Randomness-Efficient Constructions of Capacity-Achieving List-Decodable Codes
Abstract
In this work, we consider the task of generating list-decodable codes over small (say, binary) alphabets using as little randomness as possible. Specifically, we hope to generate codes achieving what we term the Elias bound, which means that they are -list-decodable with rate . A long line of work shows that uniformly random linear codes (RLCs) achieve the Elias bound: hence, we know random bits suffice. Prior works (Guruswami and Mosheiff, FOCS 2022; Putterman and Pyne, arXiv 2023) demonstrate that just random bits suffice, via puncturing of low-bias codes. These recent constructions are essentially combinatorial, and rely (directly or indirectly) on graph expansion.
We provide two new constructions, which are algebraic. Compared to prior works, our constructions are considerably simpler and more direct. Furthermore, our codes are designed in such a way that their duals are also quite easy to analyze. Our first construction — which can be seen as a generalization of the celebrated Wozencraft ensemble — achieves the Elias bound and consumes random bits. Additionally, its dual code achieves the Gilbert-Varshamov bound with high probability, and both the primal and dual admit quasilinear-time encoding algorithms. The second construction consumes random bits and yields a code where both it and its dual achieve the Elias bound. As we discuss, properties of a dual code are often crucial for applications of error-correcting codes in cryptography.
In all of the above cases – including the prior works achieving randomness complexity – the codes are designed to “approximate” RLCs. More precisely, for a given locality parameter we construct codes achieving the same -local properties as RLCs. This allows one to appeal to known list-decodability results for RLCs and thereby conclude that the code approximating an RLC also achieves the Elias bound (with high probability). As a final contribution, we indicate that such a proof strategy is inherently unable to generate list-decodable codes of rate over with less than bits of randomness.
1 Introduction
The basic task of coding theory is to define subsets of , where is the alphabet size and is the block-length, that satisfy two conflicting desiderata. Firstly, the code should be as large as possible, as this corresponds to the amount of information that one transmits in symbol transmissions. But secondly, the elements of , termed codewords, should be as spread out as possible in order to minimize the likelihood that two distinct codewords are confused should errors be introduced. In this work, we will focus almost exclusively on linear codes, in which case we require to be a prime power and insist that , i.e., is a subspace of the vector space . Unless otherwise mentioned, from now on all codes are linear.
Typically, instead of directly working with the cardinality of a code, one analyzes its rate , which measures the amount of information transmitted per codeword symbol. To measure a code’s error-resilience, various metrics can be used. The most basic (at least for the setting of worst-case errors) is ’s minimum distance , where here and throughout is the (normalized) Hamming distance. A classical observation is that as long as fraction of symbols are corrupted, one can always uniquely-decode111At least, information-theoretically. Algorithmic decoding is a separate challenge. to recover the original codeword.
The first question one might ask, then, is what sort of tradeoffs one can achieve between rate and distance. A classical result due to Gilbert [Gil52] and Varshamov [Var57] states that, for any satisfying ,222Here, denotes the -ary entropy function, which we define formally in Section 2.1. there exist infinite families of codes of rate at least and distance at least . We say that codes which achieve this tradeoff (or, in some cases, get -close for some small ) achieve the GV bound.
A natural relaxation of unique-decoding that we focus upon is list-decoding: for a parameter and an integer we call a code -list-decodable if for any , the number of codewords at distance at most from is less than . In notation:
Early work due to Elias and Wozencraft [Eli57, Woz58, Eli91] proposed list-decodable codes as an object of study, largely as an intermediate target on the way to unique-decoding. In the past 30 years or so, list-decodable codes have seen increased attention due to their connections to other parts of theoretical computer science, particularly complexity theory, cryptography and pseudorandomness [GL89, BFNW90, Lip90, KM93, Jac97, STV01]. Note that the above discussion of unique-decodability implies that any code with distance is -list-decodable. In particular, by choosing a code achieving the GV bound, we can have a rate code which is -list-decodable.
If one allows the list-size parameter to grow, the list-decoding capacity theorem essentially says that we can correct up to twice as many errors for the same rate. More precisely, there exist -list-decodable codes of rate . Informally, one says that a code333Technically, one should speak of an infinite family of codes of increasing block-length whose rates have limit . In this work, we will not be too careful with this formalism, but it should be clear that our constructions lead to such infinite families. achieves list-decoding capacity if its rate is arbitrarily close to with list-size . For our purposes, we are interested in codes that achieve the tradeoff achieved by random codes. Introducing some terminology, we will say a code construction achieves the Elias bound if it is -list-decodable and has rate at least .
We also mention that a generalization of list-decoding, termed list-recovery, has seen increasing attention in recent years. It was originally abstracted as a useful primitive in list-decoding concatenated codes [GI01, GI02, GI03, GI04]. However, it has recently proved itself to merit investigation in its own right, finding applications in cryptography [HIOS15, HLR21], randomness extraction [GUV09], hardness amplification [DMOZ20], group testing [INR10, NPR11], streaming algorithms [DW22], and beyond. The interested reader is directed to Section 2.3 for the precise definition of list-recovery; for now, suffice it to say that all of the preceding and ensuing discussion generalizes cleanly to list-recovery as well.
An outstanding problem in the theory of error-correcting codes is to provide explicit444While we will not be too precise with the meaning of “explicit” in this work, we informally mean that a description of the code can be constructed deterministically in time polynomial in . constructions of capacity-achieving list-decodable codes. The problem in the regime of “large alphabet” has seen tremendous progress in the last quarter of a century. Since Guruswami and Rudra demonstrated that folded Reed-Solomon codes achieve list-decoding capacity [GR08], a long line of work has now led to explicit constructions of capacity-achieving codes: namely, codes of rate which are -list-decodable, assuming [GRZ21]. While achieving optimal tradeoffs between all the parameters involved is still not completely resolved, it is fair to say that we have very satisfactory constructions, assuming is sufficiently large. However, when it comes to explicitly constructing list-decodable codes over the binary alphabet, the existing results are quite paltry. The only notable successes concern the regime of very high noise, where one hopes to decode at radius with codes of rate , matching (up to constant factors) the rate-distance tradeoff achieved by random linear codes. The current state of the art is Ta-Shma’s code [TS17] achieving rate , for which we now additionally have efficient unique- and list-decoding [GJQST20, JST21] algorithms.
In light of the difficulty of explicitly constructing list-decodable codes over small alphabets, we focus on a more modest goal: let’s construct them randomly using as little randomness as possible. And in this case, we would like to achieve the Elias bound, i.e., for -list-decodability the rate should be at least . For example, the classical argument of Elias – which argues that random subsets of size are -list-decodable assuming – shows that with exponentially many random bits we can have such a code. This generalizes to for general alphabet size .
If rather than a plain random code one instead samples a random linear code (RLC), a long line of works [ZP81, GHSZ02, GHK11, CGV13, Woo13, RW14, RW18, LW21, GLM+22, AGL23] shows that they achieve the Elias bound in most parameter regimes. In particular, [LW21, GLM+22] settles the binary case. Hence, random bits are sufficient.
To push beyond this, [MRR+20] shows that random low-density parity-check (LDPC) codes also achieve list-decoding capacity efficiently, and such codes can be sampled with bits of randomness. This work actually argues something stronger: namely, any local property that is satisfied by a random linear code of rate with high probability is also satisfied by a random LDPC code of rate .
While we precisely define local properties in Section 2.4, for now we give the following intuitive explanation: for a given locality parameter , -local properties are defined by excluding a collection of “forbidden subsets” of size . In the case of list-decodability, the collection would be defined as the family of all -tuples of vectors which all lie in a Hamming ball of radius . That is, -list-decodability is an -local property. The same in fact holds for -list-recoverability: it is also an -local property.
Subsequent work by Guruswami and Mosheiff [GM22] provides a means of sampling codes achieving list-decoding capacity efficiently with only randomness. In fact, as is the case for LDPC codes, these codes achieve the same local properties as RLCs. First, note that an RLC is nothing but a random puncturing of the Hadamard code.555Recall that the Hadamard code encodes a message into a length- codeword by computing for every . Observe further that the Hadamard code is optimally balanced, in the sense that every non-zero codeword has weight precisely . Gurusawmi and Mosheiff suggest then puncturing some other explicitly chosen “mother code” of block-length , and so long as this code is nearly balanced in the sense that all non-zero codewords have weight , then a random puncturing will again “look like” an RLC from the perspective of local properties. Assuming , then we need random bits to sample such a code, matching the guarantee for LDPC codes. To achieve randomness, one must ensure (by choosing, e.g., Ta-Shma’s codes [TS17] for the mother code) and then puncturing without replacement: one thus requires only bits of randomness.
Very recently, another derandomization has been offered. Putterman and Pyne [PP23] demonstrate that instead of choosing each coordinate independently one can choose them via an expander random walk. This then means that we only require bits of randomness to sample the code, where is the degree of the expander graph. Assuming – which is achievable if one is interested in local properties – we in particular find that bits of randomness suffice.
Thus, we currently know how to construct list-decodable binary codes achieving capacity efficiently with bits of randomness. As elaborated below, this seems like a hard barrier for current techniques.
The above constructions are quite “indirect,” requiring the existence of a sufficiently nice mother code that can then be punctured. While explicit constructions of such highly balanced codes are known, the constructions are all quite nontrivial. This status naturally leads us to wonder if we can provide more “direct” randomness-efficient constructions of binary codes achieving the Elias bound.
Furthermore, we also find motivations stemming from code-based cryptography. In this setting, one would often like to generate codes that “look like” random codes, but in fact admit efficient descriptions, as the description of the code is often some sort of public parameter that must be known by all parties making use of the cryptographic scheme. We elaborate upon this connection below. And in this case, one would often like the dual code to also look random (again, we discuss this motivation further below). We observe that while the dual of an RLC is again an RLC – and hence will also satisfy the Elias bound with high probability – the above constructions (LDPC or puncturing-based) do not have such guarantees. And indeed, the dual of an LDPC code certainly cannot even have linear minimum distance! As for the puncturing-based constructions, it is unclear to us whether random puncturing can yield the Elias bound and good dual distance; at the very least, such a proof would require new techniques.
1.1 Our Results
In this work, we provide two new randomized constructions of codes achieving the Elias bound and consuming only bits of randomness. In fact, for any (constant) locality parameter , we show that these codes are -locally similar (see Definition 2.14) to RLCs, which implies that any -local property satisfied by RLCs with high probability is also satisfied by our codes with high probability (in fact, the success probability will be of the form ). In particular, taking implies that all our codes achieve list-decoding capacity efficiently with high probability. We provide our constructions for general (but constant) field size , although we are mostly motivated by the binary case.
The notions of local property and local similarity are thoroughly defined and discussed in section 2.4. For concreteness, we give a shorter and less precise description here, and for simplicity we restrict attention here to the binary case. Fix a locality parameter and consider the set of all binary matrices. We generally think of as constant while tends to infinity. A code is said to contain a matrix if it contains all the columns of as codewords. We group the matrices in according to their row distribution. More precisely, we associate with a distribution that yields a vector proportionally to the number of times that appears as a row in , namely, , where denote ’s rows. We denote the set of all matrices in with row distribution by . We can now define the notion of local-similarity to an RLC for binary codes.
Definition 1.1 (Local similarity to RLC in the binary case).
Let be a linear code sampled from some ensemble. We say that is -locally-similar to an RLC of rate if, for every and every distribution with , we have
Above, denotes the entropy of the distribution , measured in bits.
Less formally, is locally similar to an RLC if, for every , the expected number of matrices from in is not much larger than that in an RLC. The motivation for this definition is that local-similarity of to an RLC implies that almost surely satisfies every local property (a notion formulated in Definition 2.9) that is satisfied by an RLC with high probability. As important motivating special cases, we note that list-decodability and list-recoverability are both local properties; this is established in e.g. [MRR+20, Res20]. Therefore, we can morally say that any code satisfying Definition 1.1 is likely to be list-decodable and list-recoverable with similar paramters to those of an RLC. In particular, such a code is likely to achieve the Elias bound.
We now turn to describing our constructions. In contrast to prior works, neither of our constructions rely on an explicit “mother code” which we then puncture, but are instead built “from scratch.” Our constructions also have the pleasing property of being rather simple. A final major bonus of our codes is that their duals also satisfy non-trivial properties: for the first construction, its dual achieves the GV bound with high probability; for the second, its dual is also -locally similar to RLCs!
Our first construction, which yields a code over of block-length , uses linearized polynomials with -degree at most . That is, is of the form where each , the degree extension of . As we review in Section 2.2, such linearized polynomials define -linear maps . That is, for all and , we have . The code is sampled by sampling the coefficients independently and uniformly at random. In particular, this requires only uniformly random bits.
To provide codes with rate , we fix an -linear subspace of dimension . The code is then defined as , where is any bijective -linear map. Recall that such a map exists as is of dimension as a vector space over , and any two vector spaces over the same field of the same dimension are isomorphic. For example, if is a basis for over , we could set . We say that is a pseudorandom code from linearized polynomials of rate and degree , or just for short, if it is sampled according to the above procedure.666The dependence on and is not made explicit in this notation, as they will turn out to have no impact on our results regarding ’s combinatorial properties. Requiring the polynomial to be linearized guarantees that the resulting code is linear, as desired.
Not only are we able to show that such codes achieve the Elias bound with high probability, we also show that their dual code achieves the GV bound. As we elaborate upon below, for cryptographic applications a code’s dual distance is often a crucial parameter of interest. We remark that, prior to our work, we are not aware of any construction of binary codes consuming randomness outputting codes with both distance and dual distance lying on the GV bound.
Having realized that with randomness we can construct a binary code that is -locally similar to RLCs with dual code achieving the GV bound (which informally follows from being -locally similar to RLCs), it is natural to wonder if it is possible to get both primal and dual code -locally similar to RLCs. We emphasize again that this would imply that both the primal and the dual code achieve the Elias bound for list size . The answer to this question is yes: our second construction has exactly this property. We now turn to describing this construction.
First, fix distinct elements (they need not be linearly independent over ). Let be a full-rank linear map (as with before), and let be any surjective -linear map. For example, if is a basis for over , we could set and .
For a given rate , we choose independently two polynomials uniformly amongst all such polynomials of degree at most (unlike in the previous construction, these polynomials need not be linearized). Note that this requires only uniformly random bits. We then define the following two matrices :
-
•
For each , the -th row of is defined to be .
-
•
For each , the -th column of is defined to be .
We then define and set . We call a code constructed in this way a pseudorandom code from row and column polynomials of rate and degree , or just , if it is sampled according to this procedure.777For reasons analogous to before, this notation omits mention of , and . Informally, the matrix is responsible for ensuring that the primal code is -locally similar to RLCs, while the matrix guarantees the same holds for the dual code. In particular, if we had just set then we would have had just the primal code -locally similar to RLCs, while if we just set then only the dual code would be -locally similar to RLCs.
This second construction thus yields the following result.
Theorem 1.2 (Informal; follows from Theorem 4.2).
Let , for which and is a prime power. Let be -local properties, and suppose that an satisfies with probability and an satisfies with probability . Then, for sufficiently large , there exists a randomized procedure consuming bits of randomness outputting a code such that, with probability at least :
-
•
has rate ;
-
•
satisfies ; and
-
•
satisfies , where is the code dual to .
As mentioned above, we do know of other code ensembles sampled with linear randomness that share local properties with RLCs. However, we are not aware of any other code ensembles for which the dual code also shares local properties with RLCs.
Lastly, we mention one other pleasing feature of our first construction based on linearized polynomials. Namely, a careful choice of representation for over allows one to view the task of encoding a message as a constant number of polynomial multiplications, which can be computed in time via standard FFT-type methods. Thus, we can also claim the following result.
Theorem 1.3 (Informal; follows from Theorem 3.4 and Proposition 3.5).
Let , for which and a prime power. Let be an -local property, and suppose that an satisfies with probability . Then, for sufficiently large , there exists a randomized procedure consuming bits of randomness outputting a code such that, with probability at least :
-
•
has rate ;
-
•
satisfies ;
-
•
achieves the GV-bound;
-
•
is encodable in time.
Cryptographic motivation.
We remark that codes that “look like random linear codes” but are in fact samplable with less randomness are highly motivated by cryptographic considerations. And in fact, achieving good dual distance is often a crucial desideratum: the security of a cryptosystem is typically tied to the dual distance of the code, whether this is provably the case (i.e., with secret-sharing schemes [CDD+15],[CXY20]) or plausibly the case (i.e., the linear tests framework for learning parity with noise [BCG+22]). However, codes that require less randomness to generate allow for reduced public key sizes: the sizes of keys is typically the major drawback of post-quantum public-key cryptosystems. Hence the popularity of, e.g., quasi-cyclic [MAB+18] and moderate-density parity-check codes [ABB+22].
While for McEliece-type encryption schemes [McE78] an important requirement is that the code admits an efficient decoding algorithm, this is not in fact required for recent applications of error-correcting codes in multi-party computation – e.g., in the context of pseudorandom correlation generators (PCGs). In fact, one typically hopes that such codes do not admit efficient decoding [BIP+18, DGH+21]. A current “rule-of-thumb” is that the employed code should have good dual distance. In our view, a much more satisfying guarantee is that the dual code in fact shares more sophisticated properties with random linear codes, e.g., list-decodability/-recoverability, as our techniques can establish.
We further remark that many recent code constructions for PCGs [BCG+20, BCG+22, RRT23] in fact only admit randomized constructions that fail with probability ; that is, they fail with non-negligible probability. This implies that the resulting constructions technically fail to satisfy standard security definitions. In contrast, all of our code constructions satisfy the targeted combinatorial properties with probability at least .
Concretely, one can plug the (dual of) our first code construction into the framework of [BCG+19] to obtain PCGs for standard correlations like oblivious transfers with quasi-linear computation time for the involved parties. While constructions of such efficiency were known previously, we view our additional guarantee of local-similarity to RLCs as a stronger security guarantee than prior constructions offered (which only promised good minimum distance). Additionally, as emphasized above, ours is the first construction of such efficiency with negligible failure probability (in the randomized construction of the utilized code). We leave further investigation of the PCG implications of our codes for future research.
Finally, we recall that a linear code with large distance and dual distance yields a linear secret sharing scheme with small reconstruction and large privacy, and moreover that an asymptotically good linear code with asymptotically good dual yields an asymptotically good linear secret sharing scheme. The asymptotic linear secret sharing scheme was first considered and realized in [CC06], thereby enabling an “asymptotic version” of the general MPC theorem from [BGW88]. Since 2007, with the advent of the so-called “MPC-in-the-head paradigm” [IKOS09], these asymptotically-good schemes have been further exposed as a central theoretical primitive in numerous constant communication-rate results in multi-party cryptographic scenarios and – perhaps surprisingly – in two-party cryptography as well. Druk and Ishai [DI14] utilize an expander graph to construct a linear time encodable code; such a code combined with a linear-time universal hash function [CDD+15] yields an asymptotically good linear secret sharing scheme equipped with a linear time encoding algorithm. Recently, Cramer, Xing and Yuan [CXY20] construct an asymptotically good secret sharing scheme with quasi-linear time encoding and decoding algorithm.
We remark that the privacy and reconstruction of all above mentioned asymptotically good schemes do not achieve the optimal trade-off, i.e., GV bound. In contrast, the linear code derived from our linearized polynomials yields an asymptotically good linear secret sharing scheme with quasi-linear-time encoding algorithm, and moreover the privacy and reconstruction of the resulting scheme achieves the optimal trade-off.
Challenge of sublinear randomness.
As a final contribution, we highlight the inherent challenge of designing code ensembles consuming random bits outputting codes that achieve the EB bound with high probability – or for that matter, even the GV-bound.888Of course, recent breakthroughs [TS17] provide explicit binary codes of rate nearly with minimum distance ; however such constructions seem inherently unable to reach the GV bound in other regimes, and even in the distance regime the constant in front of the rate is unlikely to be pushed to , as one would hope. More precisely, we observe that any code ensemble that is -locally similar to RLCs requires at least bits of randomness. This is not much more than an observation – namely, that the granularity required by certain distributions is only achievable with this many bits of randomness – but we nonetheless believe that elucidating this shortcoming is insightful. Note that local similarity to RLC is merely a sufficient condition for a code ensemble to share combinatorial properties with RLCs. However, we emphasize that all the previous works (including our own) rely on local-similarity.
We also observe that our lower bound is tight: a simple twist on our codes from linearized polynomials requires only to sample and is -locally similar to RLCs. In fact, this code is a natural generalization of the famous Wozencraft ensemble [Mas63]. That is, recall that the Wozencraft ensmeble is obtained by uniformly sampling and then defining
where is a full-rank -linear map. Defining , the codewords of are thus of the form . Note that is in fact a uniformly random linearized polynomial of -degree at most . The generalization that we consider is thus to allow to have -degree at most , and we observe that indeed this code ensemble will be -locally similar to RLCs. However, a drawback is that this construction only naturally produces codes of rate ; by sampling independent linearized polynomials we can also achieve rates of the form for , but not any possible rate as we can with ’s (which can themselves be similarly considered a different generalization of the Wozencraft ensemble). Further discussion of this construction is provided in Section 3.1.
To conclude this discussion, we provide Figure 1 summarizing our contributions and the prior state-of-the-art.
Source | Code | Randomness | Dual Code |
---|---|---|---|
[GLM+22] | Random Linear Code | EB | |
[MRR+20] | Low-Density Parity-Check Codes | ✗ | |
[GM22] | Puncturing of Low-Bias Code | ✗ | |
[PP23] | Expander-Puncturing of Low-Bias Code | ✗ | |
Section 3 | Codes from Linearized Polynomials | GV | |
Section 3 | Generalized Wozencraft Ensemble | , | ✗ |
Section 4 | Row-Column Polynomial Codes | EB | |
Section 5 | Lower Bound for RLC-similarity |
1.2 Techniques
Given a random code of (design) rate sampled according to either of the above constructions, we wish to demonstrate that it behaves combinatorially much as an RLC of rate . More precisely, we consider any property obtained by forbidding -sized sets of vectors and wish to show that satisfies the property with probability roughly the same as . As discussed above, these properties capture well-studied notions like list-decodability and list-recoverability.
Fortunately, recent works [MRR+20, GM22] have introduced a calculus for making such arguments. Intuitively, a conclusion of these works is that it suffices to argue that, for any of size , the probability that is contained in is roughly the same as the probability this holds for . Of course, this latter probability is , where denotes the dimension of the vector space spanned by .999At least, this holds exactly if one samples a RLC by choosing a uniformly random parity-check matrix, which is the model we consider in this work. For other natural models – e.g., sampling a uniformly random generator matrix – gives an upper on this probability.
In a bit more detail, these works in fact view such sets as matrices in , and observe that the forbidden matrices for properties like list-decoding are closed under row-permutation. One can thus restrict to the various orbit classes of this action, and study these orbit classes one at a time. The requirement is in fact that, for each orbit class, the expected number of matrices from that class lying in is roughly the same as the expected number lying in . By identifying these orbit classes with row distributions, one obtains Definition 1.1.
For our specific constructions, for fixed vectors we consider event indicator random variables outputting if , and observe that, for any , a -tuple of random variables is independent if are linearly independent. Of course, this also holds for random linear codes (in fact, it holds for tuples of all sizes),101010At least, this is true if one defines a random linear code by sampling a uniformly random parity-check matrix, which we here implicitly assume, and this is the sense in which our constructions approximate the “local behaviour” of random linear codes, which we can then bootstrap into full-blown -local similarity via the machinery of [MRR+20, GM22].
To analyze our first construction based on linearized polynomials, we exploit the fact that for any fixed tuple of inputs and outputs with linearly independent over , over a uniformly random choice of linearized polynomial of -degree at most , the vector is distributed uniformly at random over . This follows readily from properties of the Moore matrix (recalling ).
Next, we consider the code’s dual. In order to show that the dual of a code achieves the GV-bound with high probably, we exploit a pleasant characterization of its dual. Namely, the dual is of the form , where is connected to the dual of and is (morally) dual to .111111More precisely, if is a basis for for which , then where is the dual basis. In particular, the dual is essentially another -code! Hence, the previous discussion implies it is -locally similar to an RLC, which means in particular that it achieves the GV bound.
For the second construction, i.e., pseudorandom codes from row and column polynomials, upon summing over all choices of (full-rank) sets of message vectors one can observe that the desired behaviour of the random variables in fact follows from the following: if is of rank , then over the randomness of the generator , is uniformly random. Recalling , we just must show is uniformly random. Exploiting the requirement that is an isomorphism, it suffices to show that the tuple
(1) |
is uniformly random over the choice of . And this follows naturally from properties of the Vandermonde matrix, as the ’s are distinct and is chosen uniformly amongst all polynomials of degree (recalling again ).
The argument establishing -local-similarity for the dual is almost identical to the above argument for the primal. Here, it suffices to consider a matrix of rank and argue that over the randomness of now, is uniformly random. And to do this, one reduces to studying a tuple of random variables analogous to those in Equation 1, although in this case the polynomial will play the starring role. Since is again uniformly sampled from all polynomials of degree at most , the desired conclusion follows.
2 Preliminaries
2.1 Miscellaneous Notation
By default, , i.e., . For a positive integer , . Throughout, denotes a prime power, denotes a finite field with elements, and denotes a degree extension of (which of course has size ). The -ary entropy function is defined for as
and extended by continuity to and . This function is known to be monotonically increasing from to on the interval , and hence we can define its inverse .
Given a discrete distribution and a universe , we write to denote that is distributed over , i.e., that ’s support . In general, we write vectors in boldface – e.g., , , etc. – while scalars are unbolded.
2.2 Algebraic Concepts
Let be a trace function, i.e.,
Lemma 2.1.
Suppose is a basis of over . We can always find a dual basis in such that
(2) |
where for any and is otherwise .
Proof.
We provide the proof for completeness. Write and we consider the equations
Define the matrix over ; the above equations can be written as where is the -th vector in the standard basis of . Since forms a basis of , has full rank and there must exists a nonzero solution for . Thus, we can always find which satisfy (2). It remains to show that are -linearly independent. Assume not and without loss of generality we may assume can be represented as the linear combination of , i.e., with . From (2) we have
a clear contradiction. ∎
We now introduce the concept of orthogonality for two -subspaces of .
Definition 2.2.
Let be a -linear space. is said to be orthogonal to if the following holds
We write to denote that is orthogonal to . If , is said to be the dual space of .
Finally, we collect terminology connected to linearized polynomials.
Definition 2.3 (Linearized Polynomial).
We call a polynomial a linearized polynomial if it is of the form with and . That is, the only monomials appearing in have exponent a power of . Its -degree is .
Recall that the Frobenius automorphism defined by is -linear, i.e., it holds that for all and ,
This readily implies that any linearized polynomial is also an -linear map, justifying the name. We record this fact now.
Proposition 2.4.
Any linearized polynomial defines an -linear map from .
2.3 Coding Theory
A linear code is a subspace of for a prime power . Such a code may always be presented in terms of its generator matrix, which is a matrix for which . When , a code is called binary. The block-length of the code is and its rate is , where . We endow with the (relative) Hamming metric for . For a linear code , its dual code is defined as . 121212Note the contrast with Definition 2.2: that definition is concerned with -linear subspaces of the ambient space , which is endowed with a different inner-product than . The appropriate meaning of can therefore be deduced from the context.
A random linear code of rate – briefly, a RLC – is defined to be the kernel of a uniformly random matrix , i.e., .
This work concerns combinatorial properties of linear codes. The quintessential example of such a property is minimum distance defined as . Equivalently, it is , the minimum weight of a non-zero codeword. By the triangle-inequality for the Hamming metric, it is immediate that is the maximum radius at which one can hope to uniquely-decode from worst-case errors. If one relaxes the requirement for unique-decoding and is satisfied with outputting a list of possible messages, then one arrives list-decoding.
Definition 2.5 (List-Decodability).
Let and . A code is -list-decodable if for all ,
A generalization of list-decoding is proferred by list-recovery. For this notion, we extend the definition of Hamming distance to allow one of the arguments to be a tuple of sets , where each , as follows: .
Definition 2.6 (List-Recovery).
Let , and . A code is -list-recoverable if for all tuples with each satisfying ,
These are both special cases of the much more general class of local properties, which we now introduce. The technical terminology takes some time to motivate and define, but will allow for a very clean argument once we have it in place.
2.4 Local Properties
We now introduce the specialized notations and tools that we need in order to apply the machinery of [MRR+20, GM22]. Generally speaking, this machinery allows us to efficiently reason about the probability that sets of vectors (for any integer ) lie in random ensembles of codes. In fact, it is convenient to (arbitrarily) order these sets and thereby view them as matrices. Thus, for we will talk about events of the form “”, which denotes that event that every column of is contained in .
To index these events, we assign to each matrix a type, which is determined by the empirical row distribution of the matrix.
Definition 2.7 (Empirical Row Distribution).
Let . We define its empirical row distribution