Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers Kiran Kedlaya Sergey Yekhanin MIT Microsoft Research.

Slides:



Advertisements
Similar presentations
Optimal Lower Bounds for 2-Query Locally Decodable Linear Codes Kenji Obata.
Advertisements

Xiaoming Sun Tsinghua University David Woodruff MIT
Tight Lower Bounds for the Distinct Elements Problem David Woodruff MIT Joint work with Piotr Indyk.
Computing with adversarial noise Aram Harrow (UW -> MIT) Matt Hastings (Duke/MSR) Anup Rao (UW)
Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
Multiplicity Codes Swastik Kopparty (Rutgers) (based on [K-Saraf-Yekhanin ’11], [K ‘12], [K ‘14])
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
On Complexity, Sampling, and -Nets and -Samples. Range Spaces A range space is a pair, where is a ground set, it’s elements called points and is a family.
The Communication Complexity of Approximate Set Packing and Covering
An Ω(n 1/3 ) Lower Bound for Bilinear Group Based Private Information Retrieval Alexander Razborov Sergey Yekhanin.
Information and Coding Theory
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
Locally Decodable Codes
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Linear-time encodable and decodable error-correcting codes Daniel A. Spielman Presented by Tian Sang Jed Liu 2003 March 3rd.
Constant Degree, Lossless Expanders Omer Reingold AT&T joint work with Michael Capalbo (IAS), Salil Vadhan (Harvard), and Avi Wigderson (Hebrew U., IAS)
Quantum Error Correction Michele Mosca. Quantum Error Correction: Bit Flip Errors l Suppose the environment will effect error (i.e. operation ) on our.
Correcting Errors Beyond the Guruswami-Sudan Radius Farzad Parvaresh & Alexander Vardy Presented by Efrat Bank.
The Goldreich-Levin Theorem: List-decoding the Hadamard code
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Private Information Retrieval. What is Private Information retrieval (PIR) ? Reduction from Private Information Retrieval (PIR) to Smooth Codes Constructions.
Quantum Computing Lecture 22 Michele Mosca. Correcting Phase Errors l Suppose the environment effects error on our quantum computer, where This is a description.
Locally Decodable Codes Uri Nadav. Contents What is Locally Decodable Code (LDC) ? Constructions Lower Bounds Reduction from Private Information Retrieval.
Variable-Length Codes: Huffman Codes
Codes with local decoding procedures Sergey Yekhanin Microsoft Research.
Linear-Time Encodable and Decodable Error-Correcting Codes Jed Liu 3 March 2003.
Mario Vodisek 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Erasure Codes for Reading and Writing Mario Vodisek ( joint work.
On the Complexity of Approximating the VC Dimension Chris Umans, Microsoft Research joint work with Elchanan Mossel, Microsoft Research June 2001.
Cardinality of a Set “The number of elements in a set.” Let A be a set. a.If A =  (the empty set), then the cardinality of A is 0. b. If A has exactly.
©2003/04 Alessandro Bogliolo Background Information theory Probability theory Algorithms.
Correlation testing for affine invariant properties on Shachar Lovett Institute for Advanced Study Joint with Hamed Hatami (McGill)
Computational Complexity Polynomial time O(n k ) input size n, k constant Tractable problems solvable in polynomial time(Opposite Intractable) Ex: sorting,
Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.
NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
Zeev Dvir Weizmann Institute of Science Amir Shpilka Technion Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits.
Basic Concepts of Encoding Codes, their efficiency and redundancy 1.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
IELM 511: Information System design Introduction Part 1. ISD for well structured data – relational and other DBMS Part 2. ISD for systems with non-uniformly.
Great Theoretical Ideas in Computer Science.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
1 Information Theory Nathanael Paul Oct. 09, 2002.
CS717 Algorithm-Based Fault Tolerance Matrix Multiplication Greg Bronevetsky.
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
ADVANTAGE of GENERATOR MATRIX:
Information Theory Linear Block Codes Jalal Al Roumy.
On Locally Decodable Codes Self Correctable Codes t-private PIR and Omer Barkol, Yuval Ishai and Enav Weinreb Technion, Israel.
Some Computation Problems in Coding Theory
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
Additive Combinatorics in Theoretical Computer Science Shachar Lovett (UCSD)
Sergey Yekhanin Institute for Advanced Study Lower Bounds on Noise.
RS – Reed Solomon Error correcting code. Error-correcting codes are clever ways of representing data so that one can recover the original information.
Codes for Symbol-Pair Read Channels Yuval Cassuto EPFL – ALGO Formerly: Hitachi GST Research November 3, 2010 IPG Seminar.
Locally Decodable Codes of fixed number of queries and Sub-exponential Length Article By Klim Efremenko Presented by Inon Peled 30 November 2008.
Random Access Codes and a Hypercontractive Inequality for
New Locally Decodable Codes and Private Information Retrieval Schemes
IERG6120 Lecture 22 Kenneth Shum Dec 2016.
New Characterizations in Turnstile Streams with Applications
Sublinear-Time Error-Correction and Error-Detection
Sublinear-Time Error-Correction and Error-Detection
Distinct Distances in the Plane
Algebraic Codes and Invariance
Local Error-Detection and Error-correction
Pseudo-derandomizing learning and approximation
RS – Reed Solomon List Decoding.
Uncertain Compression
Compact routing schemes with improved stretch
Lecture 15 The Minimum Distance of a Code (Section 4.4)
Zeev Dvir (Princeton) Shachar Lovett (IAS)
Presentation transcript:

Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers Kiran Kedlaya Sergey Yekhanin MIT Microsoft Research

An Inequality 

Error Correcting Codes In classical error correcting codes decoder needs to process the whole (corrupted) codeword to recover even a single bit of the original message! 0010…011 01… …001 n bit message N bit codeword Adversarial noise Decoder processes the (corrupted) codeword

Locally Decodable Codes Definition: Definition: A code C encoding n bits to N bits is called k-LDC if given a (linearly) corrupted codeword one can recover any particular bit of the message (w.h.p.) by reading only k randomly chosen bits. 0010…011 01… …001 n bit message N bit codeword Adversarial noise Decoder reads only k bits Codes with sub-linear decoding complexity!

Locally Decodable Codes Example: There is a 2-query LDC of length Exp(n). Example: There is a 2-query LDC of length Exp(n). Major question: Major question: What is the length of optimal k-query LDCs? Applications: Applications: – Cryptography (private information retrieval). – Worst-case to average case reductions. – Fault tolerant computation. – Data transmission / storage.

LDCs: progress in bounds 2-query: Tight bound - Exp(n) [KdW]. 3-query: Ω(n 2 / log log n) [W]. Lower bound: - Ω(n 2 / log log n) [W]. Upper bounds: Exp(n 1/2 ) [BIK]. (P olynomial interpolation.) - Exp(n 1/2 ) [BIK]. (P olynomial interpolation.) - Exp(n 1/t ), where 2 t -1 is prime [Y]. ( Point removal method.)  Exp(n 1/32,582,657 ) - unconditionally.  Exp(n o(1) ) - if there exist infinitely many Mersenne primes. Exp(n o(1) ) unconditionally. Goal: Obtain constant-query LDCs of length Exp(n o(1) ) unconditionally. Mersenne primes Primes

This work We undertake an in-depth study of the point removal method of [Y] to answer two questions: We undertake an in-depth study of the point removal method of [Y] to answer two questions: Are Mersenne primes essential to the method? Are Mersenne primes essential to the method? Has the method been pushed to its limit? Has the method been pushed to its limit?

Heart of the point removal method Definition: A set S  F q is t - combinatorially nice if …. Definition: A set S  F q is t - combinatorially nice if …. Definition: A set S  F q is k - algebraically nice if …. Definition: A set S  F q is k - algebraically nice if …. Theorem: If for some F q there exists S  F q such that: Theorem: If for some F q there exists S  F q such that: t-combinatorially nice and - S is t-combinatorially nice and - S is k-algebraically nice; then there exist k-query LDCs of length Exp(n 1/t ). Lemma: Let p = 2 t -1 be a Mersenne prime; then S = {1,2,4,…,2 t-1 } in F p is t-combinatorially nice and 3-algebraically nice.

Are Mersenne primes essential? Answer: No. Mersenne numbers with large prime factors are good enough! Theorem: Let  > 0. If P(2 t -1) > (2 t -1)  = p; then {1,2,…,2 t-1 }  F p is t-comb. nice and k(  )-algebr. nice; thus {1,2,…,2 t-1 }  F p is t-comb. nice and k(  )-algebr. nice; thus exist k(  ) – query LDCs of length Exp(n 1/t ). exist k(  ) – query LDCs of length Exp(n 1/t ). Notation: P(m) = the largest prime factor of m. Primes Large prime factors of Mersenne numbers Mersenne primes

Has the method been pushed to its limit? Answer: Yes. Unless we progress on some old number theory questions. Primes that are somewhat large factors of Mersenne numbers are necessary! Theorem: If for infinitely many t there is an F q and S  F q that is k- algebraically nice and t-combinatorially nice; then infinitely often: P(2 t -1) > ( t / 2 ) 1+1 / (k-2). The largest function f(t) for that P(2 t -1) > f(t) unconditionally infinitely often is: f(t) = t log 2 t / log log t. [Stewart]

LDCs and factors of Mersenne numbers P(2 t -1) = 2 t -1 (2 t -1)  P(2 t -1) > (2 t -1)  ( t / 2 ) 1+1 / (k-2) P(2 t -1) > ( t / 2 ) 1+1 / (k-2) g 2 P(2 t -1) > t log 2 t / log log t Sufficient Necessary Known Goal: Obtain constant-query codes of subexponential length.

About the proof Mersenne numbers with large prime factors yield nice subsets. Mersenne numbers with large prime factors yield nice subsets. Nice subsets of finite fields yield Mersenne numbers with somewhat large prime factors. Nice subsets of finite fields yield Mersenne numbers with somewhat large prime factors. (We will see a piece of the second proof.)

Nice subsets to large factors of Mersenne numbers Claim: 3-algebraically nice subsets of prime fields yield large prime factors of Mersenne numbers. Theorem: Suppose S  F p is 3-algebraically nice; then 2 t -1; - p | 2 t -1; - p > 0.75 t 2.

Proof: two steps S  F p is 3-algebraically nice; S  F p is 3-algebraically nice; then there exist  1  2  3 in C p such that:  1 +  2 +  3 = 0. There exist  1  2  3 in C p such that:  1 +  2 +  3 = 0; There exist  1  2  3 in C p such that:  1 +  2 +  3 = 0; then 2 t -1 and p > 0.25 t 2. then p | 2 t -1 and p > 0.25 t 2. Notation: C p - the set of p-th roots of unity in F 2. (We will go over the second step.)

Proof of the second step - I Lemma: There exist  1  2  3 in C p such that:  1 +  2 +  3 = 0; then 2 t -1 and p > 0.25 t 2. then p | 2 t -1 and p > 0.25 t 2.Proof: Let t be the smallest such that C p  F 2. Let t be the smallest such that C p  F 2. p | 2 t -1; p | 2 t -1; Elements of C p \ {1} are proper elements of F 2 i.e., Elements of C p \ {1} are proper elements of F 2 i.e., for  in C p \ {1}, and f(x) in F 2 [x], deg f < t: f(  ) = 0. for  in C p \ {1}, and f(x) in F 2 [x], deg f < t: f(  ) = 0. t t F 2 CpCp t

Proof of the second step - II Proof (continued): Let  i denote elements of C p. Let  i denote elements of C p.  1 +  2 +  3 = 0; yields  4 = 1 +  5.  1 +  2 +  3 = 0; yields  4 = 1 +  5. –  4 =   1 ;  5 =   3 Fix  in C p such that (1+  ) is in C p. Fix  in C p such that (1+  ) is in C p. Consider the set Z={  a (1 +  ) b | a,b in [0,…, t/2-1]}. Consider the set Z={  a (1 +  ) b | a,b in [0,…, t/2-1]}.  a (1 +  ) b   c (1 +  ) d else we would have: f(  ) = 0, where deg f < t.  a (1 +  ) b   c (1 +  ) d else we would have: f(  ) = 0, where deg f < t. Thus, |Z| = (t / 2) 2 and hence p > (t / 2) 2.

Conclusions: Summary: Summary: Further progress on upper bounds for LDCs via point removal method is tied to progress on lower bounds for prime factors of Mersenne numbers. Hopes: Hopes: – Progress in number theory problems. – Broader generalizations of the method. (finite rings?)