2,027 research outputs found

    Locally recoverable codes from rational maps

    Get PDF
    Producción CientíficaWe give a method to construct Locally Recoverable Error-Correcting codes. This method is based on the use of rational maps between affine spaces. The recovery of erasures is carried out by Lagrangian interpolation in general and simply by one addition in some good cases.Ministerio de Economía, Industria y Competitividad ( grant MTM2015-65764-C3-1-P)Consejo Nacional de Desarrollo Científico y Tecnológico- Brasil (grants 159852/2014-5 / 201584/2015-8

    Locally recoverable codes from automorphism groups of function fields of genus g1g \geq 1

    Full text link
    A Locally Recoverable Code is a code such that the value of any single coordinate of a codeword can be recovered from the values of a small subset of other coordinates. When we have δ\delta non overlapping subsets of cardinality rir_i that can be used to recover the missing coordinate we say that a linear code C\mathcal{C} with length nn, dimension kk, minimum distance dd has (r1,,rδ)(r_1,\ldots, r_\delta)-locality and denote it by [n,k,d;r1,r2,,rδ].[n, k, d; r_1, r_2,\dots, r_\delta]. In this paper we provide a new upper bound for the minimum distance of these codes. Working with a finite number of subgroups of cardinality ri+1r_i+1 of the automorphism group of a function field FFq\mathcal{F}| \mathbb{F}_q of genus g1g \geq 1, we propose a construction of [n,k,d;r1,r2,,rδ][n, k, d; r_1, r_2,\dots, r_\delta]-codes and apply the results to some well known families of function fields

    Minimum Distance and Parameter Ranges of Locally Recoverable Codes with Availability from Fiber Products of Curves

    Get PDF
    We construct families of locally recoverable codes with availability t2t\geq 2 using fiber products of curves, determine the exact minimum distance of many families, and prove a general theorem for minimum distance of such codes. The paper concludes with an exploration of parameters of codes from these families and the fiber product construction more generally. We show that fiber product codes can achieve arbitrarily large rate and arbitrarily small relative defect, and compare to known bounds and important constructions from the literature

    Algebraic hierarchical locally recoverable codes with nested affine subspace recovery

    Full text link
    Codes with locality, also known as locally recoverable codes, allow for recovery of erasures using proper subsets of other coordinates. Theses subsets are typically of small cardinality to promote recovery using limited network traffic and other resources. Hierarchical locally recoverable codes allow for recovery of erasures using sets of other symbols whose sizes increase as needed to allow for recovery of more symbols. In this paper, we construct codes with hierarchical locality from a geometric perspective, using fiber products of curves. We demonstrate how the constructed hierarchical codes can be viewed as punctured subcodes of Reed-Muller codes. This point of view provides natural structures for local recovery at each level in the hierarchy

    Security in Locally Repairable Storage

    Full text link
    In this paper we extend the notion of {\em locally repairable} codes to {\em secret sharing} schemes. The main problem that we consider is to find optimal ways to distribute shares of a secret among a set of storage-nodes (participants) such that the content of each node (share) can be recovered by using contents of only few other nodes, and at the same time the secret can be reconstructed by only some allowable subsets of nodes. As a special case, an eavesdropper observing some set of specific nodes (such as less than certain number of nodes) does not get any information. In other words, we propose to study a locally repairable distributed storage system that is secure against a {\em passive eavesdropper} that can observe some subsets of nodes. We provide a number of results related to such systems including upper-bounds and achievability results on the number of bits that can be securely stored with these constraints.Comment: This paper has been accepted for publication in IEEE Transactions of Information Theor
    corecore