Reed-Muller Codes for Random Erasures and Errors

  • Abstract
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

This paper studies the parameters for which binary Reed-Muller (RM) codes can be decoded successfully on the BEC and BSC, and in particular when can they achieve capacity for these two classical channels. Necessarily, the paper also studies properties of evaluations of multi-variate GF(2) polynomials on random sets of inputs. For erasures, we prove that RM codes achieve capacity both for very high rate and very low rate regimes. For errors, we prove that RM codes achieve capacity for very low rate regimes, and for very high rates, we show that they can uniquely decode at about square root of the number of errors at capacity.The proofs of these four results are based on different techniques, which we find interesting in their own right. In particular, we study the following questions about E(m,r), the matrix whose rows are truth tables of all monomials of degree ≤ r in m variables. What is the most (resp. least) number of random columns in E(m,r) that define a submatrix having full column rank (resp. full row rank) with high probability? We obtain tight bounds for very small (resp. very large) degrees r, which we use to show that RM codes achieve capacity for erasures in these regimes.Our decoding from random errors follows from the following novel reduction. For every linear code C of sufficiently high rate we construct a new code C' obtained by tensoring C, such that for every subset S of coordinates, if $C$ can recover from erasures in $S$, then C' can recover from errors in S. Specializing this to RM codes and using our results for erasures imply our result on unique decoding of RM codes at high rate.Finally, two of our capacity achieving results require tight bounds on the weight distribution of RM codes. We obtain such bounds extending the recent [27] bounds from constant degree to linear degree polynomials.

Similar Papers
  • Research Article
  • Cite Count Icon 67
  • 10.1109/tit.2015.2462817
Reed–Muller Codes for Random Erasures and Errors
  • Oct 1, 2015
  • IEEE Transactions on Information Theory
  • Emmanuel Abbe + 2 more

This paper studies the parameters for which binary Reed-Muller (RM) codes can be decoded successfully on the binary erasure channel and binary symmetry channel, and, in particular, when can they achieve capacity for these two classical channels. Necessarily, this paper also studies the properties of evaluations of multivariate GF(2) polynomials on the random sets of inputs. For erasures, we prove that RM codes achieve capacity both for very high rate and very low rate regimes. For errors, we prove that RM codes achieve capacity for very low rate regimes, and for very high rates, we show that they can uniquely decode at about the square root of the number of errors at capacity. The proofs of these four results are based on different techniques, which we find interesting in their own right. In particular, we study the following questions about E(m, r), the matrix whose rows are the truth tables of all the monomials of degree ≤ r in m variables. What is the most (resp. least) number of random columns in E(m, r) that define a submatrix having full column rank (resp. full row rank) with high probability? We obtain tight bounds for very small (resp. very large) degrees r, which we use to show that RM codes achieve capacity for erasures in these regimes. Our decoding from random errors follows from the following novel reduction. For every linear code C of sufficiently high rate, we construct a new code C' obtained by tensorizing C, such that for every subset S of coordinates, if C can recover from erasures in S, then C' can recover from errors in S. Specializing this to the RM codes and using our results for erasures imply our result on the unique decoding of the RM codes at high rate. Finally, two of our capacity achieving results require tight bounds on the weight distribution of RM codes. We obtain such bounds extending the recent bounds from constant degree to linear degree polynomials.

  • Research Article
  • Cite Count Icon 2
  • 10.1109/tit.2021.3116663
Almost-Reed–Muller Codes Achieve Constant Rates for Random Errors
  • Dec 1, 2021
  • IEEE Transactions on Information Theory
  • Emmanuel Abbe + 2 more

This paper considers "delta-almost Reed-Muller codes", i.e., linear codes spanned by evaluations of all but a delta fraction of monomials of degree at most d. It is shown that for any delta > 0 and any epsilon > 0, there exists a family of delta-almost Reed-Muller codes of constant rate that correct 1/2-epsilon fraction of random errors with high probability. For exact Reed-Muller codes, the analogous result is not known and represents a weaker version of the longstanding conjecture that Reed-Muller codes achieve capacity for random errors (Abbe-Shpilka-Wigderson STOC '15). Our proof is based on the recent polarization result for Reed-Muller codes, combined with a combinatorial approach to establishing inequalities between the Reed-Muller code entropies.

  • Research Article
  • Cite Count Icon 28
  • 10.1109/tit.2017.2671410
Efficiently Decoding Reed–Muller Codes From Random Errors
  • Apr 1, 2017
  • IEEE Transactions on Information Theory
  • Ramprasad Saptharishi + 2 more

Reed–Muller (RM) codes encode an $m$ -variate polynomial of degree at most $r$ by evaluating it on all points in $\{0,1\}^{m}$ . We denote this code by $RM(r,m)$ . The minimum distance of $RM(r,m)$ is $2^{m-r}$ and so it cannot correct more than half that number of errors in the worst case. For random errors one may hope for a better result. In this paper we give an efficient algorithm (in the block length $n=2^{m}$ ) for decoding random errors in RM codes far beyond the minimum distance. Specifically, for low-rate codes (of degree $r=o(\sqrt {m})$ ), we can correct a random set of $(1/2-o(1))n$ errors with high probability. For high rate codes (of degree $m-r$ for $r=o(\sqrt {m/\log m})$ ), we can correct roughly $m^{r/2}$ errors. More generally, for any integer $r$ , our algorithm can correct any error pattern in $RM(m-(2r+2),m)$ , for which the same erasure pattern can be corrected in $RM(m-(r+1),m)$ . The results above are obtained by applying recent results of Abbe, Shpilka, and Wigderson (STOC, 2015) and Kudekar et al. (STOC, 2016) regarding the ability of RM codes to correct random erasures. The algorithm is based on solving a carefully defined set of linear equations and thus it is significantly different than other algorithms for decoding RM codes that are based on the recursive structure of the code. It can be seen as a more explicit proof of a result of Abbe et al. that shows a reduction from correcting erasures to correcting errors, and it also bares some similarities with the error-locating pair method of Pellikaan, Duursma, and Kotter that generalizes the Berlekamp–Welch algorithm for decoding Reed–Solomon codes.

  • Book Chapter
  • Cite Count Icon 20
  • 10.1137/1.9781611975994.82
On the Performance of Reed-Muller Codes with respect to Random Errors and Erasures
  • Jan 1, 2020
  • Ori Sberlo + 1 more

This work proves new results on the ability of binary Reed-Muller codes to decode from random errors and erasures. Specifically, we prove that RM codes with m variables and degree γm, for some explicit constant γ achieve capacity for random erasures (i.e. for the binary erasure channel) and for random errors (for the binary symmetric channel). Earlier, it was known that RM codes achieve capacity for the binary symmetric channel for degrees r = o(m). For the binary erasure channel it was known that RM codes achieve capacity for degree . Thus, our results provide a new range of parameters for which RM achieve capacity for these two well studied channels. In addition, our results imply that for every ϵ > 0 (in fact we can get up to RM codes of degree r < (1/2 – ϵ)m can correct a fraction of 1 – o(1) random erasures with high probability. We also show that, information theoretically, such codes can handle a fraction of random errors with high probability. For example, given noisy evaluations of a degree 0.499m polynomial, it is possible to interpolate it even if a random 0. 499 fraction of the evaluations were corrupted, with high probability. While the o(1) terms are not the correct ones to ensure capacity, these results show that RM codes of rates up to 1/poly(log n) (where n = 2m is the block length) are is some sense as good as capacity achieving codes. We obtain these results by proving improved bounds on the weight distribution of Reed-Muller codes of high degrees. Namely, given weight β ϵ (0, 1) we prove an upper bound on the number of codewords of relative weight at most β. We obtain new results in two different settings: for weights β < 1/2 and for weights that are close to 1/2. Our results for weights close to 1/2 also answer an open problem posed by Beame et al. [10].

  • Conference Article
  • Cite Count Icon 6
  • 10.1145/2897518.2897526
Efficiently decoding Reed-Muller codes from random errors
  • Jun 19, 2016
  • Ramprasad Saptharishi + 2 more

Reed-Muller codes encode an m-variate polynomial of degree r by evaluating it on all points in {0,1}m. We denote this code by RM(m,r). The minimal distance of RM(m,r) is 2m−r and so it cannot correct more than half that number of errors in the worst case. For random errors one may hope for a better result.

  • Research Article
  • Cite Count Icon 1
  • 10.1049/ip-f-1:19880060
New class of double inductive binary error correcting codes based on the class of Reed–Muller codes
  • Dec 1, 1988
  • D Kabilafkas + 1 more

A new class of binary codes is introduced. The codes have length n = 1.5 · 2m (m ≥ 3), and have a similar ‘double inductive’ structure to that possessed by the class of Reed-Muller (RM) codes. The new codes are structured such that their length-to-distance ratio n/d = 2m, m ≥ 2. For rates less than 1/2, the new codes have a higher rate than the next Reed-Muller code of the same order and length n = 2 · 2m.

  • Book Chapter
  • Cite Count Icon 1
  • 10.1137/1.9781611975031.44
Syndrome decoding of Reed-Muller codes and tensor decomposition over finite fields
  • Jan 1, 2018
  • Swastik Kopparty + 1 more

Reed-Muller codes are some of the oldest and most widely studied error-correcting codes, of interest for both their algebraic structure as well as their many algorithmic properties. A recent beautiful result of Saptharishi, Shpilka and Volk [SSV17] showed that for binary Reed-Muller codes of length n and distance d = O(1), one can correct polylog(n) random errors in poly(n) time (which is well beyond the worst-case error tolerance of O(1)). In this paper, we consider the problem of syndrome decoding Reed-Muller codes from random errors. More specifically, given the polylog(n)-bit long syndrome vector of a codeword corrupted in polylog(n) random coordinates, we would like to compute the locations of the codeword corruptions. This problem turns out to be equivalent to a basic question about computing tensor decomposition of random low-rank tensors over finite fields. Our main result is that syndrome decoding of Reed-Muller codes (and the equivalent tensor decomposition problem) can be solved efficiently, i.e., in polylog(n) time. We give two algorithms for this problem: 1. The first algorithm is a finite field variant of a classical algorithm for tensor decomposition over real numbers due to Jennrich. This also gives an alternate proof for the main result of [SSV17]. 2. The second algorithm is obtained by implementing the steps of [SSV17]'s Berlekamp-Welch-style decoding algorithm in sublinear-time. The main new ingredient is an algorithm for solving certain kinds of systems of polynomial equations.

  • Research Article
  • Cite Count Icon 33
  • 10.1109/lcomm.2007.070172
PAPR Reduction of OFDM Signals Using Partial Transmit Sequences and Reed-Muller Codes
  • Jun 1, 2007
  • IEEE Communications Letters
  • Houshou Chen + 1 more

This letter proposes a modified PTS technique using binary Reed-Muller (RM) codes for error correction and PAPR control in BPSK OFDM systems. A RM code is divided into the direct sum of a correcting subcode for encoding information bits and a scrambling subcode for encoding PAPR bits. The transmitted signal of the resulting OFDM sequence is selected with minimum PAPR from a number of candidates which are codewords of a coset of the scrambling subcode. We consider the RM codes in natural and cyclic orderings. Numerical results show that RM codes in cyclic ordering achieve better performance in PAPR reduction than RM codes in natural ordering.

  • Conference Article
  • 10.1109/isit.2012.6283977
Projected subcodes of the second order binary Reed-Muller code
  • Jul 1, 2012
  • Matthieu Legeay + 1 more

In this paper we construct new subcodes of the second-order binary Reed-Muller code by using the permutation group and by projecting the code onto codes with smaller parameters. The permutation group of Reed-Muller codes is the general affine group and can be decomposed into the semi-direct product of the translation group and the general linear group. The action of the translation group projects the second order Reed-Muller code onto copies of the first order Reed-Muller code. The general linear group projects the code onto codes for which we can control the useful length and the dimension. These parameters depend on the dimension of the eigenspace of the chosen element of the general linear group for the eigenvalue 1.

  • Research Article
  • Cite Count Icon 5
  • 10.3844/jcssp.2008.792.798
Reed-Muller Codec Simulation Performance
  • Oct 1, 2008
  • Journal of Computer Science
  • Othman O Khalifa + 4 more

The approach to error correction coding taken by modern digital communication systems started in the late 1940&amp;apos;s with the ground breaking work of Shannon, Hamming and Golay. Reed-Muller (RM) codes were an important step beyond the Hamming and Golay codes because they allowed more flexibility in the size of the code word and the number of correctable errors per code word. Whereas the Hamming and Golay codes were specific codes with particular values for q; n; k; and t, the RM codes were a class of binary codes with a wide range of allowable design parameters. Binary Reed-Muller codes are among the most prominent families of codes in coding theory. They have been extensively studied and employed for practical applications. In this research, the performance simulation of Reed-Muller Codec was presented. An introduction on Reed-Muller codes, were introduced that consists of defining the key terms and operation used with the binary numbers. Reed-Muller codes were defined and encoding matrices were discussed. The decoding process was given and some examples were demonstrated to clarify the method. The results and the performance of Reed-Muller encoding were presented and the messages been encoded using the defined matrices were shown. The simulation of the decoding part also been shown. The performance of Reed-Muller codes were then analyzed in terms of its code rate, code length and minimum Hamming distance. The analysis that performed also successfully examines the relationship between the parameters of Reed-Muller coding. The decoding part of the Reed-Muller codes can detect one error and correct it as shown in the examples.

  • Research Article
  • Cite Count Icon 4
  • 10.1109/tit.2021.3128495
Classification of the Codewords of Weights 16 and 18 of the Reed-Muller Code RM(n-3,n)
  • Feb 1, 2022
  • IEEE Transactions on Information Theory
  • Sihem Mesnager + 1 more

Reed-Muller codes are error-correcting codes used in many areas related to coding theory, such as electrical engineering and computer science. The binary rth-order Reed-Muller code RM(r, n) can be viewed as the set of all n-variable Boolean functions of algebraic degree at most r. Despite the intense work on these codes, many problems are known to be hard (notably, determining their covering radius) and remain open to this day. Fourteen years ago, Carlet and Mesnager improved in [IEEE Transactions on Information Theory, “Improving the Upper Bounds on the Covering Radii of Binary Reed-Muller Codes”, 53(1), 2007] the upper bound on the covering radius of the Reed-Muller code of order 2, and they deduced improved upper bounds on the covering radii of the Reed-Muller codes of higher orders. Until 2021, these upper bounds remain the best ones in the literature. The Reed-Muller code RM(n -3, n), which corresponds to the dual of the Reed-Muller code RM(2, n), has attracted much attention. One of the main reasons is that it is precisely the code that has been considered to get the upper bounds derived by Carlet and Mesnager. Those upper bounds have been obtained thanks to the characterization of the codewords of the Reed-Muller code, whose Hamming weights are strictly less than 2.5 times the minimum distance 2n-r due to Kasami, Tokura, and Azumi. Despite their impressive work in the seventieth, a more refined study and profound description of those codewords of RM(n -3, n) whose Hamming weight equals 16, and especially 18, seem necessary, as it could help us significantly in improving the covering radius of Reed-Muller codes. In this paper, we push further the known results on the Reed-Muller codes by focusing on the Reed-Muller code RM(n -3, n). We provide a classification of the codewords of weight 16 and 18 of the Reed-Muller code RM(n -3, n). Our algebraic descriptions allow us to count the number of such codewords and to enumerate all of them explicitly.

  • Conference Article
  • Cite Count Icon 1
  • 10.1109/codit.2019.8820625
On the Algebraic Structure of the Moore Penrose Inverse of Full Row or Full Column Rank Polynomial Matrices
  • Apr 1, 2019
  • Ioannis S Kafetzis + 1 more

This work establishes the connection between the finite and infinite algebraic structure of a full row or column rank polynomial matrix and its Moore Penrose inverse. For non-singular matrices, it is known that the inverse has no finite zeros and its finite poles are the finite zeros of the original matrix, while the infinite poles and zeros of the original matrix are the infinite zeros and poles of its inverse respectively. The fact that the Moore Penrose inverse is unique for every matrix along with the fact that for non-singular matrices it coincides with the normal inverse leads to the assumption that a similar connection holds for the structure, both finite and infinite, of the Moore Penrose inverse of a polynomial matrix. We prove that the Moore Penrose inverse of a full row or column rank polynomial matrix has no finite zeros, and that extra poles appear, compared to the non-singular case. Furthermore, we prove that the result regarding the infinite structure of nonsingular matrices is extended to the case of the Moore Penrose inverse of a full rank polynomial matrix. Finally we determine a connection between the minimal indices of the polynomial matrix and its Moore Penrose inverse. The results are also presented through an illustrative example.

  • Research Article
  • Cite Count Icon 11
  • 10.5075/epfl-thesis-3846
Cryptography based on error correcting codes
  • Jan 1, 2007
  • Lorenz Minder

The idea to use error-correcting codes in order to construct public key cryptosystems was published in 1978 by McEliece [ME1978]. In his original construction, McEliece used Goppa codes, but various later publications suggested the use of different families of error-correcting codes. The choice of the code has a crucial impact on the security of this type of cryptosystem. Some codes have a structure that can be recovered in polynomial time, thus breaking the cryptosystem completely, while other codes have resisted attempts to cryptanalyze them for a very long time now. In this thesis, we examine different derivatives of the McEliece cryptosystem and study their structural weaknesses. The main results are the following: In chapter 3 we devise an effective structural attack against the McEliece cryptosystem based on algebraic geometry codes defined over elliptic curves. This attack is inspired by an algorithm due to Sidelnikov and Shestakov [SS1992] which solves the corresponding problem for Reed-Solomon codes. The presented algorithm is heuristic polynomial time and thus inverts trapdoors even for very large codes. In chapter 4, we show that the Sidelnikov cryptosystem [S1994], which is based on binary Reed-Muller codes, is insecure. The basic idea of our attack is to use the fact that minimum weight words in a Reed-Muller code have very particular properties. This attack relies on the ability to find minimum weight words in the code, a problem that is, in this specific instance, much easier than general decoding, and feasible for interesting parameters in a modest amount of time. The attack has subexponential running time if the order of the code is kept fixed, and it breaks the large keys as proposed by Sidelnikov in under an hour on a stock PC. In the chapter 5, we finally discuss some of the problems to solve if one attempts to generalize these algorithms.

  • Research Article
  • Cite Count Icon 8
  • 10.1049/iet-ipr.2016.0655
Matrix embedding in steganography with binary Reed–Muller codes
  • Jun 12, 2017
  • IET Image Processing
  • Tingya Yang + 1 more

This study presents a modified majority‐logic decoding algorithm of Reed–Muller (RM) codes for matrix embedding (ME) in steganography. An ME algorithm uses linear block code to improve the embedding efficiency in steganography. The optimal embedding algorithm in steganography is equivalent to the maximum likelihood decoding (MLD) algorithm in error‐correcting codes. The main disadvantage of ME is that the equivalent MLD algorithm of lengthy embedding codes requires highly complex embedding. This study used RM codes to embed data in binary host images. The authors propose a novel low‐complexity embedding algorithm that uses a modified majority‐logic algorithm to decode RM codes, in which a message‐passing algorithm (i.e. sum‐product, min‐sum, or bias propagation) is performed on the highest order of information bits in the RM codes. The experimental results indicate that integrating bias propagation into the proposed scheme achieves superior embedding efficiency (relative to when the sum‐product or min‐sum algorithm is used) and can even achieve the embedding bound of RM codes.

  • Conference Article
  • Cite Count Icon 2
  • 10.23919/eusipco.2019.8903050
Joint Low-Rank Factorizations with Shared and Unshared Components: Identifiability and Algorithms
  • Sep 1, 2019
  • Mikael Sorensen + 1 more

We study the joint low-rank factorization of the matrices $\mathrm{X}=[\mathrm{A} \mathrm{B}]\mathrm{G}$ and $\mathrm{Y}=[\mathrm{A} \mathrm{C}]\mathrm{H}$, in which the columns of the shared factor matrix A correspond to vectorized rank-one matrices, the unshared factors B and C have full column rank, and the matrices G and H have full row rank. The objective is to find the shared factor A, given only X and Y. We first explain that if the matrix [A B C] has full column rank, then a basis for the column space of the shared factor matrix A can be obtained from the null space of the matrix [X Y]. This in turn implies that the problem of finding the shared factor matrix A boils down to a basic Canonical Polyadic Decomposition (CPD) problem that in many cases can directly be solved by means of an eigenvalue decomposition. Next, we explain that by taking the rank-one constraint of the columns of the shared factor matrix A into account when computing the null space of the matrix [X Y], more relaxed identifiability conditions can be obtained that do not require that [A B C] has full column rank. The benefit of the unconstrained null space approach is that it leads to simple algorithms while the benefit of the rank-one constrained null space approach is that it leads to relaxed identifiability conditions. Finally, a joint unbalanced orthogonal Procrustes and CPD fitting approach for computing the shared factor matrix A from noisy observation matrices X and Y will briefly be discussed.

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.