DocumentCode :
2074903
Title :
Private codes or succinct random codes that are (almost) perfect
Author :
Langberg, Michael
Author_Institution :
Dept. of Comput. Sci., California Inst. of Technol., Pasadena, CA, USA
fYear :
2004
fDate :
17-19 Oct. 2004
Firstpage :
325
Lastpage :
334
Abstract :
Coding theory addresses the design and analysis of codes that enable communication over noisy channels. Two types of channels that have been extensively considered are the binary symmetric channel and the adversarial channel. In a binary symmetric channel each bit of the sent message is flipped independently with some probability p, implying that the noise imposed by the channel is random in nature where the amount of noise is determined by p. In an adversarial channel the message is treated as a whole, and the noise may be an arbitrary (and malicious) function of the message being sent, as long as it does not effect more that a certain fraction (say p) of the bits transmitted. Roughly speaking, any code designed for an adversarial channel can be used on a corresponding binary symmetric channel successfully, whereas the contrary is not necessarily true. In this work we present a construction that transforms the best codes for binary symmetric channels into "codes" for corresponding adversarial channels. The "codes" we present assume that the sender and the receiver of the message have a joint secret random string (which is not known to the channel). These codes are referred to as private codes. Intuitively, this private randomness allows a reduction between the random and adversarial channels. Such a reduction is simple once the size of the joint random string is Θ(n log n) (here the codes are a subset of {0,1 }n). In this work we present private codes in which the size of the joint random string is O(log n). Moreover, we show that our result is tight. Namely, to design private codes that allow communication over adversarial channels that meet the bounds achievable when communicating over binary symmetric channels, an amount of Ω(log n) shared random bits are required. To the best of our knowledge, no prior results of this nature have been presented in the past. As part of our proof we establish a connection between list decodable codes and private codes which complements a recent result of Guruswami (CCC \´03) on list decoding with side information.
Keywords :
computational complexity; decoding; random codes; telecommunication channels; adversarial channel; binary symmetric channel; coding theory; decodable code; joint secret random string; noisy channel; private codes; succinct random codes; Computer science;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Foundations of Computer Science, 2004. Proceedings. 45th Annual IEEE Symposium on
ISSN :
0272-5428
Print_ISBN :
0-7695-2228-9
Type :
conf
DOI :
10.1109/FOCS.2004.51
Filename :
1366252
Link To Document :
بازگشت