On the Modulus in Matching Vector Codes
Abstract
A -query locally decodable code (LDC) allows one to encode any -symbol message as a codeword of symbols such that each symbol of can be recovered by looking at symbols of , even if a constant fraction of have been corrupted. Currently, the best known LDCs are matching vector codes (MVCs). A modulus may result in an MVC with and . The is good if it is possible to have . The good numbers yield more efficient MVCs. Prior to this work, there are only finitely many good numbers. All of them were obtained via computer search and have the form . In this paper, we study good numbers of the form . We show that if is good, then any multiple of of the form must be good as well. Given a good number , we show an explicit method of obtaining smaller good numbers that have the same prime divisors. Our approach yields infinitely many new good numbers.
keywords:
matching vector codes, locally decodable codes, private information retrieval1 Introduction
Classical error-correcting codes allow one to encode any -bit message as an -bit codeword such that can still be recovered, even if a constant fraction of have been corrupted. The disadvantage of such codes is that one has to read all or most of the codeword to recover any information about . As a better solution for decoding particular bits of the message, a -locally decodable code (LDC) [1] encodes any -bit message to an -bit codeword, such that any message bit can be recovered with probability , by a randomized decoding procedure that makes at most queries, even if bits of have been corrupted. Such codes have interesting applications [2, 3] in cryptography and complexity theory. For an efficient LDC, both the code length and the query complexity should be as small as possible, as functions of .
Following [1, 4, 5], Gasarch [2] and Goldreich [4] conjectured that for any constant , the length of a -query LDC should be . Yekhanin [6] disproved this conjecture with a 3-query LDC of length , assuming that there are infinitely many Mersenne primes. For any , Efremenko [7] provided a construction of -query LDCs of length under no assumptions, and in particular a 3-query LDC when . Such codes have been reformulated and called matching vector codes (MVCs) in [8].
The MVCs in [7] are based on two ingredients: -matching family and -decoding polynomial. For , let be the set of integers of the form , where are distinct primes and . The existence of both ingredients in MVCs depends on a modulus . In particular, the query complexity of the MVC is equal to the number of monomials in the -decoding polynomial, and is at most for all . A number has been called good if an -decoding polynomial with monomials exists when is used to construct MVC. For example, the 3-query LDC of [7] was constructed with the good number . Itoh and Suzuki [9] showed that one can reduce the query complexity of MVCs via a composition theorem. In particular, by using the good numbers 511 and 2047, they were able to obtain -query LDC of length for all . Chee et al. [10] showed that if there exist primes such that , then must be good. They determined 50 new good numbers of the above form and then significantly reduced the query complexity of MVCs.
Since [7, 9, 10], the work of finding good numbers has become interesting. However, the study of [7, 9, 10] was limited to good numbers of the form . When , it is not known how to decide a number of the form is good except using the very expensive computer search. In this paper, we shall provide two methods for obtaining new good numbers in :
-
•
If is good and is a multiple of , then must be good as well;
-
•
If is good, and there is an -decoding polynomial of the form for such that , then must be good as well.
2 Preliminaries
We denote by and the set of integers and positive integers, respectively. For any , we denote . For any , we denote by the set of integers modulo and denote by the multiplicative group of integers modulo . When is odd, we have that and denote by the multiplicative order of in . For a prime power , we denote by the finite field of elements and denote by the multiplicative group of . For any , we denote by the multiplicative order of . For any two vectors , we denote by the Hamming distance between and . For any , we denote by the dot product of and . If the components of a vector are labeled by a set , then for every we denote by the th component of .
Definition 2.1.
(locally decodable code) Let and let . A code is said to be -locally decodable if there exist randomized decoding algorithms such that:
-
•
For any , any such that and any , .
-
•
The algorithm makes at most queries to .
The numbers and are called the query complexity and the length of , respectively. They are usually considered as functions of , the message length, and measure the efficiency of . Ideally, we would like and to be as small as possible.
Efremenko [7] proposed a construction of LDCs, which is based on two fundamental building blocks: -matching family and -decoding polynomial.
Definition 2.2.
(-matching family) Let and let . A set is said to be an -matching family if
-
•
for every ,
-
•
for all such that .
Definition 2.3.
(-decoding polynomial) Let be odd. Let and let be a primitive th root of unity. A polynomial is said to be an -decoding polynomial if
-
•
for every ,
-
•
.
Given an -matching family and an -decoding polynomial , Efremenko’s LDC can be described by Figure. 1.
Encoding: This algorithm encodes any message as a codeword such that:
-
•
the components of are labeled by the elements of respectively; and
-
•
for every , the th component is computed as .
Decoding: This algorithm takes a word and an integer as input. It recovers as follows:
-
•
choose a vector uniformly and at random.
-
•
output .
Figure 1. Efremenko’s Construction
Efremenko’s construction gives a linear -LDC that encodes messages of length to codewords of length . When is fixed, the larger the is, the more efficient the is. Efremenko [7] and several later works [9, 10] choose as the canonical set in . For any , the canonical set in is defined as
For example, . Efremenko [7] observed that Grolmusz’s set system [11] gives a direct construction of -matching families.
Lemma 2.4.
In particular, the takes the form of for an integer and is determined by both , , and the weak representation of the function [11]. Efremenko [7] also observed that the polynomial is an -decoding polynomial with monomials.
Lemma 2.5.
([7]) For any , there is an -decoding polynomial with at most monomials.
Theorem 2.6.
([7]) For every integer , there is a -LDC of query complexity and length .
For every integer , Theorem 2.6 gives an infinite family of LDCs, each based on a number . Different may give LDCs of different query complexity. For example, gives a code of query complexity 3 [7], while is only able to give a code of query complexity 4 [9]. A number of the form has been called good in [9, 10] if it is able to result in an LDC of query complexity . By using the good numbers and , Itoh and Suzuki [9] concluded that for any , the query complexity of the LDCs in Theorem 2.6 can be reduced to . On the other hand, for and , the best decoding algorithms to date for the LDCs in Theorem 2.6 have query complexity 3, 8, 9, and 24, respectively. Chee et al. [10] showed Mersenne numbers of the form are good. With infinitely many such good numbers, Chee et al. [10] can further reduce the query complexity to .
3 Good Numbers of the Form
Let . Let and let be a primitive root of unity. Lemma 2.5 shows that there is an -decoding polynomial with monomials. In this section, we will establish several sufficient and necessary conditions for a number to be good.
Lemma 3.1.
Let . Then any -decoding polynomial has monomials.
Proof 3.2.
Let be the set of good numbers in . The following lemmas characterize .
Lemma 3.3.
Let . Then if and only if there is a polynomial that satisfies the following properties
-
①
-
②
, and
-
③
, .
Proof 3.4.
If , then by Lemma 3.1 there exists an -decoding polynomial
(5) |
with exactly 3 monomials. In particular, we must have
-
④
,
-
⑤
, and
-
⑥
.
While ④ and ⑥ are clear from the definition, we show that ⑤ is also true. Assume for contradiction that . Then for all and thus
(6) | ||||
(7) | ||||
(8) |
Due to (6) and (7), we have that and thus . Consequently, (6) implies that , which contradicts to (8).
W.l.o.g., we suppose that . Let and . Then
(9) |
The properties ①, ②, and ③ trivially follow from ④, ⑤, and ⑥, respectively.
Conversely, suppose that is a polynomial that satisfies the properties ①, ②, and ③. Then will be an -decoding polynomial with exactly 3 monomials. Therefore, .
Lemma 3.5.
Let . Then if and only if there exist such that and , where
(10) |
Proof 3.6.
If , then there is a polynomial such that the ①, ②, and ③ in Lemma 3.3 are true. Due to ②, we have that . On the other hand, ③ is equivalent to
(11) | ||||
(12) |
Equation (11) requires that . It remains to show that . We show that . The proofs for and will be similar and omitted. Note that
(13) | ||||
If , then and . Equation (13) would imply or . If , then and thus , which would contradicts to ②. If , then and thus , which contradicts to (12).
Conversely, suppose that are integers such that and . To show that , it suffices to construct an -decoding polynomial such that ①, ②, and ③ are satisfied. First of all, implies that . If , then we must have that . It follows that , which contradicts to . As , the null space of will be 1-dimensional and spanned by a nonzero vector . Below we shall see that for all . If , then
(14) |
Then must be nonzero and thus . The latter equality requires that , which contradicts to the fact . Hence, . Similarly, we have and . Let . Then . Furthermore, we must have . Otherwise, and
(15) |
As , this is possible only if
(16) |
Denote by the value of the fractions in (16). Then
(17) |
where the first equality is based on the fact that and the second equality is true because we are working over a finite field of characteristic 2. It follows from (17) that . Therefore, we must have that . Similarly, we have that . Based on the two congruences, we have that , which gives a contradiction. Hence, and is a polynomial satisfying ①, ②, and ③.
Lemma 3.7.
Let . Let and let be a primitive th root of unity. Let
Then if and only if is not injective on .
Proof 3.8.
If , then by Lemma 3.5 there exist such that and , where is defined by (10). Note that requires that
Clearly, and are two distinct elements of and Hence, is not injective on .
Conversely, suppose that for two distinct elements . To show that , by Lemma 3.5 it suffices to find such that and . Suppose that
for and . Then there exist integers , where and , such that
By Chinese remainder theorem, there exist such that:
In particular, and (o.w., we will have ). Furthermore, and Since , we must have that due to (13).
Let Then Lemma 3.7 gives the following theorem.
Theorem 3.9.
Let . Let and let be a primitive root of unity. Then if and only if is not injective on .
4 Implications between Good Numbers
In this section, we show the implications between good numbers in , which allows us to construct new good numbers from old.
Lemma 4.1.
Let . Let and let be a primitive root of unity for . If , then there is an integer such that .
Proof 4.2.
As and , we must have that . Then is a subfield of . Note that and are elements of the same finite field and have the same multiplicative order (i.e., ). Both and are subgroups of of order . As has a unique subgroup of order , it must be the case that . Hence, there is an integer such that .
Theorem 4.3.
Let . If and , then .
Proof 4.4.
For , let , let , and let be of order . Let and .
If , then there is a collision such that and
(18) |
As per Lemma 4.1, let be an integer such that . Then (18) is
(19) |
We claim that if there exist integers such that
then , and
(20) |
i.e., form a collision for (and thus ). Note that (20) is clear from (i), (ii) and (19). We need to show that and . If , then we will have that . The second congruence of (i) would imply that , which contradicts to and . Similarly, we have and . Hence, . If , then the first congruences of (i) and (ii) would imply that , which requires that . Similarly, the second congruences of (i) and (ii) would imply . It follows that , which is a contradiction.
It remains to show the existence of integers and that satisfy (i) and (ii). We show that existence of . The existence of is similar. Due to Chinese remainder theorem, the first congruence of (i) is equivalent to
(21) |
Note that the first congruence of (21) is always true. On the other hand, as , the first congruence of (i) must be equivalent to
(22) |
Similarly, the second congruence of (i) is equivalent to
(23) |
Therefore, (i) is equivalent to the system formed by (22) and (23). The existence of is an easy consequence of the Chinese remainder theorem.
Theorem 4.5.
Let . Suppose that and is a collision for , where . Let and . Then belongs to .
Proof 4.6.
For , let , let and let be of order . Let and . To show that , it suffices to find two integers such that and
(24) |
As per Lemma 4.1, there is an integer such that . Then (24) is
(25) |
As is a collision for , we have
(26) |
We claim that if there exist integers such that
then , and (25) holds. Note that (25) is clear from (i), (ii) and (26). If , then the second congruence of (i) would imply that , which contradicts to the fact that . Similarly, we can show that and . Therefore, . If , then the first congruences of (i) and (ii) would imply that , which requires that . Similarly, the second congruences of (i) and (ii) require that . It follows that , which is a contradiction.
It remains to show the existence of and that satisfy (i) and (ii). We show the existence of . The existence of is similar and omitted. As and , the first congruence in (i) is equivalent to
(27) |
Note that the first congruence of (27) is always true. On the other hand, as , there is an integer such that . Therefore, the first congruence of (i) will be equivalent to
(28) |
Similarly, we can show that the second congruence of (i) is equivalent to
(29) |
where is an integer such that . The existence of is an easy consequence of the Chinese remainder theorem on (28) and (29).
Example 4.7.
Let . Then . Let and let be a primitive root of unity. Then is a collision for . Clearly, and . Then must be a good number, which is .
5 Conclusion
In this paper, we characterized the good numbers in and showed two implications between good numbers in . In particular, the second implication requires an additional condition. It is an interesting problem to remove the condition.
Data Availability Statement The data underlying this article are available in the article.
Funding Natural Science Foundation of Shanghai (21ZR1443000); Singapore Ministry of Education under Research Grant RG12/19
Acknowledgments The authors would like to thank the anonymous reviewers for their helpful suggestions.
References
- [1] Katz, J. and Trevisan, L. (2000) On the efficiency of local decoding procedures for error-correcting codes. In Yao, F. and Luks, E. M. (eds) Proc. 32nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2000, Portland, OR, USA, May 21-23, 2000, pp. 80–86. ACM.
- [2] Gasarch, W. (2004) A survey on private information retrieval. Bulletin of the EATCS, 82, 72–107.
- [3] Trevisan, L. (2004) Some applications of coding theory in computational complexity. Electron. Colloquium Comput. Complex., 11, No. 043.
- [4] Goldreich, O., Karloff, H.J., Schulman, L.J. and Trevisan, L. (2006) Lower bounds for linear locally decodable codes and private information retrieval. Comput. Complex., 15, 263–296.
- [5] Woodruff, D.P. (2007) New lower bounds for general locally decodable codes. Electron. Colloquium Comput. Complex., 14, No. 006.
- [6] Yekhanin, S. (2008) Towards 3-query locally decodable codes of subexponential length. J. ACM, 55, 1:1–1:16.
- [7] Efremenko, K. (2012) 3-query locally decodable codes of subexponential length. SIAM J. Comput., 41, 1694–1703.
- [8] Dvir, Z., Gopalan, P. and Yekhanin, S. (2011) Matching vector codes. SIAM J. Comput., 40, 1154–1178.
- [9] Itoh, T. and Suzuki, Y. (2010) Improved constructions for query-efficient locally decodable codes of subexponential length. IEICE Trans. Inf. Syst., E93–D, 263–270.
- [10] Chee, Y.M., Feng, T., Ling, S., Wang, H. and Zhang, L.F. (2013) Query-efficient locally decodable codes of subexponential length. Comput. Complex., 22, 159–189.
- [11] Grolmusz, V. (2000) Superpolynomial size set-systems with restricted intersections mod 6 and explicit Ramsey graphs. Combinatorica, 20, 71–86.