Efficient List-Decoding with Constant Alphabet and List Sizes

November 11, 2020 ยท The Ethereal ยท ๐Ÿ› IEEE Transactions on Information Theory

๐Ÿ”ฎ THE ETHEREAL: The Ethereal
Pure theory โ€” exists on a plane beyond code

"No code URL or promise found in abstract"

Evidence collected by the PWNC Scanner

Authors Zeyu Guo, Noga Ron-Zewi arXiv ID 2011.05884 Category cs.CC: Computational Complexity Cross-listed cs.IT Citations 20 Venue IEEE Transactions on Information Theory Last Checked 2 months ago
Abstract
We present an explicit and efficient algebraic construction of capacity-achieving list decodable codes with both constant alphabet and constant list sizes. More specifically, for any $R \in (0,1)$ and $ฮต>0$, we give an algebraic construction of an infinite family of error-correcting codes of rate $R$, over an alphabet of size $(1/ฮต)^{O(1/ฮต^2)}$, that can be list decoded from a $(1-R-ฮต)$-fraction of errors with list size at most $\exp(\mathrm{poly}(1/ฮต))$. Moreover, the codes can be encoded in time $\mathrm{poly}(1/ฮต, n)$, the output list is contained in a linear subspace of dimension at most $\mathrm{poly}(1/ฮต)$, and a basis for this subspace can be found in time $\mathrm{poly}(1/ฮต, n)$. Thus, both encoding and list decoding can be performed in fully polynomial-time $\mathrm{poly}(1/ฮต, n)$, except for pruning the subspace and outputting the final list which takes time $\exp(\mathrm{poly}(1/ฮต))\cdot\mathrm{poly}(n)$. Our codes are quite natural and structured. Specifically, we use algebraic-geometric (AG) codes with evaluation points restricted to a subfield, and with the message space restricted to a (carefully chosen) linear subspace. Our main observation is that the output list of AG codes with subfield evaluation points is contained in an affine shift of the image of a block-triangular-Toeplitz (BTT) matrix, and that the list size can potentially be reduced to a constant by restricting the message space to a BTT evasive subspace, which is a large subspace that intersects the image of any BTT matrix in a constant number of points. We further show how to explicitly construct such BTT evasive subspaces, based on the explicit subspace designs of Guruswami and Kopparty (Combinatorica, 2016), and composition.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Computational Complexity