-
Toward Quantum CSS-T Codes from Sparse Matrices
Authors:
Eduardo Camps-Moreno,
Hiram H. López,
Gretchen L. Matthews,
Emily McMillon
Abstract:
CSS-T codes were recently introduced as quantum error-correcting codes that respect a transversal gate. A CSS-T code depends on a pair $(C_1, C_2)$ of binary linear codes $C_1$ and $C_2$ that satisfy certain conditions. We prove that $C_1$ and $C_2$ form a CSS-T pair if and only if $C_2 \subset \operatorname{Hull}(C_1) \cap \operatorname{Hull}(C_1^2)$, where the hull of a code is the intersection…
▽ More
CSS-T codes were recently introduced as quantum error-correcting codes that respect a transversal gate. A CSS-T code depends on a pair $(C_1, C_2)$ of binary linear codes $C_1$ and $C_2$ that satisfy certain conditions. We prove that $C_1$ and $C_2$ form a CSS-T pair if and only if $C_2 \subset \operatorname{Hull}(C_1) \cap \operatorname{Hull}(C_1^2)$, where the hull of a code is the intersection of the code with its dual. We show that if $(C_1,C_2)$ is a CSS-T pair, and the code $C_2$ is degenerated on $\{i\}$, meaning that the $i^{th}$-entry is zero for all the elements in $C_2$, then the pair of punctured codes $(C_1|_i,C_2|_i)$ is also a CSS-T pair. Finally, we provide Magma code based on our results and quasi-cyclic codes as a step toward finding quantum LDPC or LDGM CSS-T codes computationally.
△ Less
Submitted 1 June, 2024;
originally announced June 2024.
-
Algebraic Geometric Rook Codes for Coded Distributed Computing
Authors:
Gretchen L. Matthews,
Pedro Soto
Abstract:
We extend coded distributed computing over finite fields to allow the number of workers to be larger than the field size. We give codes that work for fully general matrix multiplication and show that in this case we serendipitously have that all functions can be computed in a distributed fault-tolerant fashion over finite fields. This generalizes previous results on the topic. We prove that the as…
▽ More
We extend coded distributed computing over finite fields to allow the number of workers to be larger than the field size. We give codes that work for fully general matrix multiplication and show that in this case we serendipitously have that all functions can be computed in a distributed fault-tolerant fashion over finite fields. This generalizes previous results on the topic. We prove that the associated codes achieve a recovery threshold similar to the ones for characteristic zero fields but now with a factor that is proportional to the genus of the underlying function field. In particular, we have that the recovery threshold of these codes is proportional to the classical complexity of matrix multiplication by a factor of at most the genus.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Fractional decoding of algebraic geometry codes over extension fields
Authors:
Eduardo Camps-Moreno,
Gretchen L. Matthews,
Welington Santos
Abstract:
In this paper, we study algebraic geometry codes from curves over $\mathbb{F}_{q^\ell}$ through their virtual projections which are algebraic geometric codes over $\mathbb{F}_q$. We use the virtual projections to provide fractional decoding algorithms for the codes over $\mathbb{F}_{q^\ell}$. Fractional decoding seeks to perform error correction using a smaller fraction of $\mathbb{F}_q$-symbols t…
▽ More
In this paper, we study algebraic geometry codes from curves over $\mathbb{F}_{q^\ell}$ through their virtual projections which are algebraic geometric codes over $\mathbb{F}_q$. We use the virtual projections to provide fractional decoding algorithms for the codes over $\mathbb{F}_{q^\ell}$. Fractional decoding seeks to perform error correction using a smaller fraction of $\mathbb{F}_q$-symbols than a typical decoding algorithm. In one instance, the bound on the number of correctable errors differs from the usual lower bound by the degree of a pole divisor of an annihilator function. In another, we view the virtual projections as interleaved codes to, with high probability, correct more errors than anticipated.
△ Less
Submitted 10 April, 2024;
originally announced April 2024.
-
An algebraic characterization of binary CSS-T codes and cyclic CSS-T codes for quantum fault tolerance
Authors:
Eduardo Camps-Moreno,
Hiram H. López,
Gretchen L. Matthews,
Diego Ruano,
Rodrigo San-José,
Ivan Soprunov
Abstract:
CSS-T codes were recently introduced as quantum error-correcting codes that respect a transversal gate. A CSS-T code depends on a CSS-T pair, which is a pair of binary codes $(C_1, C_2)$ such that $C_1$ contains $C_2$, $C_2$ is even, and the shortening of the dual of $C_1$ with respect to the support of each codeword of $C_2$ is self-dual. In this paper, we give new conditions to guarantee that a…
▽ More
CSS-T codes were recently introduced as quantum error-correcting codes that respect a transversal gate. A CSS-T code depends on a CSS-T pair, which is a pair of binary codes $(C_1, C_2)$ such that $C_1$ contains $C_2$, $C_2$ is even, and the shortening of the dual of $C_1$ with respect to the support of each codeword of $C_2$ is self-dual. In this paper, we give new conditions to guarantee that a pair of binary codes $(C_1, C_2)$ is a CSS-T pair. We define the poset of CSS-T pairs and determine the minimal and maximal elements of the poset. We provide a propagation rule for nondegenerate CSS-T codes. We apply some main results to Reed-Muller, cyclic, and extended cyclic codes. We characterize CSS-T pairs of cyclic codes in terms of the defining cyclotomic cosets. We find cyclic and extended cyclic codes to obtain quantum codes with better parameters than those in the literature.
△ Less
Submitted 6 June, 2024; v1 submitted 29 December, 2023;
originally announced December 2023.
-
Mathematical LoRE: Local Recovery of Erasures using Polynomials, Curves, Surfaces, and Liftings
Authors:
Kathryn Haymaker,
Hiram H. López,
Beth Malmskog,
Gretchen L. Matthews,
Fernando Piñero
Abstract:
Employing underlying geometric and algebraic structures allows for constructing bespoke codes for local recovery of erasures. We survey techniques for enriching classical codes with additional machinery, such as using lines or curves in projective space for local recovery sets or products of curves to enhance the availability of data.
Employing underlying geometric and algebraic structures allows for constructing bespoke codes for local recovery of erasures. We survey techniques for enriching classical codes with additional machinery, such as using lines or curves in projective space for local recovery sets or products of curves to enhance the availability of data.
△ Less
Submitted 3 February, 2024; v1 submitted 26 December, 2023;
originally announced December 2023.
-
Algebraic hierarchical locally recoverable codes with nested affine subspace recovery
Authors:
Kathryn Haymaker,
Beth Malmskog,
Gretchen L. Matthews
Abstract:
Codes with locality, also known as locally recoverable codes, allow for recovery of erasures using proper subsets of other coordinates. Theses subsets are typically of small cardinality to promote recovery using limited network traffic and other resources. Hierarchical locally recoverable codes allow for recovery of erasures using sets of other symbols whose sizes increase as needed to allow for r…
▽ More
Codes with locality, also known as locally recoverable codes, allow for recovery of erasures using proper subsets of other coordinates. Theses subsets are typically of small cardinality to promote recovery using limited network traffic and other resources. Hierarchical locally recoverable codes allow for recovery of erasures using sets of other symbols whose sizes increase as needed to allow for recovery of more symbols. In this paper, we construct codes with hierarchical locality from a geometric perspective, using fiber products of curves. We demonstrate how the constructed hierarchical codes can be viewed as punctured subcodes of Reed-Muller codes. This point of view provides natural structures for local recovery at each level in the hierarchy.
△ Less
Submitted 31 October, 2023;
originally announced October 2023.
-
Influences of some families of error-correcting codes
Authors:
Hailey Egan,
Jason T. LeGrow,
Gretchen L. Matthews,
Jeff Suliga
Abstract:
Binary codes of length $n$ may be viewed as subsets of vertices of the Boolean hypercube $\{0,1\}^n$. The ability of a linear error-correcting code to recover erasures is connected to influences of particular monotone Boolean functions. These functions provide insight into the role that particular coordinates play in a code's erasure repair capability. In this paper, we consider directly the influ…
▽ More
Binary codes of length $n$ may be viewed as subsets of vertices of the Boolean hypercube $\{0,1\}^n$. The ability of a linear error-correcting code to recover erasures is connected to influences of particular monotone Boolean functions. These functions provide insight into the role that particular coordinates play in a code's erasure repair capability. In this paper, we consider directly the influences of coordinates of a code. We describe a family of codes, called codes with minimum disjoint support, for which all influences may be determined. As a consequence, we find influences of repetition codes and certain distinct weight codes. Computing influences is typically circumvented by appealing to the transitivity of the automorphism group of the code. Some of the codes considered here fail to meet the transitivity conditions requires for these standard approaches, yet we can compute them directly.
△ Less
Submitted 10 October, 2023; v1 submitted 3 August, 2023;
originally announced August 2023.
-
Curve-lifted codes for local recovery using lines
Authors:
Gretchen L. Matthews,
Travis Morrison,
Aidan W. Murphy
Abstract:
In this paper, we introduce curve-lifted codes over fields of arbitrary characteristic, inspired by Hermitian-lifted codes over $\mathbb{F}_{2^r}$. These codes are designed for locality and availability, and their particular parameters depend on the choice of curve and its properties. Due to the construction, the numbers of rational points of intersection between curves and lines play a key role.…
▽ More
In this paper, we introduce curve-lifted codes over fields of arbitrary characteristic, inspired by Hermitian-lifted codes over $\mathbb{F}_{2^r}$. These codes are designed for locality and availability, and their particular parameters depend on the choice of curve and its properties. Due to the construction, the numbers of rational points of intersection between curves and lines play a key role. To demonstrate that and generate new families of locally recoverable codes (LRCs) with high availabilty, we focus on norm-trace-lifted codes. In some cases, they are easier to define than their Hermitian counterparts and consequently have a better asymptotic bound on the code rate.
△ Less
Submitted 24 July, 2023;
originally announced July 2023.
-
Multishot Adversarial Network Decoding
Authors:
Giuseppe Cotardo,
Gretchen L. Matthews,
Alberto Ravagnani,
Julia Shapiro
Abstract:
We investigate adversarial network coding and decoding focusing on the multishot regime. Errors can occur on a proper subset of the network edges and are modeled via an adversarial channel. The paper contains both bounds and capacity-achieving schemes for the Diamond Network and the Mirrored Diamond Network. We also initiate the study of the generalizations of these networks.
We investigate adversarial network coding and decoding focusing on the multishot regime. Errors can occur on a proper subset of the network edges and are modeled via an adversarial channel. The paper contains both bounds and capacity-achieving schemes for the Diamond Network and the Mirrored Diamond Network. We also initiate the study of the generalizations of these networks.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
HerA Scheme: Secure Distributed Matrix Multiplication via Hermitian Codes
Authors:
Roberto A. Machado,
Gretchen L. Matthews,
Welington Santos
Abstract:
We consider the problem of secure distributed matrix multiplication (SDMM), where a user has two matrices and wishes to compute their product with the help of $N$ honest but curious servers under the security constraint that any information about either $A$ or $B$ is not leaked to any server. This paper presents a \emph{new scheme} that considers the inner product partition for matrices $A$ and…
▽ More
We consider the problem of secure distributed matrix multiplication (SDMM), where a user has two matrices and wishes to compute their product with the help of $N$ honest but curious servers under the security constraint that any information about either $A$ or $B$ is not leaked to any server. This paper presents a \emph{new scheme} that considers the inner product partition for matrices $A$ and $B$. Our central technique relies on encoding matrices $A$ and $B$ in a Hermitian code and its dual code, respectively. We present the Hermitian Algebraic (HerA) scheme, which employs Hermitian codes and characterizes the partitioning and security capacities given entries of matrices belonging to a finite field with $q^2$ elements. We showcase that this scheme performs the secure distributed matrix multiplication in a significantly smaller finite field and expands security allowances compared to the existing results in the literature.
△ Less
Submitted 15 May, 2023; v1 submitted 28 March, 2023;
originally announced March 2023.
-
Relative hulls and quantum codes
Authors:
Sarah E. Anderson,
Eduardo Camps-Moreno,
Hiram H. López,
Gretchen L. Matthews,
Diego Ruano,
Ivan Soprunov
Abstract:
Given two $q$-ary codes $C_1$ and $C_2$, the relative hull of $C_1$ with respect to $C_2$ is the intersection $C_1\cap C_2^\perp$. We prove that when $q>2$, the relative hull dimension can be repeatedly reduced by one, down to a certain bound, by replacing either of the two codes with an equivalent one. The reduction of the relative hull dimension applies to hulls taken with respect to the $e$-Gal…
▽ More
Given two $q$-ary codes $C_1$ and $C_2$, the relative hull of $C_1$ with respect to $C_2$ is the intersection $C_1\cap C_2^\perp$. We prove that when $q>2$, the relative hull dimension can be repeatedly reduced by one, down to a certain bound, by replacing either of the two codes with an equivalent one. The reduction of the relative hull dimension applies to hulls taken with respect to the $e$-Galois inner product, which has as special cases both the Euclidean and Hermitian inner products. We give conditions under which the relative hull dimension can be increased by one via equivalent codes when $q>2$. We study some consequences of the relative hull properties on entanglement-assisted quantum error-correcting codes and prove the existence of new entanglement-assisted quantum error-correcting maximum distance separable codes, meaning those whose parameters satisfy the quantum Singleton bound.
△ Less
Submitted 23 December, 2023; v1 submitted 29 December, 2022;
originally announced December 2022.
-
Decreasing norm-trace codes
Authors:
Cícero Carvalho,
Hiram H. López,
Gretchen L. Matthews
Abstract:
The decreasing norm-trace codes are evaluation codes defined by a set of monomials closed under divisibility and the rational points of the extended norm-trace curve. In particular, the decreasing norm-trace codes contain the one-point algebraic geometry (AG) codes over the extended norm-trace curve. We use Gröbner basis theory and find the indicator functions on the rational points of the curve t…
▽ More
The decreasing norm-trace codes are evaluation codes defined by a set of monomials closed under divisibility and the rational points of the extended norm-trace curve. In particular, the decreasing norm-trace codes contain the one-point algebraic geometry (AG) codes over the extended norm-trace curve. We use Gröbner basis theory and find the indicator functions on the rational points of the curve to determine the basic parameters of the decreasing norm-trace codes: length, dimension, and minimum distance. We also obtain their dual codes. We give conditions for a decreasing norm-trace code to be a self-orthogonal or a self-dual code. We provide a linear exact repair scheme to correct single erasures for decreasing norm-trace codes, which applies to higher rate codes than the scheme developed by **, Luo, and Xing (IEEE Transactions on Information Theory {\bf 64} (2), 900-908, 2018) when applied to the one-point AG codes over the extended norm-trace curve.
△ Less
Submitted 24 July, 2023; v1 submitted 24 September, 2022;
originally announced September 2022.
-
Explicit non-special divisors of small degree, algebraic geometric hulls, and LCD codes from Kummer extensions
Authors:
Eduardo Camps,
Hiram H. López,
Gretchen L. Matthews
Abstract:
In this paper, we consider the hull of an algebraic geometry code, meaning the intersection of the code and its dual. We demonstrate how codes whose hulls are algebraic geometry codes may be defined using only rational places of Kummer extensions (and Hermitian function fields in particular). Our primary tool is explicitly constructing non-special divisors of degrees $g$ and $g-1$ on certain famil…
▽ More
In this paper, we consider the hull of an algebraic geometry code, meaning the intersection of the code and its dual. We demonstrate how codes whose hulls are algebraic geometry codes may be defined using only rational places of Kummer extensions (and Hermitian function fields in particular). Our primary tool is explicitly constructing non-special divisors of degrees $g$ and $g-1$ on certain families of function fields with many rational places, accomplished by appealing to Weierstrass semigroups. We provide explicit algebraic geometry codes with hulls of specified dimensions, producing along the way linearly complementary dual algebraic geometric codes from the Hermitian function field (among others) using only rational places and an answer to an open question posed by Ballet and Le Brigand for particular function fields. These results complement earlier work by Mesnager, Tang, and Qi that use lower-genus function fields as well as instances using places of a higher degree from Hermitian function fields to construct linearly complementary dual (LCD) codes and that of Carlet, Mesnager, Tang, Qi, and Pellikaan to provide explicit algebraic geometry codes with the LCD property rather than obtaining codes via monomial equivalences.
△ Less
Submitted 3 February, 2024; v1 submitted 26 December, 2021;
originally announced December 2021.
-
Multivariate Goppa codes
Authors:
Hiram H. López,
Gretchen L. Matthews
Abstract:
In this paper, we introduce multivariate Goppa codes, which contain as a special case the well-known, classical Goppa codes. We provide a parity check matrix for a multivariate Goppa code in terms of a tensor product of generalized Reed-Solomon codes. We prove that multivariate Goppa codes are subfield subcodes of augmented Cartesian codes. By showing how this new family of codes relates to tensor…
▽ More
In this paper, we introduce multivariate Goppa codes, which contain as a special case the well-known, classical Goppa codes. We provide a parity check matrix for a multivariate Goppa code in terms of a tensor product of generalized Reed-Solomon codes. We prove that multivariate Goppa codes are subfield subcodes of augmented Cartesian codes. By showing how this new family of codes relates to tensor products of generalized Reed-Solomon codes and augmented codes, we obtain information about the parameters, subcodes, duals, and hulls of multivariate Goppa codes. We see that in certain cases, the hulls of multivariate Goppa codes (resp., tensor product of generalized Reed-Solomon codes), are also multivariate Goppa codes (resp. tensor product of generalized Reed-Solomon codes). We utilize the multivariate Goppa codes to obtain entanglement-assisted quantum error-correcting codes and to build families of long LCD, self-dual, or self-orthogonal codes.
△ Less
Submitted 12 December, 2021;
originally announced December 2021.
-
Erasures repair for decreasing monomial-Cartesian and augmented Reed-Muller codes of high rate
Authors:
Hiram H. López,
Gretchen L. Matthews,
Daniel Valvo
Abstract:
In this work, we present linear exact repair schemes for one or two erasures in decreasing monomial-Cartesian codes DM-CC, a family of codes which provides a framework for polar codes. In the case of two erasures, the positions of the erasures should satisfy a certain restriction. We present families of augmented Reed-Muller (ARM) and augmented Cartesian codes (ACar) which are families of evaluati…
▽ More
In this work, we present linear exact repair schemes for one or two erasures in decreasing monomial-Cartesian codes DM-CC, a family of codes which provides a framework for polar codes. In the case of two erasures, the positions of the erasures should satisfy a certain restriction. We present families of augmented Reed-Muller (ARM) and augmented Cartesian codes (ACar) which are families of evaluation codes obtained by strategically adding vectors to Reed-Muller and Cartesian codes, respectively. We develop repair schemes for one or two erasures for these families of augmented codes. Unlike the repair scheme for two erasures of DM-CC, the repair scheme for two erasures for the augmented codes has no restrictions on the positions of the erasures. When the dimension and base field are fixed, we give examples where ARM and ACar codes provide a lower bandwidth (resp., bitwidth) in comparison with Reed-Solomon (resp., Hermitian) codes. When the length and base field are fixed, we give examples where ACar codes provide a lower bandwidth in comparison with ARM. Finally, we analyze the asymptotic behavior when the augmented codes achieve the maximum rate.
△ Less
Submitted 3 July, 2021;
originally announced July 2021.
-
Codes with locality from cyclic extensions of Deligne-Lusztig curves
Authors:
Gretchen L. Matthews,
Fernando L. Piñero
Abstract:
Recently, Skabelund defined new maximal curves which are cyclic extensions of the Suzuki and Ree curves. Previously, the now well-known GK curves were found as cyclic extensions of the Hermitian curve. In this paper, we consider locally recoverable codes constructed from these new curves, complementing that done for the GK curve. Locally recoverable codes allow for the recovery of a single symbol…
▽ More
Recently, Skabelund defined new maximal curves which are cyclic extensions of the Suzuki and Ree curves. Previously, the now well-known GK curves were found as cyclic extensions of the Hermitian curve. In this paper, we consider locally recoverable codes constructed from these new curves, complementing that done for the GK curve. Locally recoverable codes allow for the recovery of a single symbol by accessing only a few others which form what is known as a recovery set. If every symbol has at least two disjoint recovery sets, the code is said to have availability. Three constructions are described, as each best fits a particular situation. The first employs the original construction of locally recoverable codes from curves by Tamo and Barg. The second yields codes with availability by appealing to the use of fiber products as described by Haymaker, Malmskog, and Matthews, while the third accomplishes availability by taking products of codes themselves. We see that cyclic extensions of the Deligne-Lusztig curves provide codes with smaller locality than those typically found in the literature.
△ Less
Submitted 11 June, 2020;
originally announced June 2020.
-
Hermitian-Lifted Codes
Authors:
Hiram H. López,
Beth Malmskog,
Gretchen L Matthews,
Fernando Piñero-González,
Mary Wootters
Abstract:
In this paper, we construct codes for local recovery of erasures with high availability and constant-bounded rate from the Hermitian curve. These new codes, called Hermitian-lifted codes, are evaluation codes with evaluation set being the set of $\mathbb{F}_{q^2}$-rational points on the affine curve. The novelty is in terms of the functions to be evaluated; they are a special set of monomials whic…
▽ More
In this paper, we construct codes for local recovery of erasures with high availability and constant-bounded rate from the Hermitian curve. These new codes, called Hermitian-lifted codes, are evaluation codes with evaluation set being the set of $\mathbb{F}_{q^2}$-rational points on the affine curve. The novelty is in terms of the functions to be evaluated; they are a special set of monomials which restrict to low degree polynomials on lines intersected with the Hermitian curve. As a result, the positions corresponding to points on any line through a given point act as a recovery set for the position corresponding to that point.
△ Less
Submitted 9 June, 2020;
originally announced June 2020.
-
Polar decreasing monomial-Cartesian codes
Authors:
Eduardo Camps,
Hiram H. López,
Gretchen L. Matthews,
Eliseo Sarmiento
Abstract:
We prove that families of polar codes with multiple kernels over certain symmetric channels can be viewed as polar decreasing monomial-Cartesian codes, offering a unified treatment for such codes, over any finite field. We define decreasing monomial-Cartesian codes as the evaluation of a set of monomials closed under divisibility over a Cartesian product. Polar decreasing monomial-Cartesian codes…
▽ More
We prove that families of polar codes with multiple kernels over certain symmetric channels can be viewed as polar decreasing monomial-Cartesian codes, offering a unified treatment for such codes, over any finite field. We define decreasing monomial-Cartesian codes as the evaluation of a set of monomials closed under divisibility over a Cartesian product. Polar decreasing monomial-Cartesian codes are decreasing monomial-Cartesian codes whose sets of monomials are closed respect a partial order inspired by the recent work of Bardet, Dragoi, Otmani, and Tillich ["Algebraic properties of polar codes from a new polynomial formalism," 2016 IEEE International Symposium on Information Theory (ISIT)]. Extending the main theorem of Mori and Tanaka ["Source and Channel Polarization Over Finite Fields and Reed-Solomon Matrices," in IEEE Transactions on Information Theory, vol. 60, no. 5, pp. 2720--2736, May 2014], we prove that any sequence of invertible matrices over an arbitrary field satisfying certain conditions polarizes any symmetric over the field channel. In addition, we prove that the dual of a decreasing monomial-Cartesian code is monomially equivalent to a decreasing monomial-Cartesian code. Defining the minimal generating set for a set of monomials, we use it to describe the length, dimension and minimum distance of a decreasing monomial-Cartesian code.
△ Less
Submitted 1 February, 2020;
originally announced February 2020.
-
Affine Cartesian codes with complementary duals
Authors:
Hiram H. López,
Felice Manganiello,
Gretchen L. Matthews
Abstract:
A linear code $C$ with the property that $C \cap C^{\perp} = \{0 \}$ is said to be a linear complementary dual, or LCD, code. In this paper, we consider generalized affine Cartesian codes which are LCD. Generalized affine Cartesian codes arise naturally as the duals of affine Cartesian codes in the same way that generalized Reed-Solomon codes arise as duals of Reed-Solomon codes. Generalized affin…
▽ More
A linear code $C$ with the property that $C \cap C^{\perp} = \{0 \}$ is said to be a linear complementary dual, or LCD, code. In this paper, we consider generalized affine Cartesian codes which are LCD. Generalized affine Cartesian codes arise naturally as the duals of affine Cartesian codes in the same way that generalized Reed-Solomon codes arise as duals of Reed-Solomon codes. Generalized affine Cartesian codes are evaluation codes constructed by evaluating multivariate polynomials of bounded degree at points in $m$-dimensional Cartesian set over a finite field $K$ and scaling the coordinates. The LCD property depends on the scalars used. Because Reed-Solomon codes are a special case, we obtain a characterization of those generalized Reed-Solomon codes which are LCD along with the more general result for generalized affine Cartesian codes.
△ Less
Submitted 28 May, 2018; v1 submitted 17 May, 2018;
originally announced May 2018.
-
On the Service Capacity Region of Accessing Erasure Coded Content
Authors:
Mehmet Aktas,
Sarah E. Anderson,
Ann Johnston,
Gauri Joshi,
Swanand Kadhe,
Gretchen L. Matthews,
Carolyn Mayer,
Emina Soljanin
Abstract:
Cloud storage systems generally add redundancy in storing content files such that $K$ files are replicated or erasure coded and stored on $N > K$ nodes. In addition to providing reliability against failures, the redundant copies can be used to serve a larger volume of content access requests. A request for one of the files can be either be sent to a systematic node, or one of the repair groups. In…
▽ More
Cloud storage systems generally add redundancy in storing content files such that $K$ files are replicated or erasure coded and stored on $N > K$ nodes. In addition to providing reliability against failures, the redundant copies can be used to serve a larger volume of content access requests. A request for one of the files can be either be sent to a systematic node, or one of the repair groups. In this paper, we seek to maximize the service capacity region, that is, the set of request arrival rates for the $K$ files that can be supported by a coded storage system. We explore two aspects of this problem: 1) for a given erasure code, how to optimally split incoming requests between systematic nodes and repair groups, and 2) choosing an underlying erasure code that maximizes the achievable service capacity region. In particular, we consider MDS and Simplex codes. Our analysis demonstrates that erasure coding makes the system more robust to skews in file popularity than simply replicating a file at multiple servers, and that coding and replication together can make the capacity region larger than either alone.
△ Less
Submitted 9 October, 2017;
originally announced October 2017.
-
Locally recoverable codes from algebraic curves and surfaces
Authors:
Alexander Barg,
Kathryn Haymaker,
Everett W. Howe,
Gretchen L. Matthews,
Anthony Várilly-Alvarado
Abstract:
A locally recoverable code is a code over a finite alphabet such that the value of any single coordinate of a codeword can be recovered from the values of a small subset of other coordinates. Building on work of Barg, Tamo, and Vlăduţ, we present several constructions of locally recoverable codes from algebraic curves and surfaces.
A locally recoverable code is a code over a finite alphabet such that the value of any single coordinate of a codeword can be recovered from the values of a small subset of other coordinates. Building on work of Barg, Tamo, and Vlăduţ, we present several constructions of locally recoverable codes from algebraic curves and surfaces.
△ Less
Submitted 18 January, 2017;
originally announced January 2017.