Skip to main content

Showing 1–50 of 92 results for author: Etzion, T

.
  1. arXiv:2405.08475  [pdf, ps, other

    cs.IT

    Representing Information on DNA using Patterns Induced by Enzymatic Labeling

    Authors: Daniella Bar-Lev, Tuvi Etzion, Eitan Yaakobi, Zohar Yakhini

    Abstract: Enzymatic DNA labeling is a powerful tool with applications in biochemistry, molecular biology, biotechnology, medical science, and genomic research. This paper contributes to the evolving field of DNA-based data storage by presenting a formal framework for modeling DNA labeling in strings, specifically tailored for data storage purposes. Our approach involves a known DNA molecule as a template fo… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: Accepted to The IEEE International Symposium on Information Theory (ISIT) 2024

  2. arXiv:2405.07180  [pdf, other

    cs.IT

    Repairing Reed-Solomon Codes with Side Information

    Authors: Thi Xinh Dinh, Ba Thong Le, Son Hoang Dau, Serdar Boztas, Stanislav Kruglik, Han Mao Kiah, Emanuele Viterbo, Tuvi Etzion, Yeow Meng Chee

    Abstract: We generalize the problem of recovering a lost/erased symbol in a Reed-Solomon code to the scenario in which some side information about the lost symbol is known. The side information is represented as a set $S$ of linearly independent combinations of the sub-symbols of the lost symbol. When $S = \varnothing$, this reduces to the standard problem of repairing a single codeword symbol. When $S$ is… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    MSC Class: 94B05; 94B60 ACM Class: E.4

  3. arXiv:2405.03614  [pdf, ps, other

    cs.IT

    Repairing with Zero Skip Cost

    Authors: Wenqin Zhang, Yeow Meng Chee, Son Hoang Dau, Tuvi Etzion, Han Mao Kiah, Yuan Luo

    Abstract: To measure repair latency at helper nodes, we introduce a new metric called skip cost that quantifies the number of contiguous sections accessed on a disk. We provide explicit constructions of zigzag codes and fractional repetition codes that incur zero skip cost

    Submitted 6 May, 2024; originally announced May 2024.

  4. arXiv:2405.00258  [pdf, ps, other

    cs.IT

    Nearly Perfect Covering Codes

    Authors: Avital Boruchovsky, Tuvi Etzion

    Abstract: Nearly perfect packing codes are those codes that meet the Johnson upper bound on the size of error-correcting codes. This bound is an improvement to the sphere-packing bound. A related bound for covering codes is known as the van Wee bound. Codes that meet this bound will be called nearly perfect covering codes. In this paper, such codes with covering radius one will be considered. It will be pro… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

  5. arXiv:2404.13674  [pdf, ps, other

    cs.IT

    On de Bruijn Covering Sequences and Arrays

    Authors: Yeow Meng Chee, Tuvi Etzion, Hoang Ta, Van Khu Vu

    Abstract: An $(m,n,R)$-de Bruijn covering array (dBCA) is a doubly periodic $M \times N$ array over an alphabet of size $q$ such that the set of all its $m \times n$ windows form a covering code with radius $R$. An upper bound of the smallest array area of an $(m,n,R)$-dBCA is provided using a probabilistic technique which is similar to the one that was used for an upper bound on the length of a de Bruijn c… ▽ More

    Submitted 9 May, 2024; v1 submitted 21 April, 2024; originally announced April 2024.

  6. arXiv:2403.20170  [pdf, ps, other

    cs.IT

    Recovery Sets of Subspaces from a Simplex Code

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Hui Zhang

    Abstract: Recovery sets for vectors and subspaces are important in the construction of distributed storage system codes. These concepts are also interesting in their own right. In this paper, we consider the following very basic recovery question: what is the maximum number of possible pairwise disjoint recovery sets for each recovered element? The recovered elements in this work are d-dimensional subspaces… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

  7. arXiv:2403.01454  [pdf, ps, other

    cs.IT

    Maximum Length RLL Sequences in de Bruijn Graph

    Authors: Yeow Meng Chee, Tuvi Etzion, Tien Long Nguyen, Duy Hoang Ta, Vinh Duc Tran, Van Khu Vu

    Abstract: A timing and synchronization system based on a de Bruijn sequence has been proposed and studied recently for a channel associated with quantum communication that requires reliable synchronization. To avoid a long period of no-pulse in such a system on-off pulses are used to simulate a zero and on-on pulses are used to simulate a one. However, these sequences have high redundancy. To reduce the red… ▽ More

    Submitted 3 March, 2024; originally announced March 2024.

  8. arXiv:2401.15368  [pdf, ps, other

    cs.IT

    The Capacity of the Weighted Read Channel

    Authors: Omer Yerushalmi, Tuvi Etzion, Eitan Yaakobi

    Abstract: One of the primary sequencing methods gaining prominence in DNA storage is nanopore sequencing, attributed to various factors. In this work, we consider a simplified model of the sequencer, characterized as a channel. This channel takes a sequence and processes it using a sliding window of length $\ell$, shifting the window by $δ$ characters each time. The output of this channel, which we refer to… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

  9. arXiv:2311.04451  [pdf, ps, other

    cs.IT

    Pseduo-Random and de Bruijn Array Codes

    Authors: Tuvi Etzion

    Abstract: Pseudo-random arrays and perfect maps are the two-dimensional analogs of M-sequences and de Bruijn sequences, respectively. We modify the definitions to be applied to codes. These codes are also the two-dimensional analogs of certain factors in the de Bruijn graph. These factors are called zero factors and perfect factors in the de Bruijn graph. We apply a folding technique to construct pseudo-ran… ▽ More

    Submitted 13 May, 2024; v1 submitted 7 November, 2023; originally announced November 2023.

  10. arXiv:2306.03685  [pdf, ps, other

    math.CO

    Permutations that separate close elements, and rectangle packings in the torus

    Authors: Simon R. Blackburn, Tuvi Etzion

    Abstract: Let $n$, $s$ and $k$ be positive integers. For distinct $i,j\in\mathbb{Z}_n$, define $||i,j||_n$ to be the distance between $i$ and $j$ when the elements of $\mathbb{Z}_n$ are written in a circle. So \[ ||i,j||_n=\min\{(i-j)\bmod n,(j-i)\bmod n\}. \] A permutation $π:\mathbb{Z}_n\rightarrow\mathbb {Z}_n$ is \emph{$(s,k)$-clash-free} if $||π(i),π(j)||_n\geq k$ whenever $||i,j||_n<s$. So an $(s,k)$-… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: 21 pages, 6 figures

    MSC Class: 05B40; 05A05

  11. arXiv:2305.05972  [pdf, other

    cs.IT cs.DS

    Coding for IBLTs with Listing Guarantees

    Authors: Daniella Bar-Lev, Avi Mizrahi, Tuvi Etzion, Ori Rottenstreich, Eitan Yaakobi

    Abstract: The Invertible Bloom Lookup Table (IBLT) is a probabilistic data structure for set representation, with applications in network and traffic monitoring. It is known for its ability to list its elements, an operation that succeeds with high probability for sufficiently large table. However, listing can fail even for relatively small sets. This paper extends recent work on the worst-case analysis of… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  12. arXiv:2206.07995  [pdf, ps, other

    cs.IT math.CO

    On the Size of Balls and Anticodes of Small Diameter under the Fixed-Length Levenshtein Metric

    Authors: Daniella Bar-Lev, Tuvi Etzion, Eitan Yaakobi

    Abstract: The rapid development of DNA storage has brought the deletion and insertion channel to the front line of research. When the number of deletions is equal to the number of insertions, the Fixed Length Levenshtein (FLL) metric is the right measure for the distance between two words of the same length. Similar to any other metric, the size of a ball is one of the most fundamental parameters. In this w… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

    Comments: arXiv admin note: text overlap with arXiv:2103.01681

  13. arXiv:2206.03711  [pdf, other

    cs.IT

    Covering Sequences for $\ell$-Tuples

    Authors: Sagi Marcovich, Tuvi Etzion, Eitan Yaakobi

    Abstract: de Bruijn sequences of order $\ell$, i.e., sequences that contain each $\ell$-tuple as a window exactly once, have found many diverse applications in information theory and most recently in DNA storage. This family of binary sequences has rate of $1/2$. To overcome this low rate, we study $\ell$-tuples covering sequences, which impose that each $\ell$-tuple appears at least once as a window in the… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

  14. arXiv:2109.00613  [pdf, ps, other

    cs.IT math.CO

    Non-Binary Diameter Perfect Constant-Weight Codes

    Authors: Tuvi Etzion

    Abstract: Diameter perfect codes form a natural generalization for perfect codes. They are based on the code-anticode bound which generalizes the sphere-packing bound. The code-anticode bound was proved by Delsarte for distance-regular graphs and it holds for some other metrics too. In this paper we prove the bound for non-binary constant-weight codes with the Hamming metric and characterize the diameter pe… ▽ More

    Submitted 25 September, 2021; v1 submitted 1 September, 2021; originally announced September 2021.

  15. arXiv:2109.00031  [pdf

    cs.IT cs.AI

    Deep DNA Storage: Scalable and Robust DNA Storage via Coding Theory and Deep Learning

    Authors: Daniella Bar-Lev, Itai Orr, Omer Sabary, Tuvi Etzion, Eitan Yaakobi

    Abstract: DNA-based storage is an emerging technology that enables digital information to be archived in DNA molecules. This method enjoys major advantages over magnetic and optical storage solutions such as exceptional information density, enhanced data durability, and negligible power consumption to maintain data integrity. To access the data, an information retrieval process is employed, where some of th… ▽ More

    Submitted 11 March, 2024; v1 submitted 31 August, 2021; originally announced September 2021.

  16. arXiv:2103.01681  [pdf, ps, other

    cs.IT

    On Levenshtein Balls with Radius One

    Authors: Daniella Bar-Lev, Tuvi Etzion, Eitan Yaakobi

    Abstract: The rapid development of DNA storage has brought the deletion and insertion channel, once again, to the front line of research. When the number of deletions is equal to the number of insertions, the Fixed Length Levenshtein (FLL) metric is the right measure for the distance between two words of the same length. The size of a ball is one of the most fundamental parameters in any metric. The size of… ▽ More

    Submitted 29 June, 2021; v1 submitted 2 March, 2021; originally announced March 2021.

    Comments: 6 pages, to be published in 2021 IEEE International Symposium on Information Theory (ISIT)

  17. arXiv:2007.11626  [pdf, ps, other

    math.CO

    Explicit Baranyai Partitions for Quadruples, Part I: Quadrupling Constructions

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Chengmin Wang

    Abstract: It is well known that, whenever $k$ divides $n$, the complete $k$-uniform hypergraph on $n$ vertices can be partitioned into disjoint perfect matchings. Equivalently, the set of $k$-subsets of an $n$-set can be partitioned into parallel classes so that each parallel class is a partition of the $n$-set. This result is known as Baranyai's theorem, which guarantees the existence of \emph{Baranyai par… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

  18. arXiv:2007.09608  [pdf, ps, other

    math.CO

    Large Sets with Multiplicity

    Authors: Tuvi Etzion, Junling Zhou

    Abstract: Large sets of combinatorial designs has always been a fascinating topic in design theory. These designs form a partition of the whole space into combinatorial designs with the same parameters. In particular, a large set of block designs, whose blocks are of size $k$ taken from an $n$-set, is a partition of all the $k$-subsets of the $n$-set into disjoint copies of block designs, defined on the… ▽ More

    Submitted 19 July, 2020; originally announced July 2020.

  19. arXiv:2005.03102  [pdf, ps, other

    cs.IT

    Constrained de Bruijn Codes: Properties, Enumeration, Constructions, and Applications

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Van Khu Vu, Eitan yaakobi

    Abstract: The de Bruijn graph, its sequences, and their various generalizations, have found many applications in information theory, including many new ones in the last decade. In this paper, motivated by a coding problem for emerging memory technologies, a set of sequences which generalize sequences in the de Bruijn graph are defined. These sequences can be also defined and viewed as constrained sequences.… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

  20. arXiv:2001.09103  [pdf, ps, other

    math.CO

    Block-avoiding point sequencings

    Authors: Simon R. Blackburn, Tuvi Etzion

    Abstract: Let $n$ and $\ell$ be positive integers. Recent papers by Kreher, Stinson and Veitch have explored variants of the problem of ordering the points in a triple system (such as a Steiner triple system, directed triple system or Mendelsohn triple system) on $n$ points so that no block occurs in a segment of $\ell$ consecutive entries (thus the ordering is locally block-avoiding). We describe a greedy… ▽ More

    Submitted 6 January, 2021; v1 submitted 24 January, 2020; originally announced January 2020.

    Comments: 38 pages. Typo in the statement of Theorem 17 corrected, and other minor changes made

    MSC Class: 05B07; 05B05

  21. arXiv:1912.11617  [pdf, ps, other

    cs.CR cs.SC

    Efficient Algorithm for the Linear Complexity of Sequences and Some Related Consequences

    Authors: Yeow Meng Chee, Johan Chrisnata, Tuvi Etzion, Han Mao Kiah

    Abstract: The linear complexity of a sequence $s$ is one of the measures of its predictability. It represents the smallest degree of a linear recursion which the sequence satisfies. There are several algorithms to find the linear complexity of a periodic sequence $s$ of length $N$ (where $N$ is of some given form) over a finite field $F_q$ in $O(N)$ symbol field operations. The first such algorithm is The G… ▽ More

    Submitted 25 December, 2019; originally announced December 2019.

  22. arXiv:1912.04489  [pdf, ps, other

    math.CO

    An improved Recursive Construction for Disjoint Steiner Quadruple Systems

    Authors: Tuvi Etzion, Junling Zhou

    Abstract: Let $D(n)$ be the number of pairwise disjoint Steiner quadruple systems. A simple counting argument shows that $D(n) \leq n-3$ and a set of $n-3$ such systems is called a large set. No nontrivial large set was constructed yet, although it is known that they exist if $n \equiv 2$ or $4~(\text{mod}~6)$ is large enough. When $n \geq 7$ and $n \equiv 1$ or $5~(\text{mod}~6)$, we present a recursive co… ▽ More

    Submitted 9 December, 2019; originally announced December 2019.

  23. Subspace Packings -- Constructions and Bounds

    Authors: Tuvi Etzion, Sascha Kurz, Kamil Otal, Ferruh Özbudak

    Abstract: The Grassmannian $\mathcal{G}_q(n,k)$ is the set of all $k$-dimensional subspaces of the vector space $\mathbb{F}_q^n$. Kötter and Kschischang showed that codes in Grassmannian space can be used for error-correction in random network coding. On the other hand, these codes are $q$-analogs of codes in the Johnson scheme, i.e., constant dimension codes. These codes of the Grassmannian… ▽ More

    Submitted 2 January, 2020; v1 submitted 13 September, 2019; originally announced September 2019.

    Comments: 30 pages, 27 tables, continuation of arXiv:1811.04611, typos corrected

    MSC Class: 94B65; 94B60; 51E20

  24. arXiv:1907.10724  [pdf, ps, other

    cs.IT

    Private Proximity Retrieval Codes

    Authors: Yiwei Zhang, Eitan Yaakobi, Tuvi Etzion

    Abstract: A \emph{private proximity retrieval} (\emph{PPR}) scheme is a protocol which allows a user to retrieve the identities of all records in a database that are within some distance $r$ from the user's record $x$. The user's \emph{privacy} at each server is given by the fraction of the record $x$ that is kept private. In this paper, this research is initiated and protocols that offer trade-offs between… ▽ More

    Submitted 8 August, 2019; v1 submitted 24 July, 2019; originally announced July 2019.

  25. arXiv:1901.01605  [pdf, ps, other

    cs.IT

    Bounds on the Length of Functional PIR and Batch codes

    Authors: Yiwei Zhang, Eitan yaakobi, Tuvi Etzion

    Abstract: A functional $k$-PIR code of dimension $s$ consists of $n$ servers storing linear combinations of $s$ linearly independent information symbols. Any linear combination of the $s$ information symbols can be recovered by $k$ disjoint subsets of servers. The goal is to find the smallest number of servers for given $k$ and $s$. We provide lower bounds on the number of servers and constructions which yi… ▽ More

    Submitted 15 April, 2019; v1 submitted 6 January, 2019; originally announced January 2019.

  26. arXiv:1901.01058  [pdf, other

    cs.IT

    Network-Coding Solutions for Minimal Combination Networks and Their Sub-networks

    Authors: Han Cai, Johan Chrisnata, Tuvi Etzion, Moshe Schwartz, Antonia Wachter-Zeh

    Abstract: Minimal multicast networks are fascinating and efficient combinatorial objects, where the removal of a single link makes it impossible for all receivers to obtain all messages. We study the structure of such networks, and prove some constraints on their possible solutions. We then focus on the combination network, which is one of the simplest and most insightful network in network-coding theory.… ▽ More

    Submitted 13 September, 2019; v1 submitted 4 January, 2019; originally announced January 2019.

  27. arXiv:1811.04611  [pdf, ps, other

    cs.IT

    Subspace Packings

    Authors: Tuvi Etzion, Sascha Kurz, Kamil Otal, Ferruh Özbudak

    Abstract: The Grassmannian ${\mathcal G}_q(n,k)$ is the set of all $k$-dimensional subspaces of the vector space $\mathbb{F}_q^n$. It is well known that codes in the Grassmannian space can be used for error-correction in random network coding. On the other hand, these codes are $q$-analogs of codes in the Johnson scheme, i.e. constant dimension codes. These codes of the Grassmannian ${\mathcal G}_q(n,k)$ al… ▽ More

    Submitted 1 March, 2019; v1 submitted 12 November, 2018; originally announced November 2018.

    Comments: 10 pages, 3 tables, typos corrected

    MSC Class: 05B40; 51E20; 11T71; 94B25

  28. arXiv:1808.09535  [pdf, ps, other

    cs.IT

    Low-Power Cooling Codes with Efficient Encoding and Decoding

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Hengjia Wei

    Abstract: A class of low-power cooling (LPC) codes, to control simultaneously both the peak temperature and the average power consumption of interconnects, was introduced recently. An $(n,t,w)$-LPC code is a coding scheme over $n$ wires that (A) avoids state transitions on the $t$ hottest wires (cooling), and (B) limits the number of transitions to $w$ in each transmission (low-power). A few constructions… ▽ More

    Submitted 19 March, 2019; v1 submitted 16 August, 2018; originally announced August 2018.

  29. arXiv:1807.10954  [pdf, other

    math.CO

    Domination Map**s into the Hamming Ball: Existence, Constructions, and Algorithms

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy

    Abstract: The Hamming ball of radius $w$ in $\{0,1\}^n$ is the set ${\cal B}(n,w)$ of all binary words of length $n$ and Hamming weight at most $w$. We consider injective map**s $\varphi: \{0,1\}^m \to {\cal B}(n,w)$ with the following domination property: every position $j \in [n]$ is dominated by some position $i \in [m]$, in the sense that "switching off" position $i$ in $x \in \{0,1\}^m$ necessarily s… ▽ More

    Submitted 28 July, 2018; originally announced July 2018.

  30. arXiv:1804.02692  [pdf, other

    cs.IT

    On the Access Complexity of PIR Schemes

    Authors: Yiwei Zhang, Eitan Yaakobi, Tuvi Etzion, Moshe Schwartz

    Abstract: Private information retrieval has been reformulated in an information-theoretic perspective in recent years. The two most important parameters considered for a PIR scheme in a distributed storage system are the storage overhead and PIR rate. The complexity of the computations done by the servers for the various tasks of the distributed storage system is an important parameter in such systems which… ▽ More

    Submitted 23 January, 2019; v1 submitted 8 April, 2018; originally announced April 2018.

  31. arXiv:1801.02329  [pdf, other

    cs.IT

    Grassmannian Codes with New Distance Measures for Network Coding

    Authors: Tuvi Etzion, Hui Zhang

    Abstract: Grassmannian codes are known to be useful in error-correction for random network coding. Recently, they were used to prove that vector network codes outperform scalar linear network codes, on multicast networks, with respect to the alphabet size. The multicast networks which were used for this purpose are generalized combination networks. In both the scalar and the vector network coding solutions,… ▽ More

    Submitted 8 February, 2019; v1 submitted 8 January, 2018; originally announced January 2018.

  32. arXiv:1704.07714  [pdf, ps, other

    math.CO

    Residual $q$-Fano Planes and Related Structures

    Authors: Tuvi Etzion, Niv Hooker

    Abstract: One of the most intriguing problems, in $q$-analogs of designs, is the existence question of an infinite family of $q$-analog of Steiner systems, known also as $q$-Steiner systems, (spreads not included) in general, and the existence question for the $q$-analog of the Fano plane, known also as the $q$-Fano plane, in particular. These questions are in the front line of open problems in block design… ▽ More

    Submitted 20 November, 2017; v1 submitted 25 April, 2017; originally announced April 2017.

  33. arXiv:1701.07872  [pdf, other

    cs.IT

    Cooling Codes: Thermal-Management Coding for High-Performance Interconnects

    Authors: Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy

    Abstract: High temperatures have dramatic negative effects on interconnect performance and, hence, numerous techniques have been proposed to reduce the power consumption of on-chip buses. However, existing methods fall short of fully addressing the thermal challenges posed by high-performance interconnects. In this paper, we introduce new efficient coding schemes that make it possible to directly control th… ▽ More

    Submitted 23 October, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

  34. arXiv:1701.07501  [pdf, other

    cs.IT

    Locality and Availability of Array Codes Constructed from Subspaces

    Authors: Natalia Silberstein, Tuvi Etzion, Moshe Schwartz

    Abstract: Ever-increasing amounts of data are created and processed in internet-scale companies such as Google, Facebook, and Amazon. The efficient storage of such copious amounts of data has thus become a fundamental and acute problem in modern computing. No single machine can possibly satisfy such immense storage demands. Therefore, distributed storage systems (DSS), which rely on tens of thousands of sto… ▽ More

    Submitted 23 June, 2018; v1 submitted 25 January, 2017; originally announced January 2017.

  35. arXiv:1609.08067  [pdf, ps, other

    cs.IT cs.DM

    Metrics Based on Finite Directed Graphs and Coding Invariants

    Authors: Tuvi Etzion, Marcelo Firer, Roberto Assis Machado

    Abstract: Given a finite directed graph with $n$ vertices, we define a metric $d_G$ on $\mathbb{F}_q^n$, where $\mathbb{F}_q$ is the finite field with $q$ elements. The weight of a word is defined as the number of vertices that can be reached by a directed path starting at the support of the vector. Two canonical forms, which do not affect the metric, are given to each graph. Based on these forms we charact… ▽ More

    Submitted 1 May, 2017; v1 submitted 26 September, 2016; originally announced September 2016.

  36. arXiv:1609.07070  [pdf, ps, other

    cs.IT

    PIR Array Codes with Optimal PIR Rates

    Authors: Simon R. Blackburn, Tuvi Etzion

    Abstract: There has been much recent interest in Private information Retrieval (PIR) in models where a database is stored across several servers using coding techniques from distributed storage, rather than being simply replicated. In particular, a recent breakthrough result of Fazelli, Vardy and Yaakobi introduces the notion of a PIR code and a PIR array code, and uses this notion to produce efficient prot… ▽ More

    Submitted 17 December, 2016; v1 submitted 22 September, 2016; originally announced September 2016.

    Comments: A conference version for arXiv:1607.00235

  37. arXiv:1609.07027  [pdf, ps, other

    cs.IT cs.CR

    PIR schemes with small download complexity and low storage requirements

    Authors: Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson

    Abstract: In the classical model for (information theoretically secure) Private Information Retrieval (PIR), a user wishes to retrieve one bit of a database that is stored on a set of $n$ servers, in such a way that no individual server gains information about which bit the user is interested in. The aim is to design schemes that minimise communication between the user and the servers. More recently, there… ▽ More

    Submitted 4 December, 2018; v1 submitted 22 September, 2016; originally announced September 2016.

    Comments: 30 pages. Minor updates and corrections throughout, with updated bibliography

    MSC Class: 94A60

  38. arXiv:1607.00235  [pdf, ps, other

    cs.IT

    PIR Array Codes with Optimal Virtual Server Rate

    Authors: Simon Blackburn, Tuvi Etzion

    Abstract: There has been much recent interest in Private information Retrieval (PIR) in models where a database is stored across several servers using coding techniques from distributed storage, rather than being simply replicated. In particular, a recent breakthrough result of Fazelli, Vardy and Yaakobi introduces the notion of a PIR code and a PIR array code, and uses this notion to produce efficient PIR… ▽ More

    Submitted 6 February, 2018; v1 submitted 1 July, 2016; originally announced July 2016.

  39. arXiv:1604.03292  [pdf, other

    cs.IT

    Vector Network Coding Based on Subspace Codes Outperforms Scalar Linear Network Coding

    Authors: Tuvi Etzion, Antonia Wachter-Zeh

    Abstract: This paper considers vector network coding based on rank-metric codes and subspace codes. Our main result is that vector network coding can significantly reduce the required field size compared to scalar linear network coding in the same multicast network. The achieved gap between the field size of scalar and vector network coding is in the order of $q^{(\ell-1)t^2/\ell}-q^t$, for any $q \geq 2$,… ▽ More

    Submitted 13 May, 2016; v1 submitted 12 April, 2016; originally announced April 2016.

    Comments: Accepted for ISIT 2016. Short version of arXiv:1512.06352

  40. arXiv:1512.06352  [pdf, ps, other

    cs.IT

    Vector Network Coding Based on Subspace Codes Outperforms Scalar Linear Network Coding

    Authors: Tuvi Etzion, Antonia Wachter-Zeh

    Abstract: This paper considers vector network coding solutions based on rank-metric codes and subspace codes. The main result of this paper is that vector solutions can significantly reduce the required alphabet size compared to the optimal scalar linear solution for the same multicast network. The multicast networks considered in this paper have one source with $h$ messages, and the vector solution is over… ▽ More

    Submitted 14 January, 2018; v1 submitted 20 December, 2015; originally announced December 2015.

    Comments: to appear in IEEE Transactions on Information Theory

  41. arXiv:1509.03072   

    math.CO

    Regular Graphs with Forbidden Subgraphs of $K_n$ with $k$ Edges

    Authors: Tuvi Etzion

    Abstract: In this paper we raise a variant of a classic problem in extremal graph theory, which is motivated by a design of fractional repetition codes, a model in distributed storage systems. For any feasible positive integers $d\geq 3$, $n \geq 3$, and $k$, where $n-1 \leq k \leq \binom{n}{2}$, what is the minimum possible number of vertices in a $d$-regular undirected graph whose subgraphs with $n$ verti… ▽ More

    Submitted 12 August, 2016; v1 submitted 10 September, 2015; originally announced September 2015.

    Comments: I want to rewrite it and start it fresh

  42. arXiv:1508.01839  [pdf, ps, other

    math.CO

    On the Structure of the $q$-Fano Plane

    Authors: Tuvi Etzion

    Abstract: The $q$-Fano plane is the $q$-analog of the Steiner system $S(2,3,7)$. For any given prime power $q$ it is not known whether the $q$-Fano plane exists or not. We consider the structure of the $q$-Fano plane for any given $q$ and conclude that most of its structure is known. Even so, we were unable to determine whether it exists or not. A special attention is given for the case $q=2$ which was cons… ▽ More

    Submitted 15 August, 2015; v1 submitted 7 August, 2015; originally announced August 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1507.08503

  43. arXiv:1507.08503  [pdf, ps, other

    math.CO

    A New Approach to Examine q-Steiner Systems

    Authors: Tuvi Etzion

    Abstract: One of the most intriguing problems, in $q$-analogs of designs and codes, is the existence question of an infinite family of $q$-analog of Steiner systems (spreads not included) in general, and the existence question for the $q$-analog of the Fano plane in particular. We exhibit a completely new method to attack this problem. In the process we define a new family of designs whose existence is im… ▽ More

    Submitted 4 February, 2017; v1 submitted 30 July, 2015; originally announced July 2015.

  44. arXiv:1505.00919  [pdf, ps, other

    cs.IT

    Constructions of High-Rate MSR Codes over Small Fields

    Authors: Netanel Raviv, Natalia Silberstein, Tuvi Etzion

    Abstract: A novel technique for construction of minimum storage regenerating (MSR) codes is presented. Based on this technique, three explicit constructions of MSR codes are given. The first two constructions provide access-optimal MSR codes, with two and three parities, respectively, which attain the sub-packetization bound for access-optimal codes. The third construction provides longer MSR codes with thr… ▽ More

    Submitted 28 January, 2016; v1 submitted 5 May, 2015; originally announced May 2015.

  45. arXiv:1501.05177  [pdf, other

    cs.IT cs.DM

    Optimal Fractional Repetition Codes and Fractional Repetition Batch Codes

    Authors: Natalia Silberstein, Tuvi Etzion

    Abstract: Fractional repetition (FR) codes is a family of codes for distributed storage systems (DSS) that allow uncoded exact repairs with minimum repair bandwidth. In this work, we consider a bound on the maximum amount of data that can be stored using an FR code. Optimal FR codes which attain this bound are presented. The constructions of these FR codes are based on families of regular graphs, such as Tu… ▽ More

    Submitted 21 January, 2015; originally announced January 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1401.4734

  46. arXiv:1410.8433  [pdf, ps, other

    cs.IT

    Binary Polarization Kernels from Code Decompositions

    Authors: Noam Presman, Ofer Shapira, Simon Litsyn, Tuvi Etzion, Alexander Vardy

    Abstract: In this paper, code decompositions (a.k.a. code nestings) are used to design binary polarization kernels. The proposed kernels are in general non-linear. They provide a better polarization exponent than the previously known kernels of the same dimensions. In particular, non-linear kernels of dimensions 14, 15, and 16 are constructed and are shown to have optimal asymptotic error-correction perform… ▽ More

    Submitted 6 March, 2015; v1 submitted 30 October, 2014; originally announced October 2014.

    Comments: The paper was accepted for publication in the Transactions on Information Theory. It can be considered as an extended version of "Binary Polar Code Kernels from Code Decompositions" arXiv:1101.0764

  47. arXiv:1408.4963  [pdf, ps, other

    cs.IT

    Bounds on the Size of Permutation Codes with the Kendall $τ$-Metric

    Authors: Sarit Buzaglo, Tuvi Etzion

    Abstract: The rank modulation scheme has been proposed for efficient writing and storing data in non-volatile memory storage. Error-correction in the rank modulation scheme is done by considering permutation codes. In this paper we consider codes in the set of all permutations on $n$ elements, $S_n$, using the Kendall $τ$-metric. The main goal of this paper is to derive new bounds on the size of such codes.… ▽ More

    Submitted 2 May, 2022; v1 submitted 21 August, 2014; originally announced August 2014.

    Comments: arXiv admin note: text overlap with arXiv:1310.5515

  48. arXiv:1406.6170  [pdf, ps, other

    cs.IT

    Distributed Storage Systems based on Equidistant Subspace Codes

    Authors: Netanel Raviv, Tuvi Etzion

    Abstract: Distributed storage systems based on equidistant constant dimension codes are presented. These equidistant codes are based on the Plücker embedding, which is essential in the repair and the reconstruction algorithms. These systems posses several useful properties such as high failure resilience, minimum bandwidth, low storage, simple algebraic repair and reconstruction algorithms, good locality, a… ▽ More

    Submitted 24 June, 2014; originally announced June 2014.

  49. arXiv:1405.1885  [pdf, other

    cs.IT

    Optimal Ferrers Diagram Rank-Metric Codes

    Authors: Antonia Wachter-Zeh, Tuvi Etzion

    Abstract: Optimal rank-metric codes in Ferrers diagrams are considered. Such codes consist of matrices having zeros at certain fixed positions and can be used to construct good codes in the projective space. Four techniques and constructions of Ferrers diagram rank-metric codes are presented, each providing optimal codes for different diagrams and parameters.

    Submitted 25 May, 2014; v1 submitted 8 May, 2014; originally announced May 2014.

    Comments: to be presented in Algebra, Codes, and Networks, Bordeaux, June 16 - 20, 2014

  50. arXiv:1404.7739  [pdf, ps, other

    cs.IT

    Subspace Polynomials and Cyclic Subspace Codes

    Authors: Eli Ben-Sasson, Tuvi Etzion, Ariel Gabizon, Netanel Raviv

    Abstract: Subspace codes have received an increasing interest recently due to their application in error-correction for random network coding. In particular, cyclic subspace codes are possible candidates for large codes with efficient encoding and decoding algorithms. In this paper we consider such cyclic codes and provide constructions of optimal codes for which their codewords do not have full orbits. We… ▽ More

    Submitted 12 April, 2015; v1 submitted 30 April, 2014; originally announced April 2014.