Algebraic properties of polar codes from a new polynomial formalism

Polar codes form a very powerful family of codes with a low complexity decoding algorithm that attains many information theoretic limits in error correction and source coding. These codes are closely related to Reed-Muller codes because both can be described with the same algebraic formalism, namely they are generated by evaluations of monomials. However, finding the right set of generating monomials for a polar code which optimises the decoding performances is a nontrivial task and is channel dependent. The purpose of this paper is to reveal some universal properties of these monomials. We will namely prove that there is a way to define a nontrivial (partial) order on monomials so that the monomials generating a polar code devised for a binary-input symmetric channel always form a decreasing set. We call such codes decreasing monomial codes. The fact that polar codes are decreasing monomial codes turns out to have rather deep consequences on their structure. Indeed, we show that decreasing monomial codes have a very large permutation group by proving that it contains a group called lower triangular affine group. Furthermore, the codewords of minimum weight correspond exactly to the orbits of the minimum weight codewords that are obtained from evaluations of monomials of the generating set. In particular, it gives an efficient way of counting the number of minimum weight codewords of a decreasing monomial code and henceforth of a polar code.

[1]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[2]  Kazukuni Kobara Code-Based Public-Key Cryptosystems and Their Applications , 2009, ICITS.

[3]  Ayoub Otmani,et al.  Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes , 2016, PQCrypto.

[4]  Jean-Charles Faugère,et al.  A Distinguisher for High-Rate McEliece Cryptosystems , 2011, IEEE Transactions on Information Theory.

[5]  Bernhard C. Geiger,et al.  The Fractality of Polar and Reed–Muller Codes † , 2015, Entropy.

[6]  Hugues Randriambololona,et al.  On products and powers of linear codes under componentwise multiplication , 2013, ArXiv.

[7]  Alexander Vardy,et al.  How to Construct Polar Codes , 2011, IEEE Transactions on Information Theory.

[8]  Ignacio Cascudo,et al.  Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field , 2009, CRYPTO.

[9]  Christian Wieschebrink Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes , 2010, PQCrypto.

[10]  Rüdiger L. Urbanke,et al.  Polar Codes for Channel and Source Coding , 2009, ArXiv.

[11]  Jean-Charles Faugère,et al.  A Distinguisher for High-Rate McEliece Cryptosystems , 2013, IEEE Trans. Inf. Theory.

[12]  Rüdiger L. Urbanke,et al.  Modern Coding Theory , 2008 .

[13]  Santhosh Kumar,et al.  Reed–Muller Codes Achieve Capacity on Erasure Channels , 2015, IEEE Transactions on Information Theory.

[14]  Pascale Charpin Codes cycliques étendus affines-invariants et antichaines d'un ensemble partiellement ordonne , 1990, Discret. Math..

[15]  Erdal Arikan,et al.  Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.

[16]  Alain Couvreur,et al.  Polynomial Time Attack on Wild McEliece Over Quadratic Extensions , 2017, IEEE Transactions on Information Theory.

[17]  Tadao Kasami,et al.  On the Weight Enumeration of Weights Less than 2.5d of Reed-Muller Codes , 1976, Inf. Control..

[18]  Joseph M Renes,et al.  Efficient polar coding of quantum information. , 2011, Physical review letters.

[19]  Ilya Dumer,et al.  Soft-decision decoding of Reed-Muller codes: a simplified algorithm , 2006, IEEE Transactions on Information Theory.

[20]  Alain Couvreur,et al.  A polynomial time attack against algebraic geometry code based public key cryptosystems , 2014, 2014 IEEE International Symposium on Information Theory.

[21]  Ryuhei Mori,et al.  Performance and construction of polar codes on symmetric binary-input memoryless channels , 2009, 2009 IEEE International Symposium on Information Theory.

[22]  Rüdiger L. Urbanke,et al.  Reed-Muller Codes Achieve Capacity on the Binary Erasure Channel under MAP Decoding , 2015, ArXiv.

[23]  Eren Sasoglu,et al.  Polarization and Polar Codes , 2012, Found. Trends Commun. Inf. Theory.

[24]  Young-Sik Kim,et al.  New McEliece cryptosystem based on polar codes as a candidate for post-quantum cryptography , 2014, 2014 14th International Symposium on Communications and Information Technologies (ISCIT).

[25]  Ruud Pellikaan,et al.  On decoding by error location and dependent sets of error positions , 1992, Discret. Math..

[26]  Alain Couvreur,et al.  Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes , 2013, Des. Codes Cryptogr..

[27]  Ignacio Cascudo,et al.  The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing , 2011, CRYPTO.

[28]  Gilles Zémor,et al.  Discrete Isoperimetric Inequalities and the Probability of a Decoding Error , 2000, Combinatorics, Probability and Computing.

[29]  P. Charpin,et al.  Affine-invariant extended cyclic codes and partially ordered sets of antichains , 1990 .

[30]  Mikhail A. Borodin,et al.  Effective attack on the McEliece cryptosystem based on Reed-Muller codes , 2014 .