(x),, γt-1gt-1(i)(x) be a cyclic code of length n over , where gt-1(i)(x)|gt-2(i)(x)||g1(i)(x)|g0(x)|xn-1, and deg(gj(i)(x))>deg(gj+1(i)(x)) for j=0,,t-1. Let C={Ci|i=1,,r}. If deg(gj(1)(x))=deg(gj(2)(x))=deg(gj(r)(x))=kj for j=1,2,,t-1, then C is a constant rank code over of rank k and length n, where k=1tj=0t-1(t-j)deg(gj(1)(x)).

3 Orbit Constant Rank Codes over Finite Chain Rings

From now on, we denote by GLm() the set GLm()={AMm×m()|det(A)*}. It is well known that A,BGLm() if and only if ABGLm().

Let u be a linear (submodule) code of length n over with a generator matrix G in standard form in (1). Clearly, u=imG :={aG|aK(C)}, i.e., the submodule of n generated by the rows of G.

Definition 10   Let G be a subgroup of GLm(), u be a linear code (submodule) of length n over with a generator matrix G in standard form in (1). The orbit submodule code generated by u with respect to the subgroup G, denoted by OrbG(u), is defined as OrbG(u)={im(GB)|BG}.

Theorem 3   Let G be a subgroup of GLm(), and u be a linear code (submodule) of length n over with a generator matrix G in standard form in (1). Set k=1ti=0t-1(t-i)ki. Then orbit submodule code OrbG(u) is a constant rank code over of rank k, length n. In particular, take l=i=0t-1ki, then (OrbG(u) :γt-1)¯ is a constant dimension code over Fq of dimension l, length n, and dS((OrbG(u) :γt-1)¯)dM(u). Moreover,

( O r b G ( u )   : γ t - 1 ) ¯ = { i m ( A ¯ B ¯ ) | B G } = O r b G ¯ ( u   : γ t - 1 ) ¯ ,

where A is in (2), and G¯={H¯|HG}.

Proof   For any vOrbG(u), there exists DG such that v=im(GD). Since

G = ( I k 0 A 0,1 A 0,2 A 0,3 A 0 , t - 1 A 0 , t 0 γ I k 1 γ A 1,2 γ A 1,3 γ A 1 , t - 1 γ A 1 , t 0 0 γ 2 I k 2 γ 2 A 2,3 γ 2 A 1 , t - 1 γ 2 A 2 , t 0 0 0 0 γ t - 1 I k t - 1 γ t - 1 A t - 1 , t ) = ( A 0 γ A 1 γ t - 1 A t - 1 ) ,

we have that rk(A0D)=k0, rk(A1D)=k1,,rk(At-1D)=kt-1 by Corollary 1.

On the other hand, we have

G D = ( A 0 D γ ( A 1 D ) γ t - 1 ( A t - 1 D ) ) .

Clearly, after a suitable permutation of coordinates, we obtain a generator matrix G˜ in standard form of the submodule v as follows

G ˜ = ( I k 0 A 0,1 ̃ A 0,2 ̃ A 0,3 ̃ A 0 , t - 1 ̃ A 0 , t ̃ 0 γ I k 1 γ A 1,2 ̃ γ A 1,3 ̃ γ A 1 , t - 1 ̃ γ A 1 , t ̃ 0 0 γ 2 I k 2 γ 2 A 2,3 ̃ γ 2 A 1 , t - 1 ̃ γ 2 A 2 , t ̃ 0 0 0 0 γ t - 1 I k t - 1 γ t - 1 A t - 1 , t ̃ ) .

Thus, rank(v)=k=rank(u). This means that orbit submodule code OrbG(u) is a constant rank code over of rank k, length n.

The second statement follows directly from Theorem 1.

By Lemma 9, A¯ is a generator matrix of the linear code (u :γt-1)¯ over Fq.

For any vOrbG(u), by Definition 10, there is a PG such that v=im(GP). Then A¯P¯ is a generator matrix of the linear code (v :γt-1)¯ over Fq. This means that

( O r b G ( u )   : γ t - 1 ) ¯ = { i m ( A ¯ B ¯ ) | B G } = O r b G ¯ ( ( u   : γ t - 1 ) ¯ ) .

In the following, we give two examples to demonstrate Theorem 3. We use the Magma Computer Algebra System[33] in our computations.

Example 1 Consider =Z4. Let u be a linear (submodule) code of length 11 over Z4 with a generator matrix Gu in standard form as follows:

G u = ( 1 0 0 0 1 0 1 2 0 0 1 0 1 0 0 0 1 0 2 1 2 1 0 0 2 0 2 0 0 2 2 0 2 0 0 0 2 2 2 0 2 2 0 2 ) .

Set G=M.i.e., G is a cyclic subgroup generated by M of GL11(Z4), where

M = ( 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 3 0 0 3 0 0 3 3 0 3 3 ) .

Clearly, |G|=ο(M)=178 over GL11(Z4).

It is easy to see that G¯=M¯ over GL11(F2), where

M ¯ = ( 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 1 1 0 1 1 ) .

Thus, |G¯|=ο(M¯)=89 over GL11(F2), and 89 is a prime.

Take

A ¯ = ( 1 0 0 0 1 0 1 0 0 0 1 0 1 0 0 0 1 0 0 1 0 1 0 0 1 0 1 0 0 1 1 0 1 0 0 0 1 1 1 0 1 1 0 1 ) .

By Lemma 8, A¯ is a generator matrix of the linear code (u :2)¯. By Theorem 3, we know

O r b G ¯ ( ( u   : 2 ) ¯ ) = { i m ( A ¯ M ¯ j ) | j = 0,1 , , 88 } ,

is a constant dimension code over F2 of dimension 4, length 11. One can check that dS((u :2)¯)=6. This means that (u :2)¯ is a constant dimension code over F2 with parameters (11,89,6;4)2. Thus, by Theorem 3, OrbG(u) is an optimum distance constant dimension code over Z4 with parameters (11,178,6;3)2.

Remark 4   In Refs. [4, 6, 10-12, 34-35], the authors have proved the existence of constant dimension codes with size qN-1q-1, or rqN-1q-1, or (qm-1)qN-1q-1+qN-1qk-1 and minimal distance 2k-2 for any given k. Since 892N-1, r(2N-1), (2m-1)(2N-1)+2N-124-1 for any positive integers N and m, the constant dimension code over F2 with parameters (11,89,6;4)2 from Example 1 is new.

Example 2 Consider =Z9. Let u be a linear (submodule) code of length 7 over Z9 with a generator matrix Gu in standard form as follows:

G u = ( 1 0 0 0 1 0 8 0 1 0 0 4 1 5 0 0 3 0 3 0 6 ) .

Set G=M. i.e., G is a cyclic subgroup generated by M of GL7(Z9), where

M = ( 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 4 4 4 0 0 0 0 ) .

Clearly, |G|=ο(M)=3 279 over GL7(Z9).

It is easy to check that G¯=M¯ over GL7(F3), where

M ¯ = ( 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 1 1 1 0 0 0 0 ) .

Thus, |G¯|=ο(M¯)=1 093 over GL7(F3), and 1 093 is a prime.

Take

A ¯ = ( 1 0 0 0 1 0 2 0 1 0 0 0 1 2 0 0 1 0 0 1 0 ) .

By Lemma 8, A¯ is a generator matrix of the linear code (u :3)¯. Again by Theorem 3, we know OrbG¯((u :2)¯)={im(A¯M¯j)| j=0,1,,1 092} is a constant dimension code over F3 of dimension 3, length 6. One can check that dS((u :3)¯)=4. This means that (u :3)¯ is a constant dimension code over F2 with parameters (7,1 093,4;3)3. Thus, by Theorem 3, OrbG(u) is a constant rank code over 9 with parameters (7,3 279,4;52)3.

Remark 5   Glusing-Luerssen et al[4] gave an open problem: Cyclic orbit codes with maximum distance, that is, 2k, are spread codes (A subspace code C is called a spread of Fqn if VCV=Fqn and VW={0} for all distinct V,WC ). Thus, the best distance a non-spread cyclic orbit code of dimension k can attain is 2(k-1), but the construction of such codes is unknown. Examples 1 and 2 obtain two special such codes.

Remark 6   When the length and rank of a constant rank code C over and a constant dimension code (C :γt-1)¯ over Fq are same, we can see that |C|=h|(C :γt-1)¯| for some integer h>1 by Examples 1 and 2.

4 Gray Images of Constant Rank Code over Fq+γFq

The ring 1=Fq+γFq consists of all q-ary polynomials of degree 0 and 1 in an indeterminate γ, and it is closed under q-ary polynomial addition and multiplication modulo γ2. Thus 1=Fq|γ|γ2={a+γb|a,bFq} is a local ring with maximal ideal γFq. Therefore, it is a chain ring.

We first give the definition of the Gray map on 1n. The Gray map Φ1: 1Fq2 is given by Φ1(a+γb)=(b, a+b). This map can be extended to 1n in a natural way: Φ: 1nFq2n, (a1+b1γ, , an+bnγ)(b1, a1+b1,, bn, an+bn). The following corollary and lemma are from Refs. [13, 16].

Corollary 3 (  Corollary 5.10 in Ref. [16]) If C is a linear code over 1 of length n and size qk, then Φ(C) is a linear code over Fq with parameters [2n, k].

Lemma 11 (  Theorem 3.4 in Ref. [13]) Let C=f(x)h(x), γf(x) be a cyclic code of length n over 1, where xn-1=f(x)g(x)h(x) and f(x), g(x), h(x) are pairwise coprime. Then |C|=q2(n-deg(f(x))).

Lemma 12   Let Ci=fi(x)hi(x), γfi(x) be a cyclic code of length n over 1 , where xn-1=fi(x)gi(x)hi(x) and fi(x), gi(x), hi(x) are pairwise coprime for i=1,2. Then C1C2=lcm(f1(x)h1(x), f2(x)h2(x)), γlcm(f1(x), f2(x)). Moreover, |C1C2|=q2(n-deg(lcm(f1(x),f2(x)))).

Proof   Since C1C2 is a cyclic code of n over , there exist u(x), v(x) and w(x) in [x] such that C1C2=u(x)v(x), γu(x), where xn-1=u(x)v(x)w(x) and u(x), v(x), w(x) are pairwise coprime.

By u(x)v(x)C1C2C1, there exist a1(x) and b1(x) in [x] such that u(x)v(x)=a1(x)f1(x)h1(x)+γb1(x)f1(x). Multiplying by γ, we obtain γu(x)v(x)=γa1(x)f1(x)h1(x), which implies f1(x)h1(x)|u(x)v(x).

Again by γu(x)C1C2C1, there exist a2(x) and b2(x) in [x] such that γu(x)=a2(x)f1(x)h1(x)+γb2(x)f1(x). Multiplying by g1(x),we obtain γu(x)g1(x)=γb2(x)f1(x)g1(x), which implies f1(x)|u(x).

Similarly, C1C2C2, which implies f2(x)h2(x)|u(x)v(x) and f2(x)|u(x).

Consequently, lcm(f1(x)h1(x),f2(x)h2(x))|u(x)v(x) and lcm(f1(x),f2(x))|u(x). This means that

C 1 C 2 l c m ( f 1 ( x ) h 1 ( x ) , f 2 ( x ) h 2 ( x ) , γ l c m ( f 1 ( x ) , g 2 ( x ) ) .

On the other hand, clearly, we have lcm(f1(x)h2(x), f2(x)h2(x)), γlcm(f1(x), f2(x))C1C2.

To summarize, we have C1C2=lcm(f1(x)h1(x), f2(x)h2(x), γlcm(f1(x), f2(x)).

Set f(x)=lcm(f1(x),f2(x)), h(x)=xn-1lcm(f1(x),f2(x))gcd(g1(x),f2(x)), and g(x)=gcd(g1(x), f2(x)).

Then, xn-1=f(x)g(x)h(x) and the polynomials f(x), g(x) and h(x) are pairwise coprime.

It is easy to check that C1C2=f(x)h(x), γf(x). Therefore, |C1C2|=q2(n-deg(lcm(f1(x),f2(x)))).

Now combining Corollary 3 with Lemmas 11 and 12, we obtain the following proposition.

Proposition 1   Let Ci=fi(x)hi(x),γfi(x) be a cyclic code of length n over 1 , where xn-1=fi(x)gi(x)hi(x), fi(x), gi(x), hi(x) are pairwise coprime for i=1,2,,s. Let C ={Ci|i = 1,, s}. If deg(f1(x))=deg(f2(x))==deg(fs(x)) and deg(lcm(f1(x), f2(x)))=deg(lcm(fi(x), fj(x))) for all ij, then C is a constant rank code over 1 with parameters (n, s, d; k)q, where k=n-deg(f1(x)) and d=2(deg(lcm(f1(x),f2(x))) -deg(f1(x))).

Corollary 4   Let xn-1=l1(x)l2(x)lr(x), where l1(x),l2(x),,lr(x) are pairwise coprime. We assume that deg(lj1(x))==deg(ljs(x)) for {j1,,js}  {1,2,,r}. Let Ci=lji(x)hi(x), γlji(x) be a cyclic code of length n over 1 where xn-1=lji(x)gi(x)hi(x). Let C ={Φ(Ci)|i=1,,s}. Then C is an optimum constant dimension code Fq with parameters (2n, s, d; k)q, where d=4deg(lj1(x)), and k=2(n-deg(lj1(x))).

Proof   It is easy to check that Φ(CiCj)=Φ(Ci)Φ(Cj) for i, j=1, 2, , s.

By Corollary 3 and Lemma 12, for i, j=1, 2, , s, Φ(Ci) is a linear code over Fq with parameters [2n, k], and Φ(Ci)Φ(Cj) is a linear code over Fq with parameters [2n, k-2deg(lj1(x))]. Thus, ds(Φ(Ci))=2k-2(k-2deg(lj1(x)))=

4 d e g ( l j 1 ( x ) ) . So, C is an optimum constant dimension code Fq with parameters (2n, s, d; k)q.

Example 3 Consider cyclic codes of length 71 over F52+γF52. In F52+γF52,

x 71 - 1 = M 0 ( x ) M 1 ( x ) M 2 ( x ) M 14 ( x )

where

M 0 ( x ) = x + 4 ,   M 1 ( x ) = x 5 + x 2 + 2 x + 4 ,    M 2 ( x ) = x 5 + 4 x 3 + 3 x + 4 ,   M 3 ( x ) = x 5 + 4 x 3 + 4 x 2 + x + 4 ,   M 4 ( x ) = x 5 + 3 x 3 + x 2 + 4 x + 4 ,   M 5 ( x ) = x 5 + x 4 + x 3 + 3 x 2 + 2 x + 4 ,   M 6 ( x ) = x 5 + x 4 + 2 x 3 + 3 x 2 + 3 x + 4 ,   M 7 ( x ) = x 5 + x 4 + 4 x 3 + 2 x 2 + 4 ,   M 8 ( x ) = x 5 + x 4 + 3 x 3 + 2 x 2 + 2 x + 4 ,   M 9 ( x ) = x 5 + 2 x 4 + x 2 + 4 ,   M 10 ( x ) = x 5 + 2 x 4 + 2 x 3 + 3 x 2 + 4 x + 4 ,   M 11 ( x ) = x 5 + 4 x 4 + x 3 + x 2 + 4 ,   M 12 ( x ) = x 5 + 3 x 4 + 2 x 3 + 4 x 2 + 4 x + 4 ,   M 13 ( x ) = x 5 + 3 x 4 + 4 x 3 + 4 ,   M 14 ( x ) = x 5 + 3 x 4 + 3 x 3 + 2 x 2 + 4 x + 4 .

Let Ci=M0(x)Mi(x), γMi(x) for i=1,2,,14. Using Corollary 4, we find that the subspace code C ={Φ(Ci)|i=1, 2,,14} is an optimum distance constant dimension code over F52 with parameters (142, 14, 20; 132)52.

Example 4 Consider cyclic codes of lengths 84 and 93 over F4+γF4, respectively. First,

x 85 - 1 = M 0 ( x ) M 1 ( x ) M 2 ( x ) M 21 ( x ) ,  

where

M 0 ( x ) = x + 1 ,   M 1 ( x ) = ( x 2 + w x + 1 ) ( x 2 + w 2 x + 1 ) ,   M 2 ( x ) = x 4 + x 2 + w x + 1 ,   M 3 ( x ) = x 4 + w 2 x 3 + x 2 + w 2 x + 1 ,   M 4 ( x ) = x 4 + w x 2 + w 2 x + 1 ,   M 5 ( x ) = x 4 + w 2 x 2 + w x + 1 ,   M 6 ( x ) = x 4 + x 3 + w x + 1 ,   M 7 ( x ) = x 4 + x 3 + w 2 x + 1 ,   M 8 ( x ) = x 4 + x 3 + w x 2 + x + 1 ,   M 9 ( x ) = x 4 + x 3 + w 2 x 2 + x + 1 ,   M 10 ( x ) = x 4 + w 2 x 3 + w x 2 + 1 ,   M 11 ( x ) = x 4 + x 2 + w 2 x + 1 ,   M 12 ( x ) = x 4 + w x 3 + w 2 x 2 + 1 ,   M 13 ( x ) = x 4 + w 2 x 3 + x + 1 ,   M 14 ( x ) = x 4 + w x 3 + x + 1 ,   M 15 ( x ) = x 4 + w 2 x 3 + x 2 + 1 ,   M 16 ( x ) = x 4 + w x 3 + x 2 + 1 ,   M 17 ( x ) = x 4 + w x 3 + x 2 + w x + 1 ,   M 18 ( x ) = x 4 + w 2 x 3 + w x 2 + w x + 1 ,   M 19 ( x ) = x 4 + w x 3 + w 2 x 2 + w 2 x + 1 ,   M 20 ( x ) = x 4 + w x 3 + w x 2 + w 2 x + 1 ,   M 21 ( x ) = x 4 + w 2 x 3 + w 2 x 2 + w x + 1 .

Let Ci=M0(x)Mi(x), γMi(x) for i=1, 2,,21. Using Corollary 4, we find that the subspace code C={Φ(Ci)|i=1, 2,,21} is an optimum distance constant dimension code over F4 with parameters (170, 21, 16; 162)4.

Second, taking n=93, we have

x 93 - 1 = N 0 ( x ) N 1 ( x ) N 2 ( x ) N 20 ( x ) ,

where

N 0 ( x ) = x + 1 ,   N 1 ( x ) = x + w ,   N 2 ( x ) = x + w 2 ,   N 3 ( x ) = x 5 + x 2 + 1 ,   N 4 ( x ) = x 5 + x 2 + w ,   N 5 ( x ) = x 5 + x 2 + w 2 ,   N 6 ( x ) = x 5 + x 3 + 1 ,   N 7 ( x ) = x 5 + x 3 + x 2 + x + 1 ,   N 8 ( x ) = x 5 + w x 3 + w ,   N 9 ( x ) = x 5 + w 2 x 3 + w 2 ,   N 10 ( x ) = x 5 + x 4 + x 2 + x + 1 ,   N 11 ( x ) = x 5 + w x 3 + x 2 + w 2 x + w ,   N 12 ( x ) = x 5 + w 2 x 3 + x 2 + w x + w 2 ,   N 13 ( x ) = x 5 + w x 4 + x 2 + w x + w 2 ,   N 14 ( x ) = x 5 + w x 4 + w 2 x 3 + w x + w 2 ,   N 15 ( x ) = x 5 + w x 4 + w 2 x 3 + x 2 + w 2 ,   N 16 ( x ) = x 5 + w 2 x 4 + x 2 + w 2 x + w , N 17 ( x ) = x 5 + w 2 x 4 + w x 3 + w 2 x + w ,   N 18 ( x ) = x 5 + w 2 x 4 + w x 3 + x 2 + w ,   N 19 ( x ) = x 5 + x 4 + x 3 + x + 1 ,   N 20 ( x ) = x 5 + x 4 + x 3 + x 2 + 1 .

Let Ci=M0(x)Mi(x), γMi(x) for i=3,4,,20. Using Corollary 4, we find that the subspace code C ={Φ(Ci)|i=3,,20} is an optimum distance constant dimension code over F4 with parameters (186, 17, 20; 176)4.

Remark 7   In Refs. [4, 6, 10-12, 34-35], the authors proved the existence of constant dimension codes with size qN-1q-1, or rqN-1q-1,or (qm-1)qN-1q-1+qN-1qk-1 and minimal distance 2k-2 for any given k. Since 21, 174N-1, r4N-13,(4m-1)4N-13+4N-14k-1 for any positive integers r, k, N and m, the constant dimension codes over F4 with parameters (170,21,16;162)4 and (186,17,20;176)4 from Example 4 are new.

Remark 8   The constant dimension codes from Examples 3 and 4 are optimum distance constant dimension codes.

5 Conclusion

In this paper, we studied submodule codes over finite chain rings, and gave two criteria for a submodule code C over finite chain rings to be a constant rank code. Further, we constructed optimum distance constant dimension codes over Fq by using submodule codes in finite chain rings. We believe that submodule codes over finite chain rings will be a good source for constructing new constant dimension codes over Fq. In future work, in order to construct new constant dimension codes, we will use the computer algebra system MAGMA to search for more good submodule codes over finite chain rings.

References

  1. Ahlswede R, Cai N, Li S R, et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216. [Google Scholar]
  2. Koetter R, Kschischang F R. Coding for errors and erasures in random network coding[J]. IEEE Transactions on Information Theory, 2008, 54(8): 3579-3591. [Google Scholar]
  3. Gluesing-Luerssen H, Lehmann H. Distance distributions of cyclic orbit codes[J]. Designs, Codes and Cryptography, 2021, 89(3): 447-470. [Google Scholar]
  4. Gluesing-Luerssen H, Morrison K, Troha C. Cyclic orbit codes and stabilizer subfields[J]. Advances in Mathematics of Communications, 2015, 9(2): 177-197. [Google Scholar]
  5. Gluesing-Luerssen H, Troha C. Construction of subspace codes through linkage[J]. Advances in Mathematics of Communications, 2016, 10(3): 525-540. [Google Scholar]
  6. Chen B C, Liu H W. Constructions of cyclic constant dimension codes[J]. Designs, Codes and Cryptography, 2018, 86(6): 1267-1279. [Google Scholar]
  7. Heinlein D, Kurz S. Coset construction for subspace codes[J]. IEEE Transactions on Information Theory, 2017, 63(12): 7651-7660. [Google Scholar]
  8. Honold T, Kiermaier M, Kurz S. Optimal binary subspace codes of length 6, constant dimension 3 and minimum distance 4[EB/OL]. [2024-09-10]. https://arxiv.org/abs/1311.0464v2. [Google Scholar]
  9. Trautmann A L, Manganiello F, Braun M, et al. Cyclic orbit codes[J]. IEEE Transactions on Information Theory, 2013, 59(11): 7386-7404. [Google Scholar]
  10. Ben-Sasson E, Etzion T, Gabizon A, et al. Subspace polynomials and cyclic subspace codes[J]. IEEE Transactions on Information Theory, 2016, 62(3): 1157-1165. [Google Scholar]
  11. Roth R M, Raviv N, Tamo I. Construction of Sidon spaces with applications to coding[J]. IEEE Transactions on Information Theory, 2018, 64(6): 4412-4422. [Google Scholar]
  12. Zhang H, Cao X W. Further constructions of cyclic subspace codes[J]. Cryptography and Communications, 2021, 13(2): 245-262. [Google Scholar]
  13. Dinh H Q, Lopez-Permouth S R. Cyclic and negacyclic codes over finite chain rings[J]. IEEE Transactions on Information Theory, 2004, 50(8): 1728-1744. [Google Scholar]
  14. Liu X S, Liu H L. LCD codes over finite chain rings[J]. Finite Fields and Their Applications, 2015, 34: 1-19. [Google Scholar]
  15. Hu P, Liu X S. Constacyclic codes of length ps over finite rings FPm+uFPm+vFPm+uvFPm[J]. Wuhan University Journal of Natural Sciences, 2020, 25(4): 311-322. [Google Scholar]
  16. Liu X S, Liu H L. σ-LCD codes over finite chain rings[J]. Designs, Codes and Cryptography, 2020, 88(4): 727-746. [Google Scholar]
  17. Liu X S, Liu H L. Quantum codes from linear codes over finite chain rings[J]. Quantum Information Processing, 2017, 16(10): 240. [Google Scholar]
  18. Liu Z H, Wang J L. Linear complementary dual codes over rings[J]. Designs, Codes and Cryptography, 2019, 87(12): 3077-3086. [Google Scholar]
  19. Norton G H, Sălăgean A. On the structure of linear and cyclic codes over a finite chain ring[J]. Applicable Algebra in Engineering, Communication and Computing, 2000, 10(6): 489-506. [Google Scholar]
  20. Abualrub T, Aydin N, Aydogdu I. Optimal binary codes derived from F2F4-additivecyclic codes[J]. Journal of Applied Mathematics and Computing, 2020, 64(1): 71-87. [Google Scholar]
  21. Bonnecaze A, Udaya P. Cyclic codes and self-dual codes over F2+uF2[J]. IEEE Transactions on Information Theory, 1999, 45(4): 1250-1255. [Google Scholar]
  22. Norton G H, Salagean A. On the Hamming distance of linear codes over a finite chain ring[J]. IEEE Transactions on Information Theory, 2000, 46(3): 1060-1067. [Google Scholar]
  23. Dinh H Q, Bag T, Upadhyay A K, et al. Quantum codes from a class of constacyclic codes over finite commutative rings[J]. Journal of Algebra and Its Applications, 2020, 19(12): 2150003. [Google Scholar]
  24. Kal X S, Zhu S X. Quaternary construction of quantum codes from cyclic codes over F4+uF4[J]. International Journal of Quantum Information, 2011, 9(2): 689-700. [Google Scholar]
  25. Liu H L, Liu X S. New EAQEC codes from cyclic codes over Fq+uFq[J]. Quantum Information Processing, 2020, 19(3): 85. [Google Scholar]
  26. Ma F, Gao J, Fu F W. Constacyclic codes over the ring FP+vFq and their applications of constructing new non-binary quantum codes[J]. Quantum Information Processing, 2018, 5(2):130-141. [Google Scholar]
  27. Tang Y S, Zhu S X, Kai X S, et al. New quantum codes from dual-containing cyclic codes over finite rings[J]. Quantum Information Processing, 2016, 15(11): 4489-4500. [Google Scholar]
  28. Dougherty S T, Liu H W. Independence of vectors in codes over rings[J]. Designs, Codes and Cryptography, 2009, 51(1): 55-68. [Google Scholar]
  29. MacWilliams F J, Sloane N J A. The Theory of Error-correcting Codes[M]. Amsterdam: Elsevier, 1977. [Google Scholar]
  30. Wood J A. Duality for modules over finite rings and applications to coding theory[J]. American Journal of Mathematics, 1999, 121(3): 555-575. [Google Scholar]
  31. Liu Z H. Galois LCD codes over rings[J]. Advances in Mathematics of Communications, 2024, 18(1): 91-104. [Google Scholar]
  32. Fan Y, Ling S, Liu H W. Matrix product codes over finite commutative Frobenius rings[J]. Designs, Codes and Cryptography, 2014, 71(2): 201-227. [Google Scholar]
  33. Bosma W, Cannon J, Playoust C. The magma algebra system I: The user language[J]. Journal of Symbolic Computation, 1997, 24(3/4): 235-265. [Google Scholar]
  34. Otal K, Özbudak F. Cyclic subspace codes via subspace polynomials[J]. Designs, Codes and Cryptography, 2017, 85(2): 191-204. [Google Scholar]
  35. Zhao W, Tang X L. A characterization of cyclic subspace codes via subspace polynomials[J]. Finite Fields and Their Applications, 2019, 57: 1-12. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.