Error Correcting Codes Questions Pool

Similar documents
Questions Pool. Amnon Ta-Shma and Dean Doron. January 2, Make sure you know how to solve. Do not submit.

Error Correcting Codes: Combinatorics, Algorithms and Applications Spring Homework Due Monday March 23, 2009 in class

Lecture 12: November 6, 2017

: Error Correcting Codes. October 2017 Lecture 1

Great Theoretical Ideas in Computer Science

Lecture 4: Codes based on Concatenation

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution

Reed-Solomon codes. Chapter Linear codes over finite fields

Local correctability of expander codes

: Error Correcting Codes. November 2017 Lecture 2

Lecture Introduction. 2 Formal Definition. CS CTT Current Topics in Theoretical CS Oct 30, 2012

Lecture 3: Error Correcting Codes

Lecture 8: Shannon s Noise Models

Locally Decodable Codes

Ma/CS 6b Class 25: Error Correcting Codes 2

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012

Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

MATH32031: Coding Theory Part 15: Summary

6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Lecture 03: Polynomial Based Codes

: Error Correcting Codes. December 2017 Lecture 10

Lecture 12: November 6, 2013

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

3x + 1 (mod 5) x + 2 (mod 5)

Efficiently decodable codes for the binary deletion channel

CSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4. Theorem 1. A non-zero, univariate polynomial with degree d has at most d roots.

3. Coding theory 3.1. Basic concepts

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

Lecture 12. Block Diagram

1 Randomized Computation

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Lecture 4: Proof of Shannon s theorem and an explicit code

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

EE 229B ERROR CONTROL CODING Spring 2005

List Decoding of Reed Solomon Codes

Lecture 17: Perfect Codes and Gilbert-Varshamov Bound

On Irreducible Polynomial Remainder Codes

Bridging Shannon and Hamming: List Error-Correction with Optimal Rate

Locally Decodable Codes

Discrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 11. Error Correcting Codes Erasure Errors

Discrete Mathematics and Probability Theory Fall 2017 Ramchandran and Rao Midterm 2 Solutions

Combinatória e Teoria de Códigos Exercises from the notes. Chapter 1

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

Computing Error Distance of Reed-Solomon Codes

Math 512 Syllabus Spring 2017, LIU Post

Lecture B04 : Linear codes and singleton bound

Physical Layer and Coding

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Lecture 3 Small bias with respect to linear tests

IMPROVING THE ALPHABET-SIZE IN EXPANDER BASED CODE CONSTRUCTIONS

Decoding Reed-Muller codes over product sets

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs

Algebraic Codes for Error Control

Lecture 6: Expander Codes

Orthogonal Arrays & Codes

Linear-algebraic list decoding for variants of Reed-Solomon codes

Notes for the Hong Kong Lectures on Algorithmic Coding Theory. Luca Trevisan. January 7, 2007

Rings, Paths, and Paley Graphs

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

Lecture 12: Reed-Solomon Codes

Lecture 28: Generalized Minimum Distance Decoding

Guess & Check Codes for Deletions, Insertions, and Synchronization

Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 6

Error Detection & Correction

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.

NOTES ON FINITE FIELDS

List-Decodable Codes

Part II. Number Theory. Year

Improving the Alphabet Size in Expander Based Code Constructions

Communications II Lecture 9: Error Correction Coding. Professor Kin K. Leung EEE and Computing Departments Imperial College London Copyright reserved

Arrangements, matroids and codes

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)

18.310A Final exam practice questions

Mathematics for Cryptography

Introduction to binary block codes

Information redundancy

Notes 3: Stochastic channels and noisy coding theorem bound. 1 Model of information communication and noisy channel

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

7.1 Definitions and Generator Polynomials

Information Theory. Lecture 7

Lecture 6: Deterministic Primality Testing

On the Complexity of Approximating the VC Dimension

COMPSCI 650 Applied Information Theory Apr 5, Lecture 18. Instructor: Arya Mazumdar Scribe: Hamed Zamani, Hadi Zolfaghari, Fatemeh Rezaei

Lecture 2 Linear Codes

Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method

00000, 01101, 10110, Find the information rate and the minimum distance of the binary code 0000, 0101, 0011, 0110, 1111, 1010, 1100, 1001.

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Moreover this binary operation satisfies the following properties

14 Diffie-Hellman Key Agreement

18.5 Crossings and incidences

atri/courses/coding-theory/book/

Finite fields, randomness and complexity. Swastik Kopparty Rutgers University

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Note 8

Generator Matrix. Theorem 6: If the generator polynomial g(x) of C has degree n-k then C is an [n,k]-cyclic code. If g(x) = a 0. a 1 a n k 1.

Lecture 9: List decoding Reed-Solomon and Folded Reed-Solomon codes

Lecture 19: Elias-Bassalygo Bound

Mathematics Masters Examination

Transcription:

Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to solve. Do not submit. Mandatory questions. Bonus questions. On the submission date we will collect your answers. We will then go over the questions and solve them in class. After that you have a week to write the solutions and submit to us, as long as 1. You write the solutions alone,. You give credit to any source (or any person) you consulted with. You have to submit solutions to, at least, the mandatory questions. We give the same grade to solutions that were submitted before or after we solved the question in class. 1

HW 1 Basic error-correcting codes. Out: 9.10.017 Due: 1.11.017 1. (Know). What is the expected number of roots of a random univariate polynomial of degree d over F q?. (Know). Let F q be a finite field of odd characteristic. An element x F q is a quadratic residue if there exists y F q such that x = y. What is the number of quadratic residues in F q? Prove that the set of quadratic residues is a multiplicative group. 3. (Know). Prove that the number of distinct generator matrices of [n, k] q codes is k 1 i=0 (qk q i ). 4. (Know). Let C be an [n, k, d] q code. We can extend C to C by adding a parity-check bit. That is, C = { x F n+1 q x 1 x n C, x 1 +... x n+1 = 0 } Prove that C is a linear code. parity-check matrix for C. Given a parity-check matrix for C, show how to obtain a 5. (Know). Let C be an [n, k, d] q code. We can puncture C by deleting the same coordinate in each codeword. Fix some i [n] and let C be the code C punctured on the i-th coordinate. Prove: (a) C is a linear code. (b) If d > 1, C is an [n 1, k, d ] q code where d = d 1 if C has minimum weight codeword with a nonzero i-th coordinate and d = d otherwise. 6. (Mandatory). Let C be an [n, k, d] code. (a) Prove that all the codewords of C have even weight, or half the codewords have even weight and half of them have odd weight. (b) Assume d is odd. Show that there exists a linear code C that is a [n, k 1, d + 1] code. 7. (Know). For integers k n we write B(k, n) = {x {0, 1} n w(x) k}. For p [0, 1 ], prove that B(pn, n) H(p) n 1 and lim n n log B(pn, n) = H(p). H(x) = x log x (1 x) log (1 x) is the binary entropy function, and H(0) = H(1) = 0. 8. (Know). Prove that for every [n, k, d] q code, d n k + 1. 9. (Know). For every k, give an explicit construction of a [ k, k + 1, k 1 ] code. 10. (Mandatory). Let C 1 and C be cyclic codes over F q with generator polynomials g 1 (x) and g (x) respectively. (a) Prove that C 1 C and C 1 + C are also cyclic and find their generating polynomial. (b) Prove that C 1 C if and only if g (x) g 1 (x).

11. (Know). A local decoder for a code C : C k {0, 1} n handling d errors is an algorithm that given an access to a string y such that (y, C(x)) d for some unknown x and an index j [k], runs in time poly(log n) and outputs x j with high probability. Show that for every δ < 1 4, the Hadamard code has a local decoder handling δ-fraction of errors. How many queries to you need in order to succeed with probability at least 1 ε? 1. (Bonus). Let C RS be the [n, k, n k + 1] q=n+1 RS code defined by evaluating degree k 1 polynomials over α 0,..., α n 1, where α is a generator of F q. Suppose that q = m for some integer m and consider C = C RS F n. (a) Prove that C is a binary linear code of distance at least d = n k + 1 and dimension at least n (d 1) log(n + 1). (b) Prove a better bound of n d 1 log(n + 1) on the dimension of C by finding redundant checks amongst the natural checks defining C. (c) For constant d (and growing n), prove that C has nearly optimal dimension, in the sense that the dimension cannot be n t log(n + 1) for t < d 1. 13. Alice holds x {0, 1} n and Bob holds y {0, 1} n and they wish to verify that x = y. The goal is to use as few communication bits as possible. We allow Alice and Bob to use private random coins, and allow one-sided error, i.e., if x = y Alice and Bob should always accept, whereas whenever x y Alice and Bob should reject with probability (over their coins) at least 1 ε. (a) (Mandatory). Show a protocol with ε one-sided error and log n ε communication bits. (b) (Bonus). A bipartite graph G = (V 1 = [N], V = [M], E) is a (K, α)-disperser if for every X V 1 of cardinality K, Γ(X) > (1 α)m (that is, every large enough set in V 1 misses less than an α-fraction of the vertices in V ). Prove that for every M K N and constant 0 < α < 1 there exists a (K, α)-disperser G = (V 1 = [N], V = [M], E) with degree D = O(log N K ). (c) (Bonus). Show a protocol with ε one-sided error and log n + O(log 1 ε ) communication bits. 14. (Mandatory). Write explicitly a parity check matrix for the Hamming [7, 4, 3] code that gives a cyclic code. 15. (Know). Prove Lemma 10 and 11 of Lecture 1. 3

HW Decoding and List Decoding. Out: 6.11.017 Due: 10.1.017 1. (Know). Show that the ring of multivariate polynomials is not a Euclidean ring (i.e., it does not satisfy the division-with-remainder property) but it is a unique factorization domain (i.e., every non-zero non-unit element can be written as a product of irreducible polynomials, uniquely up to order scalar multiplication).. (Know). Let C be an [n, k, d = n k + 1] q RS code. (a) Give a polynomial time algorithm that decodes C from up to d 1 erasures. 1 (b) Use the Berlekamp-Welch algorithm to give a polynomial time algorithm that decodes C from e errors and s erasures as long as d > e + s. 3. (Mandatory). To uniquely decode concatenated code, we first considered uniquely decoding the inner code and got bad parameters. In the GMD algorithm, we applied soft decoding on the inner code and reached half the distance. Instead, we can consider list-decoding the inner code (say even by brute force). Analyze this approach on the code that is obtained by concatenating Reed-Solomon with Hadamard. What is the decoding radius that you obtain? 4. (Mandatory). Prove the correctness of the following algorithm for unique decoding RS codes. Input: q, n, k where k < n q,e < n k+1. {(α i, y i )} n i=1, where α i are distinct elements of F = F q and y i F. Output: A polynomial p F[x] of degree at most k 1 with distance at most e from the given word. Algorithm: Find a polynomial Q : F F F such that deg Y (Q) = 1, i.e., Q(x, y) = A(x) + yb(x). deg(a) k + e 1, deg(b) e, For every i [n], Q(α i, y i ) = 0. You have to prove that such a Q exists and can be efficiently found. Then, find g F[x] such that y g Q and output it. You have to show that such a g exists, has small degree and is correct. 5. ( (Mandatory). In this question we give a decoding algorithm for binary C = [n = m, k = m ) r, m r ] RM codes (of evaluations over F m of all degree r multi-linear polynomials) from errors up to half the minimum distance. The running time of the algoritm will be polynomial in n, and therefore is allowed to be exponential in m. For a subset S [m], define the polynomial χ S : F m F defined by χ S (x) = i S x i. Any degree r polynomial P over F m can be uniquely expressed as P (x) = S [m], S r c S χ S (x) with c S F (Why?). 1 Recall that an erasure is marked with a special symbol?, so we know where an error has occurred, unlike the adversarial error model. 4

We are given some word g [n] F and we think of it as g : F m F. We are promised that g has distance e < m r / from a correct codeword p = S p Sχ S. (a) Prove that for all b F m r and a degree r polynomial P (x) = S [m], S r c S χ S (x), for any S [m], S = r, P (a) = c S. a F m,a S =b (b) For a given S [m], S = r, the algorithm goes over all b F m r. For each such b it computes z b = a F m,a S =b g(a). It outputs Maj b(z b ). Prove that the algorithm outputs p s. (c) Give a polynomial (in n) time decoding algorithm for C from any number of errors smaller than 1 m r. 6. (Mandatory). Let C be the [n = m, m, 1 ] Hadamard code. Let w F n be an arbitrary word. Prove that the number of codewords in radius 1 ε around w is O( 1 ), and in particular is ε independent of n. 7. (Mandatory). (a) Prove that there exists a mapping φ : F q R q such that: For every a F q, φ(a) = 1. For every a b F q, φ(a), φ(b) = 1 q 1. (b) Let C be a q-ary code of length n and minimum distance at least d. d n > 1 1 q then C qd qd (q 1)n. Prove that if 8. (Bonus). Let 1 k n be integers and let p 1 <... < p n be n distinct primes. Denote K = k i=1 p i and N = n i=1 p i. Consider the mapping E : Z K Z p1... Z pn defined by: E(m) = (m mod p 1,..., m mod p n ). (a) Suppose that m 1 m. For i [n], define the indicator b i such that b i = 1 iff E(m 1 ) i E(m ) i. Prove that n i=1 pb i i > N/K. Deduce that when m 1 m, (E(m 1 ), E(m )) n k + 1. (b) We will now adopt the Welch-Berlekamp algorithm to handle E. Suppose r = (r 1,..., r n ) is the received word, where r i Z pi. i. Prove there can be at most one m Z K such that p i N/K. (1) i:e(m) i r i In what follows, let r be the unique integer in Z N such that r mod p i = r i for every i [n] (note that the Chinese Remainder theorem guarantees that there is a unique such r). ii. Assuming such an m exists, prove that there exist integers y, z with 0 y < NK and 1 z N/K such that y rz (mod N). iii. Prove that if y, z are any integers satisfying the above conditions, then in fact m = y/z. Note that a pair of integers (y, z) satisfying the above can be found by integer linear programming in a fixed number of dimensions in polynomial time. 5

(c) Instead of condition (1), what if we want to decode under the more natural condition: {i E(m) i r i } n k? Show how this can be done by calling the above decoder many times and erasing the last i symbols for each choice of i [n]. 6

HW 3 List decoding, What can and cannot be done I. Out: 11.1.017 Due: 31.1.017 1. (Mandatory). Generalize the Guruswami-Sudan list-decoding algorithm to RM codes (the one with the multiplicities). For rate R RS codes, the Guruswami-Sudan decodes from relative distance δ 1 R. Show that your generalized algorithm achieves δ 1 r m+1 q where m is the number of variables, r is the total degree and q is the field size. Note that when m = 1 this is exactly the RS bound.. (Mandatory). In this question you will generalize the Guruswami-Sudan list-decoding algorithm to handle list recovery. Design and analyze an algorithm that gets as input q, n, k, L and n pairs {(α i, L i )} n i=1 such that L i F q and 1 n n i=1 L i L. It should be efficient, and output a list of polynomials p(x) of degree less than k such that for more than agr = nlk pairs j, p(α j ) L j. 3. (Mandatory). Let P : F n q F m q and Q : F l q F n q. Prove that for every a F l q, mult(p Q, a) mult(p, Q(a)) mult(q Q(a), a). 4. (Mandatory). In this question you will prove another bound on the length of a linear code of specific dimension and minimum distance, which when d q strengthens the Singleton bound. (a) Let C be an [n, k, d] q code. Let c C and consider the code C (c) that is obtained by puncturing the codewords of C at the nonzero indices of c. Prove that if c C has weight w < dq q 1, the code C (c) has length n w and dimension k 1. Prove that if c C has weight w < dq q 1, the code C (c) has distance at least d w + w q. (b) Prove that n k 1 i=0 d q i. 5. (Mandatory). Consider the q-ary erasure channel with erasure probability α: the input to this channel is a field element x F q, and the output is x with probability 1 α, and an erasure? with probability α. For a linear code C generated by an n k matrix G over F q, let D : (F q {?}) n C {fail} be the following decoder: { c if y agrees with exactly one c C on the unerased entries in F q D(y) = fail otherwise (a) For a set J [n], let p G (J) be the probability (over the channel noise and choice of a random message) that D outputs fail conditioned on the erasures being indexed by J. Prove that E G F n k[p q G (J)] q k n+ J. (b) Let p G be the be the probability that D outputs fail. Show that when k = Rn for R < 1 α, E G F n k[p q G ] is exponentially small in n. 7

(c) Conclude that one can reliably communicate on the q-ary erasure channel with erasure probability α at any rate less than 1 α using a linear code. 6. (Bonus). Let p < 1/. Prove that there exists a constant c = c(p) such that for every ε > 0 and large enough n, if C F n is a random linear code of rate at least 1 H(p) ε then it is (p, c ε ) list-decodable with probability 1 Ω(n). Use the following theorem: Let p < 1/. There exists a constant c = c(p) such that for every n and l = o( n), if X 1,..., X l are drawn uniformly and independently from B(0, pn), then Pr[ Span({X 1,..., X l }) B(0, pn) cl] (6 o(1))n. 8

HW 4 List decoding, What can and cannot be done II. Out: 31.1.017 Due: 14.1.018 1. (Know). Give an explicit representation of a Fourier basis (i.e., an orthonormal basis of homomorphisms) for V = {f : G C}, where: (a) G = Z p for a prime p. (b) G = Z n. Prove correctness.. (Mandatory). Let C be an [n, k = rn, d = δn] q code. Prove that r 1 q q 1 δ + o(1). 3. (Mandatory). In class we saw that there exists a linear code C of length n and distance d with C n B(d 1,n) and we want to (very slightly) improve upon this. Let v 1,..., v r F t such that no d 1 of them are linearly dependent. Prove that if B(d, r) < t then there exists w F t such that in v 1,..., v r, w no d 1 vectors are linearly dependent. Use the above to prove that there exists a linear code C of length n and distance d with C n B(d,n). 4. (Mandatory). We say H F n q is a hitting set for n-variate polynomials of total degree at most d over F q if for every nonzero such polynomial f there exists x H such that f(x) 0. Prove that if H is a hitting set for the above family of polynomials then H ( ) n+d n. 5. (Mandatory). Let H be a group and S H be a generating set. The Cayley graph C(H, S) is defined as follows: The vertices are labeled with elements of H, and (a, b) is an edge iff a = bs 1 for some s S. (a) What is G = C(Z n, {e 1,..., e n }), where e i has 1 in the i-th coordinate and 0 elsewhere? Calculate the eigenvalues and eigenvectors of the normalized adjacency matrix of G. (b) Let C be an [ n, n, 1 ε n] code where the weight of every codeword is at most 1+ε. Let S Z n be the rows of a generating matrix for C and denote G = C(Zn, S). What are the eigenvectors of A G, the normalized adjacency matrix of G? Let λ n... λ λ 1 be the eigenvalues of A G. Prove that max {λ, λ n} ε. 9