Professional Documents
Culture Documents
Decoding of Reed Solomon Codes Beyond The ErrorCorrection
Decoding of Reed Solomon Codes Beyond The ErrorCorrection
ARTICLE NO.
CM970439
f(
x ; y
1. INTRODUCTION
1.1. Problem Statement
We consider the following problem.
PROBLEM 1.
: A field ;
and integers and .
from
satisfying
The above problem and close variants have been considered before in the
context of coding theory and learning. The best threshold on for which
*E-mail: madhu@watson.ibm.com.
180
0885-064X/97 $25.00
Copyright 1997 by Academic Press
All rights of reproduction in any form reserved.
181
182
MADHU SUDAN
183
2. ALGORITHM
We now present our algorithm for solving the problem given in Section 1.1.
the
DEFINITION 1 (Weighted Degree). For weights
is
. The
-weighted
weighted degree of a monomial
degree of a polynomial
is the maximum, over the
monomials with nonzero coefficients, of the
-weighted degree of the
monomial.
ALGORITHM. /* Inputs:
A. /* Parameters
*/
to be set later. */
184
MADHU SUDAN
satisfying
and
Note. Step C above can be solved in randomized polynomial time with zerois of characteristic zero, or if the running time is allowed to
sided error. If
then the solution can be obtained deterministically. (See,
be polynomial in
for instance, [13].)
3. ANALYSIS
In order to prove that the algorithm above can be run in polynomial time
and works correctly, we need to prove the following set of claims. In all the
.
following claims, we fix the set of pairs
CLAIM 2. If a function
found in time poly( ).
>
185
CLAIM 4. If
isfying (1) and >
is a function sat.
. This is a polynomial in
Proof. Consider the function
and we argue that it has degree at most
. Consider any monomial
of
. Since has
-weighted degree at most
we have that
. Thus the term
is a polynomial in of degree at
most
. Thus
has degree at most
(since it is a sum
polynomials of degree at most
).
Now we argue that
is identically zero. Since
is zero
we have that
is zero for strictly greater than
whenever
points. Thus has more zeroes than its degree and hence is identically zero,
.
implying
Now consider
as a polynomial
in with coefficients from
the ring of polynomials in . By the polynomial remainder theorem, we
then
divides
. Substituting
have that if
yields the lemma.
We are now ready to optimize the parameters
and . For now we will
ignore the fact that and
have to be integers and fix this aspect later. Note
that we want
We can now minimize the expression above as a function of the unknown parameter to obtain the smallest value of for which this algorithm will work.
The minimum occurs when
and
186
MADHU SUDAN
Due to the integrality issues we will lose a little bit in the following theorem.
where the
THEOREM 5. Given a sequence of distinct pairs
and
are elements of a field
and integer parameters and such that
, there exists an algorithm, which runs in time
of degree at most
polynomial in that can find all the polynomials
such that the number of points
such that
is at least .
and
Proof. We use the algorithm of Section 2 with
. It may be verified that this setting satisfies the
. Hence, by Claim 3, Step 2 will
condition
return a function
satisfying property (2). Furthermore, the setting of
and also satisfies the condition >
. Thus Claim 4 guarantees that
if is a function satisfying (1), then
will divide the polynomial
returned in Step 2 and hence be one of our outputs.
Remark. The bound above shows that when is linear in then the number
of polynomials is bounded by a constant (see also Table I). In particular, if
(i.e., the number of errors is less than the error-correction limit),
then the bound shown above is 1.
Proof. If and are integers such that the algorithm of the previous section
works correctly, then the algorithm of Section 2 gives at most solutions
187
TABLE I
= nk
Error-correction
bound
Error tolerated by
our algorithm
# Solns reported by
our algorithm
.5
.25
.25
.33
.333
.35
.25
.375
.417
.10
.45
.602
Rate
and
Let
Then
and
> 1, then
and
1Note that we need l to be an integer which satisfies the inequality (5) strictly and hence we are
c rather than just de.
forced to use b
+1
188
MADHU SUDAN
If
satisfies the condition above then we get the following bound for :
This yields the lemma. (Equation [11] already shows that the final quantity is
so we do not have to show that part.)
upper bounded by
189
PROBLEM 2.
A field
a set
a function
and integers
and .
A list of all functions
satisfying
*/
A. /* Parameters
to be set later. */
B. Find any function
satisfying
is a factor of
190
as large as
MADHU SUDAN
is a function sat.
Proof. Let
. Set
and
.
, Lemma 8 guarantees that
Then since
Step B of the multivariate algorithm will return a polynomial satisfying (7).
Further, the condition on implies that
indicating that if a
will divide . Thus all polynomials will
function satisfies (6), then
be returned by this procedure.
6. CONCLUSIONS
We first discuss the univariate reconstruction algorithm. The limit on i.e.,
is a significant weakness in the practical usability of this code. Many
codes where
, and for such
applications tend to work with
growth our proof does not yield anything interesting. However, low-rate codes,
and even Hadamard codes, have been used in the past 2 and when it suffices to
use a low-rate code the reconstruction algorithm has some advantage. In Table I,
we list the error which the reconstruction algorithm can tolerate and the number
of solutions produced for such rates. The -reconstruction problem remains open
2Apparently
191
192
MADHU SUDAN
ACKNOWLEDGMENTS
I am grateful to Sanjeev Arora, Oded Goldreich, Ronitt Rubinfeld, Martin Tompa, and Shmuel
Winograd for many valuable comments and discussions. I am especially grateful to Greg Sorkin
for spending numerous hours implementing a version of the algorithm presented here.
REFERENCES
1. Ar, S., Lipton, R., Rubinfeld, R., and Sudan, M. (1992), Reconstructing algebraic functions
from mixed data, in Proceedings of the 33rd Annual IEEE Symposium on Foundations of
Computer Science, 1992, pp. 503512.
2. Arora, S., and Sudan, M. (Aug. 1996), manuscript.
3. Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988), Completeness theorems for noncryptographic fault-tolerant distributed computation, in Proceedings of the 20th Annual ACM
Symposium on Theory of Computing, 1988, pp. 110.
4. Berlekamp, E., and Welch, L. Error Correction of Algebraic Block Codes, U.S. Patent Number
4,633,470, 1986.
5. Berlekamp, E., McEliece, R., and Van Tilborg, H. On the inherent intractability of certain
coding problems, IEEE Trans. Inform. Theory (1978), 384386.
6. Bruck, J., and Naor, M. The hardness of decoding linear codes with preprocessing, IEEE
Trans. Inform. Theory (1990), 381385.
7. Feige, U., and Lund, C. On the hardness of computing the permanent of random matrices,
in Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992, pp.
643654.
193