[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Extractor codes

Published: 01 December 2004 Publication History

Abstract

We study error-correcting codes for highly noisy channels. For example, every received signal in the channel may originate from some half of the symbols in the alphabet. Our main conceptual contribution is an equivalence between error-correcting codes for such channels and extractors. Our main technical contribution is a new explicit error-correcting code based on Trevisan's extractor that can handle such channels, and even noisier ones. Our new code has polynomial-time encoding and polynomial-time soft-decision decoding. We note that Reed-Solomon codes cannot handle such channels, and our study exposes some limitations on list decoding of Reed-Solomon codes. Another advantage of our equivalence is that when the Johnson bound is restated in terms of extractors, it becomes the well-known Leftover Hash Lemma. This yields a new proof of the Johnson bound which applies to large alphabets and soft decoding. Our explicit codes are useful in several applications. First, they yield algorithms to extract many hardcore bits using few auxiliary random bits. Second, they are the key tool in a recent scheme to compactly store a set of elements in a way that membership in the set can be determined by looking at only one bit of the representation. Finally, they are the basis for the recent construction of high-noise, almost-optimal rate list-decodable codes over large alphabets.

Cited By

View all
  • (2024)Explicit Codes for Poly-Size Circuits and Functions That Are Hard to Sample on Low Entropy DistributionsProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649735(2028-2038)Online publication date: 10-Jun-2024
  • (2022)Nearly Optimal Pseudorandomness from HardnessJournal of the ACM10.1145/355530769:6(1-55)Online publication date: 17-Nov-2022
  • (2021)Hardness of KT characterizes parallel cryptographyProceedings of the 36th Computational Complexity Conference10.4230/LIPIcs.CCC.2021.35Online publication date: 20-Jul-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Theory
IEEE Transactions on Information Theory  Volume 50, Issue 12
December 2004
479 pages

Publisher

IEEE Press

Publication History

Published: 01 December 2004

Author Tags

  1. Extractor codes
  2. Johnson bound
  3. extractors
  4. hardcore bits
  5. list decoding
  6. soft-decision decoding

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Explicit Codes for Poly-Size Circuits and Functions That Are Hard to Sample on Low Entropy DistributionsProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649735(2028-2038)Online publication date: 10-Jun-2024
  • (2022)Nearly Optimal Pseudorandomness from HardnessJournal of the ACM10.1145/355530769:6(1-55)Online publication date: 17-Nov-2022
  • (2021)Hardness of KT characterizes parallel cryptographyProceedings of the 36th Computational Complexity Conference10.4230/LIPIcs.CCC.2021.35Online publication date: 20-Jul-2021
  • (2021)Efficient list-decoding with constant alphabet and list sizesProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3406325.3451046(1502-1515)Online publication date: 15-Jun-2021
  • (2020)Non-malleability Against Polynomial TamperingAdvances in Cryptology – CRYPTO 202010.1007/978-3-030-56877-1_4(97-126)Online publication date: 17-Aug-2020
  • (2019)Computational entropyProviding Sound Foundations for Cryptography10.1145/3335741.3335767(693-726)Online publication date: 4-Oct-2019
  • (2017)For-All Sparse Recovery in Near-Optimal TimeACM Transactions on Algorithms10.1145/303987213:3(1-26)Online publication date: 6-Mar-2017
  • (2016)Integrality gaps and approximation algorithms for dispersers and bipartite expandersProceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms10.5555/2884435.2884540(1543-1560)Online publication date: 10-Jan-2016
  • (2016)Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterministic ReductionsComputational Complexity10.1007/s00037-016-0128-925:2(349-418)Online publication date: 1-Jun-2016
  • (2013)Noise-resilient group testingDiscrete Applied Mathematics10.1016/j.dam.2012.07.022161:1-2(81-95)Online publication date: 1-Jan-2013
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media