-
Private Information Retrieval from Colluding and Byzantine Servers with Binary Reed-Muller Codes
Authors:
Perttu Saarela,
Matteo Allaix,
Ragnar Freij-Hollanti,
Camilla Hollanti
Abstract:
In this work, a flexible and robust private information retrieval (PIR) scheme based on binary non-maximum distance separable (non-MDS) codes is considered. This combines previous works on PIR schemes based on transitive non-MDS codes on one hand, and PIR from MDS-coded Byzantine and non-responsive servers on the other hand. More specifically, a PIR scheme employing binary Reed-Muller (RM) codes t…
▽ More
In this work, a flexible and robust private information retrieval (PIR) scheme based on binary non-maximum distance separable (non-MDS) codes is considered. This combines previous works on PIR schemes based on transitive non-MDS codes on one hand, and PIR from MDS-coded Byzantine and non-responsive servers on the other hand. More specifically, a PIR scheme employing binary Reed-Muller (RM) codes tolerant to colluding, Byzantine, and non-responsive servers is constructed, and bounds for the achievable rates are derived under certain conditions. The construction of such schemes turns out to be much more involved than for MDS codes. Namely, the binary query vectors have to be selected with great care to hit the desired information sets, which is technically challenging as will be shown.
△ Less
Submitted 18 February, 2022;
originally announced February 2022.
-
Information Hiding Using Matroid Theory
Authors:
Ragnar Freij-Hollanti,
Olga Kuznetsova
Abstract:
Inspired by problems in Private Information Retrieval, we consider the setting where two users need to establish a communication protocol to transmit a secret without revealing it to external observers. This is a question of how large a linear code can be, when it is required to agree with a prescribed code on a collection of coordinate sets. We show how the efficiency of such a protocol is determ…
▽ More
Inspired by problems in Private Information Retrieval, we consider the setting where two users need to establish a communication protocol to transmit a secret without revealing it to external observers. This is a question of how large a linear code can be, when it is required to agree with a prescribed code on a collection of coordinate sets. We show how the efficiency of such a protocol is determined by the derived matroid of the underlying linear communication code. Furthermore, we provide several sufficient combinatorial conditions for when no secret transmission is possible.
△ Less
Submitted 5 April, 2021; v1 submitted 7 September, 2020;
originally announced September 2020.
-
Low-Rank Parity-Check Codes over the Ring of Integers Modulo a Prime Power
Authors:
Julian Renner,
Sven Puchinger,
Antonia Wachter-Zeh,
Camilla Hollanti,
Ragnar Freij-Hollanti
Abstract:
We define and analyze low-rank parity-check (LRPC) codes over extension rings of the finite chain ring $\mathbb{Z}_{p^r}$, where $p$ is a prime and $r$ is a positive integer. LRPC codes have originally been proposed by Gaborit et al.(2013) over finite fields for cryptographic applications. The adaption to finite rings is inspired by a recent paper by Kamche et al. (2019), which constructed Gabidul…
▽ More
We define and analyze low-rank parity-check (LRPC) codes over extension rings of the finite chain ring $\mathbb{Z}_{p^r}$, where $p$ is a prime and $r$ is a positive integer. LRPC codes have originally been proposed by Gaborit et al.(2013) over finite fields for cryptographic applications. The adaption to finite rings is inspired by a recent paper by Kamche et al. (2019), which constructed Gabidulin codes over finite principle ideal rings with applications to space-time codes and network coding. We give a decoding algorithm based on simple linear-algebraic operations. Further, we derive an upper bound on the failure probability of the decoder. The upper bound is valid for errors whose rank is equal to the free rank.
△ Less
Submitted 15 May, 2020; v1 submitted 14 January, 2020;
originally announced January 2020.
-
Uniform Minors in Maximally Recoverable Codes
Authors:
Matthias Grezet,
Thomas Westerbäck,
Ragnar Freij-Hollanti,
Camilla Hollanti
Abstract:
In this letter, locally recoverable codes with maximal recoverability are studied with a focus on identifying the MDS codes resulting from puncturing and shortening. By using matroid theory and the relation between MDS codes and uniform minors, the list of all the possible uniform minors is derived. This list is used to improve the known non-asymptotic lower bound on the required field size of a m…
▽ More
In this letter, locally recoverable codes with maximal recoverability are studied with a focus on identifying the MDS codes resulting from puncturing and shortening. By using matroid theory and the relation between MDS codes and uniform minors, the list of all the possible uniform minors is derived. This list is used to improve the known non-asymptotic lower bound on the required field size of a maximally recoverable code.
△ Less
Submitted 6 June, 2019;
originally announced June 2019.
-
Towards the Capacity of Private Information Retrieval from Coded and Colluding Servers
Authors:
Lukas Holzbaur,
Ragnar Freij-Hollanti,
Jie Li,
Camilla Hollanti
Abstract:
In this work, two practical concepts related to private information retrieval (PIR) are introduced and coined full support-rank PIR and strongly linear PIR. Being of full support-rank is a technical, yet natural condition required to prove a converse result for a capacity expression and satisfied by almost all currently known capacity-achieving schemes, while strong linearity is a practical requir…
▽ More
In this work, two practical concepts related to private information retrieval (PIR) are introduced and coined full support-rank PIR and strongly linear PIR. Being of full support-rank is a technical, yet natural condition required to prove a converse result for a capacity expression and satisfied by almost all currently known capacity-achieving schemes, while strong linearity is a practical requirement enabling implementation over small finite fields with low subpacketization degree. Then, the capacity of MDS-coded, linear, full support-rank PIR in the presence of colluding servers is derived, as well as the capacity of symmetric, linear PIR with colluding, adversarial, and nonresponsive servers for the recently introduced concept of matched randomness. This positively settles the capacity conjectures stated by Freij-Hollanti et al. and Tajeddine et al. in the presented cases. It is also shown that, further restricting to strongly-linear PIR schemes with deterministic linear interference cancellation, the so-called star product scheme proposed by Freij-Hollanti et al. is essentially optimal and induces no capacity loss.
△ Less
Submitted 6 October, 2021; v1 submitted 29 March, 2019;
originally announced March 2019.
-
Cyclic Codes with Locality and Availability
Authors:
Lukas Holzbaur,
Ragnar Freij-Hollanti,
Antonia Wachter-Zeh
Abstract:
In this work codes with availability are constructed based on the cyclic \emph{locally repairable code} (LRC) construction by Tamo et al. and their extension to $(r,ρ)$-locality by Chen et al. The minimum distance of these codes is increased by carefully extending their defining set. We give a bound on the dimension of LRCs with availability and orthogonal repair sets and show that the given const…
▽ More
In this work codes with availability are constructed based on the cyclic \emph{locally repairable code} (LRC) construction by Tamo et al. and their extension to $(r,ρ)$-locality by Chen et al. The minimum distance of these codes is increased by carefully extending their defining set. We give a bound on the dimension of LRCs with availability and orthogonal repair sets and show that the given construction is optimal for a range of parameters.
△ Less
Submitted 4 April, 2019; v1 submitted 17 December, 2018;
originally announced December 2018.
-
Private Information Retrieval Schemes with Regenerating Codes
Authors:
Julien Lavauzelle,
Razane Tajeddine,
Ragnar Freij-Hollanti,
Camilla Hollanti
Abstract:
A private information retrieval (PIR) scheme allows a user to retrieve a file from a database without revealing any information on the file being requested. As of now, PIR schemes have been proposed for several kinds of storage systems, including replicated and MDS-coded data. In this paper, the problem of constructing a PIR scheme on regenerating codes is considered.
A regenerating code is a st…
▽ More
A private information retrieval (PIR) scheme allows a user to retrieve a file from a database without revealing any information on the file being requested. As of now, PIR schemes have been proposed for several kinds of storage systems, including replicated and MDS-coded data. In this paper, the problem of constructing a PIR scheme on regenerating codes is considered.
A regenerating code is a storage code whose codewords are distributed among $n$ nodes, enabling efficient storage of files, as well as low-bandwidth retrieval of files and repair of nodes. In this work, a PIR scheme on regenerating codes is constructed, using the product-matrix (PM) framework of Rashmi, Shah and Kumar. Both the minimum-bandwidth (MBR) and minimum-storage (MSR) settings are considered, and the structure given by the PM framework is used in order to reduce the download communication complexity of our schemes.
△ Less
Submitted 6 December, 2018; v1 submitted 7 November, 2018;
originally announced November 2018.
-
Alphabet-Dependent Bounds for Linear Locally Repairable Codes Based on Residual Codes
Authors:
Matthias Grezet,
Ragnar Freij-Hollanti,
Thomas Westerbäck,
Camilla Hollanti
Abstract:
Locally repairable codes (LRCs) have gained significant interest for the design of large distributed storage systems as they allow a small number of erased nodes to be recovered by accessing only a few others. Several works have thus been carried out to understand the optimal rate-distance tradeoff, but only recently the size of the alphabet has been taken into account. In this paper, a novel defi…
▽ More
Locally repairable codes (LRCs) have gained significant interest for the design of large distributed storage systems as they allow a small number of erased nodes to be recovered by accessing only a few others. Several works have thus been carried out to understand the optimal rate-distance tradeoff, but only recently the size of the alphabet has been taken into account. In this paper, a novel definition of locality is proposed to keep track of the precise number of nodes required for a local repair when the repair sets do not yield MDS codes. Then, a new alphabet-dependent bound is derived, which applies both to the new definition and the initial definition of locality. The new bound is based on consecutive residual codes and intrinsically uses the Griesmer bound. A special case of the bound yields both the extension of the Cadambe-Mazumdar bound and the Singleton-type bound for codes with locality $(r, δ)$, implying that the new bound is at least as good as these bounds. Furthermore, an upper bound on the asymptotic rate-distance tradeoff of LRCs is derived, and yields the tightest known upper bound for large relative minimum distances. Achievability results are also provided by deriving the locality of the family of Simplex codes together with a few examples of optimal codes.
△ Less
Submitted 6 June, 2019; v1 submitted 19 October, 2018;
originally announced October 2018.
-
Private Information Retrieval from Coded Storage Systems with Colluding, Byzantine, and Unresponsive Servers
Authors:
Razane Tajeddine,
Oliver W. Gnilke,
David Karpuk,
Ragnar Freij-Hollanti,
Camilla Hollanti
Abstract:
The problem of Private Information Retrieval (PIR) from coded storage systems with colluding, byzantine, and unresponsive servers is considered. An explicit scheme using an $[n,k]$ Reed-Solomon storage code is designed, protecting against $t$-collusion and handling up to $b$ byzantine and $r$ unresponsive servers, when $n>k+t+2b+r-1$. This scheme achieves a PIR rate of…
▽ More
The problem of Private Information Retrieval (PIR) from coded storage systems with colluding, byzantine, and unresponsive servers is considered. An explicit scheme using an $[n,k]$ Reed-Solomon storage code is designed, protecting against $t$-collusion and handling up to $b$ byzantine and $r$ unresponsive servers, when $n>k+t+2b+r-1$. This scheme achieves a PIR rate of $\frac{n-r-(k+2b+t-1)}{n-r}$. In the case where the capacity is known, namely when $k=1$, it is asymptotically capacity-achieving as the number of files grows. Lastly, the scheme is adapted to symmetric PIR.
△ Less
Submitted 5 September, 2018; v1 submitted 20 June, 2018;
originally announced June 2018.
-
Private Streaming with Convolutional Codes
Authors:
Lukas Holzbaur,
Ragnar Freij-Hollanti,
Antonia Wachter-Zeh,
Camilla Hollanti
Abstract:
Recently, information-theoretic private information retrieval (PIR) from coded storage systems has gained a lot of attention, and a general star product PIR scheme was proposed. In this paper, the star product scheme is adopted, with appropriate modifications, to the case of private (e.g., video) streaming. It is assumed that the files to be streamed are stored on~$n$ servers in a coded form, and…
▽ More
Recently, information-theoretic private information retrieval (PIR) from coded storage systems has gained a lot of attention, and a general star product PIR scheme was proposed. In this paper, the star product scheme is adopted, with appropriate modifications, to the case of private (e.g., video) streaming. It is assumed that the files to be streamed are stored on~$n$ servers in a coded form, and the streaming is carried out via a convolutional code. The star product scheme is defined for this special case, and various properties are analyzed for two channel models related to straggling and Byzantine servers, both in the baseline case as well as with colluding servers. The achieved PIR rates for the given models are derived and, for the cases where the capacity is known, the first model is shown to be asymptotically optimal, when the number of stripes in a file is large. The second scheme introduced in this work is shown to be the equivalent of block convolutional codes in the PIR setting. For the Byzantine server model, it is shown to outperform the trivial scheme of downloading stripes of the desired file separately without memory.
△ Less
Submitted 11 October, 2019; v1 submitted 1 June, 2018;
originally announced June 2018.
-
Robust Private Information Retrieval from Coded Systems with Byzantine and Colluding Servers
Authors:
Razane Tajeddine,
Oliver W. Gnilke,
David Karpuk,
Ragnar Freij-Hollanti,
Camilla Hollanti
Abstract:
A private information retrieval (PIR) scheme on coded storage systems with colluding, byzantine, and non-responsive servers is presented. Furthermore, the scheme can also be used for symmetric PIR in the same setting.
An explicit scheme using an $[n,k]$ generalized Reed-Solomon storage code is designed, protecting against $t$-collusion and handling up to $b$ byzantine and $r$ non-responsive serv…
▽ More
A private information retrieval (PIR) scheme on coded storage systems with colluding, byzantine, and non-responsive servers is presented. Furthermore, the scheme can also be used for symmetric PIR in the same setting.
An explicit scheme using an $[n,k]$ generalized Reed-Solomon storage code is designed, protecting against $t$-collusion and handling up to $b$ byzantine and $r$ non-responsive servers, when $n\geq n'= (ν+1) k+t+2b+r-1$, for some integer $ν\geq 1$. This scheme achieves a PIR rate of $1-\frac{k+2b+t+r-1}{n'}$. In the case where the capacity is known, namely when $k=1$, it is asymptotically capacity achieving as the number of files grows.
△ Less
Submitted 5 September, 2018; v1 submitted 11 February, 2018;
originally announced February 2018.
-
t-Private Information Retrieval Schemes Using Transitive Codes
Authors:
Ragnar Freij-Hollanti,
Oliver W. Gnilke,
Camilla Hollanti,
Anna-Lena Horlemann-Trautmann,
David Karpuk,
Ivo Kubjas
Abstract:
This paper presents private information retrieval (PIR) schemes for coded storage with colluding servers, which are not restricted to maximum distance separable (MDS) codes. PIR schemes for general linear codes are constructed and the resulting PIR rate is calculated explicitly. It is shown that codes with transitive automorphism groups yield the highest possible rates obtainable with the proposed…
▽ More
This paper presents private information retrieval (PIR) schemes for coded storage with colluding servers, which are not restricted to maximum distance separable (MDS) codes. PIR schemes for general linear codes are constructed and the resulting PIR rate is calculated explicitly. It is shown that codes with transitive automorphism groups yield the highest possible rates obtainable with the proposed scheme. This rate coincides with the known asymptotic PIR capacity for MDS-coded storage systems without collusion. While many PIR schemes in the literature require field sizes that grow with the number of servers and files in the system, we focus especially on the case of a binary base field, for which Reed- Muller codes serve as an important and explicit class of examples.
△ Less
Submitted 7 December, 2017;
originally announced December 2017.
-
Bounds on Binary Locally Repairable Codes Tolerating Multiple Erasures
Authors:
Matthias Grezet,
Ragnar Freij-Hollanti,
Thomas Westerbäck,
Oktay Olmez,
Camilla Hollanti
Abstract:
Recently, locally repairable codes has gained significant interest for their potential applications in distributed storage systems. However, most constructions in existence are over fields with size that grows with the number of servers, which makes the systems computationally expensive and difficult to maintain. Here, we study linear locally repairable codes over the binary field, tolerating mult…
▽ More
Recently, locally repairable codes has gained significant interest for their potential applications in distributed storage systems. However, most constructions in existence are over fields with size that grows with the number of servers, which makes the systems computationally expensive and difficult to maintain. Here, we study linear locally repairable codes over the binary field, tolerating multiple local erasures. We derive bounds on the minimum distance on such codes, and give examples of LRCs achieving these bounds. Our main technical tools come from matroid theory, and as a byproduct of our proofs, we show that the lattice of cyclic flats of a simple binary matroid is atomic.
△ Less
Submitted 19 February, 2018; v1 submitted 18 September, 2017;
originally announced September 2017.
-
On Binary Matroid Minors and Applications to Data Storage over Small Fields
Authors:
Matthias Grezet,
Ragnar Freij-Hollanti,
Thomas Westerbäck,
Camilla Hollanti
Abstract:
Locally repairable codes for distributed storage systems have gained a lot of interest recently, and various constructions can be found in the literature. However, most of the constructions result in either large field sizes and hence too high computational complexity for practical implementation, or in low rates translating into waste of the available storage space. In this paper we address this…
▽ More
Locally repairable codes for distributed storage systems have gained a lot of interest recently, and various constructions can be found in the literature. However, most of the constructions result in either large field sizes and hence too high computational complexity for practical implementation, or in low rates translating into waste of the available storage space. In this paper we address this issue by develo** theory towards code existence and design over a given field. This is done via exploiting recently established connections between linear locally repairable codes and matroids, and using matroid-theoretic characterisations of linearity over small fields. In particular, nonexistence can be shown by finding certain forbidden uniform minors within the lattice of cyclic flats. It is shown that the lattice of cyclic flats of binary matroids have additional structure that significantly restricts the possible locality properties of $\mathbb{F}_{2}$-linear storage codes. Moreover, a collection of criteria for detecting uniform minors from the lattice of cyclic flats of a given matroid is given, which is interesting in its own right.
△ Less
Submitted 19 February, 2018; v1 submitted 3 July, 2017;
originally announced July 2017.
-
Traffic Minimizing Caching and Latent Variable Distributions of Order Statistics
Authors:
Joonas Pääkkönen,
Prathapasinghe Dharmawansa,
Ragnar Freij-Hollanti,
Camilla Hollanti,
Olav Tirkkonen
Abstract:
Given a statistical model for the request frequencies and sizes of data objects in a caching system, we derive the probability density of the size of the file that accounts for the largest amount of data traffic. This is equivalent to finding the required size of the cache for a caching placement that maximizes the expected byte hit ratio for given file size and popularity distributions. The file…
▽ More
Given a statistical model for the request frequencies and sizes of data objects in a caching system, we derive the probability density of the size of the file that accounts for the largest amount of data traffic. This is equivalent to finding the required size of the cache for a caching placement that maximizes the expected byte hit ratio for given file size and popularity distributions. The file that maximizes the expected byte hit ratio is the file for which the product of its size and popularity is the highest -- thus, it is the file that incurs the greatest load on the network. We generalize this theoretical problem to cover factors and addends of arbitrary order statistics for given parent distributions. Further, we study the asymptotic behavior of these distributions. We give several factor and addend densities of widely-used distributions, and verify our results by extensive computer simulations.
△ Less
Submitted 13 April, 2017;
originally announced April 2017.
-
Matroid Theory and Storage Codes: Bounds and Constructions
Authors:
Ragnar Freij-Hollanti,
Camilla Hollanti,
Thomas Westerbäck
Abstract:
Recent research on distributed storage systems (DSSs) has revealed interesting connections between matroid theory and locally repairable codes (LRCs). The goal of this chapter is to introduce the reader to matroids and polymatroids, and illustrate their relation to distribute storage systems. While many of the results are rather technical in nature, effort is made to increase accessibility via sim…
▽ More
Recent research on distributed storage systems (DSSs) has revealed interesting connections between matroid theory and locally repairable codes (LRCs). The goal of this chapter is to introduce the reader to matroids and polymatroids, and illustrate their relation to distribute storage systems. While many of the results are rather technical in nature, effort is made to increase accessibility via simple examples. The chapter embeds all the essential features of LRCs, namely locality, availability, and hierarchy alongside with related generalised Singleton bounds.
△ Less
Submitted 5 September, 2017; v1 submitted 13 April, 2017;
originally announced April 2017.
-
Private Information Retrieval Schemes for Coded Data with Arbitrary Collusion Patterns
Authors:
Razane Tajeddine,
Oliver W. Gnilke,
David Karpuk,
Ragnar Freij-Hollanti,
Camilla Hollanti,
Salim El Rouayheb
Abstract:
In Private Information Retrieval (PIR), one wants to download a file from a database without revealing to the database which file is being downloaded. Much attention has been paid to the case of the database being encoded across several servers, subsets of which can collude to attempt to deduce the requested file. With the goal of studying the achievable PIR rates in realistic scenarios, we genera…
▽ More
In Private Information Retrieval (PIR), one wants to download a file from a database without revealing to the database which file is being downloaded. Much attention has been paid to the case of the database being encoded across several servers, subsets of which can collude to attempt to deduce the requested file. With the goal of studying the achievable PIR rates in realistic scenarios, we generalize results for coded data from the case of all subsets of servers of size $t$ colluding, to arbitrary subsets of the servers. We investigate the effectiveness of previous strategies in this new scenario, and present new results in the case where the servers are partitioned into disjoint colluding groups.
△ Less
Submitted 22 June, 2017; v1 submitted 26 January, 2017;
originally announced January 2017.
-
Private Information Retrieval from Coded Databases with Colluding Servers
Authors:
Ragnar Freij-Hollanti,
Oliver Gnilke,
Camilla Hollanti,
David Karpuk
Abstract:
We present a general framework for Private Information Retrieval (PIR) from arbitrary coded databases, that allows one to adjust the rate of the scheme according to the suspected number of colluding servers. If the storage code is a generalized Reed-Solomon code of length n and dimension k, we design PIR schemes which simultaneously protect against t colluding servers and provide PIR rate 1-(k+t-1…
▽ More
We present a general framework for Private Information Retrieval (PIR) from arbitrary coded databases, that allows one to adjust the rate of the scheme according to the suspected number of colluding servers. If the storage code is a generalized Reed-Solomon code of length n and dimension k, we design PIR schemes which simultaneously protect against t colluding servers and provide PIR rate 1-(k+t-1)/n, for all t between 1 and n-k. This interpolates between the previously studied cases of t=1 and k=1 and asymptotically achieves the known capacity bounds in both of these cases, as the size of the database grows.
△ Less
Submitted 16 August, 2017; v1 submitted 7 November, 2016;
originally announced November 2016.
-
Network Resource Sharing Games with Instantaneous Reciprocity
Authors:
Sofonias Hailu,
Ragnar Freij-Hollanti,
Alexis A. Dowhuszko,
Olav Tirkkonen
Abstract:
We propose a generic strategic network resource sharing game between a set of players representing operators. The players negotiate which sets of players share given resources, serving users with varying sensitivity to interference. We prove that the proposed game has a Nash equilibrium, to which a greedily played game converges. Furthermore, simulation results show that, when applied to inter-ope…
▽ More
We propose a generic strategic network resource sharing game between a set of players representing operators. The players negotiate which sets of players share given resources, serving users with varying sensitivity to interference. We prove that the proposed game has a Nash equilibrium, to which a greedily played game converges. Furthermore, simulation results show that, when applied to inter-operator spectrum sharing in small-cell indoor office environment, the convergence is fast and there is a significant performance improvement for the operators when compared to the default resource usage configuration.
△ Less
Submitted 30 May, 2016;
originally announced May 2016.
-
A Connection Between Locally Repairable Codes and Exact Regenerating Codes
Authors:
Toni Ernvall,
Thomas Westerbäck,
Ragnar Freij-Hollanti,
Camilla Hollanti
Abstract:
Typically, locally repairable codes (LRCs) and regenerating codes have been studied independently of each other, and it has not been clear how the parameters of one relate to those of the other. In this paper, a novel connection between locally repairable codes and exact regenerating codes is established. Via this connection, locally repairable codes are interpreted as exact regenerating codes. Fu…
▽ More
Typically, locally repairable codes (LRCs) and regenerating codes have been studied independently of each other, and it has not been clear how the parameters of one relate to those of the other. In this paper, a novel connection between locally repairable codes and exact regenerating codes is established. Via this connection, locally repairable codes are interpreted as exact regenerating codes. Further, some of these codes are shown to perform better than time-sharing codes between minimum bandwidth regenerating and minimum storage regenerating codes.
△ Less
Submitted 18 March, 2016;
originally announced March 2016.
-
Bounds on the Maximal Minimum Distance of Linear Locally Repairable Codes
Authors:
Antti Pöllänen,
Thomas Westerbäck,
Ragnar Freij-Hollanti,
Camilla Hollanti
Abstract:
Locally repairable codes (LRCs) are error correcting codes used in distributed data storage. Besides a global level, they enable errors to be corrected locally, reducing the need for communication between storage nodes. There is a close connection between almost affine LRCs and matroid theory which can be utilized to construct good LRCs and derive bounds on their performance.
A generalized Singl…
▽ More
Locally repairable codes (LRCs) are error correcting codes used in distributed data storage. Besides a global level, they enable errors to be corrected locally, reducing the need for communication between storage nodes. There is a close connection between almost affine LRCs and matroid theory which can be utilized to construct good LRCs and derive bounds on their performance.
A generalized Singleton bound for linear LRCs with parameters $(n,k,d,r,δ)$ was given in [N. Prakash et al., "Optimal Linear Codes with a Local-Error-Correction Property", IEEE Int. Symp. Inf. Theory]. In this paper, a LRC achieving this bound is called perfect. Results on the existence and nonexistence of linear perfect $(n,k,d,r,δ)$-LRCs were given in [W. Song et al., "Optimal locally repairable codes", IEEE J. Sel. Areas Comm.]. Using matroid theory, these existence and nonexistence results were later strengthened in [T. Westerbäck et al., "On the Combinatorics of Locally Repairable Codes", Arxiv: 1501.00153], which also provided a general lower bound on the maximal achievable minimum distance $d_{\rm{max}}(n,k,r,δ)$ that a linear LRC with parameters $(n,k,r,δ)$ can have. This article expands the class of parameters $(n,k,d,r,δ)$ for which there exist perfect linear LRCs and improves the lower bound for $d_{\rm{max}}(n,k,r,δ)$. Further, this bound is proved to be optimal for the class of matroids that is used to derive the existence bounds of linear LRCs.
△ Less
Submitted 23 May, 2016; v1 submitted 14 February, 2016;
originally announced February 2016.
-
An Approximation of Theta Functions with Applications to Communications
Authors:
Amaro Barreal,
Mohamed Taoufiq Damir,
Ragnar Freij-Hollanti,
Camilla Hollanti
Abstract:
Computing the theta series of an arbitrary lattice, and more specifically a related quantity known as the flatness factor, has been recently shown to be important for lattice code design in various wireless communication setups. However, the theta series is in general not known in closed form, excluding a small set of very special lattices. In this article, motivated by the practical applications…
▽ More
Computing the theta series of an arbitrary lattice, and more specifically a related quantity known as the flatness factor, has been recently shown to be important for lattice code design in various wireless communication setups. However, the theta series is in general not known in closed form, excluding a small set of very special lattices. In this article, motivated by the practical applications as well as the mathematical problem itself, a simple approximation of the theta series of a lattice is derived. A rigorous analysis of its accuracy is provided.
In relation to this, maximum-likelihood decoding in the context of compute-and-forward relaying is studied. Following previous work, it is shown that the related metric can exhibit a flat behavior, which can be characterized by the flatness factor of the decoding function. Contrary to common belief, we note that the decoding metric can be rewritten as a sum over a random lattice only when at most two sources are considered. Using a particular matrix decomposition, a link between the random lattice and the code lattice employed at the transmitter is established, which leads to an explicit criterion for code design, in contrast to implicit criteria derived previously. Finally, candidate lattices are examined with respect to the proposed criterion using the derived theta series approximation.
△ Less
Submitted 21 June, 2020; v1 submitted 21 January, 2016;
originally announced January 2016.
-
Applications of Polymatroid Theory to Distributed Storage Systems
Authors:
Thomas Westerbäck,
Ragnar Freij-Hollanti,
Camilla Hollanti
Abstract:
In this paper, a link between polymatroid theory and locally repairable codes (LRCs) is established. The codes considered here are completely general in that they are subsets of $A^n$, where $A$ is an arbitrary finite set. Three classes of LRCs are considered, both with and without availability, and for both information-symbol and all-symbol locality. The parameters and classes of LRCs are general…
▽ More
In this paper, a link between polymatroid theory and locally repairable codes (LRCs) is established. The codes considered here are completely general in that they are subsets of $A^n$, where $A$ is an arbitrary finite set. Three classes of LRCs are considered, both with and without availability, and for both information-symbol and all-symbol locality. The parameters and classes of LRCs are generalized to polymatroids, and a general- ized Singelton bound on the parameters for these three classes of polymatroids and LRCs is given. This result generalizes the earlier Singleton-type bounds given for LRCs. Codes achieving these bounds are coined perfect, as opposed to the more common term optimal used earlier, since they might not always exist. Finally, new constructions of perfect linear LRCs are derived from gammoids, which are a special class of matroids. Matroids, for their part, form a subclass of polymatroids and have proven useful in analyzing and constructing linear LRCs.
△ Less
Submitted 8 October, 2015;
originally announced October 2015.