115 research outputs found

    New Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length

    Full text link
    A (k,δ,ϵ)(k,\delta,\epsilon)-locally decodable code C:FqnFqNC: F_{q}^{n} \to F_{q}^{N} is an error-correcting code that encodes each message x=(x1,x2,...,xn)Fqn\vec{x}=(x_{1},x_{2},...,x_{n}) \in F_{q}^{n} to C(x)FqNC(\vec{x}) \in F_{q}^{N} and has the following property: For any yFqN\vec{y} \in {\bf F}_{q}^{N} such that d(y,C(x))δNd(\vec{y},C(\vec{x})) \leq \delta N and each 1in1 \leq i \leq n, the symbol xix_{i} of x\vec{x} can be recovered with probability at least 1ϵ1-\epsilon by a randomized decoding algorithm looking only at kk coordinates of y\vec{y}. The efficiency of a (k,δ,ϵ)(k,\delta,\epsilon)-locally decodable code C:FqnFqNC: F_{q}^{n} \to F_{q}^{N} is measured by the code length NN and the number kk of queries. For any kk-query locally decodable code C:FqnFqNC: F_{q}^{n} \to F_{q}^{N}, the code length NN is conjectured to be exponential of nn, however, this was disproved. Yekhanin [In Proc. of STOC, 2007] showed that there exists a 3-query locally decodable code C:F2nF2NC: F_{2}^{n} \to F_{2}^{N} such that N=exp(n(1/loglogn))N=\exp(n^{(1/\log \log n)}) assuming that the number of Mersenne primes is infinite. For a 3-query locally decodable code C:FqnFqNC: F_{q}^{n} \to F_{q}^{N}, Efremenko [ECCC Report No.69, 2008] reduced the code length further to N=exp(nO((loglogn/logn)1/2))N=\exp(n^{O((\log \log n/ \log n)^{1/2})}), and also showed that for any integer r>1r>1, there exists a kk-query locally decodable code C:FqnFqNC: F_{q}^{n} \to F_{q}^{N} such that k2rk \leq 2^{r} and N=exp(nO((loglogn/logn)11/r))N=\exp(n^{O((\log \log n/ \log n)^{1-1/r})}). In this paper, we present a query-efficient locally decodable code and show that for any integer r>1r>1, there exists a kk-query locally decodable code C:FqnFqNC: F_{q}^{n} \to F_{q}^{N} such that k32r2k \leq 3 \cdot 2^{r-2} and N=exp(nO((loglogn/logn)11/r))N=\exp(n^{O((\log \log n/ \log n)^{1-1/r})}).Comment: 13 pages, 1 figure, 2 table

    Query-Efficient Locally Decodable Codes of Subexponential Length

    Full text link
    We develop the algebraic theory behind the constructions of Yekhanin (2008) and Efremenko (2009), in an attempt to understand the ``algebraic niceness'' phenomenon in Zm\mathbb{Z}_m. We show that every integer m=pq=2t1m = pq = 2^t -1, where pp, qq and tt are prime, possesses the same good algebraic property as m=511m=511 that allows savings in query complexity. We identify 50 numbers of this form by computer search, which together with 511, are then applied to gain improvements on query complexity via Itoh and Suzuki's composition method. More precisely, we construct a 3r/23^{\lceil r/2\rceil}-query LDC for every positive integer r<104r<104 and a (3/4)512r\left\lfloor (3/4)^{51}\cdot 2^{r}\right\rfloor-query LDC for every integer r104r\geq 104, both of length NrN_{r}, improving the 2r2^r queries used by Efremenko (2009) and 32r23\cdot 2^{r-2} queries used by Itoh and Suzuki (2010). We also obtain new efficient private information retrieval (PIR) schemes from the new query-efficient LDCs.Comment: to appear in Computational Complexit

    Three Query Locally Decodable Codes with Higher Correctness Require Exponential Length

    Get PDF
    Locally decodable codes are error correcting codes with the extra property that, in order to retrieve the correct value of just one position of the input with high probability, it is sufficient to read a small number of positions of the corresponding, possibly corrupted codeword. A breakthrough result by Yekhanin showed that 3-query linear locally decodable codes may have subexponential length. The construction of Yekhanin, and the three query constructions that followed, achieve correctness only up to a certain limit which is 13delta1 - 3 delta for nonbinary codes, where an adversary is allowed to corrupt up to delta fraction of the codeword. The largest correctness for a subexponential length 3-query binary code is achieved in a construction by Woodruff, and it is below 1 - 3 delta. We show that achieving slightly larger correctness (as a function of deltadelta) requires exponential codeword length for 3-query codes. Previously, there were no larger than quadratic lower bounds known for locally decodable codes with more than 2 queries, even in the case of 3-query linear codes. Our results hold for linear codes over arbitrary finite fields and for binary nonlinear codes. Considering larger number of queries, we obtain lower bounds for q-query codes for q>3, under certain assumptions on the decoding algorithm that have been commonly used in previous constructions. We also prove bounds on the largest correctness achievable by these decoding algorithms, regardless of the length of the code. Our results explain the limitations on correctness in previous constructions using such decoding algorithms. In addition, our results imply tradeoffs on the parameters of error correcting data structures

    A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers

    Get PDF
    Since the concept of locally decodable codes was introduced by Katz and Trevisan in 2000, it is well-known that information the-oretically secure private information retrieval schemes can be built using locally decodable codes. In this paper, we construct a Byzantine ro-bust PIR scheme using the multiplicity codes introduced by Kopparty et al. Our main contributions are on the one hand to avoid full replica-tion of the database on each server; this significantly reduces the global redundancy. On the other hand, to have a much lower locality in the PIR context than in the LDC context. This shows that there exists two different notions: LDC-locality and PIR-locality. This is made possible by exploiting geometric properties of multiplicity codes

    2-Server PIR with sub-polynomial communication

    Full text link
    A 2-server Private Information Retrieval (PIR) scheme allows a user to retrieve the iith bit of an nn-bit database replicated among two servers (which do not communicate) while not revealing any information about ii to either server. In this work we construct a 1-round 2-server PIR with total communication cost nO(loglogn/logn)n^{O({\sqrt{\log\log n/\log n}})}. This improves over the currently known 2-server protocols which require O(n1/3)O(n^{1/3}) communication and matches the communication cost of known 3-server PIR schemes. Our improvement comes from reducing the number of servers in existing protocols, based on Matching Vector Codes, from 3 or 4 servers to 2. This is achieved by viewing these protocols in an algebraic way (using polynomial interpolation) and extending them using partial derivatives

    Error-Correcting Data Structures

    Get PDF
    We study data structures in the presence of adversarial noise. We want to encode a given object in a succinct data structure that enables us to efficiently answer specific queries about the object, even if the data structure has been corrupted by a constant fraction of errors. This new model is the common generalization of (static) data structures and locally decodable error-correcting codes. The main issue is the tradeoff between the space used by the data structure and the time (number of probes) needed to answer a query about the encoded object. We prove a number of upper and lower bounds on various natural error-correcting data structure problems. In particular, we show that the optimal length of error-correcting data structures for the Membership problem (where we want to store subsets of size s from a universe of size n) is closely related to the optimal length of locally decodable codes for s-bit strings.Comment: 15 pages LaTeX; an abridged version will appear in the Proceedings of the STACS 2009 conferenc

    Efficient and Error-Correcting Data Structures for Membership and Polynomial Evaluation

    Get PDF
    We construct efficient data structures that are resilient against a constant fraction of adversarial noise. Our model requires that the decoder answers most queries correctly with high probability and for the remaining queries, the decoder with high probability either answers correctly or declares "don't know." Furthermore, if there is no noise on the data structure, it answers all queries correctly with high probability. Our model is the common generalization of a model proposed recently by de Wolf and the notion of "relaxed locally decodable codes" developed in the PCP literature. We measure the efficiency of a data structure in terms of its length, measured by the number of bits in its representation, and query-answering time, measured by the number of bit-probes to the (possibly corrupted) representation. In this work, we study two data structure problems: membership and polynomial evaluation. We show that these two problems have constructions that are simultaneously efficient and error-correcting.Comment: An abridged version of this paper appears in STACS 201
    corecore