-
Efficient List-decoding of Polynomial Ideal Codes with Optimal List Size
Authors:
Noga Ron-Zewi,
S. Venkitesh,
Mary Wootters
Abstract:
In a recent breakthrough [BGM23, GZ23, AGL23], it was shown that randomly punctured Reed-Solomon codes are list decodable with optimal list size with high probability, i.e., they attain the Singleton bound for list decoding [ST20, Rot22, GST22]. We extend this result to the family of polynomial ideal codes, a large class of error-correcting codes which includes several well-studied families of cod…
▽ More
In a recent breakthrough [BGM23, GZ23, AGL23], it was shown that randomly punctured Reed-Solomon codes are list decodable with optimal list size with high probability, i.e., they attain the Singleton bound for list decoding [ST20, Rot22, GST22]. We extend this result to the family of polynomial ideal codes, a large class of error-correcting codes which includes several well-studied families of codes such as Reed-Solomon, folded Reed-Solomon, and multiplicity codes. More specifically, similarly to the Reed-Solomon setting, we show that randomly punctured polynomial ideal codes over an exponentially large alphabet exactly achieve the Singleton bound for list-decoding; while such codes over a polynomially large alphabet approximately achieve it.
Combining our results with the efficient list-decoding algorithm for a large subclass of polynomial ideal codes of [BHKS21], implies as a corollary that a large subclass of polynomial ideal codes (over random evaluation points) is efficiently list decodable with optimal list size. To the best of our knowledge, this gives the first family of codes that can be efficiently list decoded with optimal list size (for all list sizes), as well as the first family of linear codes of rate $R$ that can be efficiently list decoded up to a radius of $1 -R-ε$ with list size that is polynomial (and even linear) in $1/ε$. Our result applies to natural families of codes with algebraic structure such as folded Reed-Solomon or multiplicity codes (over random evaluation points).
Our proof follows the general framework of [BGM23, GZ23, AGL23], but several new ingredients are needed. The main two new ingredients are a polynomial-ideal GM-MDS theorem (extending the algebraic GM-MDS theorem of [YH19, Lov21]), as well as a duality theorem for polynomial ideal codes, both of which may be of independent interest.
△ Less
Submitted 6 April, 2024; v1 submitted 25 January, 2024;
originally announced January 2024.
-
Finer-grained Reductions in Fine-grained Hardness of Approximation
Authors:
Elie Abboud,
Noga Ron-Zewi
Abstract:
We investigate the relation between $δ$ and $ε$ required for obtaining a $(1+δ)$-approximation in time $N^{2-ε}$ for closest pair problems under various distance metrics, and for other related problems in fine-grained complexity.
Specifically, our main result shows that if it is impossible to (exactly) solve the (bichromatic) inner product (IP) problem for vectors of dimension $c \log N$ in time…
▽ More
We investigate the relation between $δ$ and $ε$ required for obtaining a $(1+δ)$-approximation in time $N^{2-ε}$ for closest pair problems under various distance metrics, and for other related problems in fine-grained complexity.
Specifically, our main result shows that if it is impossible to (exactly) solve the (bichromatic) inner product (IP) problem for vectors of dimension $c \log N$ in time $N^{2-ε}$, then there is no $(1+δ)$-approximation algorithm for (bichromatic) Euclidean Closest Pair running in time $N^{2-2ε}$, where $δ\approx (ε/c)^2$ (where $\approx$ hides $\polylog$ factors). This improves on the prior result due to Chen and Williams (SODA 2019) which gave a smaller polynomial dependence of $δ$ on $ε$, on the order of $δ\approx (ε/c)^6$. Our result implies in turn that no $(1+δ)$-approximation algorithm exists for Euclidean closest pair for $δ\approx ε^4$, unless an algorithmic improvement for IP is obtained. This in turn is very close to the approximation guarantee of $δ\approx ε^3$ for Euclidean closest pair, given by the best known algorithm of Almam, Chan, and Williams (FOCS 2016). By known reductions, a similar result follows for a host of other related problems in fine-grained hardness of approximation.
Our reduction combines the hardness of approximation framework of Chen and Williams, together with an MA communication protocol for IP over a small alphabet, that is inspired by the MA protocol of Chen (Theory of Computing, 2020).
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Simple Constructions of Unique Neighbor Expanders from Error-correcting Codes
Authors:
Swastik Kopparty,
Noga Ron-Zewi,
Shubhangi Saraf
Abstract:
In this note, we give very simple constructions of unique neighbor expander graphs starting from spectral or combinatorial expander graphs of mild expansion. These constructions and their analysis are simple variants of the constructions of LDPC error-correcting codes from expanders, given by Sipser-Spielman [SS96] (and Tanner [Tan81]), and their analysis. We also show how to obtain expanders with…
▽ More
In this note, we give very simple constructions of unique neighbor expander graphs starting from spectral or combinatorial expander graphs of mild expansion. These constructions and their analysis are simple variants of the constructions of LDPC error-correcting codes from expanders, given by Sipser-Spielman [SS96] (and Tanner [Tan81]), and their analysis. We also show how to obtain expanders with many unique neighbors using similar ideas.
There were many exciting results on this topic recently, starting with Asherov-Dinur [AD23] and Hsieh-McKenzie-Mohanty-Paredes [HMMP23], who gave a similar construction of unique neighbor expander graphs, but using more sophisticated ingredients (such as almost-Ramanujan graphs) and a more involved analysis. Subsequent beautiful works of Cohen-Roth-TaShma [CRT23] and Golowich [Gol23] gave even stronger objects (lossless expanders), but also using sophisticated ingredients.
The main contribution of this work is that we get much more elementary constructions of unique neighbor expanders and with a simpler analysis.
△ Less
Submitted 25 January, 2024; v1 submitted 29 October, 2023;
originally announced October 2023.
-
Efficient List-Decoding with Constant Alphabet and List Sizes
Authors:
Zeyu Guo,
Noga Ron-Zewi
Abstract:
We present an explicit and efficient algebraic construction of capacity-achieving list decodable codes with both constant alphabet and constant list sizes. More specifically, for any $R \in (0,1)$ and $ε>0$, we give an algebraic construction of an infinite family of error-correcting codes of rate $R$, over an alphabet of size $(1/ε)^{O(1/ε^2)}$, that can be list decoded from a $(1-R-ε)$-fraction o…
▽ More
We present an explicit and efficient algebraic construction of capacity-achieving list decodable codes with both constant alphabet and constant list sizes. More specifically, for any $R \in (0,1)$ and $ε>0$, we give an algebraic construction of an infinite family of error-correcting codes of rate $R$, over an alphabet of size $(1/ε)^{O(1/ε^2)}$, that can be list decoded from a $(1-R-ε)$-fraction of errors with list size at most $\exp(\mathrm{poly}(1/ε))$. Moreover, the codes can be encoded in time $\mathrm{poly}(1/ε, n)$, the output list is contained in a linear subspace of dimension at most $\mathrm{poly}(1/ε)$, and a basis for this subspace can be found in time $\mathrm{poly}(1/ε, n)$. Thus, both encoding and list decoding can be performed in fully polynomial-time $\mathrm{poly}(1/ε, n)$, except for pruning the subspace and outputting the final list which takes time $\exp(\mathrm{poly}(1/ε))\cdot\mathrm{poly}(n)$.
Our codes are quite natural and structured. Specifically, we use algebraic-geometric (AG) codes with evaluation points restricted to a subfield, and with the message space restricted to a (carefully chosen) linear subspace. Our main observation is that the output list of AG codes with subfield evaluation points is contained in an affine shift of the image of a block-triangular-Toeplitz (BTT) matrix, and that the list size can potentially be reduced to a constant by restricting the message space to a BTT evasive subspace, which is a large subspace that intersects the image of any BTT matrix in a constant number of points. We further show how to explicitly construct such BTT evasive subspaces, based on the explicit subspace designs of Guruswami and Kopparty (Combinatorica, 2016), and composition.
△ Less
Submitted 9 June, 2021; v1 submitted 11 November, 2020;
originally announced November 2020.
-
Locally testable codes via high-dimensional expanders
Authors:
Yotam Dikstein,
Irit Dinur,
Prahladh Harsha,
Noga Ron-Zewi
Abstract:
Locally testable codes (LTC) are error-correcting codes that have a local tester which can distinguish valid codewords from words that are "far" from all codewords by probing a given word only at a very few (sublinear, typically constant) number of locations. Such codes form the combinatorial backbone of PCPs. A major open problem is whether there exist LTCs with positive rate, constant relative d…
▽ More
Locally testable codes (LTC) are error-correcting codes that have a local tester which can distinguish valid codewords from words that are "far" from all codewords by probing a given word only at a very few (sublinear, typically constant) number of locations. Such codes form the combinatorial backbone of PCPs. A major open problem is whether there exist LTCs with positive rate, constant relative distance and testable with a constant number of queries.
In this paper, we present a new approach towards constructing such LTCs using the machinery of high-dimensional expanders. To this end, we consider the Tanner representation of a code, which is specified by a graph and a base code. Informally, our result states that if this graph is part of a high-dimensional expander then the local testability of the code follows from the local testability of the base code.
This work unifies and generalizes the known results on testability of the Hadamard, Reed-Muller and lifted codes on the Subspace Complex, all of which are proved via local self correction. However, unlike previous results, constant rounds of self correction do not suffice as the diameter of the underlying test graph can be logarithmically large in a high-dimensional expander and not constant as in all known earlier results. We overcome this technical hurdle by performing iterative self correction with logarithmically many rounds and tightly controlling the error in each iteration using properties of the high-dimensional expander.
Given this result, the missing ingredient towards constructing a constant-query LTC with positive rate and constant relative distance is an instantiation of a base code that interacts well with a constant-degree high-dimensional expander.
△ Less
Submitted 3 May, 2020;
originally announced May 2020.
-
Linear-time Erasure List-decoding of Expander Codes
Authors:
Noga Ron-Zewi,
Mary Wootters,
Gilles Zémor
Abstract:
We give a linear-time erasure list-decoding algorithm for expander codes. More precisely, let $r > 0$ be any integer. Given an inner code $C_0$ of length $d$, and a $d$-regular bipartite expander graph $G$ with $n$ vertices on each side, we give an algorithm to list-decode the expander code $C = C(G, C_0)$ of length $nd$ from approximately $δδ_r nd$ erasures in time…
▽ More
We give a linear-time erasure list-decoding algorithm for expander codes. More precisely, let $r > 0$ be any integer. Given an inner code $C_0$ of length $d$, and a $d$-regular bipartite expander graph $G$ with $n$ vertices on each side, we give an algorithm to list-decode the expander code $C = C(G, C_0)$ of length $nd$ from approximately $δδ_r nd$ erasures in time $n \cdot \mathrm{poly}(d2^r / δ)$, where $δ$ and $δ_r$ are the relative distance and the $r$'th generalized relative distance of $C_0$, respectively. To the best of our knowledge, this is the first linear-time algorithm that can list-decode expander codes from erasures beyond their (designed) distance of approximately $δ^2 nd$.
To obtain our results, we show that an approach similar to that of (Hemenway and Wootters, Information and Computation, 2018) can be used to obtain such an erasure-list-decoding algorithm with an exponentially worse dependence of the running time on $r$ and $δ$; then we show how to improve the dependence of the running time on these parameters.
△ Less
Submitted 20 February, 2020;
originally announced February 2020.
-
LDPC Codes Achieve List Decoding Capacity
Authors:
Jonathan Mosheiff,
Nicolas Resch,
Noga Ron-Zewi,
Shashwat Silas,
Mary Wootters
Abstract:
We show that Gallager's ensemble of Low-Density Parity Check (LDPC) codes achieves list-decoding capacity with high probability. These are the first graph-based codes shown to have this property. This result opens up a potential avenue towards truly linear-time list-decodable codes that achieve list-decoding capacity.
Our result on list decoding follows from a much more general result: any…
▽ More
We show that Gallager's ensemble of Low-Density Parity Check (LDPC) codes achieves list-decoding capacity with high probability. These are the first graph-based codes shown to have this property. This result opens up a potential avenue towards truly linear-time list-decodable codes that achieve list-decoding capacity.
Our result on list decoding follows from a much more general result: any $\textit{local}$ property satisfied with high probability by a random linear code is also satisfied with high probability by a random LDPC code from Gallager's distribution. Local properties are properties characterized by the exclusion of small sets of codewords, and include list-decodability, list-recoverability and average-radius list-decodability.
In order to prove our results on LDPC codes, we establish sharp thresholds for when local properties are satisfied by a random linear code. More precisely, we show that for any local property $\mathcal{P}$, there is some $R^*$ so that random linear codes of rate slightly less than $R^*$ satisfy $\mathcal{P}$ with high probability, while random linear codes of rate slightly more than $R^*$, with high probability, do not. We also give a characterization of the threshold rate $R^*$.
△ Less
Submitted 17 November, 2021; v1 submitted 13 September, 2019;
originally announced September 2019.
-
Improved decoding of Folded Reed-Solomon and Multiplicity Codes
Authors:
Swastik Kopparty,
Noga Ron-Zewi,
Shubhangi Saraf,
Mary Wootters
Abstract:
In this work, we show new and improved error-correcting properties of folded Reed-Solomon codes and multiplicity codes. Both of these families of codes are based on polynomials over finite fields, and both have been the sources of recent advances in coding theory. Folded Reed-Solomon codes were the first explicit constructions of codes known to achieve list-decoding capacity; multivariate multipli…
▽ More
In this work, we show new and improved error-correcting properties of folded Reed-Solomon codes and multiplicity codes. Both of these families of codes are based on polynomials over finite fields, and both have been the sources of recent advances in coding theory. Folded Reed-Solomon codes were the first explicit constructions of codes known to achieve list-decoding capacity; multivariate multiplicity codes were the first constructions of high-rate locally correctable codes; and univariate multiplicity codes are also known to achieve list-decoding capacity.
However, previous analyses of the error-correction properties of these codes did not yield optimal results. In particular, in the list-decoding setting, the guarantees on the list-sizes were polynomial in the block length, rather than constant; and for multivariate multiplicity codes, local list-decoding algorithms could not go beyond the Johnson bound.
In this paper, we show that Folded Reed-Solomon codes and multiplicity codes are in fact better than previously known in the context of list-decoding and local list-decoding. More precisely, we first show that Folded RS codes achieve list-decoding capacity with constant list sizes, independent of the block length; and that high-rate univariate multiplicity codes can also be list-recovered with constant list sizes. Using our result on univariate multiplicity codes, we show that multivariate multiplicity codes are high-rate, locally list-recoverable codes. Finally, we show how to combine the above results with standard tools to obtain capacity achieving locally list decodable codes with query complexity significantly lower than was known before.
△ Less
Submitted 3 May, 2018;
originally announced May 2018.
-
Local List Recovery of High-rate Tensor Codes and Applications
Authors:
Brett Hemenway,
Noga Ron-Zewi,
Mary Wootters
Abstract:
In this work, we give the first construction of high-rate locally list-recoverable codes. List-recovery has been an extremely useful building block in coding theory, and our motivation is to use these codes as such a building block. In particular, our construction gives the first capacity-achieving locally list-decodable codes (over constant-sized alphabet); the first capacity achieving globally l…
▽ More
In this work, we give the first construction of high-rate locally list-recoverable codes. List-recovery has been an extremely useful building block in coding theory, and our motivation is to use these codes as such a building block. In particular, our construction gives the first capacity-achieving locally list-decodable codes (over constant-sized alphabet); the first capacity achieving globally list-decodable codes with nearly linear time list decoding algorithm (once more, over constant-sized alphabet); and a randomized construction of binary codes on the Gilbert-Varshamov bound that can be uniquely decoded in near-linear-time, with higher rate than was previously known.
Our techniques are actually quite simple, and are inspired by an approach of Gopalan, Guruswami, and Raghavendra (Siam Journal on Computing, 2011) for list-decoding tensor codes. We show that tensor powers of (globally) list-recoverable codes are "approximately" locally list-recoverable, and that the "approximately" modifier may be removed by pre-encoding the message with a suitable locally decodable code. Instantiating this with known constructions of high-rate globally list-recoverable codes and high-rate locally decodable codes finishes the construction.
△ Less
Submitted 11 June, 2017;
originally announced June 2017.
-
High rate locally-correctable and locally-testable codes with sub-polynomial query complexity
Authors:
Swastik Kopparty,
Or Meir,
Noga Ron-Zewi,
Shubhangi Saraf
Abstract:
In this work, we construct the first locally-correctable codes (LCCs), and locally-testable codes (LTCs) with constant rate, constant relative distance, and sub-polynomial query complexity. Specifically, we show that there exist binary LCCs and LTCs with block length $n$, constant rate (which can even be taken arbitrarily close to 1), constant relative distance, and query complexity…
▽ More
In this work, we construct the first locally-correctable codes (LCCs), and locally-testable codes (LTCs) with constant rate, constant relative distance, and sub-polynomial query complexity. Specifically, we show that there exist binary LCCs and LTCs with block length $n$, constant rate (which can even be taken arbitrarily close to 1), constant relative distance, and query complexity $\exp(\tilde{O}(\sqrt{\log n}))$. Previously such codes were known to exist only with $Ω(n^β)$ query complexity (for constant $β> 0$), and there were several, quite different, constructions known.
Our codes are based on a general distance-amplification method of Alon and Luby~\cite{AL96_codes}. We show that this method interacts well with local correctors and testers, and obtain our main results by applying it to suitably constructed LCCs and LTCs in the non-standard regime of \emph{sub-constant relative distance}.
Along the way, we also construct LCCs and LTCs over large alphabets, with the same query complexity $\exp(\tilde{O}(\sqrt{\log n}))$, which additionally have the property of approaching the Singleton bound: they have almost the best-possible relationship between their rate and distance. This has the surprising consequence that asking for a large alphabet error-correcting code to further be an LCC or LTC with $\exp(\tilde{O}(\sqrt{\log n}))$ query complexity does not require any sacrifice in terms of rate and distance! Such a result was previously not known for any $o(n)$ query complexity.
Our results on LCCs also immediately give locally-decodable codes (LDCs) with the same parameters.
△ Less
Submitted 22 April, 2015;
originally announced April 2015.
-
Sampling-based proofs of almost-periodicity results and algorithmic applications
Authors:
Eli Ben-Sasson,
Noga Ron-Zewi,
Madhur Tulsiani,
Julia Wolf
Abstract:
We give new combinatorial proofs of known almost-periodicity results for sumsets of sets with small doubling in the spirit of Croot and Sisask, whose almost-periodicity lemma has had far-reaching implications in additive combinatorics. We provide an alternative (and L^p-norm free) point of view, which allows for proofs to easily be converted to probabilistic algorithms that decide membership in al…
▽ More
We give new combinatorial proofs of known almost-periodicity results for sumsets of sets with small doubling in the spirit of Croot and Sisask, whose almost-periodicity lemma has had far-reaching implications in additive combinatorics. We provide an alternative (and L^p-norm free) point of view, which allows for proofs to easily be converted to probabilistic algorithms that decide membership in almost-periodic sumsets of dense subsets of F_2^n.
As an application, we give a new algorithmic version of the quasipolynomial Bogolyubov-Ruzsa lemma recently proved by Sanders. Together with the results by the last two authors, this implies an algorithmic version of the quadratic Goldreich-Levin theorem in which the number of terms in the quadratic Fourier decomposition of a given function is quasipolynomial in the error parameter, compared with an exponential dependence previously proved by the authors. It also improves the running time of the algorithm to have quasipolynomial dependence instead of an exponential one.
We also give an application to the problem of finding large subspaces in sumsets of dense sets. Green showed that the sumset of a dense subset of F_2^n contains a large subspace. Using Fourier analytic methods, Sanders proved that such a subspace must have dimension bounded below by a constant times the density times n. We provide an alternative (and L^p norm-free) proof of a comparable bound, which is analogous to a recent result of Croot, Laba and Sisask in the integers.
△ Less
Submitted 25 October, 2012;
originally announced October 2012.
-
A new upper bound on the query complexity for testing generalized Reed-Muller codes
Authors:
Noga Ron-Zewi,
Madhu Sudan
Abstract:
Over a finite field $\F_q$ the $(n,d,q)$-Reed-Muller code is the code given by evaluations of $n$-variate polynomials of total degree at most $d$ on all points (of $\F_q^n$). The task of testing if a function $f:\F_q^n \to \F_q$ is close to a codeword of an $(n,d,q)$-Reed-Muller code has been of central interest in complexity theory and property testing. The query complexity of this task is the mi…
▽ More
Over a finite field $\F_q$ the $(n,d,q)$-Reed-Muller code is the code given by evaluations of $n$-variate polynomials of total degree at most $d$ on all points (of $\F_q^n$). The task of testing if a function $f:\F_q^n \to \F_q$ is close to a codeword of an $(n,d,q)$-Reed-Muller code has been of central interest in complexity theory and property testing. The query complexity of this task is the minimal number of queries that a tester can make (minimum over all testers of the maximum number of queries over all random choices) while accepting all Reed-Muller codewords and rejecting words that are $δ$-far from the code with probability $Ω(δ)$. (In this work we allow the constant in the $Ω$ to depend on $d$.) In this work we give a new upper bound of $(c q)^{(d+1)/q}$ on the query complexity, where $c$ is a universal constant. In the process we also give new upper bounds on the "spanning weight" of the dual of the Reed-Muller code (which is also a Reed-Muller code). The spanning weight of a code is the smallest integer $w$ such that codewords of Hamming weight at most $w$ span the code.
△ Less
Submitted 24 April, 2012;
originally announced April 2012.