[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3406325.3451046acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Efficient list-decoding with constant alphabet and list sizes

Published: 15 June 2021 Publication History

Abstract

We present an explicit and efficient algebraic construction of capacity-achieving list decodable codes with both constant alphabet and constant list sizes. More specifically, for any R ∈ (0,1) and є>0, we give an algebraic construction of an infinite family of error-correcting codes of rate R, over an alphabet of size (1/є)O(1/є2), that can be list decoded from a (1−R−є)-fraction of errors with list size at most exp(poly(1/є)). Moreover, the codes can be encoded in time poly(1/є, n), the output list is contained in a linear subspace of dimension at most poly(1/є), and a basis for this subspace can be found in time poly(1/є, n). Thus, both encoding and list decoding can be performed in fully polynomial-time poly(1/є, n), except for pruning the subspace and outputting the final list which takes time exp(poly(1/є)) · poly(n). In contrast, prior explicit and efficient constructions of capacity-achieving list decodable codes either required a much higher complexity in terms of 1/є (and were additionally much less structured), or had super-constant alphabet or list sizes.
Our codes are quite natural and structured. Specifically, we use algebraic-geometric (AG) codes with evaluation points restricted to a subfield, and with the message space restricted to a (carefully chosen) linear subspace. Our main observation is that the output list of AG codes with subfield evaluation points is contained in an affine shift of the image of a block-triangular-Toeplitz (BTT) matrix, and that the list size can potentially be reduced to a constant by restricting the message space to a BTT evasive subspace, which is a large subspace that intersects the image of any BTT matrix in a constant number of points. We further show how to explicitly construct such BTT evasive subspaces, based on the explicit subspace designs of Guruswami and Kopparty (Combinatorica, 2016), and composition.

References

[1]
Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy. 1998. Proof verification and Intractability of Approximation Problems. J. ACM, 45, 3, 1998. Pages 501–555.
[2]
László Babai, Lance Fortnow, Noam Nisan, and Avi Wigderson. 1993. BPP Has Subexponential Time Simulations Unless EXPTIME has Publishable Proofs. Computational Complexity, 3, 4, 1993. Pages 307–318. https://doi.org/10.1109/SCT.1991.160263
[3]
Eli Ben-Sasson, Swastik Kopparty, and Jaikumar Radhakrishnan. 2010. Subspace polynomials and limits to list decoding of Reed-Solomon codes. IEEE Transactions on Information Theory, 56, 1, 2010. Pages 113–120. https://doi.org/10.1109/TIT.2009.2034780
[4]
E. R. Berlekamp and L. Welch. 1987. Error correction of algebraic block codes. US Patent Number 4,633,470.
[5]
Jin-Yi Cai, Aduri Pavan, and D. Sivakumar. 1999. On the Hardness of Permanent. In Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science (STACS). Lecture Notes in Computer Science. 1563, Springer. Pages 90–99. https://doi.org/10.1007/3-540-49116-3_8
[6]
Zeev Dvir, Swastik Kopparty, Shubhangi Saraf, and Madhu Sudan. 2013. Extensions to the Method of Multiplicities, with Applications to Kakeya Sets and Mergers. SIAM J. Comput., 42, 6, 2013. Pages 2305–2328. https://doi.org/10.1109/FOCS.2009.40
[7]
Zeev Dvir and Shachar Lovett. 2012. Subspace evasive sets. In Proceedings of the 44th Annual ACM Symposium on Theory of Computing (STOC). ACM Press. Pages 351–358. https://doi.org/10.1145/2213977.2214010
[8]
David Forney. 1966. Concatenated Codes. M.I.T. Press. https://doi.org/10.4249/scholarpedia.8374
[9]
Arnaldo Garcia and Henning Stichtenoth. 1996. On the asymptotic behaviour of some towers of function fields over finite fields. Journal of Number Theory, 61, 2, 1996. Pages 248–273. https://doi.org/10.1006/jnth.1996.0147
[10]
Oded Goldreich and Leonid A Levin. 1989. A hard-core predicate for all one-way functions. In Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC). Pages 25–32. https://doi.org/10.1145/73007.73010
[11]
Oded Goldreich, Dana Ron, and Madhu Sudan. 2000. Chinese remaindering with errors. IEEE Transactions on Information Theory, 46, 4, 2000. Pages 1330–1338. https://doi.org/10.1109/18.850672
[12]
Fernando Granha Jeronimo, Dylan Quintana, Shashank Srivastava, and Madhur Tulsiani. 2020. Unique Decoding of Explicit \epsilon -balanced Codes Near the Gilbert-Varshamov Bound. In Proceedings of the 61st Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society.
[13]
Venkatesan Guruswami. 2009. Artin automorphisms, cyclotomic function fields, and folded list-decodable codes. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC). ACM Press. Pages 23–32. isbn:978-1-60558-506-2 https://doi.org/10.1145/1536414.1536420
[14]
Venkatesan Guruswami and Piotr Indyk. 2001. Expander-based Constructions of Efficiently Decodable Codes. In Proceedings of the 42nd Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society. Pages 658–667. https://doi.org/10.1109/SFCS.2001.959942
[15]
Venkatesan Guruswami and Swastik Kopparty. 2016. Explicit subspace designs. Combinatorica, 36, 2, 2016. Pages 161–185. https://doi.org/10.1007/s00493-014-3169-1
[16]
Venkatesan Guruswami, Nicolas Resch, and Chaoping Xing. 2018. Lossless Dimension Expanders via Linearized Polynomials and Subspace Designs. In Proceedings of the 33rd Computational Complexity Conference (CCC). LIPIcs. 102, Schloss Dagstuhl - Leibniz-Zentrum für Informatik. Pages 4:1–4:16. isbn:978-3-95977-069-9 http://www.dagstuhl.de/dagpub/978-3-95977-069-9
[17]
Venkatesan Guruswami and Atri Rudra. 2008. Explicit Codes Achieving List Decoding Capacity: Error-Correction With Optimal Redundancy. IEEE Transactions on Information Theory, 54, 1, 2008. Pages 135–150. https://doi.org/10.1109/TIT.2007.911222
[18]
Venkatesan Guruswami and Madhu Sudan. 1999. Improved decoding of Reed-Solomon and algebraic-geometry codes. IEEE Transactions on Information Theory, 45, 6, 1999. Pages 1757–1767. https://doi.org/10.1109/18.782097
[19]
Venkatesan Guruswami, Christopher Umans, and Salil Vadhan. 2009. Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes. J. ACM, 56, 4, 2009. Pages 20:1–20:34. https://doi.org/10.1145/1538902.1538904
[20]
Venkatesan Guruswami and Carol Wang. 2013. Linear-Algebraic List Decoding for Variants of Reed-Solomon Codes. IEEE Transactions on Information Theory, 59, 6, 2013. Pages 3257–3268. https://doi.org/10.1109/TIT.2013.2246813
[21]
Venkatesan Guruswami and Chaoping Xing. 2012. Folded codes from function field towers and improved optimal rate list decoding. In Proceedings of the 44th Annual ACM Symposium on Theory of Computing (STOC). Pages 339–350. https://doi.org/10.1145/2213977.2214009
[22]
Venkatesan Guruswami and Chaoping Xing. 2013. List decoding Reed-Solomon, Algebraic-Geometric, and Gabidulin subcodes up to the Singleton bound. In Proceedings of the 45th Annual ACM Symposium on Theory of Computing (STOC). Pages 843–852. https://doi.org/10.1145/2488608.2488715
[23]
Venkatesan Guruswami and Chaoping Xing. 2014. Optimal rate list decoding of folded algebraic-geometric codes over constant-sized alphabets. In Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). SIAM. Pages 1858–1866. isbn:978-1-61197-338-9; 978-1-61197-340-2 https://doi.org/10.1137/1.9781611973402.134
[24]
Venkatesan Guruswami and Chaoping Xing. 2015. Optimal rate algebraic list decoding using narrow ray class fields. Journal of Combinatorial Theory, Series A, 129, 2015. Pages 160–183. https://doi.org/10.1016/j.jcta.2014.09.003
[25]
Venkatesan Guruswami and Chaoping Xing. 2020. Optimal rate list decoding over bounded alphabets using algebraic-geometric codes. Electronic Colloquium on Computational Complexity (ECCC), 27, 2020. Pages 172.
[26]
Brett Hemenway, Noga Ron-Zewi, and Mary Wootters. 2020. Local List Recovery of High-Rate Tensor Codes and Applications. SIAM J. Comput., 49, 4, 2020. Pages 157–195. https://doi.org/10.1137/17M116149X
[27]
Jø rn Justesen, Knud J. Larsen, Helge Elbrø nd Jensen, Allan Havemose, and Tom Hø holdt. 1989. Construction and decoding of a class of algebraic geometry codes. IEEE Transactions on Information Theory, 35, 4, 1989. Pages 811–821. https://doi.org/10.1109/18.32157
[28]
Swastik Kopparty, Nicolas Resch, Noga Ron-Zewi, Shubhangi Saraf, and Shashwat Silas. 2019. On List Recovery of High-Rate Tensor Codes. In Proceedings of the 23rd International Conference on Randomization and Computation (RANDOM). Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik. Pages 68:1–68:22.
[29]
Swastik Kopparty, Noga Ron-Zewi, Shubhangi Saraf, and Mary Wootters. 2018. Improved List Decoding of Folded Reed-Solomon and Multiplicity Codes. In Proceedings of the 59th Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society. Pages 212–223.
[30]
Eyal Kushilevitz and Yishay Mansour. 1993. Learning decision trees using the Fourier spectrum. SIAM J. Comput., 22, 6, 1993. Pages 1331–1348. https://doi.org/10.1137/0222080
[31]
Serge Lang. 2002. Algebra. Springer. https://doi.org/10.1007/978-1-4613-0041-0
[32]
Jonathan Mosheiff, Nicolas Resch, Noga Ron-Zewi, Shashwat Silas, and Mary Wootters. 2020. LDPC Codes Achieve List-Decoding Capacity. In Proceedings of the 61st Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society.
[33]
W. Wesley Peterson. 1960. Encoding and error-correction procedures for the Bose-Chaudhuri codes. IRE Transactions on Information Theory, 6, 4, 1960. Pages 459–470. https://doi.org/10.1109/TIT.1960.1057586
[34]
Irving S. Reed and Gustave Solomon. 1960. Polynomial Codes over Certain Finite Fields. SIAM Journal of the Society for Industrial and Applied Mathematics, 8, 2, 1960. Pages 300–304. https://doi.org/10.1137/0108018
[35]
Noga Ron-Zewi, Mary Wootters, and Gilles Zémor. 2020. Linear-time Erasure List-decoding of Expander Codes. In Proceedings of the IEEE International Symposium on Information Theory (ISIT). IEEE. Pages 379–383. https://doi.org/10.1109/ISIT44484.2020.9174325
[36]
Kenneth W Shum, Ilia Aleshnikov, P Vijay Kumar, Henning Stichtenoth, and Vinay Deolalikar. 2001. A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound. IEEE Transactions on Information Theory, 47, 6, 2001. Pages 2225–2241. https://doi.org/10.1109/ISIT.2001.936173
[37]
Henning Stichtenoth. 2009. Algebraic function fields and codes. 254, Springer Science & Business Media.
[38]
Madhu Sudan. 1997. Decoding of Reed Solomon Codes beyond the Error-Correction Bound. Journal of Complexity, 13, 1, 1997. Pages 180–193. https://doi.org/10.1006/jcom.1997.0439
[39]
Madhu Sudan, Luca Trevisan, and Salil Vadhan. 2001. Pseudorandom Generators without the XOR Lemma. J. Comput. System Sci., 62, 2, 2001. Pages 236–266. https://doi.org/10.1006/jcss.2000.1730
[40]
Amnon Ta-Shma. 2017. Explicit, almost optimal, epsilon-balanced codes. In Proceedings of the 49th Annual ACM Symposium on Theory of Computing (STOC). Pages 238–251. https://doi.org/10.1145/3055399.3055408
[41]
Amnon Ta-Shma and Christopher Umans. 2012. Better Condensers and New Extractors from Parvaresh-Vardy Codes. In Proceedings of the 27th Computational Complexity Conference (CCC). IEEE Computer Society. Pages 309–315. isbn:978-1-4673-1663-7 https://doi.org/10.1109/CCC.2012.25
[42]
Amnon Ta-Shma and David Zuckerman. 2004. Extractor codes. IEEE Transactions on Information Theory, 50, 12, 2004. Pages 3015–3025. https://doi.org/10.1109/TIT.2004.838377
[43]
Luca Trevisan. 2003. List-decoding using the XOR lemma. In Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society. Pages 126–135. https://doi.org/10.1109/SFCS.2003.1238187

Cited By

View all
  • (2024)Threshold Rates of Code Ensembles: Linear Is BestIEEE Transactions on Information Theory10.1109/TIT.2024.335770370:7(4823-4842)Online publication date: Jul-2024
  • (2021)Linear-Time Erasure List-Decoding of Expander CodesIEEE Transactions on Information Theory10.1109/TIT.2021.308680567:9(5827-5839)Online publication date: 1-Sep-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC 2021: Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
June 2021
1797 pages
ISBN:9781450380539
DOI:10.1145/3406325
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 June 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. algebraic codes
  2. algebraic-geometric codes
  3. error-correcting codes
  4. explicit constructions
  5. list decoding
  6. pseudorandomness

Qualifiers

  • Research-article

Funding Sources

Conference

STOC '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)1
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Threshold Rates of Code Ensembles: Linear Is BestIEEE Transactions on Information Theory10.1109/TIT.2024.335770370:7(4823-4842)Online publication date: Jul-2024
  • (2021)Linear-Time Erasure List-Decoding of Expander CodesIEEE Transactions on Information Theory10.1109/TIT.2021.308680567:9(5827-5839)Online publication date: 1-Sep-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media