×

Explicit list-decodable codes with optimal rate for computationally bounded channels. (English) Zbl 1483.94076

Summary: A stochastic code is a pair of encoding and decoding procedures (Enc, Dec) where \(\operatorname{Enc}:\{0,1\}^k\times\{0,1\}^d\rightarrow\{0,1\}^n\). The code is \((p, L)\)-list decodable against a class \(\mathcal{C}\) of “channel functions” \(C:\{0,1\}^n\rightarrow\{0,1\}^n\) if for every message \(m\in\{0,1\}^k\) and every channel \(C\in\mathcal{C}\) that induces at most \(pn\) errors, applying Dec on the “received word” \(C(\operatorname{Enc}(m,S))\) produces a list of at most \(L\) messages that contain \(m\) with high probability over the choice of uniform \(S\leftarrow\{0,1\}^d\). Note that both the channel \(C\) and the decoding algorithm Dec do not receive the random variable \(S\), when attempting to decode. The rate of a code is \(R=k/n\), and a code is explicit if Enc, Dec run in time \(\operatorname{poly}(n)\).
V. Guruswami and A. Smith [J. ACM 63, No. 4, Paper No. 35, 37 p. (2016; Zbl 1407.94009)] showed that for every constants \(0 < p < \frac{1}{2}\), \(\epsilon > 0\) and \(c > 1\) there exist a constant \(L\) and a Monte Carlo explicit constructions of stochastic codes with rate \(R\geq 1-H(p)-\epsilon\) that are \((p, L)\)-list decodable for size \(n^c\) channels. Here, Monte Carlo means that the encoding and decoding need to share a public uniformly chosen \(\operatorname{poly}(n^c)\) bit string \(Y\), and the constructed stochastic code is \((p, L)\)-list decodable with high probability over the choice of \(Y\).
Guruswami and Smith pose an open problem to give fully explicit (that is not Monte Carlo) explicit codes with the same parameters, under hardness assumptions. In this paper, we resolve this open problem, using a minimal assumption: the existence of poly-time computable pseudorandom generators for small circuits, which follows from standard complexity assumptions by R. Impagliazzo and A. Wigderson [in: Proceedings of the 29th annual ACM symposium on theory of computing, STOC ’97. El Paso, TX, USA, May 4–6, 1997. New York, NY: ACM, Association for Computing Machinery. 220–229 (1999; Zbl 0962.68058)]. Guruswami and Smith also asked to give a fully explicit unconditional constructions with the same parameters against \(O(\log n)\)-space online channels. (These are channels that have space \(O(\log n)\) and are allowed to read the input codeword in one pass.) We also resolve this open problem.
Finally, we consider a tighter notion of explicitness, in which the running time of encoding and list-decoding algorithms does not increase, when increasing the complexity of the channel. We give explicit constructions (with rate approaching \(1-H(p)\) for every \(p\leq p_0\) for some \(p_0 >0\)) for channels that are circuits of size \(2^{n^{\Omega(1/d)}}\) and depth \(d\). Here, the running time of encoding and decoding is a polynomial that does not depend on the depth of the circuit.
Our approach builds on the machinery developed by Guruswami and Smith, replacing some probabilistic arguments with explicit constructions. We also present a simplified and general approach that makes the reductions in the proof more efficient, so that we can handle weak classes of channels.

MSC:

94B60 Other types of codes
68Q25 Analysis of algorithms and problem complexity
94A40 Channel models (including quantum) in information and communication theory
94B35 Decoding

References:

[1] Miklós Ajtai (1983). \( \Sigma^1_1\)-formulae on finite structures. Ann. Pure Appl. Logic24(1), 1-48. ISSN 0168-0072 · Zbl 0519.03021
[2] Braverman, M.: Polylogarithmic independence fools \(AC^{\text{0}}\) circuits. J. ACM 57(5), (2010) · Zbl 1327.68108
[3] Zeev Dvir & Shachar Lovett (2012). Subspace Evasive Sets. In Proceedings of the Forty-fourth Annual ACM Symposium on Theory of Computing, STOC ’12, 351-358. ACM, New York, NY, USA. ISBN 978-1-4503-1245-5. URL doi:10.1145/2213977.2214010 · Zbl 1286.94109
[4] Garcia, A.; Stichtenoth, H., On the asymptotic behavior of some towers of function fields over finite fields, Journal of Number Theory, 61, 2, 248-273 (1996) · Zbl 0893.11047 · doi:10.1006/jnth.1996.0147
[5] Goldreich, Oded: A Sample of Samplers - A Computational Perspective on Sampling (survey). Electronic Colloquium on Computational Complexity (ECCC) 4(20), (1997)
[6] Guruswami, V.; Sudan, M., Improved decoding of Reed-Solomon and algebraic-geometry codes, IEEE Transactions on Information Theory, 45, 6, 1757-1767 (1999) · Zbl 0958.94036 · doi:10.1109/18.782097
[7] Guruswami, Venkatesan; Hastad, Johan; Sudan, Madhu; Zuckerman, David, Combinatorial bounds for list decoding, IEEE Transactions on Information Theory, 48, 5, 1021-1034 (2002) · Zbl 1061.94074 · doi:10.1109/18.995539
[8] Venkatesan Guruswami & Adam Smith, Optimal rate code constructions for computationally simple channels, Journal of the ACM (JACM), 63, 4, 35 (2016) · Zbl 1407.94009
[9] Venkatesan Guruswami & Carol Wang, Linear-algebraic list decoding for variants of Reed-Solomon codes, IEEE Transactions on Information Theory, 59, 6, 3257-3268 (2013) · Zbl 1364.94607 · doi:10.1109/TIT.2013.2246813
[10] Brett Hemenway & Mary Wootters (2015). Linear-time list recovery of high-rate expander codes. In International Colloquium on Automata, Languages, and Programming, 701-712. Springer · Zbl 1403.94105
[11] R. Impagliazzo, N. Nisan & A. Wigderson (1994). Pseudorandomness for network algorithms. In Proceedings of the ACM Symposium on Theory of Computing, 356-364 · Zbl 1345.68269
[12] R. Impagliazzo & A. Wigderson (1997). \( \it P\it = \it BPP\it\) if \(E\) Requires Exponential Circuits: Derandomizing the XOR Lemma. In STOC, 220-229 · Zbl 0962.68058
[13] Kaplan, E.; Naor, M.; Reingold, O., Derandomized Constructions of k-Wise (Almost) Independent Permutations, Algorithmica, 55, 1, 113-133 (2009) · Zbl 1180.68200 · doi:10.1007/s00453-008-9267-y
[14] Swastik Kopparty, Ronen Shaltiel & Jad Silbak (2019). Quasilinear time list-decodable codes for space bounded channels. In 2019 IEEE 60th Annual Symposium on Foundations of Computer Science FOCS, volume 2019, 1-1
[15] Michael Langberg (2004). Private Codes or Succinct Random Codes That Are (Almost) Perfect. In 45th Symposium on Foundations of Computer Science (FOCS 2004), 325-334. URL doi:10.1109/FOCS.2004.51
[16] Richard J. Lipton (1994). A New Approach To Information Theory. In 11th Annual Symposium on Theoretical Aspects of Computer Science, 699-708. URL doi:10.1007/3-540-57785-8_183 · Zbl 0941.94501
[17] Silvio Micali, Chris Peikert, Madhu Sudan & David A. Wilson (2010). Optimal Error Correction for Computationally Bounded Noise. IEEE Trans. Information Theory56(11), 5673-5680. URL doi:10.1109/TIT.2010.2070370 · Zbl 1366.94397
[18] Nisan, N., Pseudorandom bits for constant depth circuits, Combinatorica, 11, 1, 63-70 (1991) · Zbl 0732.68056 · doi:10.1007/BF01375474
[19] Nisan, N., Pseudorandom generators for space-bounded computation, Combinatorica, 12, 4, 449-461 (1992) · Zbl 0759.68024 · doi:10.1007/BF01305237
[20] N. Nisan & A. Wigderson (1994). Hardness vs. Randomness. JCSS: Journal of Computer and System Sciences49 · Zbl 0821.68057
[21] Nisan, N.; Zuckerman, D., Randomness is Linear in Space, J. Comput. Syst. Sci., 52, 1, 43-52 (1996) · Zbl 0846.68041 · doi:10.1006/jcss.1996.0004
[22] Jeanette P. Schmidt, Alan Siegel & Aravind Srinivasan (1995). Chernoff-Hoeffding Bounds for Applications with Limited Independence. SIAM J. Discrete Math.8(2), 223-250. URL doi:10.1137/S089548019223872X · Zbl 0819.60032
[23] Ronen Shaltiel & Jad Silbak (2020). Explicit Uniquely Decodable Codes for Space Bounded Channels That Achieve List-Decoding Capacity. Electronic Colloquium on Computational Complexity (ECCC)27, 47. URL https://eccc.weizmann.ac.il/report/2020/047
[24] Shannon, Claude E., A mathematical theory of communication, The Bell system technical journal, 27, 3, 379-423 (1948) · Zbl 1154.94303 · doi:10.1002/j.1538-7305.1948.tb01338.x
[25] Amir Shpilka (2009). Constructions of Low-degree and Error-Correcting epsilon-Biased Generators. Computational Complexity18(4), 495-525. URL doi:10.1007/s00037-009-0281-5 · Zbl 1209.94055
[26] Adam D. Smith (2007). Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes. In Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, 395-404. URL http://dl.acm.org/citation.cfm?id=1283383.1283425 · Zbl 1302.94072
[27] M. Sudan (1997). Decoding of Reed Solomon Codes Beyond the Error-Correction Bound. Journal of Complexity13 · Zbl 0872.68026
[28] Avishay Tal (2014). Tight bounds on The Fourier Spectrum of AC \({}^{\text{0}} \). Electronic Colloquium on Computational Complexity (ECCC)21, 174. URL http://eccc.hpi-web.de/report/2014/174
[29] Luca Trevisan & Tongke Xue (2013). A Derandomized Switching Lemma and an Improved Derandomization of AC0. In Proceedings of the 28th Conference on Computational Complexity, CCC, 242-247. URL doi:10.1109/CCC.2013.32
[30] Salil P. Vadhan (2004). Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model. J. Cryptology17(1), 43-77. URL doi:10.1007/s00145-003-0237-x · Zbl 1071.94016
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.