Loading [MathJax]/jax/output/SVG/jax.js
Research article

On deep holes of generalized Reed-Solomon codes

  • Received: 16 May 2016 Accepted: 20 June 2016 Published: 28 June 2016
  • Determining deep holes is an important topic in decoding Reed-Solomon codes. In a previous paper [8], we showed that the received word u is a deep hole of the standard Reed-Solomon codes [q-1, k]q if its Lagrange interpolation polynomial is the sum of monomial of degree q-2 and a polynomial of degree at most k-1. In this paper, we extend this result by giving a new class of deep holes of the generalized Reed-Solomon codes.

    Citation: Shaofang Hong, Rongjun Wu. On deep holes of generalized Reed-Solomon codes[J]. AIMS Mathematics, 2016, 1(2): 96-101. doi: 10.3934/Math.2016.2.96

    Related Papers:

    [1] Xiaofan Xu, Yongchao Xu, Shaofang Hong . Some results on ordinary words of standard Reed-Solomon codes. AIMS Mathematics, 2019, 4(5): 1336-1347. doi: 10.3934/math.2019.5.1336
    [2] Xiaofan Xu, Yongchao Xu . Some results on deep holes of generalized projective Reed-Solomon codes. AIMS Mathematics, 2019, 4(2): 176-192. doi: 10.3934/math.2019.2.176
    [3] Irwansyah, Intan Muchtadi-Alamsyah, Fajar Yuliawan, Muhammad Irfan Hidayat . Generalized Reed-Solomon codes over number fields and exact gradient coding. AIMS Mathematics, 2024, 9(4): 9508-9518. doi: 10.3934/math.2024464
    [4] Jing Huang, Jingge Liu, Dong Yu . Dimensions of the hull of generalized Reed-Solomon codes. AIMS Mathematics, 2024, 9(6): 13553-13569. doi: 10.3934/math.2024661
    [5] Claude Carlet . Identifying codewords in general Reed-Muller codes and determining their weights. AIMS Mathematics, 2024, 9(5): 10609-10637. doi: 10.3934/math.2024518
    [6] Valérie Gauthier-Umaña, Henryk Gzyl, Enrique ter Horst . Decoding as a linear ill-posed problem: The entropy minimization approach. AIMS Mathematics, 2025, 10(2): 4139-4152. doi: 10.3934/math.2025192
    [7] Yang Pan, Yan Liu . New classes of few-weight ternary codes from simplicial complexes. AIMS Mathematics, 2022, 7(3): 4315-4325. doi: 10.3934/math.2022239
    [8] Bodigiri Sai Gopinadh, Venkatrajam Marka . Reversible codes in the Rosenbloom-Tsfasman metric. AIMS Mathematics, 2024, 9(8): 22927-22940. doi: 10.3934/math.20241115
    [9] Marouane Karim, Abdelfatah Kouidere, Mostafa Rachik, Kamal Shah, Thabet Abdeljawad . Inverse problem to elaborate and control the spread of COVID-19: A case study from Morocco. AIMS Mathematics, 2023, 8(10): 23500-23518. doi: 10.3934/math.20231194
    [10] Xuesong Si, Chuanze Niu . On skew cyclic codes over M2(F2). AIMS Mathematics, 2023, 8(10): 24434-24445. doi: 10.3934/math.20231246
  • Determining deep holes is an important topic in decoding Reed-Solomon codes. In a previous paper [8], we showed that the received word u is a deep hole of the standard Reed-Solomon codes [q-1, k]q if its Lagrange interpolation polynomial is the sum of monomial of degree q-2 and a polynomial of degree at most k-1. In this paper, we extend this result by giving a new class of deep holes of the generalized Reed-Solomon codes.


    1. Introduction and the statement of the main result

    Let Fq be the finite field of q elements with characteristic p. Let n and k be positive integers. Let D={x1,...,xn} be a subset of Fq,which is called the evaluation set. The generalized Reed-Solomon code Cq(D,k) of length n and dimension k over Fq is defined as follows:

    Cq(D,k)={(f(x1),...,f(xn))Fnq|f(x)Fq[x],deg(f(x))k1}.

    If D=Fq,then it is called standard Reed-Solomon code. If D=Fq,then it is called extended Reed-Solomon code. For any [n,k]q linear code C,the minimum distance d(C) is defined by

    d(C):=min{d(x,y)|xC,yC,xy},

    where d(,) denotes the Hamming distance of two words which is the number of different entries of them and w() denotes the Hamming weight of a word which is the number of its nonzero entries. Thus we have

    d(C)=min{d(x,0)|0xC}=min{w(x)|0xC}.

    The error distance to code C of a received word uFnq is defined by

    d(u,C):=min{d(u,v)|vC}.

    Clearly d(u,C)=0 if and only if uC. The covering radius ρ(C) of code C is defined to be max{d(u,C)|uFnp}. For the generalized Reed-Solomon code C=Cq(D,k),we have that the minimum distance d(C)=nk+1 and the covering radius ρ(C)=nk. The most important algorithmic problem in coding theory is the maximum likelihood decoding (MLD): Given a received word,find a word vC such that d(u,v)=d(u,C) [5]. Therefore,it is very crucial to decide d(u,C) for the word u. Sudan [6] and Guruswami-Sudan [2] provided a polynomial time list decoding algorithm for the decoding of u when d(u,C)nnk. When the error distance increases,the decoding becomes NP-complete for the generalized Reed-Solomon codes [3].

    When decoding the generalized Reed-Solomon code C,for a received word u=(u1,...,un)Fnq,we define the Lagrange interpolation polynomial u(x) of u by

    u(x):=ni=1uinj=1jixxjxixjFq[x],

    i.e.,u(x) is the unique polynomial of degree at most n1 such that u(xi)=ui for 1in. For uFnq,we define the degree of u(x) to be the degree of u,i.e., deg(u)=deg(u(x)). It is clear that d(u,C)=0 if and only if deg(u)k1. Evidently,we have the following simple bounds.

    Lemma 1.1. [4] For k deg(u)n-1,we have the inequality ndeg(u)d(u,C)nk=ρ.

    Let uFnq. If d(u,C)=nk, then the word u is called a deep hole. If deg(u)=k,then the upper bound is equal to the lower bound,and so d(u,C)=nk which implies that u is a deep hole. This gives immediately (q1)qk deep holes. We call these deep holes the trivial deep holes. It is an interesting open problem to determine all deep holes. Cheng and Murray [1] showed that for the standard Reed-Solomon code [p1,k]p with kp1/4ϵ,the received vector (f(α))αFp cannot be a deep hole if f(x) is a polynomial of degree k+d for 1d p3/13ϵ. Based on this result,they conjectured that there is no other deep holes except the trivial ones mentioned above. Li and Wan [5] used the method of character sums to obtain a bound on the non-existence of deep holes for the extended Reed-Solomon code Cq(Fq,k). Wu and Hong [8] found a counterexample to the Cheng-Murray conjecture [1] about the standard Reed-Solomon codes.

    Let l be a positive integer. In this paper,we investigate the deep holes of the generalized Reed-Solomon codes with the evaluation set D:=Fq{a1,...,al},where a1,...,al are any fixed l distinct elements of Fq. Our method here is different from that of [8]. Write D={x1,...,xql} and for any f(x)Fq[x],let

    f(D):=(f(x1),...,f(xql)).

    Then we can rewrite the generalized Reed-Solomon code Cq(D,k) with evaluation set D as

    Cq(D,k)={f(D)Fqlq|f(x)Fq[x],deg(f(x))k1}.

    Actually,by constructing some suitable auxiliary polynomials,we find a new class of deep holes for the generalized Reed-Solomon codes. That is,we have the following result.

    Theorem 1.2. Let q4 and 2kql1. For 1jl,we define

    uj(x):=λj(xaj)q2+rj(x), (1)

    where λjFq and rj(x)Fq[x] is a polynomial of degree at most k1. Then the received words u1(D),...,ul(D) are deep holes of the generalized Reed-Solomon code Cq(D,k).

    The proof of Theorem 1.2 will be given in Section 2.

    The materials presented here form part of the second author's PhD thesis [7],which was finished on April 15,2012.


    2. Proof of Theorem 1.2

    Evidently,for any aFq,we have

    (qli=1(axi))lj=1(aaj)=aqa=0,

    and for any aD,we have N(a)=0,where

    N(x):=qli=1(xxi).

    For f(x)Fq[x],by ˉf(x)Fq[x] we denote the reduction of f(x)modN(x). Therefore,for any xiD,we have f(xi)=ˉf(xi).

    First of all,we give a lemma about error distance. In what follows,we let Gk denote the set of all the polynomials in Fq[x] of degree at most k1.

    Lemma 2.1. Let #(D)=n and let u,vFnq be two words. If u=λv+fk1(D),where λFq and fk1(x)Fq[x] is a polynomial of degree at most k1,then

    d(u,Cq(D,k))=d(v,Cq(D,k)).

    Furthermore,u is a deep hole of Cq(D,k) if and only if v is a deep hole of Cq(D,k).

    poof. From the definition of error distance and noting that fk1(x)Gk,we get immediately that

    d(u,Cq(D,k))=ming(x)Gk{d(u,g(D))}=ming(x)Gkd(λv+fk1(D),g(D))=ming(x)Gkd(λv+fk1(D),g(D)+fk1(D))=ming(x)Gkd(λv,g(D))=ming(x)Gkd(λv,λg(D))  (sinceλ0)=ming(x)Gkd(v,g(D))=d(v,Cq(D,k))

    as one desires. So Lemma 2.1 is proved.

    Now we are in the position to prove Theorem 1.2.

    Proof of Theorem 1.2. Let f(x),g(x)Fq[x]. One can deduce that

    d(f(D),g(D))=#{xiDf(xi)g(xi)}=#{xiDf(xi)g(xi)0}=#(D)#{xiDf(xi)g(xi)=0}. (2)

    Then by (???),we infer that

    d(f(D),Cq(D,k))=minh(x)Gkd(f(D),h(D))=minh(x)Gk{#(D)#{xiDf(xi)h(xi)=0}}=qlmaxh(x)Gk#{xiDf(xi)h(xi)=0}. (3)

    For any integer j with 1jl,we let

    fj(x):=(xaj)q2Fq[x].

    For any yD,we have yaj0,and so fj(y)=1yaj. We claim that

    maxh(x)Gk#{yDfj(y)h(y)=0}=k. (4)

    In order to prove this claim,we pick k distinct nonzero elements cj1,...,cjk of Fq{ataj}lt=1 (since kql1). Now we introduce the auxiliary polynomial gj(x) as follows:

    gj(x)=1x(1ki=1(1c1jix))Fq[x].

    Then deg(gj(x))=k1,and so gj(x)Gk. Since for any yD,we have

    fj(y)gj(yaj)=1yajgj(yaj)=1yaj(1(yaj)gj(yaj))=1yajki=1(1c1ji(yaj)).

    It then follows that cj1+aj,...,cjk+aj are the all roots of fj(x)gj(xaj)=0 over Fq. Noticing that cj1,...,cjkFq{a1aj,...,alaj},we have cj1+aj,...,cjk+ajD. Also DFq. Therefore cj1+aj,...,cjk+aj are the all roots of fj(x)gj(xaj)=0 over D. Hence

    #{yDfj(y)gj(yaj)=0}=k. (5)

    On the other hand,for any h(x)Gk,the equation 1(xaj)h(x)=0 has at most k roots over Fq,and so it has at most k roots over D. But 1yaj0 for any yD. Thus

    fj(y)h(yaj)=1yajh(yaj)=1yaj(1(yaj)h(yaj)).

    Hence for any h(x)Gk,we have

    #{yDfj(y)h(y)=0}k

    which implies that

    maxh(x)Gk#{yDfj(y)h(y)=0}k. (6)

    From (5) and (6),we arrive at the desired result (4). The claim (4) is proved.

    Now from (3) and (4),we derive immediately that d(fj(D),Cq(D,k))=qlk. In other words,fj(D) is a deep hole of the generalized Reed-Solomon Cq(D,k).

    Finally,from (1) one can deduce that

    uj(D)=λjfj(D)+rj(D). (7)

    Since degrj(x)k1,it then follows from (7) and Lemma 2.1 that uj(D) is a deep hole of Cq(D,k) as required.

    This completes the proof of Theorem 1.2.


    Acknowledgments

    The authors would like to thank the anonymous referee for very careful reading of the manuscript and helpful comments. This work was supported partially by National Science Foundation of China Grant # 11371260 and by the Ph.D. Programs Foundation of Ministry of Education of China Grant #20100181110073.


    Conflict of Interest

    We declare that we have no conflict of interest.


    [1] Q. Cheng and E. Murray, On deciding deep holes of Reed-Solomon codes Proceedings of TAMC 2007, LNCS 4484, Springer, Berlin, 296-305.
    [2] V. Guruswami and M. Sudan, Improved decoding of Reed-Solomon and algebraic-geometry codes IEEE Trans. Inform. Theory, (1999), 1757-1767.
    [3] V. Guruswami and A. Vardy, Maximum-likelihood decoding of Reed-Solomon codes is NP-hard IEEE Trans. Inform. Theory, (2005), 2249-2256.
    [4] J. Li and D. Wan, On the subset sum problem over finite fields Finite Fields Appls., (2008), 911-929.
    [5] Y. Li and D. Wan, On error distance of Reed-Solomon codes Science in China Series A: Mathematics, {\bf 51} (2008), 1982-1988.
    [6] M. Sudan, Decoding of Reed-Solomon codes beyond the error-correction bound J. Complexity, (1997), 180-193.
    [7] R. Wu, On deep holes of Reed-Solomon codes and nonlinearity of rotation symmetric Boolean functions PhD. Thesis, Sichuan University, April, 2012.
    [8] R. Wu and S. Hong, On deep holes of standard Reed-Solomon codes Sci. Math. China, (2012), 2447-2455.
  • This article has been cited by:

    1. Xiaofan Xu, Yongchao Xu, Shaofang Hong, Some results on ordinary words of standard Reed-Solomon codes, 2019, 4, 2473-6988, 1336, 10.3934/math.2019.5.1336
    2. Daniele Bartoli, Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco, On planes through points off the twisted cubic in PG(3,q) and multiple covering codes, 2020, 67, 10715797, 101710, 10.1016/j.ffa.2020.101710
    3. Xiaofan Xu, Yongchao Xu, Some results on deep holes of generalized projective Reed-Solomon codes, 2019, 4, 2473-6988, 176, 10.3934/math.2019.2.176
    4. Victoria Herranz, Diego Napp, Carmen Perea, Weight-2 input sequences of 1/n convolutional codes from linear systems point of view, 2023, 8, 2473-6988, 713, 10.3934/math.2023034
    5. Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco, On the weight distribution of the cosets of MDS codes, 2021, 0, 1930-5346, 0, 10.3934/amc.2021042
    6. Xiaofan XU, On Deep Holes of Projective Reed-Solomon Codes over Finite Fields with Even Characteristic, 2023, 28, 1007-1202, 15, 10.1051/wujns/2023281015
  • Reader Comments
  • © 2016 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(5724) PDF downloads(1602) Cited by(6)

Article outline

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog