Citation: Shaofang Hong, Rongjun Wu. On deep holes of generalized Reed-Solomon codes[J]. AIMS Mathematics, 2016, 1(2): 96-101. doi: 10.3934/Math.2016.2.96
[1] | Xiaofan Xu, Yongchao Xu, Shaofang Hong . Some results on ordinary words of standard Reed-Solomon codes. AIMS Mathematics, 2019, 4(5): 1336-1347. doi: 10.3934/math.2019.5.1336 |
[2] | Xiaofan Xu, Yongchao Xu . Some results on deep holes of generalized projective Reed-Solomon codes. AIMS Mathematics, 2019, 4(2): 176-192. doi: 10.3934/math.2019.2.176 |
[3] | Irwansyah, Intan Muchtadi-Alamsyah, Fajar Yuliawan, Muhammad Irfan Hidayat . Generalized Reed-Solomon codes over number fields and exact gradient coding. AIMS Mathematics, 2024, 9(4): 9508-9518. doi: 10.3934/math.2024464 |
[4] | Jing Huang, Jingge Liu, Dong Yu . Dimensions of the hull of generalized Reed-Solomon codes. AIMS Mathematics, 2024, 9(6): 13553-13569. doi: 10.3934/math.2024661 |
[5] | Claude Carlet . Identifying codewords in general Reed-Muller codes and determining their weights. AIMS Mathematics, 2024, 9(5): 10609-10637. doi: 10.3934/math.2024518 |
[6] | Valérie Gauthier-Umaña, Henryk Gzyl, Enrique ter Horst . Decoding as a linear ill-posed problem: The entropy minimization approach. AIMS Mathematics, 2025, 10(2): 4139-4152. doi: 10.3934/math.2025192 |
[7] | Yang Pan, Yan Liu . New classes of few-weight ternary codes from simplicial complexes. AIMS Mathematics, 2022, 7(3): 4315-4325. doi: 10.3934/math.2022239 |
[8] | Bodigiri Sai Gopinadh, Venkatrajam Marka . Reversible codes in the Rosenbloom-Tsfasman metric. AIMS Mathematics, 2024, 9(8): 22927-22940. doi: 10.3934/math.20241115 |
[9] | Marouane Karim, Abdelfatah Kouidere, Mostafa Rachik, Kamal Shah, Thabet Abdeljawad . Inverse problem to elaborate and control the spread of COVID-19: A case study from Morocco. AIMS Mathematics, 2023, 8(10): 23500-23518. doi: 10.3934/math.20231194 |
[10] | Xuesong Si, Chuanze Niu . On skew cyclic codes over M2(F2). AIMS Mathematics, 2023, 8(10): 24434-24445. doi: 10.3934/math.20231246 |
Let Fq be the finite field of q elements with characteristic p. Let n and k be positive integers. Let D={x1,...,xn} be a subset of Fq,which is called the evaluation set. The generalized Reed-Solomon code Cq(D,k) of length n and dimension k over Fq is defined as follows:
Cq(D,k)={(f(x1),...,f(xn))∈Fnq|f(x)∈Fq[x],deg(f(x))≤k−1}. |
If D=F∗q,then it is called standard Reed-Solomon code. If D=Fq,then it is called extended Reed-Solomon code. For any [n,k]q linear code C,the minimum distance d(C) is defined by
d(C):=min{d(x,y)|x∈C,y∈C,x≠y}, |
where d(⋅,⋅) denotes the Hamming distance of two words which is the number of different entries of them and w(⋅) denotes the Hamming weight of a word which is the number of its nonzero entries. Thus we have
d(C)=min{d(x,0)|0≠x∈C}=min{w(x)|0≠x∈C}. |
The error distance to code C of a received word u∈Fnq is defined by
d(u,C):=min{d(u,v)|v∈C}. |
Clearly d(u,C)=0 if and only if u∈C. The covering radius ρ(C) of code C is defined to be max{d(u,C)|u∈Fnp}. For the generalized Reed-Solomon code C=Cq(D,k),we have that the minimum distance d(C)=n−k+1 and the covering radius ρ(C)=n−k. The most important algorithmic problem in coding theory is the maximum likelihood decoding (MLD): Given a received word,find a word v∈C such that d(u,v)=d(u,C) [5]. Therefore,it is very crucial to decide d(u,C) for the word u. Sudan [6] and Guruswami-Sudan [2] provided a polynomial time list decoding algorithm for the decoding of u when d(u,C)≤n−√nk. When the error distance increases,the decoding becomes NP-complete for the generalized Reed-Solomon codes [3].
When decoding the generalized Reed-Solomon code C,for a received word u=(u1,...,un)∈Fnq,we define the Lagrange interpolation polynomial u(x) of u by
u(x):=n∑i=1uin∏j=1j≠ix−xjxi−xj∈Fq[x], |
i.e.,u(x) is the unique polynomial of degree at most n−1 such that u(xi)=ui for 1≤i≤n. For u∈Fnq,we define the degree of u(x) to be the degree of u,i.e., deg(u)=deg(u(x)). It is clear that d(u,C)=0 if and only if deg(u)≤k−1. Evidently,we have the following simple bounds.
Lemma 1.1. [4] For k≤ deg(u)≤n-1,we have the inequality n−deg(u)≤d(u,C)≤n−k=ρ.
Let u∈Fnq. If d(u,C)=n−k, then the word u is called a deep hole. If deg(u)=k,then the upper bound is equal to the lower bound,and so d(u,C)=n−k which implies that u is a deep hole. This gives immediately (q−1)qk deep holes. We call these deep holes the trivial deep holes. It is an interesting open problem to determine all deep holes. Cheng and Murray [1] showed that for the standard Reed-Solomon code [p−1,k]p with k<p1/4−ϵ,the received vector (f(α))α∈F∗p cannot be a deep hole if f(x) is a polynomial of degree k+d for 1≤d ≤p3/13−ϵ. Based on this result,they conjectured that there is no other deep holes except the trivial ones mentioned above. Li and Wan [5] used the method of character sums to obtain a bound on the non-existence of deep holes for the extended Reed-Solomon code Cq(Fq,k). Wu and Hong [8] found a counterexample to the Cheng-Murray conjecture [1] about the standard Reed-Solomon codes.
Let l be a positive integer. In this paper,we investigate the deep holes of the generalized Reed-Solomon codes with the evaluation set D:=Fq∖{a1,...,al},where a1,...,al are any fixed l distinct elements of Fq. Our method here is different from that of [8]. Write D={x1,...,xq−l} and for any f(x)∈Fq[x],let
f(D):=(f(x1),...,f(xq−l)). |
Then we can rewrite the generalized Reed-Solomon code Cq(D,k) with evaluation set D as
Cq(D,k)={f(D)∈Fq−lq|f(x)∈Fq[x],deg(f(x))≤k−1}. |
Actually,by constructing some suitable auxiliary polynomials,we find a new class of deep holes for the generalized Reed-Solomon codes. That is,we have the following result.
Theorem 1.2. Let q≥4 and 2≤k≤q−l−1. For 1≤j≤l,we define
uj(x):=λj(x−aj)q−2+rj(x), | (1) |
where λj∈F∗q and rj(x)∈Fq[x] is a polynomial of degree at most k−1. Then the received words u1(D),...,ul(D) are deep holes of the generalized Reed-Solomon code Cq(D,k).
The proof of Theorem 1.2 will be given in Section 2.
The materials presented here form part of the second author's PhD thesis [7],which was finished on April 15,2012.
Evidently,for any a∈Fq,we have
(∏q−li=1(a−xi))∏lj=1(a−aj)=aq−a=0, |
and for any a∈D,we have N(a)=0,where
N(x):=∏q−li=1(x−xi). |
For f(x)∈Fq[x],by ˉf(x)∈Fq[x] we denote the reduction of f(x)modN(x). Therefore,for any xi∈D,we have f(xi)=ˉf(xi).
First of all,we give a lemma about error distance. In what follows,we let Gk denote the set of all the polynomials in Fq[x] of degree at most k−1.
Lemma 2.1. Let #(D)=n and let u,v∈Fnq be two words. If u=λv+f≤k−1(D),where λ∈F∗q and f≤k−1(x)∈Fq[x] is a polynomial of degree at most k−1,then
d(u,Cq(D,k))=d(v,Cq(D,k)). |
Furthermore,u is a deep hole of Cq(D,k) if and only if v is a deep hole of Cq(D,k).
poof. From the definition of error distance and noting that f≤k−1(x)∈Gk,we get immediately that
d(u,Cq(D,k))=ming(x)∈Gk{d(u,g(D))}=ming(x)∈Gkd(λv+f≤k−1(D),g(D))=ming(x)∈Gkd(λv+f≤k−1(D),g(D)+f≤k−1(D))=ming(x)∈Gkd(λv,g(D))=ming(x)∈Gkd(λv,λg(D)) (sinceλ≠0)=ming(x)∈Gkd(v,g(D))=d(v,Cq(D,k)) |
as one desires. So Lemma 2.1 is proved.
Now we are in the position to prove Theorem 1.2.
Proof of Theorem 1.2. Let f(x),g(x)∈Fq[x]. One can deduce that
d(f(D),g(D))=#{xi∈D∣f(xi)≠g(xi)}=#{xi∈D∣f(xi)−g(xi)≠0}=#(D)−#{xi∈D∣f(xi)−g(xi)=0}. | (2) |
Then by (???),we infer that
d(f(D),Cq(D,k))=minh(x)∈Gkd(f(D),h(D))=minh(x)∈Gk{#(D)−#{xi∈D∣f(xi)−h(xi)=0}}=q−l−maxh(x)∈Gk#{xi∈D∣f(xi)−h(xi)=0}. | (3) |
For any integer j with 1≤j≤l,we let
fj(x):=(x−aj)q−2∈Fq[x]. |
For any y∈D,we have y−aj≠0,and so fj(y)=1y−aj. We claim that
maxh(x)∈Gk#{y∈D∣fj(y)−h(y)=0}=k. | (4) |
In order to prove this claim,we pick k distinct nonzero elements cj1,...,cjk of Fq∖{at−aj}lt=1 (since k≤q−l−1). Now we introduce the auxiliary polynomial gj(x) as follows:
gj(x)=1x(1−∏ki=1(1−c−1jix))∈Fq[x]. |
Then deg(gj(x))=k−1,and so gj(x)∈Gk. Since for any y∈D,we have
fj(y)−gj(y−aj)=1y−aj−gj(y−aj)=1y−aj(1−(y−aj)gj(y−aj))=1y−aj∏ki=1(1−c−1ji(y−aj)). |
It then follows that cj1+aj,...,cjk+aj are the all roots of fj(x)−gj(x−aj)=0 over Fq. Noticing that cj1,...,cjk∈Fq∖{a1−aj,...,al−aj},we have cj1+aj,...,cjk+aj∈D. Also D⊆Fq. Therefore cj1+aj,...,cjk+aj are the all roots of fj(x)−gj(x−aj)=0 over D. Hence
#{y∈D∣fj(y)−gj(y−aj)=0}=k. | (5) |
On the other hand,for any h(x)∈Gk,the equation 1−(x−aj)h(x)=0 has at most k roots over Fq,and so it has at most k roots over D. But 1y−aj≠0 for any y∈D. Thus
fj(y)−h(y−aj)=1y−aj−h(y−aj)=1y−aj(1−(y−aj)h(y−aj)). |
Hence for any h(x)∈Gk,we have
#{y∈D∣fj(y)−h(y)=0}≤k |
which implies that
maxh(x)∈Gk#{y∈D∣fj(y)−h(y)=0}≤k. | (6) |
From (5) and (6),we arrive at the desired result (4). The claim (4) is proved.
Now from (3) and (4),we derive immediately that d(fj(D),Cq(D,k))=q−l−k. In other words,fj(D) is a deep hole of the generalized Reed-Solomon Cq(D,k).
Finally,from (1) one can deduce that
uj(D)=λjfj(D)+rj(D). | (7) |
Since degrj(x)≤k−1,it then follows from (7) and Lemma 2.1 that uj(D) is a deep hole of Cq(D,k) as required.
This completes the proof of Theorem 1.2.
The authors would like to thank the anonymous referee for very careful reading of the manuscript and helpful comments. This work was supported partially by National Science Foundation of China Grant # 11371260 and by the Ph.D. Programs Foundation of Ministry of Education of China Grant #20100181110073.
We declare that we have no conflict of interest.
[1] | Q. Cheng and E. Murray, On deciding deep holes of Reed-Solomon codes Proceedings of TAMC 2007, LNCS 4484, Springer, Berlin, 296-305. |
[2] | V. Guruswami and M. Sudan, Improved decoding of Reed-Solomon and algebraic-geometry codes IEEE Trans. Inform. Theory, (1999), 1757-1767. |
[3] | V. Guruswami and A. Vardy, Maximum-likelihood decoding of Reed-Solomon codes is NP-hard IEEE Trans. Inform. Theory, (2005), 2249-2256. |
[4] | J. Li and D. Wan, On the subset sum problem over finite fields Finite Fields Appls., (2008), 911-929. |
[5] | Y. Li and D. Wan, On error distance of Reed-Solomon codes Science in China Series A: Mathematics, {\bf 51} (2008), 1982-1988. |
[6] | M. Sudan, Decoding of Reed-Solomon codes beyond the error-correction bound J. Complexity, (1997), 180-193. |
[7] | R. Wu, On deep holes of Reed-Solomon codes and nonlinearity of rotation symmetric Boolean functions PhD. Thesis, Sichuan University, April, 2012. |
[8] | R. Wu and S. Hong, On deep holes of standard Reed-Solomon codes Sci. Math. China, (2012), 2447-2455. |
1. | Xiaofan Xu, Yongchao Xu, Shaofang Hong, Some results on ordinary words of standard Reed-Solomon codes, 2019, 4, 2473-6988, 1336, 10.3934/math.2019.5.1336 | |
2. | Daniele Bartoli, Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco, On planes through points off the twisted cubic in PG(3,q) and multiple covering codes, 2020, 67, 10715797, 101710, 10.1016/j.ffa.2020.101710 | |
3. | Xiaofan Xu, Yongchao Xu, Some results on deep holes of generalized projective Reed-Solomon codes, 2019, 4, 2473-6988, 176, 10.3934/math.2019.2.176 | |
4. | Victoria Herranz, Diego Napp, Carmen Perea, Weight-2 input sequences of 1/n convolutional codes from linear systems point of view, 2023, 8, 2473-6988, 713, 10.3934/math.2023034 | |
5. | Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco, On the weight distribution of the cosets of MDS codes, 2021, 0, 1930-5346, 0, 10.3934/amc.2021042 | |
6. | Xiaofan XU, On Deep Holes of Projective Reed-Solomon Codes over Finite Fields with Even Characteristic, 2023, 28, 1007-1202, 15, 10.1051/wujns/2023281015 |