-
Linear codes in the folded Hamming distance and the quasi MDS property
Authors:
Umberto Martínez-Peñas,
Rubén Rodríguez-Ballesteros
Abstract:
In this work, we study linear codes with the folded Hamming distance, or equivalently, codes with the classical Hamming distance that are linear over a subfield. This includes additive codes. We study MDS codes in this setting and define quasi MDS (QMDS) codes and dually QMDS codes, which attain a more relaxed variant of the classical Singleton bound. We provide several general results concerning…
▽ More
In this work, we study linear codes with the folded Hamming distance, or equivalently, codes with the classical Hamming distance that are linear over a subfield. This includes additive codes. We study MDS codes in this setting and define quasi MDS (QMDS) codes and dually QMDS codes, which attain a more relaxed variant of the classical Singleton bound. We provide several general results concerning these codes, including restriction, shortening, weight distributions, existence, density, geometric description and bounds on their lengths relative to their field sizes. We provide explicit examples and a binary construction with optimal lengths relative to their field sizes, which beats any MDS code.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
New constructions of MSRD codes
Authors:
Umberto Martínez-Peñas
Abstract:
In this work, we provide four methods for constructing new maximum sum-rank distance (MSRD) codes. The first method, a variant of cartesian products, allows faster decoding than known MSRD codes of the same parameters. The other three methods allow us to extend or modify existing MSRD codes in order to obtain new explicit MSRD codes for sets of matrix sizes (numbers of rows and columns in differen…
▽ More
In this work, we provide four methods for constructing new maximum sum-rank distance (MSRD) codes. The first method, a variant of cartesian products, allows faster decoding than known MSRD codes of the same parameters. The other three methods allow us to extend or modify existing MSRD codes in order to obtain new explicit MSRD codes for sets of matrix sizes (numbers of rows and columns in different blocks) that were not attainable by previous constructions. In this way, we show that MSRD codes exist (by giving explicit constructions) for new ranges of parameters, in particular with different numbers of rows and columns at different positions.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Distributed matrix multiplication with straggler tolerance using algebraic function fields
Authors:
Adrián Fidalgo-Díaz,
Umberto Martínez-Peñas
Abstract:
The problem of straggler mitigation in distributed matrix multiplication (DMM) is considered for a large number of worker nodes and a fixed small finite field. Polynomial codes and matdot codes are generalized by making use of algebraic function fields (i.e., algebraic functions over an algebraic curve) over a finite field. The construction of optimal solutions is translated to a combinatorial pro…
▽ More
The problem of straggler mitigation in distributed matrix multiplication (DMM) is considered for a large number of worker nodes and a fixed small finite field. Polynomial codes and matdot codes are generalized by making use of algebraic function fields (i.e., algebraic functions over an algebraic curve) over a finite field. The construction of optimal solutions is translated to a combinatorial problem on the Weierstrass semigroups of the corresponding algebraic curves. Optimal or almost optimal solutions are provided. These have the same computational complexity per worker as classical polynomial and matdot codes, and their recovery thresholds are almost optimal in the asymptotic regime (growing number of workers and a fixed finite field).
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Integer sequences that are generalized weights of a linear code
Authors:
Elisa Gorla,
Elisa Lorenzo García,
Umberto Martínez-Peñas,
Flavio Salizzoni
Abstract:
Which integer sequences are sequences of generalized weights of a linear code? In this paper, we answer this question for linear block codes, rank-metric codes, and more generally for sum-rank metric codes. We do so under an existence assumption for MDS and MSRD codes. We also prove that the same integer sequences appear as sequences of greedy weights of linear block codes, rank-metric codes, and…
▽ More
Which integer sequences are sequences of generalized weights of a linear code? In this paper, we answer this question for linear block codes, rank-metric codes, and more generally for sum-rank metric codes. We do so under an existence assumption for MDS and MSRD codes. We also prove that the same integer sequences appear as sequences of greedy weights of linear block codes, rank-metric codes, and sum-rank metric codes. Finally, we characterize the integer sequences which appear as sequences of relative generalized weights (respectively, relative greedy weights) of linear block codes.
△ Less
Submitted 13 July, 2023;
originally announced July 2023.
-
Sum-rank metric codes
Authors:
Elisa Gorla,
Umberto Martínez-Peñas,
Flavio Salizzoni
Abstract:
Sum-rank metric codes are a natural extension of both linear block codes and rank-metric codes. They have several applications in information theory, including multishot network coding and distributed storage systems. The aim of this chapter is to present the mathematical theory of sum-rank metric codes, paying special attention to the $\mathbb{F}_q$-linear case in which different sizes of matrice…
▽ More
Sum-rank metric codes are a natural extension of both linear block codes and rank-metric codes. They have several applications in information theory, including multishot network coding and distributed storage systems. The aim of this chapter is to present the mathematical theory of sum-rank metric codes, paying special attention to the $\mathbb{F}_q$-linear case in which different sizes of matrices are allowed. We provide a comprehensive overview of the main results in the area. In particular, we discuss invariants, optimal anticodes, and MSRD codes. In the last section, we concentrate on $\mathbb{F}_{q^m}$-linear codes.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Doubly and triply extended MSRD codes
Authors:
Umberto Martínez-Peñas
Abstract:
In this work, doubly extended linearized Reed--Solomon codes and triply extended Reed--Solomon codes are generalized. We obtain a general result in which we characterize when a multiply extended code for a general metric attains the Singleton bound. We then use this result to obtain several families of doubly extended and triply extended maximum sum-rank distance (MSRD) codes that include doubly e…
▽ More
In this work, doubly extended linearized Reed--Solomon codes and triply extended Reed--Solomon codes are generalized. We obtain a general result in which we characterize when a multiply extended code for a general metric attains the Singleton bound. We then use this result to obtain several families of doubly extended and triply extended maximum sum-rank distance (MSRD) codes that include doubly extended linearized Reed--Solomon codes and triply extended Reed--Solomon codes as particular cases. To conclude, we discuss when these codes are one-weight codes.
△ Less
Submitted 11 December, 2022;
originally announced December 2022.
-
Zipper Codes
Authors:
Alvin Y. Sukmadji,
Umberto Martínez-Peñas,
Frank R. Kschischang
Abstract:
Zipper codes are a framework for describing spatially-coupled product-like codes. Many well-known codes, such as staircase codes and braided block codes, are subsumed into this framework. New types of codes such as tiled diagonal and delayed diagonal zipper codes are introduced along with their software simulation results. Stall patterns that can arise in iterative decoding are analyzed, giving a…
▽ More
Zipper codes are a framework for describing spatially-coupled product-like codes. Many well-known codes, such as staircase codes and braided block codes, are subsumed into this framework. New types of codes such as tiled diagonal and delayed diagonal zipper codes are introduced along with their software simulation results. Stall patterns that can arise in iterative decoding are analyzed, giving a means of error floor estimation.
△ Less
Submitted 20 February, 2023; v1 submitted 18 March, 2022;
originally announced March 2022.
-
Multilayer crisscross error and erasure correction
Authors:
Umberto Martínez-Peñas
Abstract:
In this work, multilayer crisscross error and erasures are considered, which affect entire rows and columns in the matrices of a list of matrices. To measure such errors and erasures, the multi-cover metric is introduced. Several bounds are derived, including a Singleton bound, and maximum multi-cover distance (MMCD) codes are defined as those attaining it. Duality, puncturing and shortening of li…
▽ More
In this work, multilayer crisscross error and erasures are considered, which affect entire rows and columns in the matrices of a list of matrices. To measure such errors and erasures, the multi-cover metric is introduced. Several bounds are derived, including a Singleton bound, and maximum multi-cover distance (MMCD) codes are defined as those attaining it. Duality, puncturing and shortening of linear MMCD codes are studied. It is shown that the dual of a linear MMCD code is not necessarily MMCD, and those satisfying this duality condition are defined as dually MMCD codes. Finally, some constructions of codes in the multi-cover metric are given, including dually MMCD codes, together with efficient decoding algorithms for them.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
Maximum Sum-Rank Distance Codes over Finite Chain Rings
Authors:
Umberto Martínez-Peñas,
Sven Puchinger
Abstract:
In this work, maximum sum-rank distance (MSRD) codes and linearized Reed-Solomon codes are extended to finite chain rings. It is proven that linearized Reed-Solomon codes are MSRD over finite chain rings, extending the known result for finite fields. For the proof, several results on the roots of skew polynomials are extended to finite chain rings. These include the existence and uniqueness of min…
▽ More
In this work, maximum sum-rank distance (MSRD) codes and linearized Reed-Solomon codes are extended to finite chain rings. It is proven that linearized Reed-Solomon codes are MSRD over finite chain rings, extending the known result for finite fields. For the proof, several results on the roots of skew polynomials are extended to finite chain rings. These include the existence and uniqueness of minimum-degree annihilator skew polynomials and Lagrange interpolator skew polynomials. A general cubic-complexity sum-rank Welch-Berlekamp decoder and a quadratic-complexity sum-rank syndrome decoder (under some assumptions) are then provided over finite chain rings. The latter also constitutes the first known syndrome decoder for linearized Reed--Solomon codes over finite fields. Finally, applications in Space-Time Coding with multiple fading blocks and physical-layer multishot Network Coding are discussed.
△ Less
Submitted 12 January, 2024; v1 submitted 20 September, 2021;
originally announced September 2021.
-
Optimal anticodes, MSRD codes, and generalized weights in the sum-rank metric
Authors:
Eduardo Camps Moreno,
Elisa Gorla,
Cristina Landolina,
Elisa Lorenzo García,
Umberto Martínez-Peñas,
Flavio Salizzoni
Abstract:
Sum-rank metric codes have recently attracted the attention of many researchers, due to their relevance in several applications. Mathematically, the sum-rank metric is a natural generalization of both the Hamming metric and the rank metric. In this paper, we provide an Anticode Bound for the sum-rank metric, which extends the corresponding Hamming and rank-metric Anticode bounds. We classify then…
▽ More
Sum-rank metric codes have recently attracted the attention of many researchers, due to their relevance in several applications. Mathematically, the sum-rank metric is a natural generalization of both the Hamming metric and the rank metric. In this paper, we provide an Anticode Bound for the sum-rank metric, which extends the corresponding Hamming and rank-metric Anticode bounds. We classify then optimal anticodes, i.e., codes attaining the sum-rank metric Anticode Bound. We use these optimal anticodes to define generalized sum-rank weights and we study their main properties. In particular, we prove that the generalized weights of an MSRD code are determined by its parameters. As an application, in the Appendix we explain how generalized weights measure information leakage in multishot network coding.
△ Less
Submitted 21 December, 2021; v1 submitted 28 July, 2021;
originally announced July 2021.
-
A general family of MSRD codes and PMDS codes with smaller field sizes from extended Moore matrices
Authors:
Umberto Martínez-Peñas
Abstract:
We construct six new explicit families of linear maximum sum-rank distance (MSRD) codes, each of which has the smallest field sizes among all known MSRD codes for some parameter regime. Using them and a previous result of the author, we provide two new explicit families of linear partial MDS (PMDS) codes with smaller field sizes than previous PMDS codes for some parameter regimes. Our approach is…
▽ More
We construct six new explicit families of linear maximum sum-rank distance (MSRD) codes, each of which has the smallest field sizes among all known MSRD codes for some parameter regime. Using them and a previous result of the author, we provide two new explicit families of linear partial MDS (PMDS) codes with smaller field sizes than previous PMDS codes for some parameter regimes. Our approach is to characterize evaluation points that turn extended Moore matrices into the parity-check matrix of a linear MSRD code. We then produce such sequences from codes with good Hamming-metric parameters. The six new families of linear MSRD codes with smaller field sizes are obtained using MDS codes, Hamming codes, BCH codes and three Algebraic-Geometry codes. The MSRD codes based on Hamming codes, of minimum sum-rank distance $ 3 $, meet a recent bound by Byrne et al.
△ Less
Submitted 20 April, 2022; v1 submitted 28 November, 2020;
originally announced November 2020.
-
Sum-Rank BCH Codes and Cyclic-Skew-Cyclic Codes
Authors:
Umberto Martínez-Peñas
Abstract:
In this work, cyclic-skew-cyclic codes and sum-rank BCH codes are introduced. Cyclic-skew-cyclic codes are characterized as left ideals of a suitable non-commutative finite ring, constructed using skew polynomials on top of polynomials (or vice versa). Single generators of such left ideals are found, and they are used to construct generator matrices of the corresponding codes. The notion of defini…
▽ More
In this work, cyclic-skew-cyclic codes and sum-rank BCH codes are introduced. Cyclic-skew-cyclic codes are characterized as left ideals of a suitable non-commutative finite ring, constructed using skew polynomials on top of polynomials (or vice versa). Single generators of such left ideals are found, and they are used to construct generator matrices of the corresponding codes. The notion of defining set is introduced, using pairs of roots of skew polynomials on top of poynomials. A lower bound (called sum-rank BCH bound) on the minimum sum-rank distance is given for cyclic-skew-cyclic codes whose defining set contains certain consecutive pairs. Sum-rank BCH codes, with prescribed minimum sum-rank distance, are then defined as the largest cyclic-skew-cyclic codes whose defining set contains such consecutive pairs. The defining set of a sum-rank BCH code is described, and a lower bound on its dimension is obtained. Thanks to it, tables are provided showing that sum-rank BCH codes beat previously known codes for the sum-rank metric for binary $ 2 \times 2 $ matrices (i.e., codes whose codewords are lists of $ 2 \times 2 $ binary matrices, for a wide range of list lengths that correspond to the code length). Finally, a decoder for sum-rank BCH codes up to half their prescribed distance is obtained.
△ Less
Submitted 8 June, 2021; v1 submitted 10 September, 2020;
originally announced September 2020.
-
Systematic Maximum Sum Rank Codes
Authors:
Paulo Almeida,
Umberto Martínez-Penas,
Diego Napp
Abstract:
In the last decade there has been a great interest in extending results for codes equipped with the Hamming metric to analogous results for codes endowed with the rank metric. This work follows this thread of research and studies the characterization of systematic generator matrices (encoders) of codes with maximum rank distance. In the context of Hamming distance these codes are the so-called Max…
▽ More
In the last decade there has been a great interest in extending results for codes equipped with the Hamming metric to analogous results for codes endowed with the rank metric. This work follows this thread of research and studies the characterization of systematic generator matrices (encoders) of codes with maximum rank distance. In the context of Hamming distance these codes are the so-called Maximum Distance Separable (MDS) codes and systematic encoders have been fully investigated. In this paper we investigate the algebraic properties and representation of encoders in systematic form of Maximum Rank Distance (MRD) codes and Maximum Sum Rank Distance (MSRD) codes. We address both block codes and convolutional codes separately and present necessary and sufficient conditions for an encoder in systematic form to generate a code with maximum (sum) rank distance. These characterizations are given in terms of certain matrices that must be superregular in a extension field and that preserve superregularity after some transformations performed over the base field. We conclude the work presenting some examples of Maximum Sum Rank convolutional codes over small fields. For the given parameters the examples obtained are over smaller fields than the examples obtained by other authors.
△ Less
Submitted 20 January, 2020;
originally announced January 2020.
-
Hamming and simplex codes for the sum-rank metric
Authors:
Umberto Martínez-Peñas
Abstract:
Sum-rank Hamming codes are introduced in this work. They are essentially defined as the longest codes (thus of highest information rate) with minimum sum-rank distance at least $ 3 $ (thus one-error-correcting) for a fixed redundancy $ r $, base-field size $ q $ and field-extension degree $ m $ (i.e., number of matrix rows). General upper bounds on their code length, number of shots or sublengths…
▽ More
Sum-rank Hamming codes are introduced in this work. They are essentially defined as the longest codes (thus of highest information rate) with minimum sum-rank distance at least $ 3 $ (thus one-error-correcting) for a fixed redundancy $ r $, base-field size $ q $ and field-extension degree $ m $ (i.e., number of matrix rows). General upper bounds on their code length, number of shots or sublengths and average sublength are obtained based on such parameters. When the field-extension degree is $ 1 $, it is shown that sum-rank isometry classes of sum-rank Hamming codes are in bijective correspondence with maximal-size partial spreads. In that case, it is also shown that sum-rank Hamming codes are perfect codes for the sum-rank metric. Also in that case, estimates on the parameters (lengths and number of shots) of sum-rank Hamming codes are given, together with an efficient syndrome decoding algorithm. Duals of sum-rank Hamming codes, called sum-rank simplex codes, are then introduced. Bounds on the minimum sum-rank distance of sum-rank simplex codes are given based on known bounds on the size of partial spreads. As applications, sum-rank Hamming codes are proposed for error correction in multishot matrix-multiplicative channels and to construct locally repairable codes over small fields, including binary.
△ Less
Submitted 12 January, 2021; v1 submitted 8 August, 2019;
originally announced August 2019.
-
Private Information Retrieval from Locally Repairable Databases with Colluding Servers
Authors:
Umberto Martínez-Peñas
Abstract:
We consider information-theoretical private information retrieval (PIR) from a coded database with colluding servers. We target, for the first time, locally repairable storage codes (LRCs). We consider any number of local groups $ g $, locality $ r $, local distance $ δ$ and dimension $ k $. Our main contribution is a PIR scheme for maximally recoverable (MR) LRCs based on linearized Reed--Solomon…
▽ More
We consider information-theoretical private information retrieval (PIR) from a coded database with colluding servers. We target, for the first time, locally repairable storage codes (LRCs). We consider any number of local groups $ g $, locality $ r $, local distance $ δ$ and dimension $ k $. Our main contribution is a PIR scheme for maximally recoverable (MR) LRCs based on linearized Reed--Solomon codes, which achieve the smallest field sizes among MR-LRCs for many parameter regimes. In our scheme, nodes are identified with codeword symbols and servers are identified with local groups of nodes. Only locally non-redundant information is downloaded from each server, that is, only $ r $ nodes (out of $ r+δ-1 $) are downloaded per server. The PIR scheme achieves the (download) rate $ R = (N - k - rt + 1)/N $, where $ N = gr $ is the length of the MDS code obtained after removing the local parities, and for any $ t $ colluding servers such that $ k + rt \leq N $. For an unbounded number of stored files, the obtained rate is strictly larger than those of known PIR schemes that work for any MDS code. Finally, the obtained PIR scheme can also be adapted when communication between the user and each server is performed via linear network coding, achieving the same rate as previous PIR schemes for this scenario but with polynomial finite field sizes, instead of exponential. Our rates are equal to those of PIR schemes for Reed--Solomon codes, but Reed--Solomon codes are incompatible with the MR-LRC property or linear network coding, thus our PIR scheme is less restrictive in its applications.
△ Less
Submitted 19 March, 2024; v1 submitted 9 January, 2019;
originally announced January 2019.
-
Locally Repairable Convolutional Codes with Sliding Window Repair
Authors:
Umberto Martínez-Peñas,
Diego Napp
Abstract:
Locally repairable convolutional codes (LRCCs) for distributed storage systems (DSSs) are introduced in this work. They enable local repair, for a single node erasure (or more generally, $ \partial - 1 $ erasures per local group), and sliding-window global repair, which can correct erasure patterns with up to $ {\rm d}^c_j - 1 $ erasures in every window of $ j+1 $ consecutive blocks of $ n $ nodes…
▽ More
Locally repairable convolutional codes (LRCCs) for distributed storage systems (DSSs) are introduced in this work. They enable local repair, for a single node erasure (or more generally, $ \partial - 1 $ erasures per local group), and sliding-window global repair, which can correct erasure patterns with up to $ {\rm d}^c_j - 1 $ erasures in every window of $ j+1 $ consecutive blocks of $ n $ nodes, where $ {\rm d}^c_j $ is the $ j $th column distance of the code. The parameter $ j $ can be adjusted, for a fixed LRCC, according to different catastrophic erasure patterns, requiring only to contact $ n(j+1) - {\rm d}^c_j + 1 $ nodes, plus less than $ μn $ other nodes, in the storage system, where $ μ$ is the memory of the code. A Singleton-type bound is provided for $ {\rm d}^c_j $. If it attains such a bound, an LRCC can correct the same number of catastrophic erasures in a window of length $ n(j+1) $ as an optimal locally repairable block code of the same rate and locality, and with block length $ n(j+1) $. In addition, the LRCC is able to perform the flexible and somehow local sliding-window repair by adjusting $ j $. Furthermore, by adjusting and/or sliding the window, the LRCC can potentially correct more erasures in the original window of $ n(j+1) $ nodes than an optimal locally repairable block code of the same rate and locality, and length $ n(j+1) $. Finally, the concept of partial maximum distance profile (partial MDP) codes is introduced. Partial MDP codes can correct all information-theoretically correctable erasure patterns for a given locality, local distance and information rate. An explicit construction of partial MDP codes whose column distances attain the provided Singleton-type bound, up to certain parameter $ j=L $, is obtained based on known maximum sum-rank distance convolutional codes.
△ Less
Submitted 5 December, 2020; v1 submitted 7 January, 2019;
originally announced January 2019.
-
Universal and Dynamic Locally Repairable Codes with Maximal Recoverability via Sum-Rank Codes
Authors:
Umberto Martínez-Peñas,
Frank R. Kschischang
Abstract:
Locally repairable codes (LRCs) are considered with equal or unequal localities, local distances and local field sizes. An explicit two-layer architecture with a sum-rank outer code is obtained, having disjoint local groups and achieving maximal recoverability (MR) for all families of local linear codes (MDS or not) simultaneously, up to a specified maximum locality $ r $. Furthermore, the local l…
▽ More
Locally repairable codes (LRCs) are considered with equal or unequal localities, local distances and local field sizes. An explicit two-layer architecture with a sum-rank outer code is obtained, having disjoint local groups and achieving maximal recoverability (MR) for all families of local linear codes (MDS or not) simultaneously, up to a specified maximum locality $ r $. Furthermore, the local linear codes (thus the localities, local distances and local fields) can be efficiently and dynamically modified without global recoding or changes in architecture or outer code, while preserving the MR property, easily adapting to new configurations in storage or new hot and cold data. In addition, local groups and file components can be added, removed or updated without global recoding. The construction requires global fields of size roughly $ g^r $, for $ g $ local groups and maximum or specified locality $ r $. For equal localities, these global fields are smaller than those of previous MR-LRCs when $ r \leq h $ (global parities). For unequal localities, they provide an exponential field size reduction on all previous best known MR-LRCs. For bounded localities and a large number of local groups, the global erasure-correction complexity of the given construction is comparable to that of Tamo-Barg codes or Reed-Solomon codes with local replication, while local repair is as efficient as for the Cartesian product of the local codes. Reed-Solomon codes with local replication and Cartesian products are recovered from the given construction when $ r=1 $ and $ h = 0 $, respectively. The given construction can also be adapted to provide hierarchical MR-LRCs for all types of hierarchies and parameters. Finally, subextension subcodes and sum-rank alternant codes are introduced to obtain further exponential field size reductions, at the expense of lower information rates.
△ Less
Submitted 24 April, 2019; v1 submitted 28 September, 2018;
originally announced September 2018.
-
Theory of supports for linear codes endowed with the sum-rank metric
Authors:
Umberto Martínez-Peñas
Abstract:
The sum-rank metric naturally extends both the Hamming and rank metrics in coding theory over fields. It measures the error-correcting capability of codes in multishot matrix-multiplicative channels (e.g. linear network coding or the discrete memoryless channel on fields). Although this metric has already shown to be of interest in several applications, not much is known about it. In this work, su…
▽ More
The sum-rank metric naturally extends both the Hamming and rank metrics in coding theory over fields. It measures the error-correcting capability of codes in multishot matrix-multiplicative channels (e.g. linear network coding or the discrete memoryless channel on fields). Although this metric has already shown to be of interest in several applications, not much is known about it. In this work, sum-rank supports for codewords and linear codes are introduced and studied, with emphasis on duality. The lattice structure of sum-rank supports is given; characterizations of the ambient spaces (\textit{support spaces}) they define are obtained; the classical operations of restriction and shortening are extended to the sum-rank metric; and estimates (bounds and equalities) on the parameters of such restricted and shortened codes are found. Three main applications are given: 1) Generalized sum-rank weights are introduced, together with their basic properties and bounds; 2) It is shown that duals, shortened and restricted codes of maximum sum-rank distance (MSRD) codes are in turn MSRD; 3) Degenerateness and effective lengths of sum-rank codes are introduced and characterized. In an appendix, skew supports are introduced, defined by skew polynomials, and their connection to sum-rank supports is given.
△ Less
Submitted 30 January, 2019; v1 submitted 7 August, 2018;
originally announced August 2018.
-
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Authors:
Umberto Martínez-Peñas,
Frank R. Kschischang
Abstract:
Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject erroneous packets in up to $t$ links, erase up to $ρ$ packets, and wire-tap up to $μ$ links, all throughout $\ell$ shots of a linearly-coded network. Assuming no knowledge of the underlying linear network code (in particular, the network topo…
▽ More
Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject erroneous packets in up to $t$ links, erase up to $ρ$ packets, and wire-tap up to $μ$ links, all throughout $\ell$ shots of a linearly-coded network. Assuming no knowledge of the underlying linear network code (in particular, the network topology and underlying linear code may be random and change with time), a coding scheme achieving zero-error communication and perfect secrecy is obtained based on linearized Reed-Solomon codes. The scheme achieves the maximum possible secret message size of $ \ell n^\prime - 2t - ρ- μ$ packets for coherent communication, where $ n^\prime $ is the number of outgoing links at the source, for any packet length $ m \geq n^\prime $ (largest possible range). By lifting this construction, coding schemes for non-coherent communication are obtained with information rates close to optimal for practical instances. The required field size is $ q^m $, where $ q > \ell $, thus $ q^m \approx \ell^{n^\prime} $, which is always smaller than that of a Gabidulin code tailored for $ \ell $ shots, which would be at least $ 2^{\ell n^\prime} $. A Welch-Berlekamp sum-rank decoding algorithm for linearized Reed-Solomon codes is provided, having quadratic complexity in the total length $n = \ell n^\prime $, and which can be adapted to handle not only errors, but also erasures, wire-tap observations and non-coherent communication. Combined with the obtained field size, the given decoding complexity is of $ \mathcal{O}(n^{\prime 4} \ell^2 \log(\ell)^2) $ operations in $ \mathbb{F}_2 $.
△ Less
Submitted 17 April, 2019; v1 submitted 9 May, 2018;
originally announced May 2018.
-
Skew and linearized Reed-Solomon codes and maximum sum rank distance codes over any division ring
Authors:
Umberto Martínez-Peñas
Abstract:
Reed-Solomon codes and Gabidulin codes have maximum Hamming distance and maximum rank distance, respectively. A general construction using skew polynomials, called skew Reed-Solomon codes, has already been introduced in the literature. In this work, we introduce a linearized version of such codes, called linearized Reed-Solomon codes. We prove that they have maximum sum-rank distance. Such distanc…
▽ More
Reed-Solomon codes and Gabidulin codes have maximum Hamming distance and maximum rank distance, respectively. A general construction using skew polynomials, called skew Reed-Solomon codes, has already been introduced in the literature. In this work, we introduce a linearized version of such codes, called linearized Reed-Solomon codes. We prove that they have maximum sum-rank distance. Such distance is of interest in multishot network coding or in singleshot multi-network coding. To prove our result, we introduce new metrics defined by skew polynomials, which we call skew metrics, we prove that skew Reed-Solomon codes have maximum skew distance, and then we translate this scenario to linearized Reed-Solomon codes and the sum-rank metric. The theories of Reed-Solomon codes and Gabidulin codes are particular cases of our theory, and the sum-rank metric extends both the Hamming and rank metrics. We develop our theory over any division ring (commutative or non-commutative field). We also consider non-zero derivations, which give new maximum rank distance codes over infinite fields not considered before.
△ Less
Submitted 8 February, 2018; v1 submitted 9 October, 2017;
originally announced October 2017.
-
Bounding the number of common zeros of multivariate polynomials and their consecutive derivatives
Authors:
Olav Geil,
Umberto Martínez-Peñas
Abstract:
We upper bound the number of common zeros over a finite grid of multivariate polynomials and an arbitrary finite collection of their consecutive Hasse derivatives (in a coordinate-wise sense). To that end, we make use of the tool from Gröbner basis theory known as footprint. Then we establish and prove extensions in this context of a family of well-known results in algebra and combinatorics. These…
▽ More
We upper bound the number of common zeros over a finite grid of multivariate polynomials and an arbitrary finite collection of their consecutive Hasse derivatives (in a coordinate-wise sense). To that end, we make use of the tool from Gröbner basis theory known as footprint. Then we establish and prove extensions in this context of a family of well-known results in algebra and combinatorics. These include Alon's combinatorial Nullstellensatz, existence and uniqueness of Hermite interpolating polynomials over a grid, estimations on the parameters of evaluation codes with consecutive derivatives, and bounds on the number of zeros of a polynomial by DeMillo and Lipton, Schwartz, Zippel, and Alon and Füredi. As an alternative, we also extend the Schwartz-Zippel bound to weighted multiplicities and discuss its connection with our extension of the footprint bound.
△ Less
Submitted 5 July, 2017;
originally announced July 2017.
-
Universal secure rank-metric coding schemes with optimal communication overheads
Authors:
Umberto Martínez-Peñas
Abstract:
We study the problem of reducing the communication overhead from a noisy wire-tap channel or storage system where data is encoded as a matrix, when more columns (or their linear combinations) are available. We present its applications to reducing communication overheads in universal secure linear network coding and secure distributed storage with crisscross errors and erasures and in the presence…
▽ More
We study the problem of reducing the communication overhead from a noisy wire-tap channel or storage system where data is encoded as a matrix, when more columns (or their linear combinations) are available. We present its applications to reducing communication overheads in universal secure linear network coding and secure distributed storage with crisscross errors and erasures and in the presence of a wire-tapper. Our main contribution is a method to transform coding schemes based on linear rank-metric codes, with certain properties, to schemes with lower communication overheads. By applying this method to pairs of Gabidulin codes, we obtain coding schemes with optimal information rate with respect to their security and rank error correction capability, and with universally optimal communication overheads, when $ n \leq m $, being $ n $ and $ m $ the number of columns and number of rows, respectively. Moreover, our method can be applied to other families of maximum rank distance codes when $ n > m $. The downside of the method is generally expanding the packet length, but some practical instances come at no cost.
△ Less
Submitted 25 August, 2017; v1 submitted 30 May, 2017;
originally announced May 2017.
-
Relative generalized matrix weights of matrix codes for universal security on wire-tap networks
Authors:
Umberto Martínez-Peñas,
Ryutaroh Matsumoto
Abstract:
Universal security over a network with linear network coding has been intensively studied. However, previous linear codes and code pairs used for this purpose were linear over a larger field than that used on the network, which restricts the possible packet lengths of optimal universal secure codes, does not allow to apply known list-decodable rank-metric codes and requires performing operations o…
▽ More
Universal security over a network with linear network coding has been intensively studied. However, previous linear codes and code pairs used for this purpose were linear over a larger field than that used on the network, which restricts the possible packet lengths of optimal universal secure codes, does not allow to apply known list-decodable rank-metric codes and requires performing operations over a large field. In this work, we introduce new parameters (relative generalized matrix weights and relative dimension/rank support profile) for code pairs that are linear over the field used in the network, and show that they measure the universal security performance of these code pairs. For one code and non-square matrices, generalized matrix weights coincide with the existing Delsarte generalized weights, hence we prove the connection between these latter weights and secure network coding, which was left open. As main applications, the proposed new parameters enable us to: 1) Obtain optimal universal secure linear codes on noiseless networks for all possible packet lengths, in particular for packet lengths not considered before, 2) Obtain the first universal secure list-decodable rank-metric code pairs with polynomial-sized lists, based on a recent construction by Guruswami et al, and 3) Obtain new characterizations of security equivalences of linear codes. Finally, we show that our parameters extend relative generalized Hamming weights and relative dimension/length profile, respectively, and relative generalized rank weights and relative dimension/intersection profile, respectively.
△ Less
Submitted 25 August, 2017; v1 submitted 6 December, 2016;
originally announced December 2016.
-
Communication efficient and strongly secure secret sharing schemes based on algebraic geometry codes
Authors:
Umberto Martínez-Peñas
Abstract:
Secret sharing schemes with optimal and universal communication overheads have been obtained independently by Bitar et al. and Huang et al. However, their constructions require a finite field of size q > n, where n is the number of shares, and do not provide strong security. In this work, we give a general framework to construct communication efficient secret sharing schemes based on sequences of…
▽ More
Secret sharing schemes with optimal and universal communication overheads have been obtained independently by Bitar et al. and Huang et al. However, their constructions require a finite field of size q > n, where n is the number of shares, and do not provide strong security. In this work, we give a general framework to construct communication efficient secret sharing schemes based on sequences of nested linear codes, which allows to use in particular algebraic geometry codes and allows to obtain strongly secure and communication efficient schemes. Using this framework, we obtain: 1) schemes with universal and close to optimal communication overheads for arbitrarily large lengths n and a fixed finite field, 2) the first construction of schemes with universal and optimal communication overheads and optimal strong security (for restricted lengths), having in particular the component-wise security advantages of perfect schemes and the security and storage efficiency of ramp schemes, and 3) schemes with universal and close to optimal communication overheads and close to optimal strong security defined for arbitrarily large lengths n and a fixed finite field.
△ Less
Submitted 19 February, 2018; v1 submitted 19 October, 2016;
originally announced October 2016.
-
Unifying notions of generalized weights for universal security on wire-tap networks
Authors:
Umberto Martínez-Peñas,
Ryutaroh Matsumoto
Abstract:
Universal security over a network with linear network coding has been intensively studied. However, previous linear codes used for this purpose were linear over a larger field than that used on the network. In this work, we introduce new parameters (relative dimension/rank support profile and relative generalized matrix weights) for linear codes that are linear over the field used in the network,…
▽ More
Universal security over a network with linear network coding has been intensively studied. However, previous linear codes used for this purpose were linear over a larger field than that used on the network. In this work, we introduce new parameters (relative dimension/rank support profile and relative generalized matrix weights) for linear codes that are linear over the field used in the network, measuring the universal security performance of these codes. The proposed new parameters enable us to use optimally universal secure linear codes on noiseless networks for all possible parameters, as opposed to previous works, and also enable us to add universal security to the recently proposed list-decodable rank-metric codes by Guruswami et al. We give several properties of the new parameters: monotonicity, Singleton-type lower and upper bounds, a duality theorem, and definitions and characterizations of equivalences of linear codes. Finally, we show that our parameters strictly extend relative dimension/length profile and relative generalized Hamming weights, respectively, and relative dimension/intersection profile and relative generalized rank weights, respectively. Moreover, we show that generalized matrix weights are larger than Delsarte generalized weights.
△ Less
Submitted 5 December, 2016; v1 submitted 5 July, 2016;
originally announced July 2016.
-
Generalized rank weights of reducible codes, optimal cases and related properties
Authors:
Umberto Martínez-Peñas
Abstract:
Reducible codes for the rank metric were introduced for cryptographic purposes. They have fast encoding and decoding algorithms, include maximum rank distance (MRD) codes and can correct many rank errors beyond half of their minimum rank distance, which makes them suitable for error-correction in network coding. In this paper, we study their security behaviour against information leakage on networ…
▽ More
Reducible codes for the rank metric were introduced for cryptographic purposes. They have fast encoding and decoding algorithms, include maximum rank distance (MRD) codes and can correct many rank errors beyond half of their minimum rank distance, which makes them suitable for error-correction in network coding. In this paper, we study their security behaviour against information leakage on networks when applied as coset coding schemes, giving the following main results: 1) we give lower and upper bounds on their generalized rank weights (GRWs), which measure worst-case information leakage to the wire-tapper, 2) we find new parameters for which these codes are MRD (meaning that their first GRW is optimal), and use the previous bounds to estimate their higher GRWs, 3) we show that all linear (over the extension field) codes whose GRWs are all optimal for fixed packet and code sizes but varying length are reducible codes up to rank equivalence, and 4) we show that the information leaked to a wire-tapper when using reducible codes is often much less than the worst case given by their (optimal in some cases) GRWs. We conclude with some secondary related properties: Conditions to be rank equivalent to cartesian products of linear codes, conditions to be rank degenerate, duality properties and MRD ranks.
△ Less
Submitted 3 August, 2017; v1 submitted 21 March, 2016;
originally announced March 2016.
-
Rank equivalent and rank degenerate skew cyclic codes
Authors:
Umberto Martínez-Peñas
Abstract:
Two skew cyclic codes can be equivalent for the Hamming metric only if they have the same length, and only the zero code is degenerate. The situation is completely different for the rank metric, where lengths of codes correspond to the number of outgoing links from the source when applying the code on a network. We study rank equivalences between skew cyclic codes of different lengths and, with th…
▽ More
Two skew cyclic codes can be equivalent for the Hamming metric only if they have the same length, and only the zero code is degenerate. The situation is completely different for the rank metric, where lengths of codes correspond to the number of outgoing links from the source when applying the code on a network. We study rank equivalences between skew cyclic codes of different lengths and, with the aim of finding the skew cyclic code of smallest length that is rank equivalent to a given one, we define different types of length for a given skew cyclic code, relate them and compute them in most cases. We give different characterizations of rank degenerate skew cyclic codes using conventional polynomials and linearized polynomials. Some known results on the rank weight hierarchy of cyclic codes for some lengths are obtained as particular cases and extended to all lengths and to all skew cyclic codes. Finally, we prove that the smallest length of a linear code that is rank equivalent to a given skew cyclic code can be attained by a pseudo-skew cyclic code. Throughout the paper, we find new relations between linear skew cyclic codes and their Galois closures.
△ Less
Submitted 26 January, 2016;
originally announced January 2016.
-
Rank error-correcting pairs
Authors:
Umberto Martínez-Peñas,
Ruud Pellikaan
Abstract:
Error-correcting pairs were introduced independently by Pellikaan and Kötter as a general method of decoding linear codes with respect to the Hamming metric using coordinatewise products of vectors, and are used for many well-known families of codes. In this paper, we define new types of vector products, extending the coordinatewise product, some of which preserve symbolic products of linearized p…
▽ More
Error-correcting pairs were introduced independently by Pellikaan and Kötter as a general method of decoding linear codes with respect to the Hamming metric using coordinatewise products of vectors, and are used for many well-known families of codes. In this paper, we define new types of vector products, extending the coordinatewise product, some of which preserve symbolic products of linearized polynomials after evaluation and some of which coincide with usual products of matrices. Then we define rank error-correcting pairs for codes that are linear over the extension field and for codes that are linear over the base field, and relate both types. Bounds on the minimum rank distance of codes and MRD conditions are given. Finally we show that some well-known families of rank-metric codes admit rank error-correcting pairs, and show that the given algorithm generalizes the classical algorithm using error-correcting pairs for the Hamming metric.
△ Less
Submitted 26 December, 2015;
originally announced December 2015.
-
On the roots and minimum rank distance of skew cyclic codes
Authors:
Umberto Martínez-Peñas
Abstract:
Skew cyclic codes play the same role as cyclic codes in the theory of error-correcting codes for the rank metric. In this paper, we give descriptions of these codes by root spaces, cyclotomic spaces and idempotent generators. We prove that the lattice of skew cyclic codes is anti-isomorphic to the lattice of root spaces, study these two lattices and extend the rank-BCH bound on their minimum rank…
▽ More
Skew cyclic codes play the same role as cyclic codes in the theory of error-correcting codes for the rank metric. In this paper, we give descriptions of these codes by root spaces, cyclotomic spaces and idempotent generators. We prove that the lattice of skew cyclic codes is anti-isomorphic to the lattice of root spaces, study these two lattices and extend the rank-BCH bound on their minimum rank distance to rank-metric versions of the van Lint-Wilson's shift and Hartmann-Tzeng bounds. Finally, we study skew cyclic codes which are linear over the base field, proving that these codes include all Hamming-metric cyclic codes, giving then a new relation between these codes and rank-metric skew cyclic codes.
△ Less
Submitted 22 July, 2016; v1 submitted 30 November, 2015;
originally announced November 2015.
-
Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth's second tower
Authors:
Olav Geil,
Stefano Martin,
Umberto Martínez-Peñas,
Diego Ruano
Abstract:
Asymptotically good sequences of ramp secret sharing schemes were given in [Asymptotically good ramp secret sharing schemes, arXiv:1502.05507] by using one-point algebraic geometric codes defined from asymptotically good towers of function fields. Their security is given by the relative generalized Hamming weights of the corresponding codes. In this paper we demonstrate how to obtain refined infor…
▽ More
Asymptotically good sequences of ramp secret sharing schemes were given in [Asymptotically good ramp secret sharing schemes, arXiv:1502.05507] by using one-point algebraic geometric codes defined from asymptotically good towers of function fields. Their security is given by the relative generalized Hamming weights of the corresponding codes. In this paper we demonstrate how to obtain refined information on the RGHWs when the codimension of the codes is small. For general codimension, we give an improved estimate for the highest RGHW.
△ Less
Submitted 19 November, 2015;
originally announced November 2015.
-
On the similarities between generalized rank and Hamming weights and their applications to network coding
Authors:
Umberto Martínez-Peñas
Abstract:
Rank weights and generalized rank weights have been proven to characterize error and erasure correction, and information leakage in linear network coding, in the same way as Hamming weights and generalized Hamming weights describe classical error and erasure correction, and information leakage in wire-tap channels of type II and code-based secret sharing. Although many similarities between both ca…
▽ More
Rank weights and generalized rank weights have been proven to characterize error and erasure correction, and information leakage in linear network coding, in the same way as Hamming weights and generalized Hamming weights describe classical error and erasure correction, and information leakage in wire-tap channels of type II and code-based secret sharing. Although many similarities between both cases have been established and proven in the literature, many other known results in the Hamming case, such as bounds or characterizations of weight-preserving maps, have not been translated to the rank case yet, or in some cases have been proven after develo** a different machinery. The aim of this paper is to further relate both weights and generalized weights, show that the results and proofs in both cases are usually essentially the same, and see the significance of these similarities in network coding. Some of the new results in the rank case also have new consequences in the Hamming case.
△ Less
Submitted 22 April, 2016; v1 submitted 12 June, 2015;
originally announced June 2015.
-
On asymptotically good ramp secret sharing schemes
Authors:
Olav Geil,
Stefano Martin,
Umberto Martínez-Peñas,
Ryutaroh Matsumoto,
Diego Ruano
Abstract:
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In this paper we analyze additional parameters describing the asymptotic behavior of partial information leakage and possibly also partial reconstru…
▽ More
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In this paper we analyze additional parameters describing the asymptotic behavior of partial information leakage and possibly also partial reconstruction giving a more complete picture of the access structure for sequences of linear ramp secret sharing schemes. Our study involves a detailed treatment of the (relative) generalized Hamming weights of the considered codes.
△ Less
Submitted 2 February, 2017; v1 submitted 19 February, 2015;
originally announced February 2015.