Abstract
Bent functions are optimal combinatorial objects having a lot of applications, in particular, in cryptography. Since their introduction, substantial efforts have been directed toward their study in the last three decades. In this paper, we investigate two families of functions possessing properties related to bentness: the so-called negabent and bent–negabent functions, and derive several results on their constructions and characterizations.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
1 Introduction
Bent functions are Boolean functions with the highest possible nonlinearity in an even number of variables. They were introduced by Rothaus [19] and already studied first by Dillon [9] and next by many researchers for more than three decades ago. Since 1974, bent functions have been extensively developed for their own sake as interesting combinatorial objects but also due to their significantly important role in cryptography (design of stream ciphers, see, e.g., [3]), coding theory (Reed–Muller codes, Kerdock codes (see, e.g., [7]), two-weight codes [1], codes with a few weights [12], association schemes [17]), sequences (see, e.g., [13]), and graph theory (see, e.g., [16]). The classification of bent functions is still elusive, and therefore not only their characterization, but also their generation is a challenging problem.
A number of recent research works in the theory of bent functions have been devoted to the construction of bent functions. One distinguishes two kinds of constructions of bent functions: primary constructions, which do not need to use previously constructed functions for designing new ones and secondary constructions (of new functions from two or several already known ones). A book devoted to bent functions is [11] and a jubilee survey on bent functions is [4].
The Walsh–Hadamard transform has been exploited extensively for the analysis of Boolean functions and used in coding theory and cryptology [3]. A Boolean function on an even number of variables is bent if and only if the magnitude of all the values in its Walsh–Hadamard spectrum is the same (flat Walsh–Hadamard spectrum). The Walsh–Hadamard transform is an example of a unitary transformation on the space of all Boolean functions. Riera and Parker [18] extended the concept of a bent function to some generalized bent criteria for a Boolean function, where they required that a Boolean function has flat spectrum with respect to one or more transforms from a specified set of unitary transforms. The set of transforms they chose is not arbitrary but is motivated by a choice of local unitary transforms that are central to the structural analysis of pure n-qubit stabilizer quantum states. The transforms they applied are n-fold tensor products of the identity \(I=\left( \begin{array}{cc} 1 &{} 0 \\ 0 &{} 1 \\ \end{array} \right) \), the Walsh–Hadamard matrix \(H=\frac{1}{\sqrt{2}}\left( \begin{array}{cc} 1 &{} 1 \\ 1 &{} -1 \\ \end{array} \right) \), and the nega-Hadamard matrix \(N=\frac{1}{\sqrt{2}}\left( \begin{array}{cc} 1 &{} i \\ 1 &{} -i \\ \end{array} \right) \), where \(i^2=-1\). The Walsh–Hadamard transform can be described as the tensor product of several \(H'\mathrm {s}\), and the nega-Hadamard transform is constructed from the tensor product of several \(N'\mathrm {s}\). The nega-Hadamard transform of Boolean functions was first proposed by Parker [14]. As in the case of the Walsh–Hadamard transform, a Boolean function is called negabent if the spectrum under the nega-Hadamard transform is flat. There are some papers about negabent functions in the last few years [10, 20,21,22,23,24, 26,27,28]. Many bent functions are known, and also some negabent functions are known. For an even number of variables, a function is bent–negabent if it is both bent and negabent. An interesting topic is to investigate the intersection of these two sets, i.e., to construct Boolean functions which are both bent and negabent. The bent–negabent functions were first introduced by Riera and Parker [18]. Some quite interesting results have been found in this topic by the authors mentioned above but there is still a gap between our interest and the results on the literature. The goal of this paper is to push further the study of negabent and bent–negabent by deriving results which help to design more such functions.
The paper is organized as follows. Section 2 aims to bring a background on the notions related to Boolean function needed in the paper. In Sect. 3, we discuss secondary constructions of bent–negabent functions and exhibit one construction based on the well-known indirect construction of bent functions. In Sect. 4, a secondary construction of bent function is revisited and a new method to design secondary construction is exhibited. Section 5 shows how one can design bent–negabent functions from quadratic Boolean functions. In Sect. 6, we provide a characterization of bent–negabent functions in terms of their second-order derivatives. In Sect. 7, we study the sum-of-squares indicator and derive tight lower and upper bounds. Negabent are those whose lower bound on the sum-of-squares indicator is reached.
2 Preliminaries
Let \(\mathbb {F}_2\) denote the finite field with two elements. We denote by \(\mathcal {B}_n\) the set of all Boolean functions of n-variable, i.e., of all the functions from \(\mathbb {F}_2^n\) into \(\mathbb {F}_2\). The set of integers, real numbers, and complex numbers are denoted by \(\mathbb {Z}\), \(\mathbb {R}\), and \(\mathbb {C}\), respectively. The addition over \(\mathbb {Z}\), \(\mathbb R\), and \(\mathbb {C}\) is denoted by \(+\). The addition over \(\mathbb {F}_2^n\) for all \(n\ge 1\) is denoted by \(\oplus \) (or \(+\) if there is no ambiguity). If \(z=a+bi\in \mathbb {C}\), then \(|z|=\sqrt{a^2+b^2}\) denotes the absolute value of z, and \(\overline{z}=a-bi\) denotes the complex conjugate of z, where \(i^2=-1, a,b\in \mathbb {R}\).
The Hamming weight wt(x) of an element \(x=(x_1,x_2,\ldots ,x_n)\in \mathbb {F}_2^n\) is the number of ones in x, i.e., \(wt(x)=\sum _{i=1}^nx_i\). We say that a Boolean function is balanced if its truth table contains an equal number of 0’s and 1’s, that is, if its Hamming weight equals \(wt(f)=2^{n-1}\). The Hamming distance between two functions f(x) and g(x), denoted by d(f, g), is the Hamming weight of \(f\oplus g\), i.e., \(d(f,g)=wt(f\oplus g)\).
Any Boolean function, \(f\in \mathcal {B}_n\), is generally represented by its algebraic normal form (ANF)
where \(\lambda _u\in \mathbb {F}_2\) and \(u=(u_1,u_2,\ldots ,u_n)\in \mathbb {F}_2^n\). The algebraic degree of f, denoted by deg(f), is the maximal value of wt(u) such that \(\lambda _u\ne 0\). A Boolean function is affine if there exists no term of degree strictly greater than 1 in the ANF and the set of all affine functions is denoted by \(A_n\). An affine function with constant term equal to zero is called a linear function. Any linear function on \(\mathbb {F}_2^n\) is denoted by \(x\cdot \omega =x_1\omega _1\oplus x_2\omega _2\oplus \cdots \oplus x_n\omega _n\), where \(x,\omega \in \mathbb {F}_2^n\). The nonlinearity of an n-variable function f(x) is \(nl(f)=min_{g\in A_n}(d(f,g))\), i.e., the distance from the set of all n-variable affine functions.
The derivative of \(f\in \mathcal {B}_n\) at \(\beta \in \mathbb {F}_2^n\), denoted as \(D_{\beta }f\), is defined as \(D_{\beta }f(x) = f(x) + f(x+\beta )\) for all \(x\in \mathbb {F}_2^n.\) The second-order derivatives \(D_{\alpha }D_{\beta }f \) at \((\alpha ,\beta )\in \mathbb F_2^n\times \mathbb F_2^n\) of a Boolean function f are defined by \(D_{\alpha }D_{\beta }f(x)=f(x+\alpha +\beta )-f(x+\alpha )-f(x+\beta )+f(x).\)
The Walsh–Hadamard transform of \(f\in \mathcal {B}_n\) at \(u\in \mathbb {F}_2^n\) is defined by
The nega-Hadamard transform of \(f\in \mathcal {B}_n\) at \(u\in \mathbb {F}_2^n\) is the complex-valued function:
Let n be an even positive integer, a function \(f\in \mathcal {B}_n\) is a bent function if \(|W_f(u)|=2^{n/2}\) for all \(u\in \mathbb {F}_2^n\). Similarly, f is called negabent function if \(|N_f(u)|=2^{n/2}\) for all \(u\in \mathbb {F}_2^n\). If f is both bent and negabent, we say that f is bent–negabent.
The concept of a dual bent function is well known. If \(f\in \mathcal {B}_n\) is bent, then the dual function \(\widetilde{f}\) of f, defined on \(\mathbb {F}_2^n\) by \(W_f(x)=2^{n/2}(-1)^{\widetilde{f}(x)}\), is also bent and its own dual is f itself. If f is bent–negabent, then the dual has the same property. We refer to Carlet [3], and Cusick and St\(\breve{a}\)nic\(\breve{a}\) [6] for more on cryptographic Boolean functions and to [11] for more about bent functions.
The nega-cross-correlation of f and g at \(u\in \mathbb {F}_2^n\) is denoted by
In case \(f= g\), then the nega-cross-correlation is called the nega-autocorrelation of f at u and denoted by \(C_f(u)\). A Boolean function \(f\in \mathcal {B}_n\) is negabent if and only if \(C_f(u)=0\) for all \(u\ne \mathbf{0} \). If f(x) is an affine function, then for all \(u\ne \mathbf{0} \) the nega-autocorrelation \(C_f(u)=0\). This implies that any affine function is negabent.
Definition 1
([28]) Let \(f,g\in \mathcal {B}_n\), the sum-of-squares indicator of the nega-cross-correlation between f and g is defined by
If \(f=g\) then \(\sigma _{f,f}\) is called the sum-of-squares indicator of the nega-autocorrelation of f and denoted by \(\sigma _f\), i.e.,
Note that \(C_f(\mathbf{0} )=2^n\). Thus, \(\sigma _f\ge C_f^2(\mathbf{0} )=2^{2n}\). A Boolean function \(f\in \mathcal {B}_n\) is negabent if and only if \(C_f(u)=0\) for all \(u\in \mathbb {F}_2^n\setminus \{0\}\). Hence, \(\sigma _f\ge 2^{2n}\), where the equality holds if and only if f is negabent function.
3 Secondary Constructions of Bent–Negabent Functions
A secondary construction of bent functions is due to Carlet [2] and is commonly referred to as the indirect sum construction.
Theorem 1
([2]) Let \(f_1(x)\) and \(f_2(x)\) be two r-variable bent functions (r even) and let \(g_1(y)\) and \(g_2(y)\) be two s-variable bent functions (s even). Let \((x, y)\in \mathbb {F}_2^r\times \mathbb {F}_2^s\). Then the function \(h(x, y) = f_1(x)\oplus g_1(y)\oplus (f_1\oplus f_2)(x)(g_1 \oplus g_2)(y)\) is bent and its dual \(\widetilde{h(x, y)}\) is obtained from \(\widetilde{f_1(x)}, \widetilde{f_2(x)}, \widetilde{g_1(y)}\) and \(\widetilde{g_2(y)}\) by the same formula as h(x, y) is obtained from \(f_1(x), f_2(x), g_1(y)\) and \(g_2(y)\).
In this section, we use h(x, y) to construct bent–negabent function. Here we first analyze the nega-Hadamard transform of the function h(x, y).
Lemma 1
Let \(f_1(x), f_2(x)\in \mathcal {B}_r, g_1(y), g_2(y)\in \mathcal {B}_s\). Define \(h(x, y) = f_1(x)\oplus g_1(y)\oplus (f_1\oplus f_2)(x)(g_1 \oplus g_2)(y)\). Then the nega-Hadamard transform of h(x, y) at \((u, v) \in \mathbb {F}_2^{r+s}\) is given by
Proof
By definition, we have
This completes the proof. \(\square \)
In (1), if \(f_1(x)=f_2(x)\) or \(g_1(y)=g_2(y)\), then \(N_h(u, v)=N_{f_1}(u)N_{g_1}(v)\).
Corollary 1
Let r and s be two even positive integers. Let \(f_1(x)\in \mathcal {B}_r\) and \(g_1(y)\in \mathcal {B}_s\) be two bent–negabent functions. Then \(h(x, y)=f_1(x)\oplus g_1(y)\) is also a bent–negabent function.
In the following, we propose a necessary and sufficient condition so that the indirect sum construction generates bent–negabent functions in \(r+s\) variables, using r and s variable bent–negabent functions as the input functions.
Theorem 2
Let \(f_1(x), f_2(x)\) be two r-variable bent–negabent functions (r even) and let \(g_1(y), g_2(y)\) be two s-variable bent–negabent functions (s even). Let \((x, y)\in \mathbb {F}_2^r\times \mathbb {F}_2^s\). Define
Then h(x, y) is bent–negabent if and only if \(\frac{N_{f_1}(u)}{N_{f_2}(u)}=\pm 1\) or \(\frac{N_{g_1}(v)}{N_{g_2}(v)}=\pm 1\), for all \((u, v)\in \mathbb {F}_2^r\times \mathbb {F}_2^s\).
Proof
From Theorem 1, we know that h(x, y) is bent. Thus, we need to prove that \(\frac{N_{f_1}(u)}{N_{f_2}(u)}=\pm 1\) or \(\frac{N_{g_1}(v)}{N_{g_2}(v)}=\pm 1\) if and only if h(x, y) is negabent, that is, \(|N_h(u, v)|=2^{(r+s)/2}\) for all \((u, v)\in \mathbb {F}_2^r\times \mathbb {F}_2^s\).
For simplicity, set \(z=N_h(u, v), z_1=N_{f_1}(u), z_2=N_{f_2}(u), z_3=N_{g_1}(v)\), and \(z_4=N_{g_2}(v)\). By Lemma 1, for all \((u, v)\in \mathbb {F}_2^r\times \mathbb {F}_2^s\), we have
and
Combining (2) and (3), we have
Suppose h(x, y) is negabent \(|N_h(u, v)|=2^{(r+s)/2}\) for all \((u, v)\in \mathbb {F}_2^r\times \mathbb {F}_2^s\) and \(|z_1|=|z_2|=2^{r/2}, |z_3|=|z_4|=2^{s/2}\), we obtain
that is, \(z_1\overline{z_2}=\overline{z_1}z_2\) or \(z_3\overline{z_4}=\overline{z_3}z_4\). Therefore, we have
or
that is,
or
then \(\frac{N_{f_1}(u)}{N_{f_2}(u)}\) or \(\frac{N_{g_1}(v)}{N_{g_2}(v)}\) is a real number. Since \(|N_{f_1}(u)|=|N_{f_2}(u)|=2^{r/2}, |N_{g_1}(v)|=|N_{g_2}(v)|=2^{s/2}\), we obtain \(\frac{N_{f_1}(u)}{N_{f_2}(u)}=\pm 1\) or \(\frac{N_{g_1}(v)}{N_{g_2}(v)}=\pm 1\).
Conversely, since \(|z_1|=|z_2|=2^{r/2}, |z_3|=|z_4|=2^{s/2}\), and \(\frac{z_1}{z_2}=\pm 1\) or \(\frac{z_3}{z_4}=\pm 1\), which implies that \(4|z|^2=2^{(r+s+2)}\), that is, \(|z|=2^{(r+s)/2}\). Therefore, we have \(|N_h(u, v)|=2^{(r+s)/2}\). This implies that h(x, y) is a negabent function. \(\square \)
The sufficient condition for the function h(x, y) to be bent–negabent has been given in [26].
Theorem 3
([26]) Let \(f_1(x), f_2(x)\) be two n-variable bent–negabent functions (n even) and let \(g_1(y), g_2(y)\) be two m-variable bent–negabent functions (m even). Let \((x, y)\in \mathbb {F}_2^n\times \mathbb {F}_2^m\). Define \(h(x, y) = f_1(x)\oplus g_1(y)\oplus (f_1\oplus f_2)(x)(g_1 \oplus g_2)(y)\). If \(D_\mathbf{1} (\widetilde{f_1\oplus \sigma _2})(x)=D_\mathbf{1} (\widetilde{f_2\oplus \sigma _2})(x)\), then h(x, y) is bent–negabent.
In the following, we show that the condition \(D_\mathbf{1} (\widetilde{f_1\oplus \sigma _2})(x)=D_\mathbf{1} (\widetilde{f_2\oplus \sigma _2})(x)\) is equivalent to the condition \(\frac{N_{f_1}(u)}{N_{f_2}(u)}=\pm 1\). We also need the following lemmas.
Lemma 2
([15])Let n be even and \(f(x)\in \mathcal {B}_n\). Then, f(x) is negabent if and only if \(f(x)\oplus s_2(x)\) is bent, where \(s_2(x)=\bigoplus _{1\le i<j\le n}x_ix_j\).
Lemma 2 provides a connection between bent and negabent.
Lemma 3
([24]) Let \(f(x)\in \mathcal {B}_n\), then
Lemma 3 explores a direct link between the Walsh–Hadamard transform and the nega-Hadamard transform. These properties are an important tool to analyze the properties of negabent functions.
Theorem 4
Let \(f_1(x)\) and \(f_2(x)\) be two r-variable negabent functions (r even). Then \(\frac{N_{f_1}(u)}{N_{f_2}(u)}=\pm 1\) if and only if \(D_\mathbf{1} (\widetilde{f_1\oplus s_2})(u)=D_\mathbf{1} (\widetilde{f_2\oplus s_2})(u), u\in \mathbb {F}_2^r\).
Proof
Since \(\frac{N_{f_1}(u)}{N_{f_2}(u)}=\pm 1\), then \(N_{f_1}(u)=\pm N_{f_2}(u)\). By Lemma 3, we have
Hence
then
Recall that \(W_f(u)=2^{r/2}(-1)^{\widetilde{f}(u)}\), we get
Thus, \(D_\mathbf{1} (\widetilde{f_1\oplus s_2})(u)=D_\mathbf{1} (\widetilde{f_2\oplus s_2})(u)\).
Conversely, since \(D_\mathbf{1} (\widetilde{f_1\oplus s_2})(u)=D_\mathbf{1} (\widetilde{f_2\oplus s_2})(u)\), then
Hence
Since \(f_1\oplus s_2, f_2\oplus s_2\) are bent functions, we have \(|W_{f_1\oplus s_2}(u)|=|W_{f_2\oplus s_2}(u)|=2^{r/2}\), then \(W_{f_1\oplus s_2}(u)=\pm W_{f_2\oplus s_2}(u), W_{f_1\oplus s_2}(\overline{u})=\pm W_{f_2\oplus s_2}(\overline{u})\). Thus, according to the similar discussion above, we obtain \(\frac{N_{f_1}(u)}{N_{f_2}(u)}=\pm 1\). \(\square \)
The functions f(x) and g(x) are said to have complementary nega-autocorrelation if for all nonzero \(u\in \mathbb {F}_2^n, C_f(u)+C_g(u)=0\). The relationship between the nega-autocorrelations of f(x), g(x) and their nega-Hadamard transforms has been given in [22] as follows.
Lemma 4
([22]) The functions \(f(x), g(x)\in \mathcal {B}_n\) have complementary nega-autocorrelations if and only if
The following corollary is a direct consequence from Definition 1, Theorem 2, and Lemma 4.
Corollary 2
Let \(f_1(x), f_2(x)\in \mathcal {B}_n\). If \(\frac{N_{f_1}(u)}{N_{f_2}(u)}=1\) for all \(u\in \mathbb {F}_2^n\), then the following statements are equivalent.
-
1.
\(f_1(x), f_2(x)\) are negabent functions.
-
2.
\(|N_{f_1}(u)|^2+|N_{f_2}(u)|^2=2^{n+1}\).
-
3.
\(f_1(x)\) and \(f_2(x)\) have complementary nega-autocorrelations.
4 A Secondary Construction Revisited
Recently, a secondary construction of bent functions whose duals satisfy a certain property [25] [Theorem 5.1] has been proposed:
Theorem 5
Let f from \(\mathbb F_2^n\) to \(\mathbb F_2\) be bent. Let \(\beta _1\), \(\dots \), \(\beta _r\) be points of \(\mathbb F_2^n\). Let F be a Boolean function from \(\mathbb F_2^r\) to \(\mathbb F_2\). Suppose that its dual \(\tilde{f}\) satisfies: there exists Boolean functions \(g_1\), \(\dots \), \(g_r\) from \(\mathbb F_2^n\) to \(\mathbb F_2\) such that
for every \(u\in \mathbb F_2^n\) and \((w_1,\dots ,w_r)\in \mathbb F_2^r\). Then, the Boolean function h from \(\mathbb F_2^n\) to \(\mathbb F_2\) defined at any point \(x\in \mathbb F_2^n\) as
is bent and its dual is at any point \(x\in \mathbb F_2^n\) equal to
Let us now show that Condition (4) of the above theorem can be rewritten in terms of derivatives of the dual function of f. Recall that the derivative at point \(\beta \in \mathbb F_2^n\) of a Boolean function f from \(\mathbb F_2^n\) to \(\mathbb F_2\), denoted as \(D_\beta f \), is defined at any point \(x\in \mathbb F_2^n\) as \(D_\beta f(x)=f(x)+f(x+\beta )\). We introduce now a notation to denote derivatives of higher order. Let k be a positive integer and \(\beta _1\), \(\cdots \), \(\beta _k\) be k elements of \(\mathbb F_2^n\). Then, the kth-derivative of f at \((\beta _1,\ldots ,\beta _k)\in \left( \mathbb F_2^n\right) ^k\) is denoted by \(D^{k}_{\beta _1,\ldots ,\beta _k}f=D_{\beta _1}\cdots D_{\beta _k}f\). Now, note that, for \(w\in \mathbb F_2\),
If we iterate the above identity, we get that, for \((w_1,\dots ,w_r)\in \mathbb F_2^r\),
where \(w^a=\prod _{i=1}^r w_i^{a_i}\) and \(\beta _a=(\beta _{a_{i_1}},\ldots ,\beta _{a_{i_k}})\in \mathbb F_2^k\) where \(1\le i_1< \cdots < i_k\le r\) are the indexes such that \(a_i=1\). Therefore, Condition (4) is equivalent to say that, for \(k\ge 2\), any kth-derivative with respect to any subset of \(\{\beta _1,\dots ,\beta _r\}\) of the dual function \(\tilde{f}\) of f vanishes on \(\mathbb F_2^n\). Therefore, Theorem 5 can be rewritten as follows.
Theorem 6
Let f from \(\mathbb F_2^n\) to \(\mathbb F_2\) be a Boolean bent function. Let \(\beta _1\), \(\dots \), \(\beta _r\) be points of \(\mathbb F_2^n\). Suppose that, for any positive integer \(2\le k\le r\), all the kth-order derivatives of the dual of f relatively to subsets of \(\{\beta _1,\dots ,\beta _r\}\) of size k vanish on \(\mathbb F_2^n\). Let F be a Boolean function from \(\mathbb F_2^r\) to \(\mathbb F_2\). Then, the Boolean function h from \(\mathbb F_2^n\) to \(\mathbb F_2\) defined at any point \(x\in \mathbb F_2^n\) as
is bent and its dual is
5 Bent–Negabent Functions From Quadratic Functions
5.1 Generalities
Let f be a quadratic Boolean function whose algebraic normal form
where \(\mathbf{M}=(a_{ij})_{1\le i,j\le n}\) is a square matrix of size n whose entries are in \(\mathbb F_2\) and whose entries are equal to 0 if \(i\ge j\), \(b\in \mathbb F_2^n\), and \(c\in \mathbb F_2\). We denote \(\mathbf{B}^\star \) the transpose matrix of \(\mathbf{B}\) and \(\mathbf{B}^{-1}\) the inverse of \(\mathbf{B}\) (if \(\mathbf{B}\) is of full rank). Finally, we denote \(\mathbf{I}\) the identity matrix of size n. Define a symmetric square matrix of size n as \(\mathbf{A}=\mathbf{M}+\mathbf{M}^\star \). Then, one has
Theorem 7
([15]) f is bent if and only if \(\mathbf{A}\) is of maximal rank.
One can compute explicitly the dual of f.
Proposition 1
A quadratic Boolean function f of the form (5) is bent if and only if \(\mathbf{A} = \mathbf{M} + \mathbf{M}^\star \) is of full rank and the dual of f is \(\tilde{f}(x) = f(\mathbf{A}^{-1}x) + f(0) + \varepsilon _f\) at any point \(x\in \mathbb F_2^n\) where \( \varepsilon _f = 0 \) if \(wt(f)=2^{n-1}-2^{\frac{n}{2}-1}\) and 1 if \(wt(f)=2^{n-1}+2^{\frac{n}{2}-1}\).
Proof
The necessary and sufficient condition for bentness of f is a well-known result ([15]). We now show that the dual of f can be explicitly computed. Indeed,
\(\square \)
Note that one can associate likewise the symmetric square matrix \(\mathbf{I} + \mathbf{J}\) of size n to the quadratic function \(s_2\) where \(\mathbf{I}\) is the identity matrix of size n and \(\mathbf{J}\) the square matrix of size n whose all entries are equal to 1. The polar form of \(s_2\) is then \(x\cdot ((\mathbf{I}+\mathbf{J})y)\). Then one has
Theorem 8
([15]) f is bent–negabent if and only if \(\mathbf{A}\) and \(\mathbf{A}+\mathbf{I}+\mathbf{J}\) are both of maximal rank.
5.2 Secondary Constructions of Bent and Negabent Functions
5.2.1 Symplectic Forms
Let V be a symplectic vector space over a field F. A mapping \(\sigma \) from \(V\times V\) to F is said to be a symplectic form if it is
-
1
symmetric: \(\sigma (x,y) = -\sigma (y,x)\) for any \((x,y)\in V\times V\) (in characteristic two, skew symmetry and symmetry coincides);
-
2
totally isotropic: \(\sigma (x,x) = 0\) for any \(x\in V\);
-
3
non-degenerate: if \(\sigma (u,v) = 0\) for any \(v\in V\) then \(u = 0\).
Then, \((V,\sigma )\) denotes the vector space V equipped with a symplectic form. Let \(\delta _{ij}\) be the Kronecker index: \(\delta _{ij}=0\) if \(i\not =j\) and \(\delta _{ii}=1\). Suppose that \(\dim (V)=2n\).
Definition 2
A symplectic basis for \((V,\sigma )\) is a basis \(v_1\), \(\cdots \), \(v_n\), \(w_1\), \(\dots \), \(w_n\) such that
for any \(1\le i, j\le r\) (where \(\delta _{ij}=1\) if \(i=j\) and 0 otherwise).
5.2.2 Secondary Constructions
A Boolean function f is said to be quadratic if and only if
is bilinear, symmetric, and symplectic. The bilinear map \(\phi \) is called the polar form of f. Write f as (5). Observe that
The dual of a quadratic bent function is again a quadratic bent function (see Proposition 1). On the other hand, notice that the polar form at point (a, b) coincides with the second-order derivative \(D_aD_bf\). Then, Theorem 6 is rewritten as
Corollary 3
Let f from \(\mathbb F_2^n\) to \(\mathbb F_2\) be a quadratic bent function. Denote \(\tilde{\phi }\) the polar form of the quadratic part of the dual of f. Let \(\beta _1\), \(\dots \), \(\beta _r\) be points of \(\mathbb F_2^n\) such that \(\tilde{\phi }(\beta _i,\beta _j)=0\) for \(1\le i<j\le r\). Let F be a Boolean function from \(\mathbb F_2^r\) to \(\mathbb F_2\). Then, the Boolean function h from \(\mathbb F_2^n\) to \(\mathbb F_2\) defined at any point \(x\in \mathbb F_2^n\) as
is bent.
Now, according to Proposition 1, the polar form associated to the dual of f is
Therefore,
Corollary 4
Let f from \(\mathbb F_2^n\) to \(\mathbb F_2\) be a quadratic bent function of the form (5). Let \(\beta _1\), \(\dots \), \(\beta _r\) be points of \(\mathbb F_2^n\) such that \(\beta _i\cdot (\mathbf{A}^{-1})\beta _j=0\) for \(1\le i<j\le r\). Let F be a Boolean function from \(\mathbb F_2^r\) to \(\mathbb F_2\). Then, the Boolean function h from \(\mathbb F_2^n\) to \(\mathbb F_2\) defined at any point \(x\in \mathbb F_2^n\) as
is bent.
Remark 1
Let \(n=2k\). Observe that \(\phi \) is a symplectic form over \(\mathbb F_2^n\). Thus, if \(\{e_1,\dots ,e_k,f_1,\dots ,f_k\}\) is a symplectic basis of \((\mathbb F_2^n,\phi )\) then one can take \(\{\beta _1,\dots ,\beta _r\}=\{\mathbf{A} e_i,i\in I\}\cup \{\mathbf{A} f_j,j\in J\}\) with \(I\cap J=\emptyset \) and \(I\cup J\subset \{1,\dots ,k\}\). The so-constructed bent function is then of algebraic degree r.
Next, observe that the polar form associated to \(f+s_2\) is
and thus, by the same calculation as for f, we get that the polar form of its dual is
Therefore,
Corollary 5
Let f from \(\mathbb F_2^n\) to \(\mathbb F_2\) be a quadratic negabent function of the form (5). Let \(\gamma _1\), \(\ldots \), \(\gamma _r\) be points of \(\mathbb F_2^n\) such that \(\gamma _i\cdot ((\mathbf{A}+\mathbf{I}+\mathbf{J})^{-1}\gamma _j)=0\) for \(1\le i<j\le r\). Let F be a Boolean function from \(\mathbb F_2^r\) to \(\mathbb F_2\). Then, the Boolean function h from \(\mathbb F_2^n\) to \(\mathbb F_2\) defined at any point \(x\in \mathbb F_2^n\) as
is negabent.
Remark 2
Like in Remark 1, one can deduce from a symplectic basis of \((\mathbb F_2^n,\psi )\) a set \(\{\gamma _1,\dots ,\gamma _r\}\) which satisfies the condition of the above corollary.
6 A Characterization of Bent–Negabent Functions Through Their Second-Order Derivatives
A useful tool to study a Boolean function f(x) is derivative. The derivatives play an important role in cryptography, related to the differential attack. They are also naturally involved in the definition of the strict avalanche criterion and the propagation criterion. These criteria evaluate some kind of diffusion of the function. Carlet and Prouff [5] gave a characterization of bent functions via their second-order derivatives as follows.
Lemma 5
([5])A Boolean function f(x) defined on \(\mathbb {F}_2^n\) is bent if and only if
Inspired by the work of [10], we present a characterization of bent–negabent functions, which is related to the second-order derivatives in the following.
Theorem 9
Let f(x) be n-variable bent function (n even). Then f(x) is bent–negabent if and only if for all \(b\in \mathbb {F}_2^n\)
when wt(b) is even, and
when wt(b) is odd.
Proof
By Lemma 2, f(x) is bent–negabent if and only if f(x) and \(f(x)\oplus s_2(x)\) are both bent, i.e., for \(\forall x \in \mathbb {F}_2^n\),
Since
so
From the second part of (10), we get
If wt(b) is even, then
If wt(b) is odd, then
From the first part of (10), we obtain
for all \(b\in \mathbb {F}_2^n\). By (11)–(13), we have
when wt(b) is even, and
when wt(b) is odd. This completes the proof. \(\square \)
7 An Upper Bound on the Sum-of-Squares Indicator \(\sigma _{f,g}\)
In order to find the upper bound on the sum-of-squares indicator \(\sigma _{f,g}\) for a given two n-variable Boolean functions f and g, we study some properties of the cross-correlation function. We firstly give the sum-of-squares indicators \(\sigma _f\) of \(s_2(x)=\bigoplus _{1\le i<j\le n}x_ix_j\) in the following.
Proposition 2
Let \(s_2(x)=\bigoplus _{1\le i<j\le n}x_ix_j\) be the elementary symmetric Boolean function in n variables of degree 2. Then
and \(\sigma _f=2^{3n-1}\).
Proof
Since
thus,
According to the definitions of the nega-autocorrelation and sum-of-squares indicator, we have
and
This proves the result. \(\square \)
Lemma 6
([28]) Let \(f(x),g(x)\in \mathcal {B}_n\). Then
Remark 3
If we use Cauchy’s inequality \((\sum _i{a_ib_i})^2\le \sum _ia_i^2\sum _ib_i^2\) to the sum on the right-hand side of (8), we get
i.e., \(\sigma _{f,g}\le \sqrt{\ \sigma _f\sigma _g}\). Furthermore, for n-variable negabent functions f(x) and g(x), \(\sigma _{f,g}=2^{2n}\).
In order to give the upper bound on \(\sigma _{f,g}\), we need the following important results.
Lemma 7
([22]) Let \(f(x),g(x)\in \mathcal {B}_n\). Then
Lemma 8
Let \(f(x),g(x)\in \mathcal {B}_n\). Then
Proof
By Lemma 7, we have
and
Thus
since \(v\ne w, \sum _{u\in \mathbb {F}_2^n}(-1)^{u \cdot (v\oplus w)}=0\), thus
This proves the result. \(\square \)
If we take \(f(x)=g(x)\) in the previous lemma, then we have
Theorem 10
Let \(f(x),g(x)\in \mathcal {B}_n\). Then \(\sigma _{f,g}\le 2^{3n}\), with equality if and only if there exists \(u_0\in \mathbb {F}_2^n\) such that \(|N_f(u_0)|=|N_g(u_0)|=2^n\).
Proof
By Lemma 8 and Nega-Parseval’s Identity \(\sum _{u\in \mathbb {F}_2^n}|N_f(u)|^2=2^{2n}\), we have
We know \(\sigma _{f,g}=2^{3n}\) if and only if
that is,
if and only if \(|N_f(u)|^2|N_g(v)|^2=0\) for any \(u\ne v\). There are three cases:
-
(i)
If there does not exist \(u_0\in \mathbb {F}_2^n\) such that \(|N_f(u_0)|^2\ne 0\), then \(|N_f(u)|^2=0\) for all \(u\in \mathbb {F}_2^n\), which leads to a contradiction with Nega-Parseval’s Identity.
-
(ii)
If there exists only one \(u_0\in \mathbb {F}_2^n\) such that \(|N_f(u_0)|^2\ne 0\), then \(|N_g(v)|^2=0\) for all \(v\ne u_0\). According to Nega-Parseval’s Identity, we have \(|N_f(u_0)|^2=2^{2n}\), i.e., \(|N_f(u_0)|=2^n\). On the other hand, we have \(|N_g(u_0)|^2=2^{2n}\), i.e., \(|N_g(u_0)|=2^n\).
-
(iii)
If there exist only two \(u_1, u_2\in \mathbb {F}_2^n(u_1\ne u_2)\) such that \(|N_f(u_1)|^2\ne 0\) and \(|N_f(u_2)|^2\ne 0\), then we have \(|N_g(v)|^2=0\) for all \(v\ne u_1\) and \(|N_g(v)|^2=0\) for all \(v\ne u_2\). It implies that \(|N_g(v)|^2=0\) for all \(v\in \mathbb {F}_2^n\), which is in contradiction with Nega-Parseval’s Identity. By the same way, we know that there does not exist only \(k(3\le k\le 2^n)\) different elements \(u_i\in \mathbb {F}_2^n(1\le i\le k)\) such that \(|N_f(u_0)|^2\ne 0\). \(\square \)
Based on Theorem 10, we give tight lower and upper bounds on \(\sigma _f\).
Corollary 6
Let \(f(x)\in \mathcal {B}_n\). Then
-
(1)
\(2^{2n}\le \sigma _f\le 2^{3n}\);
-
(2)
\(\sigma _f= 2^{2n}\) if and only if f is a negabent function;
-
(3)
\(\sigma _f= 2^{3n}\) if and only if there exists \(u_0\in \mathbb {F}_2^n\) such that \(|N_f(u_0)|=2^n\).
Remark 4
Let \(\mathfrak {R}(N_f(u_0))\) be the real part and \(\mathfrak {I}(N_f(u_0))\) be the imaginary part of \(N_f(u_0)\). Then \(\mathfrak {R}(N_f(u_0))\) or \(\mathfrak {I}(N_f(u_0))\) must be integer and \(|N_f(u_0)|^2=2^{2n}\) must be a sum of two squares. From Jacobi’s Two-Squares Theorem we know that \((2^n)^2+0^2=2^{2n}\). Thus, \((|\mathfrak {R}(N_f(u_0))|, |\mathfrak {I}(N_f(u_0))|)=(2^n, 0)\) or \((0, 2^n)\), i.e., either \(\mathfrak {R}(N_f(u_0))\) or \(\mathfrak {I}(N_f(u_0))\) must be zero.
8 Conclusion
In this paper, we have pushed further the theory of the so-called negabent and bent–negabent functions and derived results, which included methods of secondary constructions and characterizations.
References
Calderbank R, Kantor WM (1986) The geometry of two-weight codes. Bull Lond Math Soc 18(2):97–122
Carlet C (2004) On the secondary constructions of resilient and bent functions. In: Coding, Cryptography and combinatorics (Progress in computer science and applied logic), 18 vol 23, Basel, Switzerland, Birkh\(\ddot{a}\)user, Verlag, , pp 3–28
Carlet C (2010) Boolean functions for cryptography and error correcting codes. chapter of the monography. In: Crama Y and Hammer P (eds) Boolean models and methods in mathematics, computer science, and engineering. Cambridge University Press, pp 257–397
Carlet C, Mesnager S (2016) Four decades of research on bent Functions. J Des Codes Cryptogr 78(1):5–50
Carlet C, Prouff E (2003) On plateaued functions and their constructions. In: Proceedings of fast software encryption FSE 2003, Lecture Notes in Computer Science 2887, pp 54–73
Cusick TW, St\(\breve{a}\)nic\(\breve{a}\) P (2009) Cryptographic Boolean functions and applications. Elsevier-Academic Press
Cohen G, Honkala I, Litsyn S, Lobstein A (1997) Covering codes, North Holland
Dillon JF (1972) A survey of bent functions. NSA Tech J Spec Issue 191–215
Dillon JF (1974) Elementary Hadamard difference sets. Ph.D. dissertation. University of Maryland
Mandal B, Singh B, Gangopadhyay S, Maitra S, Vetrivel V (2018) On non-existence of bent-negabent rotation symmetric Boolean functions. Discret Appl Math 236:1–6
Mesnager S (2016) Bent functions: fundamentals and results. Springer, Switzerland
Mesnager S, Linear codes from functions. A concise encyclopedia of coding theory. To appear
Olsen JD, Scholtz RA, Welch LR (1982) Bent-function sequences. IEEE Transform Inf Theory 28(6):858–864
Parker MG (2000) The constant properties of Goley-Devis-Jedwab sequences. In: International symposium on information theory, Sorrento, Italy.http://www.ii.uib.no/matthew/mattweb.html
Parker MG, Pott A (2007) On Boolean functions which are bent and negabent. SSC 2007, LNCS 4893. Springer, Heidelberg, pp 9–23
Pott A, Tan Y, Feng T (2010) Strongly regular graphs associated with ternary bent functions. J Comb Theory Ser A 117:668–682
Pott A, Tan Y, Feng T, Ling S (2011) Association schemes arising from bent functions. J. Des Codes Cryptogr 59:319–331
Riera C, Parker MG (2006) Generalized bent criteria for Boolean functions. IEEE Transform Inform Theory 52(9):4142–4159
Rothaus O (1976) On bent functions. J Comb Theory Ser A 20:300–305
Sarkar S (2012) Characterizing negabent Boolean functions over finite fields. SETA 2012, vol 7280, LNCS, Springer, Berlin, Heidelberg, 2, pp 77–88
Schmidt KU, Parker MG, Pott A (2008) Negabent functions in the Maiorana-McFarland Class. SETA 390–402
St\(\breve{a}\)nic\(\breve{a}\) P, Gangopadhyay S, Chaturvedi A, Gangopadhyay AK, Maitra S (2012) Investigations on bent and negabent functions via the Nega-Hadamard transform. IEEE Transform Inf Theory 58(6):4064–4072
St\(\breve{a}\)nic\(\breve{a}\) P, Mandal B, Maitra S (2019) The connection between quadratic bent-negabent functions and the Kerdock code. Appl Algebra Eng Commun Comput 30(5):387–401
Su W, Pott A, Tang X (2013) Investigations on bent and negabent functions via the nega-Hadamard transform. IEEE Transform Inf Theory 59(6):3387–3395
Tang C, Zhou Z, Qi Y, Zhang X, Fan C, Helleseth T (2017) Generic construction of bent functions and bent idempotents with any possible algebraic degrees. IEEE Trans Inf Theory 63(10):6149–6157
Zhang F, Wei Y, Pasalic E (2015) Constructions of bent-negabent functions and their relation to the completed Maiorana-McFarland class. IEEE Trans Inf Theory 61(3):1496–1506
Zhou Y, Qu L (2017) Constructions of negabent functions over finite fields. Cryptogr Commun 9:165–180
Zhuo Z, Chong J (2015) On negabent functions and nega-Hadamard transform. Math Problems Eng Article ID 959617. https://doi.org/10.1155/2015/959617
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mesnager, S., ben Moussat, B., Zhuo, Z. (2021). Further Results on Bent–Negabent Boolean Functions. In: Stănică, P., Gangopadhyay, S., Debnath, S.K. (eds) Security and Privacy. Lecture Notes in Electrical Engineering, vol 744. Springer, Singapore. https://doi.org/10.1007/978-981-33-6781-4_5
Download citation
DOI: https://doi.org/10.1007/978-981-33-6781-4_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6780-7
Online ISBN: 978-981-33-6781-4
eBook Packages: Computer ScienceComputer Science (R0)