Corruption and Recovery-Efficient Locally Decodable Codes

A (q, i¾?, i¾?)-locally decodable code (LDC)C: {0,1}ni¾?{0,1}mis an encoding from n-bit strings to m-bit strings such that each bit x k can be recovered with probability at least $\frac{1}{2} + \epsilon$ from C(x) by a randomized algorithm that queries only qpositions of C(x), even if up to i¾?mpositions of C(x) are corrupted. If Cis a linear map, then the LDC is linear. We give improved constructions of LDCs in terms of the corruption parameter i¾?and recovery parameter i¾?. The key property of our LDCs is that they are non-linear, whereas all previous LDCs were linear. 1 For any i¾?, i¾?i¾? [i¾?(ni¾? 1/2), O(1)], we give a family of (2, i¾?, i¾?)-LDCs with length . For linear (2, i¾?, i¾?)-LDCs, Obata has shown that $m \geq \exp \left (\delta n \right )$. Thus, for small enough constants i¾?, i¾?, two-query non-linear LDCs are shorter than two-query linear LDCs. 1 We improve the dependence on i¾?and i¾?of all constant-query LDCs by providing general transformations to non-linear LDCs. Taking Yekhanin's linear (3, i¾?, 1/2 i¾? 6i¾?)-LDCs with $m = \exp \left (n^{1/t} \right )$ for any prime of the form 2ti¾? 1, we obtain non-linear (3, i¾?, i¾?)-LDCs with . Now consider a (q, i¾?, i¾?)-LDC Cwith a decoder that has nmatchings M 1 , ..., M n on the complete q-uniform hypergraph, whose vertices are identified with the positions of C(x). On input ki¾? [n] and received word y, the decoder chooses e= {a 1 , ..., a q } i¾? M k uniformly at random and outputs $\bigoplus_{j=1}^q y_{a_j}$. All known LDCs and ours have such a decoder, which we call a matching sum decoder. We show that if Cis a two-query LDC with such a decoder, then $m \geq \exp \left (\max(\delta, \epsilon)\delta n \right )$. Interestingly, our techniques used here can further improve the dependence on i¾?of Yekhanin's three-query LDCs. Namely, if i¾?i¾? 1/12 then Yekhanin's three-query LDCs become trivial (have recovery probability less than half), whereas we obtain three-query LDCs of length $\exp \left (n^{1/t} \right )$ for any prime of the form 2ti¾? 1 with non-trivial recovery probability for any i¾?< 1/6.

[1]  Yuval Ishai,et al.  On the power of nonlinear secret-sharing , 2001, Proceedings 16th Annual IEEE Conference on Computational Complexity.

[2]  Sergey Yekhanin,et al.  Towards 3-query locally decodable codes of subexponential length , 2008, JACM.

[3]  José D. P. Rolim,et al.  Randomization and Approximation Techniques in Computer Science , 2002, Lecture Notes in Computer Science.

[4]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[5]  Luca Trevisan,et al.  Lower bounds for linear locally decodable codes and private information retrieval , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.

[6]  Daniel A. Spielman,et al.  Expander codes , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[7]  Zeev Dvir,et al.  Locally Decodable Codes with Two Queries and Polynomial Identity Testing for Depth 3 Circuits , 2007, SIAM J. Comput..

[8]  Oded Goldreich,et al.  The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[9]  Luca Trevisan,et al.  Some Applications of Coding Theory in Computational Complexity , 2004, Electron. Colloquium Comput. Complex..

[10]  Jonathan Katz,et al.  On the efficiency of local decoding procedures for error-correcting codes , 2000, STOC '00.

[11]  Kenji Obata,et al.  Optimal Lower Bounds for 2-Query Locally Decodable Linear Codes , 2002, RANDOM.

[12]  Satyanarayana V. Lokam,et al.  An optimal lower bound for 2-query locally decodable linear codes , 2006, Inf. Process. Lett..

[13]  Yuval Ishai,et al.  Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[14]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[15]  Douglas R. Stinson,et al.  An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions , 2004, Journal of Cryptology.

[16]  Oded Goldreich,et al.  The Bit Extraction Problem of t-Resilient Functions (Preliminary Version) , 1985, FOCS.