scispace - formally typeset
Journal ArticleDOI

Improved decoding of Reed-Solomon and algebraic-geometry codes

TLDR
An improved list decoding algorithm for decoding Reed-Solomon codes and alternant codes and algebraic-geometry codes is presented and a solution to a weighted curve-fitting problem is presented, which may be of use in soft-decision decoding algorithms for Reed- Solomon codes.
Abstract
Given an error-correcting code over strings of length n and an arbitrary input string also of length n, the list decoding problem is that of finding all codewords within a specified Hamming distance from the input string. We present an improved list decoding algorithm for decoding Reed-Solomon codes. The list decoding problem for Reed-Solomon codes reduces to the following "curve-fitting" problem over a field F: given n points ((x/sub i//spl middot/y/sub i/))/sub i=1//sup n/, x/sub i/, y/sub i//spl isin/F, and a degree parameter k and error parameter e, find all univariate polynomials p of degree at most k such that y/sub i/=p(x/sub i/) for all but at most e values of i/spl isin/(1,...,n). We give an algorithm that solves this problem for e 1/3, where the result yields the first asymptotic improvement in four decades. The algorithm generalizes to solve the list decoding problem for other algebraic codes, specifically alternant codes (a class of codes including BCH codes) and algebraic-geometry codes. In both cases, we obtain a list decoding algorithm that corrects up to n-/spl radic/(n(n-d')) errors, where n is the block length and d' is the designed distance of the code. The improvement for the case of algebraic-geometry codes extends the methods of Shokrollahi and Wasserman (see in Proc. 29th Annu. ACM Symp. Theory of Computing, p.241-48, 1998) and improves upon their bound for every choice of n and d'. We also present some other consequences of our algorithm including a solution to a weighted curve-fitting problem, which may be of use in soft-decision decoding algorithms for Reed-Solomon codes.

read more

Citations
More filters
Proceedings ArticleDOI

A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance

TL;DR: In this article, the authors proposed a provable data possession protocol with fault tolerance including corrupted data locating and recovering utilizing Cuckoo Filter and Reed-Solomon codes respectively, and illustrated the security and performance of the proposed schemes.
Dissertation

Cryptographic Protocols, Sensor Network Key Management, and RFID Authentication

Jiang Wu
TL;DR: This thesis includes research on efficient cryptographic protocols, sensor network key management, and radio frequency identification (RFID) authentication protocols, which study identification protocols, key exchange protocols, and ElGamal encryption and its variant.
Proceedings ArticleDOI

Iterative Decoding of Non-Binary Cyclic Codes Using Minimum-Weight Dual Codewords

TL;DR: A harddecision iterative decoding algorithm is proposed, which can correct errors beyond half of the code’s minimum Hamming distance and is realized with polynomial multiplication and integer comparisons, which are hardware-friendly.
Dissertation

The hybrid list decoding and Chase-like algorithm of Reed-Solomon codes.

Wei. Jin
TL;DR: In this article, a polynomial time algorithm for decoding low-rate Reed-Solomon codes beyond the classical error-correcting bound t = (dmin -1) /2 is presented.
Journal ArticleDOI

Privacy-preserving verifiable delegation of polynomial and matrix functions

TL;DR: This paper construct efficient verifiable computation schemes that provide privacy for the client’s input, and prove their security in a strong model that allows verification queries, and outlines applications of the results to outsourced two-party protocols.
References
More filters
Book

The Theory of Error-Correcting Codes

TL;DR: This book presents an introduction to BCH Codes and Finite Fields, and methods for Combining Codes, and discusses self-dual Codes and Invariant Theory, as well as nonlinear Codes, Hadamard Matrices, Designs and the Golay Code.
Book

The Design and Analysis of Computer Algorithms

TL;DR: This text introduces the basic data structures and programming techniques often used in efficient algorithms, and covers use of lists, push-down stacks, queues, trees, and graphs.
Book

Algebraic Coding Theory

TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Book

A Course in Computational Algebraic Number Theory

Henri Cohen
TL;DR: The first seven chapters guide readers to the heart of current research in computational algebraic number theory, including recent algorithms for computing class groups and units, as well as elliptic curve computations, while the last three chapters survey factoring and primality testing methods.
Book

Algebraic Function Fields and Codes

TL;DR: This new edition, published in the series Graduate Texts in Mathematics, has been considerably expanded and contains numerous exercises that help the reader to understand the basic material.