ABSTRACT
A q-query Locally Decodable Code (LDC) encodes an n-bitmessage x as an n-bit codeword C(x), such that one canprobabilistically recover any bit xi of the message by queryingonly q bits of the codeword C(x), even after some constantfraction of codeword bits has been corrupted.We give new constructions of three query LDCs of vastly shorterlength than that of previous constructions. Specifically, givenany Mersenne prime p = 2t - 1, we design three query LDCs of length N=(n1/t), for every n. Based on thelargest known Mersenne prime, this translates to a length of less than exp(n10-7), compared to exp(n1/2) in the previous constructions. It hasoften been conjectured that there are infinitely many Mersenneprimes. Under this conjecture, our constructions yield three querylocally decodable codes of length N=exp(nO(1/(log log n))) forinfinitely many n.
We also obtain analogous improvements for Private InformationRetrieval (PIR) schemes. We give 3-server PIR schemes withcommunication complexity of O(n10-7) to accessan n-bit database, compared to the previous best scheme withcomplexity O(n1/5.25). Assuming again that there areinfinitely many Mersenne primes, we get 3-server PIR schemes ofcommunication complexity nO(1/(log log n))for infinitely many n.
Previous families of LDCs and PIR schemes were based on theproperties of low-degree multivariate polynomials over finitefields. Our constructions are completely different and areobtained by constructing a large number of vectors in a smalldimensional vector space whose inner products are restricted tolie in an algebraically nice set.
- A. Ambainis, "Upper bound on the communication complexity of private information retrieval," Proc. of 32th ICALP, LNCS 1256, pp. 401--407, 1997. Google ScholarDigital Library
- R. Beigel, L. Fortnow, and W. Gasarch, "A tight lower bound for restricted PIR protocols," Computational Complexity, vol.15 pp. 82--91, 2006. Google ScholarDigital Library
- L. Babai, L. Fortnow, L. Levin, and M. Szegedy, "Checking computations in polylogarithmic time," . In Proc. of the 23th ACM Sym. on Theory of Computing (STOC), pp. 21--31, 1991. Google ScholarDigital Library
- L. Babai, P. Frankl, "Linear Algebra Methods in Combinatorics." 1998.Google Scholar
- A. Beimel, Y. Ishai and E. Kushilevitz,"General constructions for information-theoretic private information retrieval," Journal of Computer and System Sciences, vol. 71, pp. 213--247, 2005. Preliminary versions in STOC 1999 and ICALP 2001. Google ScholarDigital Library
- A. Beimel, Y. Ishai, E. Kushilevitz, and J. F. Raymond. "Breaking the O(n1/(2k-1)) barrier for information-theoretic private information retrieval," In Proc. of the 43rd IEEE Symposium on Foundations of Computer Science (FOCS), pp. 261--270, 2002. Google ScholarDigital Library
- B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. "Private information retrieval," In Proc. of the 36rd IEEE Symposium on Foundations of Computer Science (FOCS), pp. 41--50, 1995. Also, in Journal of the ACM, 45, 1998. Google ScholarDigital Library
- A. Deshpande, R. Jain, T. Kavitha, S. Lokam and J. Radhakrishnan, "Better lower bounds for locally decodable codes," In Proc. of the 20th IEEE Computational Complexity Conference (CCC), pp. 184--193, 2002. Google ScholarDigital Library
- Curtis Cooper, Steven Boone, http://www.mersenne.org/32582657.htmGoogle Scholar
- W. Gasarch, "A survey on private information retrieval," The Bulletin of the EATCS, 82:72--107, 2004.Google Scholar
- O. Goldreich, "Short Locally Testable Codes and Proofs," Technical Report TR05-014, Electronic Colloquim on Computational Complexity (ECCC), 2005.Google Scholar
- O. Goldreich, H. Karloff, L. Schulman, L. Trevisan "Lower bounds for locally decodable codes and private information retrieval," In Proc. of the 17th IEEE Computational Complexity Conference (CCC), pp. 175--183, 2002. Google ScholarDigital Library
- T. Itoh, "Efficient private information retrieval," IEICE Trans. Fund. of Electronics, Commun and Comp. Sci., E82-A(1):11--20, 1999.Google Scholar
- T. Itoh, "On lower bounds for the communication complexity of private information retrieval," IEICE Trans. Fund. of Electronics, Commun. and Comp. Sci., E84-A(1):157--164, 2001.Google Scholar
- J. Katz and L. Trevisan, "On the efficiency of local decoding procedures for error-correcting codes," In Proc. of the 32th ACM Sym. on Theory of Computing (STOC), pp. 80--86, 2000. Google ScholarDigital Library
- I. Kerenidis, R. de Wolf, "Exponential Lower Bound for 2-query locally decodable codes via a quantum argument," Journal of Computer and System Sciences, 69(3), pp. 395--420. Earlier version in STOC'03. quant-ph/0208062. Google ScholarDigital Library
- R. Lidl and H. Niederreiter, Finite Fields. Cambridge: Cambridge University Press, 1983.Google Scholar
- E. Mann, Private access to distributed information. Master's thesis, Technion - Israel Institute of Technology, Haifa, 1998.Google Scholar
- L. Murata, C. Pomerance, "On the largest prime factor of a Mersenne number," Number theory, CRM Proc. Lecture Notes of American Mathematical Society vol. 36, pp. 209--218, 2004.Google ScholarCross Ref
- K. Obata, "Optimal lower bounds for 2-query locally decodable linear codes," In Proc. of the 6th RANDOM, vol. 2483 of Lecture Notes in Computer Science, pp. 39--50, 2002. Google ScholarDigital Library
- A. Polishchuk and D. Spielman," Nearly-linear size holographic proofs," In Proc. of the 26th ACM Sym. on Theory of Computing (STOC), pp. 194--203, 1994. Google ScholarDigital Library
- C. Pomerance, "Recent developments in primality testing," Math. Intelligencer, 3:3, pp. 97--105, (1980/81).Google ScholarCross Ref
- A. Razborov and S. Yekhanin "An Ω(n1/3) Lower Bound for Bilinear Group Based Private Information Retrieval," In Proc. of the 47rd IEEE Symposium on Foundations of Computer Science (FOCS), pp. 739--748, 2006. Google ScholarDigital Library
- M. Sudan, Efficient Checking of Polynomials and Proofs and the Hardness of Approximation Problems. PhD thesis, University of California at Berkeley, 1992. Google ScholarDigital Library
- L. Trevisan, "Some Applications of Coding Theory in Computational Complexity," Quaderni di Matematica, 13:347--424, 2004.Google Scholar
- S. Wehner and R. de Wolf, "Improved Lower Bounds for Locally Decodable Codes and Private Information Retrieval," In Proc. of 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), LNCS 3580, pp.1424--1436. Google ScholarDigital Library
- Lenstra-Pomerance-Wagstaff conjecture. (2006, May 22). In Wikipedia, The Free Encyclopedia. Retrieved 00:18, October 3, 2006, from http://en.wikipedia.org/w/index.php?title=Lenstra-Pomerance-Wagstaff_conjecture&oldid=54506577Google Scholar
- S. Wagstaff, "Divisors of Mersenne numbers," Math. Comp., 40:161, pp. 385--397, 1983.Google ScholarCross Ref
- Mersenne prime. (2006, October 1). In Wikipedia, The Free Encyclopedia. Retrieved 21:04, October 2, 2006, from http://en.wikipedia.org/w/index.php?title=Mersenne_prime&oldid=78877957Google Scholar
- D. Woodruff, "New lower bounds for general locally decodable codes," Electronic Colloquium on Computational Complexity, TR07-006, 2007.Google Scholar
- D. Woodruff and S. Yekhanin, "A Geometric Approach to Information Theoretic Private Information Retrieval," In Proc. of the 20th IEEE Computational Complexity Conference (CCC), pp. 275--284, 2005. Google ScholarDigital Library
Index Terms
- Towards 3-query locally decodable codes of subexponential length
Recommendations
Towards 3-query locally decodable codes of subexponential length
A q-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit xi of the message by querying only q bits of the codeword C(x), even after some constant fraction of ...
Query-Efficient Locally Decodable Codes of Subexponential Length
A k-query locally decodable code (LDC) C : n N encodes each message x into a codeword C (x) such that each symbol of x can be probabilistically recovered by querying only k coordinates of C (x), even after a constant fraction of the coordinates has been ...
3-query locally decodable codes of subexponential length
STOC '09: Proceedings of the forty-first annual ACM symposium on Theory of computingLocally Decodable Codes (LDC) allow one to decode any particular symbol of the input message by making a constant number of queries to a codeword, even if a constant fraction of the codeword is damaged. In a recent work [Yek08] Yekhanin constructs a 3-...
Comments