Processing math: 100%
Research article

Some results on deep holes of generalized projective Reed-Solomon codes

  • Received: 24 December 2018 Accepted: 11 February 2019 Published: 19 February 2019
  • MSC : 11C20, 11T71, 94B35, 94B65

  • Let l1 be an integer and a1,,al be arbitrarily given l distinct elements of the finite field Fq of q elements with the odd prime number p as its characteristic. Let D=Fq{a1,,al} and k be an integer such that 2kql1. For any f(x)Fq[x], we let f(D)=(f(y1),,f(yql)) if D={y1,...,yql} and ck1(f(x)) be the coefficient of xk1 of f(x). In this paper, by using Dür's theorem on the relation between the covering radius and minimum distance of the generalized projective Reed-Solomon code GPRSq(D,k), we show that if u(x)Fq[x] with degu(x)=k, then the received word (u(D),ck1(u(x))) is a deep hole of GPRSq(D,k) if and only if yIy0 for any subset ID with #(I)=k. We show also that if j is an integer with 1jl and uj(x):=λj(xaj)q2+νjxk1+f(j)k2(x) with λjFq, νjFq and f(j)k2(x)Fq[x] being a polynomial of degree at most k2, then (uj(D),ck1(uj(x))) is a deep hole of GPRSq(D,k) if and only if (q2k1)(aj)q1kyI(ajy)+e0 for any subset ID with #(I)=k, where e is the identity of Fq. Furthermore, (u(Fq),ck1(u(x))) is not a deep hole of the primitive projective Reed-Solomon code PPRSq(Fq,k) if degu(x)=k, and (u(Fq),δ) is a deep hole of PPRSq(Fq,k) if u(x)=λxq2+δxk1+fk2(x) with λFq and δFq.

    Citation: Xiaofan Xu, Yongchao Xu. Some results on deep holes of generalized projective Reed-Solomon codes[J]. AIMS Mathematics, 2019, 4(2): 176-192. doi: 10.3934/math.2019.2.176

    Related Papers:

    [1] Shaofang Hong, Rongjun Wu . On deep holes of generalized Reed-Solomon codes. AIMS Mathematics, 2016, 1(2): 96-101. doi: 10.3934/Math.2016.2.96
    [2] Xiaofan Xu, Yongchao Xu, Shaofang Hong . Some results on ordinary words of standard Reed-Solomon codes. AIMS Mathematics, 2019, 4(5): 1336-1347. doi: 10.3934/math.2019.5.1336
    [3] Irwansyah, Intan Muchtadi-Alamsyah, Fajar Yuliawan, Muhammad Irfan Hidayat . Generalized Reed-Solomon codes over number fields and exact gradient coding. AIMS Mathematics, 2024, 9(4): 9508-9518. doi: 10.3934/math.2024464
    [4] Jing Huang, Jingge Liu, Dong Yu . Dimensions of the hull of generalized Reed-Solomon codes. AIMS Mathematics, 2024, 9(6): 13553-13569. doi: 10.3934/math.2024661
    [5] Claude Carlet . Identifying codewords in general Reed-Muller codes and determining their weights. AIMS Mathematics, 2024, 9(5): 10609-10637. doi: 10.3934/math.2024518
    [6] Valérie Gauthier-Umaña, Henryk Gzyl, Enrique ter Horst . Decoding as a linear ill-posed problem: The entropy minimization approach. AIMS Mathematics, 2025, 10(2): 4139-4152. doi: 10.3934/math.2025192
    [7] Wei Qi . The polycyclic codes over the finite field $ \mathbb{F}_q $. AIMS Mathematics, 2024, 9(11): 29707-29717. doi: 10.3934/math.20241439
    [8] Yang Pan, Yan Liu . New classes of few-weight ternary codes from simplicial complexes. AIMS Mathematics, 2022, 7(3): 4315-4325. doi: 10.3934/math.2022239
    [9] Bodigiri Sai Gopinadh, Venkatrajam Marka . Reversible codes in the Rosenbloom-Tsfasman metric. AIMS Mathematics, 2024, 9(8): 22927-22940. doi: 10.3934/math.20241115
    [10] Lijun Ma, Shuxia Liu, Zihong Tian . The binary codes generated from quadrics in projective spaces. AIMS Mathematics, 2024, 9(10): 29333-29345. doi: 10.3934/math.20241421
  • Let l1 be an integer and a1,,al be arbitrarily given l distinct elements of the finite field Fq of q elements with the odd prime number p as its characteristic. Let D=Fq{a1,,al} and k be an integer such that 2kql1. For any f(x)Fq[x], we let f(D)=(f(y1),,f(yql)) if D={y1,...,yql} and ck1(f(x)) be the coefficient of xk1 of f(x). In this paper, by using Dür's theorem on the relation between the covering radius and minimum distance of the generalized projective Reed-Solomon code GPRSq(D,k), we show that if u(x)Fq[x] with degu(x)=k, then the received word (u(D),ck1(u(x))) is a deep hole of GPRSq(D,k) if and only if yIy0 for any subset ID with #(I)=k. We show also that if j is an integer with 1jl and uj(x):=λj(xaj)q2+νjxk1+f(j)k2(x) with λjFq, νjFq and f(j)k2(x)Fq[x] being a polynomial of degree at most k2, then (uj(D),ck1(uj(x))) is a deep hole of GPRSq(D,k) if and only if (q2k1)(aj)q1kyI(ajy)+e0 for any subset ID with #(I)=k, where e is the identity of Fq. Furthermore, (u(Fq),ck1(u(x))) is not a deep hole of the primitive projective Reed-Solomon code PPRSq(Fq,k) if degu(x)=k, and (u(Fq),δ) is a deep hole of PPRSq(Fq,k) if u(x)=λxq2+δxk1+fk2(x) with λFq and δFq.


    Let Fq be the finite field of q elements with p as its characteristic. Let n and k be positive integers such that k<n. Let D={x1,,xn} be a subset of Fq, which is called the evaluation set. The generalized Reed-Solomon code GRSq(D,k) of length n and dimension k over Fq is defined by:

    GRSq(D,k):={(f(x1),,f(xn))Fnqf(x)Fq[x],degf(x)k1}.

    Moreover, the generalized projective Reed-Solomon code GPRSq(D,k) of length n+1 and dimension k over Fq is defined as follows:

    GPRSq(D,k):={(f(x1),,f(xn),ck1(f(x)))Fn+1qf(x)Fq[x],degf(x)k1},

    where ck1(f(x)) is the coefficient of xk1 of f(x). If D=Fq, then it is called primitive projective Reed-Solomon code, namely,

    PPRSq(Fq,k):={(f(1),,f(αq2),ck1(f(x)))Fqqf(x)Fq[x],degf(x)k1},

    where α is a primitive element of Fq. If D=Fq, then it is called the extended projective Reed Solomon code. For u=(u1,,un)Fnq, v=(v1,,vn)Fnq, the Hamming distance d(u,v) is defined by

    d(u,v):=#{1inuivi,uiFq,viFq}.

    For any [n,k]q linear code C, the minimum distance d(C) is defined by

    d(C):=min{d(x,y)xC,yC,xy},

    where d(,) denotes the Hamming distance of two codewords. A linear [n,k,d] code is called maximum distance separable (MDS) code if d=nk+1. The error distance to code C of a received word uFnq is defined by

    d(u,C):=minvC{d(u,v)}.

    Clearly, d(u,C)=0 if and only if uC. The maximum error distance

    ρ(C)=max{d(u,C)uFnq}

    is called the covering radius of C.

    The most important algorithmic problem in coding theory is the maximum likelihood decoding (MLD): Given a received word uFnq, find a codeword vC such that d(u,v)=d(u,C), then we decode u to v [1]. Therefore, it is very crucial to decide d(u,C) for the received word u. Guruswami and Sudan [2] provided a polynomial time list decoding algorithm for the decoding of u when d(u,C)nnk. When the error distance increases, Guruswami and Vardy [3] showed that maximum-likelihood decoding is NP-hard for the family of Reed-Solomon codes. We also notice that Dür [4] studied the Cauchy codes. In particular, Dür [4] got the relation between the covering radius and minimum distance of GPRSq(D,k). When decoding the generalized projective Reed-Solomon code GPRSq(D,k), for a received word u=(u1,,un,un+1)Fn+1q, we define the Lagrange interpolation polynomial u(x) of the first n components of u by

    u(x):=ni=1uinj=1jixxjxixjFq[x],

    i.e., u(x) is the unique polynomial of degree degu(x)n1 such that u(xi)=ui for 1in. It is clear that uGPRSq(D,k) if and only if d(u,GPRSq(D,k))=0 if and only if degu(x)k1 and ck1(u(x))=un+1. Equivalently, uGPRSq(D,k) if and only if d(u,GPRSq(D,k))1 if and only if kdegu(x)n1 or ck1(u(x))un+1. Evidently, we have the following simple bounds of d(u,GRSq(D,k)) which are due to Li and Wan.

    Theorem 1.1. [5] Let u be a received word such that uGRSq(D,k). Then

    ndegu(x)d(u,GRSq(D,k))nk=ρ(GRSq(D,k)).

    Let uFnq. If d(u,GRSq(D,k))=ρ(GRSq(D,k)), then the received word u is called a deep hole of GRSq(D,k). From Theorem 1.1, one can easily see that the received word u is a deep hole of GRSq(D,k) if its Lagrange interpolation polynomial is of degree k. In 2012, Wu and Hong [6] found another class of deep holes for the standard Reed-Solomon code GRSq(Fq,k). In fact, if q4 and 2kq2, then they showed that the received word u is a deep hole if its Lagrange interpolation polynomial is of the form axq2+fk1(x) with aFq and fk1(x)Fq[x] is a polynomial of degree at most k1. In [7], Hong and Wu proved that the received word u is a deep hole of the generalized Reed-Solomon code GRSq(D,k) if its Lagrange interpolation polynomial is λ(xai)q2+fk1(x), where λFq,aiFqD and fk1(x)Fq[x] being a polynomial of degree at most k1. In [8], Zhuang, Lin and Lv investigated the deep hole trees of generalized Reed-Solomon codes.

    In what follows, we let l be a positive integer and a1,,al be any fixed l distinct elements of Fq. Let

    D:=Fq{a1,,al}.

    We write

    D:={y1,,yql},

    and for any f(x)Fq[x], we define

    f(D):=(f(y1),,f(yql)),

    and use ck1(f(x)) to denote the coefficient of xk1 of f(x). Then we can rewrite the generalized projective Reed-Solomon code GPRS(D,k) with evaluation set D as

    GPRSq(D,k):={(f(D),ck1(f(x)))Fql+1qf(x)Fq[x],degf(x)k1}.

    Let uGPRSq(D,k). If d(u,GPRSq(D,k))=ρ(GPRSq(D,k)), then u is also called a deep hole of generalized projective Reed-Solomon code GPRSq(D,k). In 2016, Zhang and Wan [9] studied the deep holes of projective Reed-Solomon code GPRS(Fq,k). In fact, under the assumption that the only deep holes of GRSq(Fq,k) are those received words whose Lagrange interpolation polynomials are of degree k, they proved the following results by solving a subset sum problem.

    Theorem 1.2. [9] Let q be an odd prime power. Assume that 3k+1p or 3qp+1k+1q2. Then the received word (f(Fq),ck1(f(x))) with degf(x)=k is a deep hole of GPRS(Fq,k).

    Theorem 1.3. [9] Let degf(x)k+1 and s:=degf(x)k+1. If there are positive constants c1 and c2 such that s<c1q,(s2+2)log2(q)<k<c2q, then (f(Fq),ck1(f(x))) is not a deep hole of GPRS(Fq,k).

    In this paper, our main goal is to investigate the deep holes of the generalized projective Reed-Solomon code GPRSq(D,k). Actually, we will present characterizations for the received words of degrees k and q2 to be deep holes of generalized projective Reed-Solomon code GPRSq(D,k). The main results of this paper can be stated as follows.

    Theorem 1.4. Let q be a prime power and let k,l be positive integers such that q5 and 2kmin(q3,ql1). Let u(x)Fq[x] with degu(x)=k. Then the received word (u(D),ck1(u(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if yIy0 for any subset ID with #(I)=k.

    Theorem 1.5. Let q be a prime power and let k,l be positive integers such that q4 and 2kql1. Let j be an integer with 1jl and let uj(x):=λj(xaj)q2+νjxk1+f(j)k2(x) with λjFq, νjFq and f(j)k2(x)Fq[x] being a polynomial of degree at most k2. Then the received word (uj(D),ck1(uj(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if (q2k1)aq1kjyI(yaj)e for any subset ID with #(I)=k, where e is the identity of the multiplicative group Fq.

    From Theorems 1.4 and 1.5, we can deduce the following results on the deep holes of the primitive projective Reed-Solomon codes. Note that the proof of Corollary 1.6 relies also on a result about the zero subsets sum of the group Fq (see Lemma 2.8 below).

    Corollary 1.6. Let q be an odd prime power such that q5 and 2kq3. If u(x)=λxk+γxk1+fk2(x) with λFq,γFq and fk2(x)Fq[x] being a polynomial of degree at most k2, then the received word (u(Fq),γ) is not a deep hole of the primitive projective Reed-Solomon code PPRSq(Fq,k).

    Corollary 1.7. Let q4 and 2kq2. If u(x)=λxq2+δxk1+fk2(x) with λFq,δFq and fk2(x)Fq[x] being a polynomial of degree at most k2, then the received word (u(Fq),δ) is a deep hole of the primitive projective Reed-Solomon code PPRSq(Fq,k).

    Remark 1.8. Letting δ=0. Corollary 1.7 gives us the main result of [10].

    In the proofs of Theorems 1.4 and 1.5, the basic tools are the MDS code and Vandemonde determinant. A key ingredient in these proofs is the so-called Dür's theorem on the relation between the covering radius and minimum distance of the generalized projective Reed-Solomon code GPRSq(D,k) (see Lemma 2.6 below). Another important ingredient is a new result on the zero-sum problem in the finite field that we will prove in the next section.

    This paper is organized as follows. First of all, in Section 2, we recall and prove several preliminary lemmas that are needed in the proofs of Theorems 1.4 and 1.5. Consequently, in Section 3, we use the lemmas presented in Section 2 to give the proofs of Theorem 1.4 and Corollary 1.6. Finally, by using the results given in Section 2, we supply in Section 4 the proofs of Theorem 1.5 and Corollary 1.7.

    In this section, our main goal is to prove several lemmas that are needed in the proof of Theorems 1.4 and 1.5. We begin with the following result on MDS codes.

    Lemma 2.1. Let C be a MDS code and u0C be a given codeword. Then the received word u is a deep hole of C if and only if the received word u+u0 is a deep hole of C.

    Proof. First of all, let u be a received word. Then by the definition of deep hole, one knows that u is a deep hole of C if and only if d(u,C)=ρ(C) with ρ(C) being the covering radius of C, if and only if

    minvC{d(u,v)}=ρ(C). (2.1)

    Likewise, one has that the received word u+u0 is a deep hole of C if and only if

    minvC{d(u+u0,v)}=ρ(C). (2.2)

    Since

    {d(u+u0,v)|vC}={d(u+u0,v+u0)|vC},

    it follows that

    minvC{d(u+u0,v)}=minvC{d(u+u0,v+u0)}. (2.3)

    But d(u+u0,v+u0)=d(u,v) for any codeword u0. Hence (2.3) tells us that

    minvC{d(u+u0,v)}=minvC{d(u,v)}. (2.4)

    Now from (2.1), (2.2) and (2.4), one can deduce that u is a deep hole of C if and only if u+u0 is a deep hole of C as one desires. So Lemma 2.1 is proved.

    Remark 2.1. We should point out that if the word u0 is not in C, then Lemma 2.1 is not true.

    In what follows, we let

    Pk1:={f(x)f(x)Fq[x],degf(x)k1}.

    We have the following result.

    Lemma 2.2. Let #(D)=ql and let u=(u1,,uql,uql+1)Fql+1q and v=(v1,,vql,vql+1)Fql+1q be two received words with u(x) and v(x) being the Lagrange interpolation polynomial of the first ql components of u and v. If u(x)=λv(x)+fk2(x),uql+1=λvql+1, where λFq and fk2(x)Fq[x] is a polynomial of degree at most k2, then

    d(u,GPRSq(D,k))=d(v,GPRSq(D,k)).

    Further, u is a deep hole of GPRSq(D,k) if and only if v is a deep hole of GPRSq(D,k).

    Proof. Since u(x)=λv(x)+fk2(x), we have u(D)=λv(D)+fk2(D). By the definition of Hamming distance, we know that for any code C over Fq, if u and v are two codewords of C, then

    d(u,v)=d(u+w,v+w)=d(λu,λv)

    hold for any codeword w of C and any λFq. Then from the definition of error distance and noticing that u=(u(D),uql+1), we can deduce immediately that

    d(u,GPRSq(D,k))=mingPk1d(u,(g(D),ck1(g(x))))=mingPk1d((u(D),uql+1),(g(D),ck1(g(x))))=mingPk1d((λv(D)+fk2(D),uql+1),(g(D),ck1(g(x))))=mingPk1d((λv(D)+fk2(D),λvql+1),(g(D),ck1(g(x))))=mingPk1d((λv(D)+fk2(D),λvql+1),(g(D)+fk2(D),ck1(g(x))))=mingPk1d((λv(D),λvql+1),(g(D),ck1(g(x))))=mingPk1d((λv(D),λvql+1),(λg(D),λck1(g(x))))(since λFq)=mingPk1d((v(D),vql+1),(g(D),ck1(g(x))))=d((v(D),vql+1),GPRSq(D,k))=d(v,GPRSq(D,k))

    as required. The proof of Lemma 2.2 is complete.

    For a linear [n,k] code C with n and k being the length and dimension of C, respectively, we define the generator matrix, denoted by G, to be the k×n matrix of the form G:=(g1,,gk)T, where {g1,,gk} is a basis of C as a vector space. Since D={y1,,yql}, the following k×(ql+1) matrix

    (1(D)ck1(1)x(D)ck1(x)xk2(D)ck1(xk2)xk1(D)ck1(xk1))=(110y1yql0yk21yk2ql0yk11yk1ql1) (2.5)

    forms a generator matrix of GPRSq(D,k). For the purpose of this paper, we will choose the above matrix as the generator matrix of GPRSq(D,k).

    Lemma 2.3. [11] Let C be an [n,k] linear code and G be the generator matrix of C. Then C is a MDS code if and only if any k distinct columns of G are linear independent over finite field Fq.

    Throughout this paper, for any nonempty set {γ1,,γn}Fq, the Vandermonde determinant, denoted by V(γ1,,γn), is defined as follows:

    V(γ1,,γn):=det(11γ1γnγn11γn1n).

    We have the following well-known result.

    Lemma 2.4. [11] One has

    V(γ1,,γn)=1i<jn(γjγi).

    In the following, we show that the generalized projective Reed-Solomon code is a MDS code.

    Lemma 2.5. Let DFq. Then GPRSq(D,k) is a [ql+1,k] MDS code over finite field Fq.

    Proof. Let G be the generator matrix of GPRSq(D,k) given in (2.5). Write G:=(G1,,Gql+1). Let i1,,ik be arbitrary k distinct integers such that 1i1<<ikql+1. We claim that det(Gi1,,Gik)0 which will be proved in what follows.

    If ikql, then it follows that

    det(Gi1,,Gik)=V(yi1,,yik)=1t<sk(yisyit)0.

    The claim is true in this case.

    If ik=ql+1, then by expanding the determinant according to the last column, we arrive at

    det(Gi1,,Gik)=V(yi1,,yik1)=1t<sk1(yisyit)0.

    The claim is proved in this case.

    Now by the claim, we can derive that any k columns of the generator matrix G is linear independent. Then GPRSq(D,k) is a MDS code by Lemma 2.3. This concludes the proof of Lemma 2.5.

    The following result about the relation between the covering radius and minimum distance of GPRSq(D,k) will play a key role in this paper which is due to Dür [4].

    Lemma 2.6. [4] Let D be a proper subset of Fq. Then

    ρ(GPRSq(D,k))=d(GPRSq(D,k))1.

    Now we give a criterion to determine whether a received word is a deep hole of MDS code C.

    Lemma 2.7. Let G be a generator matrix of a MDS code C=[n,k] over the finite field Fq. If the covering radius ρ(C)=nk, then a received word uFnq is a deep hole of C if and only if the (k+1)×n matrix (Gu) can be served as the generator matrix of another MDS code.

    Proof. We first show the sufficient part. Let C be a [n,k+1] MDS code with (Gu) as its generator matrix. Since uCC, one can derived that

    nk=n(k+1)+1=d(C)d(u,C)ρ(C)=nk.

    It follows that

    d(u,C)=ρ(C)=nk.

    Therefore u is a deep hole of C.

    Now we turn to prove the necessity part. Assume that (Gu) cannot be served as a generator matrix of any MDS code. By lemma 2.3, we known that there exist k+1 distinct columns of

    (Gu)=(g11g1ngk1gknu1un)(k+1)×n

    are linear dependent over Fq. Without loss of generality, we can suppose the first k+1 columns are linear dependent. Thus we have

    rank(g11g1,k+1gk1gk,k+1u1uk+1)(k+1)×(k+1)k.

    On the other hand, since G is a generator matrix of the [n,k] MDS code C over the finite field Fq, one can obtain that

    rank(g11g1kgk1gkk)k×k=k.

    Hence there exist k coefficients a1,,akFq that are not all zero such that (u1,,uk+1)=ki=1ai(gi1,,gi,k+1). Now let v=ki=1ai(gi1,,gin)C. One can immediately deduce that

    d(u,C)=minwC{d(u,w)}d(u,v)n(k+1)<nk=ρ,

    which is a contradiction with the hypothesis that u is a deep hole of C. So Lemma 2.7 is proved.

    In what follows, we show a result on the zero-sum problem in the finite field of odd characteristic.

    Lemma 2.8. Let q=ps with p being an odd prime number and k be an integer with 2kq3. Then there exist a subset IFq with #(I)=k such that zIz=0.

    Proof. Since p is an odd prime number, it follows that for any zFq, one has zFq and zz since 2z0. But |Fq{z,z}|=q32 since qk+35. Now one can pick zFq{z,z}. Then zFq{z,z,z} since 2z0. Continuing in this way, we finally arrive at

    Fq={z1,z1,,zq12,zq12}. (2.6)

    We consider the following cases.

    Case 1. 2k. In this case, we let I={z1,z1,,zk2,zk2}. Then IFq and we have

    zIz=k2i=1(zi+(zi))=0

    as desired. Lemma 2.8 holds if 2k.

    Case 2. 2k. Then k3 and so q7 since 2kq3. We claim that there are three distinct elements z,z,zFq such that z+z+z=0, which will be proved by dividing into the following three subcases.

    Case 2.1. p=3. We pick a zFq. Then 3z=0, z0 and 2z0. The latter implies that zz. Since p=3 and q7, we deduce that q32=9. Thus |Fq{z,z}|=q36. So we can choose a zFq{z,z}. But 2z0. Hence zFq{z,z,z}. It implies that z+z0, namely, z+zFq. Furthermore, we have that z+z is not equal to anyone of the four elements z,z,z and z. That is, z+zFq{z,z,z,z}. Hence (z+z)Fq{z,z,z,z,z+z}. Therefore there are three distinct elements z,z and (z+z) in Fq such that their sum equals zero. The claim holds in this case.

    Case 2.2. p=5. Take a zFq. Then 5z=0 and none of z,2z,3z and 4z equals zero. It follows that the four elements z,z,2z,2z are pairwise distinct. Since q7>5, one must have q52=25. Thus |Fq{z,z,2z,2z}|=q520. So we can choose zFq{z,z,2z,2z}. Then zFq{z,z,2z,2z} and z+z0. The latter one tells us that (z+z)Fq. Obviously, zz since 2z0. Hence zFq{z,z,2z,2z,z}.

    Furthermore, we can deduce that z+z is not equal to any of z,z,2z,2z,z and z. This infers that (z+z)Fq{z,z,2z,2z,z,z,z+z} since 2(z+z)0. Therefore we can find three distinct elements z,z and (z+z) in Fq such that their sum equals zero. The claim holds in this case. The claim is proved in this case.

    Case 2.3. p7. Then le0 for any integer l with 1l6, where e stands for the identity of the group Fq. Since e0,4e0 and 5e0, we have e2e,e3e and 2e3e. So there are three different elements e,2e,3e in Fq such that their sum is equal to zero as one desires. The claim is true in this case.

    Now by the claim, we know that there are three integers i1,i2 and i3 such that 1i1<i2<i3q12 and zi1+zi2+zi3=0.

    If q=7, then letting I={zi1,zi2,zi3} gives us the desired result.

    If q>7, then Fq{±zi1,±zi2,±zi3} is nonempty. By (2.6), we obtain that

    Fq{±zi1,±zi2,±zi3}={±z1,...,±zi11,±zi1+1,...,±zi21,±zi2+1,...,±zi31,±zi3+1,...,±zq12}. (2.7)

    Since 2k, k3 is even. Evidently, the sum of the first k3 elements on the right hand side of (2.7) is equal to zero because zi+(zi)=0 for all integers 1iq12. Then the first k3 elements on the right hand side of (2.7) together with the three elements zi1,zi2,zi3 gives us the desired result. Thus Lemma 2.8 is true if 2k.

    This completes the proof of Lemma 2.8.

    In this section, we use the lemmas presented in the previous to give the proofs of Theorem 1.4 and Corollary 1.6. At first, we show Theorem 1.4.

    Proof of Theorem 1.4. Since degu(x)=k, one may let u(x)=λxk+νxk1+fk2(x) with λFq,νFq and fk2(x)Fq[x] being a polynomial of degree at most k2. Then (u(D),ck1(u(x)))=(u(D),ν). By Lemma 2.2, we have that (u(D),ν) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if (λ1u(D),λ1ν) is a deep hole of GPRSq(D,k). But λ1u(x)=wk(x)+rk(x), where wk(x):=xk and

    rk(x):=λ1νxk1+λ1fk2(x).

    Then one has

    (λ1u(D),λ1ν)=(wk(D)+rk(D),λ1ν)=(wk(D),0)+(rk(D),λ1ν).

    Since degrk(x)k1, by the definition of GPRSq(D,k) we have (rk(D),λ1ν)GPRSq(D,k). Then it follows from Lemma 2.1 that (λ1u(D),λ1ν) is a deep hole of GPRSq(D,k) if and only if (wk(D),0) is a deep hole of GPRSq(D,k). Then we can deduce that (u(D),ck1(u(x))) is a deep hole of GPRSq(D,k) if and only if (wk(D),0) is a deep hole of GPRSq(D,k).

    We denote ˉwk:=(wk(D),0). Let G be the generator matrix of GPRSq(D,k) as given in (2.5). Then we have

    (Gˉwk)=(110y1yql0yk21yk2ql0yk11yk1ql1yk1ykql0):=(ˉG1,,ˉGql,ˉGql+1).

    Now we pick k+1 distinct integers with 1j1<<jk+1ql+1.

    Case 1. jk+1ql. Then one has

    det(ˉGj1,,ˉGjk+1)=det(11yj1yjk+1yk1j1yk1jk+1ykj1ykjk+1)=V(yj1,,yjk+1)=1t<sk+1(yjsyjt)0.

    Case 2. jk+1=ql+1. We can compute and get that

    det(ˉGj1,,ˉGjk,ˉGjql+1)=det(110yj1yjk0yk2j1yk2jk0yk1j1yk1jk1yk1ykjk0)=det(11yj1yjkyk2j1yk2jkykj1ykjk). (3.1)

    Now we introduce an auxiliary polynomial g(y) as follows:

    g(y)=det(111yj1yjkyyk1j1yk1jkyk1ykj1ykjkyk).

    Then Lemma 2.4 tells us that

    g(y)=(1s<tk(yjtyjs))ki=1(yyji):=ki=0aiyi.

    This infers that

    ak1=(ki=1yji)1s<tk(yjtyjs). (3.2)

    But

    ak1=det(11yj1yjkyk2j1yk2jkykj1ykjk). (3.3)

    Finally, (3.1) together with (3.2) and (3.3) gives us that

    det(ˉGj1,,ˉGjk,ˉGjql+1)=(ki=1yji)1s<tk(yjtyjs). (3.4)

    By Lemma 2.5, we know that GPRSq(D,k) is a [ql+1,k] MDS code which implies that

    d(GPRSq(D,k))=ql+1k+1=qlk+2.

    Then by Lemma 2.6, one can deduce that

    ρ(GPRSq(D,k))=d(GPRSq(D,k))1=qlk+21=ql+1k. (3.5)

    It then follows immediately from Lemma 2.7 that ˉwk=(wk(D),0) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if the (k+1)×(ql+1) matrix (Gˉwk) can be served as the generator matrix of a MDS code, if and only if any k+1 columns of (Gˉwk) are linear independent, if and only if for any 1j1<<jk+1ql+1, one has

    det(ˉGj1,,ˉGjk+1)0. (3.6)

    By the discussion in Cases 1 and 2, (3.4) tells us that (3.6) holds if and only if for any 1j1<<jkql, one has ki=1yji0. Hence we can derive that (wk(D),0) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if the sum yIy is nonzero for any subset ID with #(I)=k as desired.

    Finally, we can conclude that (u(D),ck1(u(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if the sum yIy is nonzero for any subset ID with #(I)=k.

    This finishes the proof of Theorem 1.4.

    We can now use Theorem 1.4 to show Corollary 1.6.

    Proof of Corollary 1.6. Let l=1 and a1=0. Then D=Fq. By Lemma 2.8, there exist a subset IFq with #(I)=k such that yIy=0. It then follows from Theorem 1.4 that the received word (u(Fq),ck1(u(x))) = (u(Fq),γ) is not a deep hole of the primitive projective Reed-Solomon code PPRSq(Fq,k). Therefore Corollary 1.6 is proved.

    In this section, we give the proofs of Theorem 1.5 and Corollary 1.7. We begin with the proof of Theorem 1.5.

    Proof of Theorem 1.5. First of all, we note that j is an integer with 1jl. We introduce a polynomial fj(x) as follows:

    fj(x)=(xaj)q2,

    and define a word ˉfj associated to fj(x) by

    ˉfj:=(fj(D),ck1(fj(x))).

    Then uj(x)=λjfj(x)+νjxk1+f(j)k2(x) which implies that

    ck1(uj(x))=λjck1(fj(x))+νj. (4.1)

    It follows from (4.1) that

    (uj(D),ck1(uj(x)))=(λjfj(D)+νjxk1(D)+f(j)k2(D),λjck1(fj(x))+νj)=(λjfj(D),λjck1(fj(x)))+(νjxk1(D)+f(j)k2(D),νj)=λjˉfj+(νjxk1(D)+f(j)k2(D),νj).

    But

    deg(νjxk1(x)+f(j)k2(x))k1

    and

    ck1(νjxk1(x)+f(j)k2(x))=νj.

    Hence

    (νjxk1(D)+f(j)k2(D),νj)GPRSq(D,k).

    It follows from Lemmas 2.1 and 2.2 that the received word (uj(D),ck1(uj(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if ˉfj is a deep hole of GPRSq(D,k).

    Let G be the generator matrix of GPRSq(D,k) as given in (2.5). Since yiaj for all integers i with 1iql, we have (yiaj)q2=(yiaj)1. It then follows that

    (Gˉfj)=(110y1yql0yk21yk2ql0yk11yk1ql1(y1aj)1(yqlaj)1ck1(fj(x))):=(ˆG1,,ˆGql+1). (4.2)

    On the other hand, from Lemma 2.7 we can deduce that ˉfj=(fj(D),ck1(fj(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k), if and only if (Gˉfj) generates a MDS code, by Lemma 2.3, if and only if any k+1 columns of (Gˉfj) are linear independent, if and only if for all k+1 integers j1,,jk+1 with 1j1<<jk+1ql+1, one has

    det(ˆGj1,,ˆGjk+1)0. (4.3)

    In what follows, we choose arbitrarily k+1 integers j1,,jk+1 such that 1j1<<jk+1ql+1. Consider the following two cases.

    Case 1. jk+1ql+1. Then k+1jk+1ql and by (4.2), one has

    (ˆGj1,,ˆGjk+1)=(11yj1yjk+1yk1j1yk1jk+1(yj1aj)1(yjk+1aj)1).

    Thus one can deduce that

    det(ˆGj1,,ˆGjk+1)=(k+1i=1(yjiaj)1)det(yj1ajyjk+1ajyj1(yj1aj)yjk+1(yjk+1aj)yk1j1(yj1aj)yk1jk+1(yjk+1aj)11)=(k+1i=1(yjiaj)1)det(yj1yjk+1ykj1ykjk+111)
    =(1)k(k+1i=1(yjiaj)1)V(yj1,,yjk+1)=(1)k(k+1i=1(yjiaj)1)1s<tk+1(yjtyjs)0

    since yj1,,yjk+1 are pairwise distinct.

    Case 2. jk+1=ql+1. Then 1j1<<jkql. From (4.2) and Lemma 2.4, we can deduce that

    det(ˆGj1,,ˆGjk,ˆGjql+1)=det(110yj1yjk0yk2j1yk2jk0yk1j1yk1jk1(yj1aj)1(yjkaj)1ck1(fj(x)))=ck1(fj(x))det(11yj1yjkyk1j1yk1jk)det(11yj1yjkyk2j1yk2jk(yj1aj)1(yjkaj)1)=ck1(fj(x))V(yj1,,yjk)det(11yj1yjkyk2j1yk2jk(yj1aj)1(yjkaj)1)=ck1(fj(x))V(yj1,,yjk)(ki=1(yjiaj)1)det(yj1yjkyk1j1yk1jk11)=ck1(fj(x))V(yj1,,yjk)+(1)k(ki=1(yjiaj)1)V(yj1,,yjk)=(ck1(fj(x))+(1)kki=1(yjiaj)1))1s<tk(yjtyjs)=(ck1(fj(x))+ki=1(ajyji)1))1s<tk(yjtyjs). (4.4)

    Now from Cases 1 and 2, we can deduce by (4.4) that (4.3) holds for all k+1 integers j1,,jk+1 with 1j1<<jk+1ql+1 if and only if for all integers j1,,jk with 1j1<<jkql, one has

    ck1(fj(x))+ki=1(ajyji)10,

    which is equivalent to

    ck1(fj(x))ki=1(ajyji)+e0. (4.5)

    Since fj(x)=(xaj)q2, the binomial theorem gives us that

    ck1(fj(x))=(q2k1)(aj)qk1.

    Then one derives that (4.5) holds for all integers j1,,jk with 1j1<<jkql if and only if the following is true:

    (q2k1)(aj)qk1ki=1(ajyji)+e0, (4.6)

    or equivalently,

    (q2k1)aqk1jki=1(yjiaj)+e0 (4.7)

    since q is odd. In other words, ˉfj=(fj(D),ck1(fj(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if the sum

    (q2k1)aq1kjyI(yaj)+e

    is nonzero for any subset ID with #(I)=k. Hence the desired result follows immediately. The proof of Theorem 1.5 is complete.

    We can now present the proof of Corollary 1.7 as the conclusion of this paper.

    Proof of Corollary 1.7. Letting l=1 and a1=0 gives us that D=Fq. Then it follows from a1=0 that

    (q2k1)aq1kjyI(yaj)+e=0(q2k1)yI(yaj)+e=e0

    for any subset ID with #(I)=k. Hence by Theorem 1.5, one can deduce that (uj(D),ck1(uj(x)))=(u(Fq),δ) is a deep hole of PPRSq(Fq,k). This ends the proof of Corollary 1.7.

    The authors would like to thank the anonymous referees for their very careful reading of the manuscript and helpful comments. This work was supported partially by National Science Foundation of China Grant #11771304, by the Fundamental Research Funds for the Central Universities and by Foundation of Sichuan Provincial Department of Education under Grant # 2016ZB0342.

    We declare that we have no conflict of interest.



    [1] Y. Li, D. Wan, On error distance of Reed-Solomon codes, Sci. China, Ser. A: Math., 51 (2008), 1982-1988. doi: 10.1007/s11425-008-0066-3
    [2] V. Guruswami, M. Sudan, Improved decoding of Reed-Solomon and algebraic-geometry codes, IEEE Trans. Inform. Theory, 45 (1999), 1757-1767. doi: 10.1109/18.782097
    [3] V. Guruswami, A. Vardy, Maximum-likelihood decoding of Reed-Solomon codes is NP-hard, IEEE Trans. Inform. Theory, 51 (2005), 2249-2256. doi: 10.1109/TIT.2005.850102
    [4] A. Dür, The decoding of extended Reed-Solomon codes, Discrete Math., 90 (1991), 21-40. doi: 10.1016/0012-365X(91)90093-H
    [5] J. Li, D. Wan, On the subset sum problem over finite fields, Finite Fields Th. App., 14 (2008), 911-929. doi: 10.1016/j.ffa.2008.05.003
    [6] R. Wu, S. Hong, On deep holes of standard Reed-Solomon codes, Sci. China Math., 55 (2012), 2447-2455. doi: 10.1007/s11425-012-4499-3
    [7] S. Hong, R. Wu, On deep holes of generalized Reed-Solomon codes, AIMS Math., 1 (2016), 96-101. doi: 10.3934/Math.2016.2.96
    [8] J. Zhuang, D. Lin, C. Lv, Determining deep hole trees of generalized Reed-Solomon codes and an application (in Chinese), Sci. Sin. Math., 47 (2017), 1615-1620. doi: 10.1360/N012017-00014
    [9] J. Zhang, D. Wan, On deep holes of projective Reed-Solomon codes, 2016 IEEE Internal Symposium on Information Theory, (2016), 925-929.
    [10] X. Xu, S. Hong, Y. Xu, On deep holes of primitive projective Reed-Solomon codes (in Chinese), Sci. Sin. Math., 48 (2018), 1087-1094. doi: 10.1360/N012017-00064
    [11] J. Van lint, Introduction to coding theory, 3 Eds., Heidelberg: Springer-Verlag Berlin, 1998.
  • This article has been cited by:

    1. Xiaofan Xu, Yongchao Xu, Shaofang Hong, Some results on ordinary words of standard Reed-Solomon codes, 2019, 4, 2473-6988, 1336, 10.3934/math.2019.5.1336
    2. Daniele Bartoli, Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco, On planes through points off the twisted cubic in PG(3,q) and multiple covering codes, 2020, 67, 10715797, 101710, 10.1016/j.ffa.2020.101710
    3. Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco, On the weight distribution of the cosets of MDS codes, 2021, 0, 1930-5346, 0, 10.3934/amc.2021042
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4089) PDF downloads(570) Cited by(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog