Citation: Xiaofan Xu, Yongchao Xu. Some results on deep holes of generalized projective Reed-Solomon codes[J]. AIMS Mathematics, 2019, 4(2): 176-192. doi: 10.3934/math.2019.2.176
[1] | Shaofang Hong, Rongjun Wu . On deep holes of generalized Reed-Solomon codes. AIMS Mathematics, 2016, 1(2): 96-101. doi: 10.3934/Math.2016.2.96 |
[2] | Xiaofan Xu, Yongchao Xu, Shaofang Hong . Some results on ordinary words of standard Reed-Solomon codes. AIMS Mathematics, 2019, 4(5): 1336-1347. doi: 10.3934/math.2019.5.1336 |
[3] | Irwansyah, Intan Muchtadi-Alamsyah, Fajar Yuliawan, Muhammad Irfan Hidayat . Generalized Reed-Solomon codes over number fields and exact gradient coding. AIMS Mathematics, 2024, 9(4): 9508-9518. doi: 10.3934/math.2024464 |
[4] | Jing Huang, Jingge Liu, Dong Yu . Dimensions of the hull of generalized Reed-Solomon codes. AIMS Mathematics, 2024, 9(6): 13553-13569. doi: 10.3934/math.2024661 |
[5] | Claude Carlet . Identifying codewords in general Reed-Muller codes and determining their weights. AIMS Mathematics, 2024, 9(5): 10609-10637. doi: 10.3934/math.2024518 |
[6] | Valérie Gauthier-Umaña, Henryk Gzyl, Enrique ter Horst . Decoding as a linear ill-posed problem: The entropy minimization approach. AIMS Mathematics, 2025, 10(2): 4139-4152. doi: 10.3934/math.2025192 |
[7] | Wei Qi . The polycyclic codes over the finite field $ \mathbb{F}_q $. AIMS Mathematics, 2024, 9(11): 29707-29717. doi: 10.3934/math.20241439 |
[8] | Yang Pan, Yan Liu . New classes of few-weight ternary codes from simplicial complexes. AIMS Mathematics, 2022, 7(3): 4315-4325. doi: 10.3934/math.2022239 |
[9] | Bodigiri Sai Gopinadh, Venkatrajam Marka . Reversible codes in the Rosenbloom-Tsfasman metric. AIMS Mathematics, 2024, 9(8): 22927-22940. doi: 10.3934/math.20241115 |
[10] | Lijun Ma, Shuxia Liu, Zihong Tian . The binary codes generated from quadrics in projective spaces. AIMS Mathematics, 2024, 9(10): 29333-29345. doi: 10.3934/math.20241421 |
Let Fq be the finite field of q elements with p as its characteristic. Let n and k be positive integers such that k<n. Let D={x1,⋯,xn} be a subset of Fq, which is called the evaluation set. The generalized Reed-Solomon code GRSq(D,k) of length n and dimension k over Fq is defined by:
GRSq(D,k):={(f(x1),…,f(xn))∈Fnq∣f(x)∈Fq[x],degf(x)≤k−1}. |
Moreover, the generalized projective Reed-Solomon code GPRSq(D,k) of length n+1 and dimension k over Fq is defined as follows:
GPRSq(D,k):={(f(x1),…,f(xn),ck−1(f(x)))∈Fn+1q∣f(x)∈Fq[x],degf(x)≤k−1}, |
where ck−1(f(x)) is the coefficient of xk−1 of f(x). If D=F∗q, then it is called primitive projective Reed-Solomon code, namely,
PPRSq(F∗q,k):={(f(1),…,f(αq−2),ck−1(f(x)))∈Fqq∣f(x)∈Fq[x],degf(x)≤k−1}, |
where α is a primitive element of Fq. If D=Fq, then it is called the extended projective Reed Solomon code. For u=(u1,…,un)∈Fnq, v=(v1,…,vn)∈Fnq, the Hamming distance d(u,v) is defined by
d(u,v):=#{1≤i≤n∣ui≠vi,ui∈Fq,vi∈Fq}. |
For any [n,k]q linear code C, the minimum distance d(C) is defined by
d(C):=min{d(x,y)∣x∈C,y∈C,x≠y}, |
where d(⋅,⋅) denotes the Hamming distance of two codewords. A linear [n,k,d] code is called maximum distance separable (MDS) code if d=n−k+1. The error distance to code C of a received word u∈Fnq is defined by
d(u,C):=minv∈C{d(u,v)}. |
Clearly, d(u,C)=0 if and only if u∈C. The maximum error distance
ρ(C)=max{d(u,C)∣u∈Fnq} |
is called the covering radius of C.
The most important algorithmic problem in coding theory is the maximum likelihood decoding (MLD): Given a received word u∈Fnq, find a codeword v∈C such that d(u,v)=d(u,C), then we decode u to v [1]. Therefore, it is very crucial to decide d(u,C) for the received word u. Guruswami and Sudan [2] provided a polynomial time list decoding algorithm for the decoding of u when d(u,C)≤n−√nk. When the error distance increases, Guruswami and Vardy [3] showed that maximum-likelihood decoding is NP-hard for the family of Reed-Solomon codes. We also notice that Dür [4] studied the Cauchy codes. In particular, Dür [4] got the relation between the covering radius and minimum distance of GPRSq(D,k). When decoding the generalized projective Reed-Solomon code GPRSq(D,k), for a received word u=(u1,…,un,un+1)∈Fn+1q, we define the Lagrange interpolation polynomial u(x) of the first n components of u by
u(x):=n∑i=1uin∏j=1j≠ix−xjxi−xj∈Fq[x], |
i.e., u(x) is the unique polynomial of degree degu(x)≤n−1 such that u(xi)=ui for 1≤i≤n. It is clear that u∈GPRSq(D,k) if and only if d(u,GPRSq(D,k))=0 if and only if degu(x)≤k−1 and ck−1(u(x))=un+1. Equivalently, u∉GPRSq(D,k) if and only if d(u,GPRSq(D,k))≥1 if and only if k≤degu(x)≤n−1 or ck−1(u(x))≠un+1. Evidently, we have the following simple bounds of d(u,GRSq(D,k)) which are due to Li and Wan.
Theorem 1.1. [5] Let u be a received word such that u∉GRSq(D,k). Then
n−degu(x)≤d(u,GRSq(D,k))≤n−k=ρ(GRSq(D,k)). |
Let u∈Fnq. If d(u,GRSq(D,k))=ρ(GRSq(D,k)), then the received word u is called a deep hole of GRSq(D,k). From Theorem 1.1, one can easily see that the received word u is a deep hole of GRSq(D,k) if its Lagrange interpolation polynomial is of degree k. In 2012, Wu and Hong [6] found another class of deep holes for the standard Reed-Solomon code GRSq(F∗q,k). In fact, if q≥4 and 2≤k≤q−2, then they showed that the received word u is a deep hole if its Lagrange interpolation polynomial is of the form axq−2+f≤k−1(x) with a∈F∗q and f≤k−1(x)∈Fq[x] is a polynomial of degree at most k−1. In [7], Hong and Wu proved that the received word u is a deep hole of the generalized Reed-Solomon code GRSq(D,k) if its Lagrange interpolation polynomial is λ(x−ai)q−2+f≤k−1(x), where λ∈F∗q,ai∈Fq∖D and f≤k−1(x)∈Fq[x] being a polynomial of degree at most k−1. In [8], Zhuang, Lin and Lv investigated the deep hole trees of generalized Reed-Solomon codes.
In what follows, we let l be a positive integer and a1,…,al be any fixed l distinct elements of Fq. Let
D:=Fq∖{a1,…,al}. |
We write
D:={y1,…,yq−l}, |
and for any f(x)∈Fq[x], we define
f(D):=(f(y1),…,f(yq−l)), |
and use ck−1(f(x)) to denote the coefficient of xk−1 of f(x). Then we can rewrite the generalized projective Reed-Solomon code GPRS(D,k) with evaluation set D as
GPRSq(D,k):={(f(D),ck−1(f(x)))∈Fq−l+1q∣f(x)∈Fq[x],degf(x)≤k−1}. |
Let u∉GPRSq(D,k). If d(u,GPRSq(D,k))=ρ(GPRSq(D,k)), then u is also called a deep hole of generalized projective Reed-Solomon code GPRSq(D,k). In 2016, Zhang and Wan [9] studied the deep holes of projective Reed-Solomon code GPRS(Fq,k). In fact, under the assumption that the only deep holes of GRSq(Fq,k) are those received words whose Lagrange interpolation polynomials are of degree k, they proved the following results by solving a subset sum problem.
Theorem 1.2. [9] Let q be an odd prime power. Assume that 3≤k+1≤p or 3≤q−p+1≤k+1≤q−2. Then the received word (f(Fq),ck−1(f(x))) with degf(x)=k is a deep hole of GPRS(Fq,k).
Theorem 1.3. [9] Let degf(x)≥k+1 and s:=degf(x)−k+1. If there are positive constants c1 and c2 such that s<c1√q,(s2+2)log2(q)<k<c2q, then (f(Fq),ck−1(f(x))) is not a deep hole of GPRS(Fq,k).
In this paper, our main goal is to investigate the deep holes of the generalized projective Reed-Solomon code GPRSq(D,k). Actually, we will present characterizations for the received words of degrees k and q−2 to be deep holes of generalized projective Reed-Solomon code GPRSq(D,k). The main results of this paper can be stated as follows.
Theorem 1.4. Let q be a prime power and let k,l be positive integers such that q≥5 and 2≤k≤min(q−3,q−l−1). Let u(x)∈Fq[x] with degu(x)=k. Then the received word (u(D),ck−1(u(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if ∑y∈Iy≠0 for any subset I⊆D with #(I)=k.
Theorem 1.5. Let q be a prime power and let k,l be positive integers such that q≥4 and 2≤k≤q−l−1. Let j be an integer with 1≤j≤l and let uj(x):=λj(x−aj)q−2+νjxk−1+f(j)≤k−2(x) with λj∈F∗q, νj∈Fq and f(j)≤k−2(x)∈Fq[x] being a polynomial of degree at most k−2. Then the received word (uj(D),ck−1(uj(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if (q−2k−1)aq−1−kj∏y∈I(y−aj)≠−e for any subset I⊆D with #(I)=k, where e is the identity of the multiplicative group F∗q.
From Theorems 1.4 and 1.5, we can deduce the following results on the deep holes of the primitive projective Reed-Solomon codes. Note that the proof of Corollary 1.6 relies also on a result about the zero subsets sum of the group F∗q (see Lemma 2.8 below).
Corollary 1.6. Let q be an odd prime power such that q≥5 and 2≤k≤q−3. If u(x)=λxk+γxk−1+f≤k−2(x) with λ∈F∗q,γ∈Fq and f≤k−2(x)∈Fq[x] being a polynomial of degree at most k−2, then the received word (u(F∗q),γ) is not a deep hole of the primitive projective Reed-Solomon code PPRSq(F∗q,k).
Corollary 1.7. Let q≥4 and 2≤k≤q−2. If u(x)=λxq−2+δxk−1+f≤k−2(x) with λ∈F∗q,δ∈Fq and f≤k−2(x)∈Fq[x] being a polynomial of degree at most k−2, then the received word (u(F∗q),δ) is a deep hole of the primitive projective Reed-Solomon code PPRSq(F∗q,k).
Remark 1.8. Letting δ=0. Corollary 1.7 gives us the main result of [10].
In the proofs of Theorems 1.4 and 1.5, the basic tools are the MDS code and Vandemonde determinant. A key ingredient in these proofs is the so-called Dür's theorem on the relation between the covering radius and minimum distance of the generalized projective Reed-Solomon code GPRSq(D,k) (see Lemma 2.6 below). Another important ingredient is a new result on the zero-sum problem in the finite field that we will prove in the next section.
This paper is organized as follows. First of all, in Section 2, we recall and prove several preliminary lemmas that are needed in the proofs of Theorems 1.4 and 1.5. Consequently, in Section 3, we use the lemmas presented in Section 2 to give the proofs of Theorem 1.4 and Corollary 1.6. Finally, by using the results given in Section 2, we supply in Section 4 the proofs of Theorem 1.5 and Corollary 1.7.
In this section, our main goal is to prove several lemmas that are needed in the proof of Theorems 1.4 and 1.5. We begin with the following result on MDS codes.
Lemma 2.1. Let C be a MDS code and u0∈C be a given codeword. Then the received word u is a deep hole of C if and only if the received word u+u0 is a deep hole of C.
Proof. First of all, let u be a received word. Then by the definition of deep hole, one knows that u is a deep hole of C if and only if d(u,C)=ρ(C) with ρ(C) being the covering radius of C, if and only if
minv∈C{d(u,v)}=ρ(C). | (2.1) |
Likewise, one has that the received word u+u0 is a deep hole of C if and only if
minv∈C{d(u+u0,v)}=ρ(C). | (2.2) |
Since
{d(u+u0,v)|v∈C}={d(u+u0,v+u0)|v∈C}, |
it follows that
minv∈C{d(u+u0,v)}=minv∈C{d(u+u0,v+u0)}. | (2.3) |
But d(u+u0,v+u0)=d(u,v) for any codeword u0. Hence (2.3) tells us that
minv∈C{d(u+u0,v)}=minv∈C{d(u,v)}. | (2.4) |
Now from (2.1), (2.2) and (2.4), one can deduce that u is a deep hole of C if and only if u+u0 is a deep hole of C as one desires. So Lemma 2.1 is proved.
Remark 2.1. We should point out that if the word u0 is not in C, then Lemma 2.1 is not true.
In what follows, we let
Pk−1:={f(x)∣f(x)∈Fq[x],degf(x)≤k−1}. |
We have the following result.
Lemma 2.2. Let #(D)=q−l and let u=(u1,⋯,uq−l,uq−l+1)∈Fq−l+1q and v=(v1,⋯,vq−l,vq−l+1)∈Fq−l+1q be two received words with u(x) and v(x) being the Lagrange interpolation polynomial of the first q−l components of u and v. If u(x)=λv(x)+f≤k−2(x),uq−l+1=λvq−l+1, where λ∈F∗q and f≤k−2(x)∈Fq[x] is a polynomial of degree at most k−2, then
d(u,GPRSq(D,k))=d(v,GPRSq(D,k)). |
Further, u is a deep hole of GPRSq(D,k) if and only if v is a deep hole of GPRSq(D,k).
Proof. Since u(x)=λv(x)+f≤k−2(x), we have u(D)=λv(D)+f≤k−2(D). By the definition of Hamming distance, we know that for any code C over Fq, if u and v are two codewords of C, then
d(u,v)=d(u+w,v+w)=d(λu,λv) |
hold for any codeword w of C and any λ∈F∗q. Then from the definition of error distance and noticing that u=(u(D),uq−l+1), we can deduce immediately that
d(u,GPRSq(D,k))=ming∈Pk−1d(u,(g(D),ck−1(g(x))))=ming∈Pk−1d((u(D),uq−l+1),(g(D),ck−1(g(x))))=ming∈Pk−1d((λv(D)+f≤k−2(D),uq−l+1),(g(D),ck−1(g(x))))=ming∈Pk−1d((λv(D)+f≤k−2(D),λvq−l+1),(g(D),ck−1(g(x))))=ming∈Pk−1d((λv(D)+f≤k−2(D),λvq−l+1),(g(D)+f≤k−2(D),ck−1(g(x))))=ming∈Pk−1d((λv(D),λvq−l+1),(g(D),ck−1(g(x))))=ming∈Pk−1d((λv(D),λvq−l+1),(λg(D),λck−1(g(x))))(since λ∈F∗q)=ming∈Pk−1d((v(D),vq−l+1),(g(D),ck−1(g(x))))=d((v(D),vq−l+1),GPRSq(D,k))=d(v,GPRSq(D,k)) |
as required. The proof of Lemma 2.2 is complete.
For a linear [n,k] code C with n and k being the length and dimension of C, respectively, we define the generator matrix, denoted by G, to be the k×n matrix of the form G:=(g1,…,gk)T, where {g1,…,gk} is a basis of C as a vector space. Since D={y1,…,yq−l}, the following k×(q−l+1) matrix
(1(D)ck−1(1)x(D)ck−1(x)⋮⋮xk−2(D)ck−1(xk−2)xk−1(D)ck−1(xk−1))=(1…10y1…yq−l0⋮⋮⋮⋮yk−21…yk−2q−l0yk−11…yk−1q−l1) | (2.5) |
forms a generator matrix of GPRSq(D,k). For the purpose of this paper, we will choose the above matrix as the generator matrix of GPRSq(D,k).
Lemma 2.3. [11] Let C be an [n,k] linear code and G be the generator matrix of C. Then C is a MDS code if and only if any k distinct columns of G are linear independent over finite field Fq.
Throughout this paper, for any nonempty set {γ1,…,γn}⊂Fq, the Vandermonde determinant, denoted by V(γ1,…,γn), is defined as follows:
V(γ1,…,γn):=det(1…1γ1…γn⋮⋮⋮γn−11…γn−1n). |
We have the following well-known result.
Lemma 2.4. [11] One has
V(γ1,…,γn)=∏1≤i<j≤n(γj−γi). |
In the following, we show that the generalized projective Reed-Solomon code is a MDS code.
Lemma 2.5. Let D⊂Fq. Then GPRSq(D,k) is a [q−l+1,k] MDS code over finite field Fq.
Proof. Let G be the generator matrix of GPRSq(D,k) given in (2.5). Write G:=(G1,…,Gq−l+1). Let i1,…,ik be arbitrary k distinct integers such that 1≤i1<⋯<ik≤q−l+1. We claim that det(Gi1,…,Gik)≠0 which will be proved in what follows.
If ik≤q−l, then it follows that
det(Gi1,…,Gik)=V(yi1,…,yik)=∏1≤t<s≤k(yis−yit)≠0. |
The claim is true in this case.
If ik=q−l+1, then by expanding the determinant according to the last column, we arrive at
det(Gi1,…,Gik)=V(yi1,…,yik−1)=∏1≤t<s≤k−1(yis−yit)≠0. |
The claim is proved in this case.
Now by the claim, we can derive that any k columns of the generator matrix G is linear independent. Then GPRSq(D,k) is a MDS code by Lemma 2.3. This concludes the proof of Lemma 2.5.
The following result about the relation between the covering radius and minimum distance of GPRSq(D,k) will play a key role in this paper which is due to Dür [4].
Lemma 2.6. [4] Let D be a proper subset of Fq. Then
ρ(GPRSq(D,k))=d(GPRSq(D,k))−1. |
Now we give a criterion to determine whether a received word is a deep hole of MDS code C.
Lemma 2.7. Let G be a generator matrix of a MDS code C=[n,k] over the finite field Fq. If the covering radius ρ(C)=n−k, then a received word u∈Fnq is a deep hole of C if and only if the (k+1)×n matrix (Gu) can be served as the generator matrix of another MDS code.
Proof. We first show the sufficient part. Let C′ be a [n,k+1] MDS code with (Gu) as its generator matrix. Since u∈C′∖C, one can derived that
n−k=n−(k+1)+1=d(C′)≤d(u,C)≤ρ(C)=n−k. |
It follows that
d(u,C)=ρ(C)=n−k. |
Therefore u is a deep hole of C.
Now we turn to prove the necessity part. Assume that (Gu) cannot be served as a generator matrix of any MDS code. By lemma 2.3, we known that there exist k+1 distinct columns of
(Gu)=(g11…g1n⋮⋮⋮gk1…gknu1…un)(k+1)×n |
are linear dependent over Fq. Without loss of generality, we can suppose the first k+1 columns are linear dependent. Thus we have
rank(g11…g1,k+1⋮⋮⋮gk1…gk,k+1u1…uk+1)(k+1)×(k+1)≤k. |
On the other hand, since G is a generator matrix of the [n,k] MDS code C over the finite field Fq, one can obtain that
rank(g11…g1k⋮⋮⋮gk1…gkk)k×k=k. |
Hence there exist k coefficients a1,⋯,ak∈Fq that are not all zero such that (u1,⋯,uk+1)=k∑i=1ai(gi1,⋯,gi,k+1). Now let v=k∑i=1ai(gi1,⋯,gin)∈C. One can immediately deduce that
d(u,C)=minw∈C{d(u,w)}≤d(u,v)≤n−(k+1)<n−k=ρ, |
which is a contradiction with the hypothesis that u is a deep hole of C. So Lemma 2.7 is proved.
In what follows, we show a result on the zero-sum problem in the finite field of odd characteristic.
Lemma 2.8. Let q=ps with p being an odd prime number and k be an integer with 2≤k≤q−3. Then there exist a subset I⊆F∗q with #(I)=k such that ∑z∈Iz=0.
Proof. Since p is an odd prime number, it follows that for any z∈F∗q, one has −z∈F∗q and z≠−z since 2z≠0. But |F∗q∖{z,−z}|=q−3≥2 since q≥k+3≥5. Now one can pick z′∈F∗q∖{z,−z}. Then −z′∈F∗q∖{z,−z,z′} since 2z′≠0. Continuing in this way, we finally arrive at
F∗q={z1,−z1,⋯,zq−12,−zq−12}. | (2.6) |
We consider the following cases.
Case 1. 2∣k. In this case, we let I={z1,−z1,⋯,zk2,−zk2}. Then I⊂F∗q and we have
∑z∈Iz=k2∑i=1(zi+(−zi))=0 |
as desired. Lemma 2.8 holds if 2∣k.
Case 2. 2∤k. Then k≥3 and so q≥7 since 2≤k≤q−3. We claim that there are three distinct elements z′,z″,z‴∈F∗q such that z′+z″+z‴=0, which will be proved by dividing into the following three subcases.
Case 2.1. p=3. We pick a z′∈F∗q. Then 3z′=0, −z′≠0 and 2z′≠0. The latter implies that z′≠−z′. Since p=3 and q≥7, we deduce that q≥32=9. Thus |F∗q∖{z′,−z′}|=q−3≥6. So we can choose a z″∈F∗q∖{z′,−z′}. But 2z″≠0. Hence −z″∈F∗q∖{z′,−z′,z″}. It implies that z′+z″≠0, namely, z′+z″∈F∗q. Furthermore, we have that z′+z″ is not equal to anyone of the four elements z′,−z′,z″ and −z″. That is, z′+z″∈F∗q∖{z′,−z′,z″,−z″}. Hence −(z′+z″)∈F∗q∖{z′,−z′,z″,−z″,z′+z″}. Therefore there are three distinct elements z′,z″ and −(z′+z″) in F∗q such that their sum equals zero. The claim holds in this case.
Case 2.2. p=5. Take a z′∈F∗q. Then 5z′=0 and none of z′,2z′,3z′ and 4z′ equals zero. It follows that the four elements z′,−z′,2z′,−2z′ are pairwise distinct. Since q≥7>5, one must have q≥52=25. Thus |F∗q∖{z′,−z′,2z′,−2z′}|=q−5≥20. So we can choose z″∈F∗q∖{z′,−z′,2z′,−2z′}. Then −z″∈F∗q∖{z′,−z′,2z′,−2z′} and z′+z″≠0. The latter one tells us that −(z′+z″)∈F∗q. Obviously, −z″≠z″ since 2z″≠0. Hence −z″∈F∗q∖{z′,−z′,2z′,−2z′,z″}.
Furthermore, we can deduce that z′+z″ is not equal to any of z′,−z′,2z′,−2z′,z″ and −z″. This infers that −(z′+z″)∈F∗q∖{z′,−z′,2z′,−2z′,z″,−z″,z′+z″} since 2(z′+z″)≠0. Therefore we can find three distinct elements z′,z″ and −(z′+z″) in F∗q such that their sum equals zero. The claim holds in this case. The claim is proved in this case.
Case 2.3. p≥7. Then le≠0 for any integer l with 1≤l≤6, where e stands for the identity of the group F∗q. Since e≠0,4e≠0 and 5e≠0, we have e≠2e,e≠−3e and 2e≠−3e. So there are three different elements e,2e,−3e in F∗q such that their sum is equal to zero as one desires. The claim is true in this case.
Now by the claim, we know that there are three integers i1,i2 and i3 such that 1≤i1<i2<i3≤q−12 and zi1+zi2+zi3=0.
If q=7, then letting I={zi1,zi2,zi3} gives us the desired result.
If q>7, then F∗q∖{±zi1,±zi2,±zi3} is nonempty. By (2.6), we obtain that
F∗q∖{±zi1,±zi2,±zi3}={±z1,...,±zi1−1,±zi1+1,...,±zi2−1,±zi2+1,...,±zi3−1,±zi3+1,...,±zq−12}. | (2.7) |
Since 2∤k, k−3 is even. Evidently, the sum of the first k−3 elements on the right hand side of (2.7) is equal to zero because zi+(−zi)=0 for all integers 1≤i≤q−12. Then the first k−3 elements on the right hand side of (2.7) together with the three elements zi1,zi2,zi3 gives us the desired result. Thus Lemma 2.8 is true if 2∤k.
This completes the proof of Lemma 2.8.
In this section, we use the lemmas presented in the previous to give the proofs of Theorem 1.4 and Corollary 1.6. At first, we show Theorem 1.4.
Proof of Theorem 1.4. Since degu(x)=k, one may let u(x)=λxk+νxk−1+f≤k−2(x) with λ∈F∗q,ν∈Fq and f≤k−2(x)∈Fq[x] being a polynomial of degree at most k−2. Then (u(D),ck−1(u(x)))=(u(D),ν). By Lemma 2.2, we have that (u(D),ν) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if (λ−1u(D),λ−1ν) is a deep hole of GPRSq(D,k). But λ−1u(x)=wk(x)+rk(x), where wk(x):=xk and
rk(x):=λ−1νxk−1+λ−1f≤k−2(x). |
Then one has
(λ−1u(D),λ−1ν)=(wk(D)+rk(D),λ−1ν)=(wk(D),0)+(rk(D),λ−1ν). |
Since degrk(x)≤k−1, by the definition of GPRSq(D,k) we have (rk(D),λ−1ν)∈GPRSq(D,k). Then it follows from Lemma 2.1 that (λ−1u(D),λ−1ν) is a deep hole of GPRSq(D,k) if and only if (wk(D),0) is a deep hole of GPRSq(D,k). Then we can deduce that (u(D),ck−1(u(x))) is a deep hole of GPRSq(D,k) if and only if (wk(D),0) is a deep hole of GPRSq(D,k).
We denote ˉwk:=(wk(D),0). Let G be the generator matrix of GPRSq(D,k) as given in (2.5). Then we have
(Gˉwk)=(1…10y1…yq−l0⋮⋮⋮⋮yk−21…yk−2q−l0yk−11…yk−1q−l1yk1…ykq−l0):=(ˉG1,…,ˉGq−l,ˉGq−l+1). |
Now we pick k+1 distinct integers with 1≤j1<⋯<jk+1≤q−l+1.
Case 1. jk+1≤q−l. Then one has
det(ˉGj1,…,ˉGjk+1)=det(1…1yj1…yjk+1⋮⋮⋮yk−1j1…yk−1jk+1ykj1…ykjk+1)=V(yj1,…,yjk+1)=∏1≤t<s≤k+1(yjs−yjt)≠0. |
Case 2. jk+1=q−l+1. We can compute and get that
det(ˉGj1,…,ˉGjk,ˉGjq−l+1)=det(1…10yj1⋯yjk0⋮⋮⋮⋮yk−2j1…yk−2jk0yk−1j1…yk−1jk1yk1…ykjk0)=−det(1…1yj1⋯yjk⋮⋮⋮yk−2j1…yk−2jkykj1…ykjk). | (3.1) |
Now we introduce an auxiliary polynomial g(y) as follows:
g(y)=det(1…11yj1⋯yjky⋮⋮⋮⋮yk−1j1…yk−1jkyk−1ykj1…ykjkyk). |
Then Lemma 2.4 tells us that
g(y)=(∏1≤s<t≤k(yjt−yjs))k∏i=1(y−yji):=k∑i=0aiyi. |
This infers that
ak−1=−(k∑i=1yji)∏1≤s<t≤k(yjt−yjs). | (3.2) |
But
ak−1=−det(1…1yj1⋯yjk⋮⋮⋮yk−2j1…yk−2jkykj1…ykjk). | (3.3) |
Finally, (3.1) together with (3.2) and (3.3) gives us that
det(ˉGj1,…,ˉGjk,ˉGjq−l+1)=−(k∑i=1yji)∏1≤s<t≤k(yjt−yjs). | (3.4) |
By Lemma 2.5, we know that GPRSq(D,k) is a [q−l+1,k] MDS code which implies that
d(GPRSq(D,k))=q−l+1−k+1=q−l−k+2. |
Then by Lemma 2.6, one can deduce that
ρ(GPRSq(D,k))=d(GPRSq(D,k))−1=q−l−k+2−1=q−l+1−k. | (3.5) |
It then follows immediately from Lemma 2.7 that ˉwk=(wk(D),0) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if the (k+1)×(q−l+1) matrix (Gˉwk) can be served as the generator matrix of a MDS code, if and only if any k+1 columns of (Gˉwk) are linear independent, if and only if for any 1≤j1<⋯<jk+1≤q−l+1, one has
det(ˉGj1,…,ˉGjk+1)≠0. | (3.6) |
By the discussion in Cases 1 and 2, (3.4) tells us that (3.6) holds if and only if for any 1≤j1<⋯<jk≤q−l, one has k∑i=1yji≠0. Hence we can derive that (wk(D),0) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if the sum ∑y∈Iy is nonzero for any subset I⊆D with #(I)=k as desired.
Finally, we can conclude that (u(D),ck−1(u(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if the sum ∑y∈Iy is nonzero for any subset I⊆D with #(I)=k.
This finishes the proof of Theorem 1.4.
We can now use Theorem 1.4 to show Corollary 1.6.
Proof of Corollary 1.6. Let l=1 and a1=0. Then D=F∗q. By Lemma 2.8, there exist a subset I⊆F∗q with #(I)=k such that ∑y∈Iy=0. It then follows from Theorem 1.4 that the received word (u(F∗q),ck−1(u(x))) = (u(F∗q),γ) is not a deep hole of the primitive projective Reed-Solomon code PPRSq(F∗q,k). Therefore Corollary 1.6 is proved.
In this section, we give the proofs of Theorem 1.5 and Corollary 1.7. We begin with the proof of Theorem 1.5.
Proof of Theorem 1.5. First of all, we note that j is an integer with 1≤j≤l. We introduce a polynomial fj(x) as follows:
fj(x)=(x−aj)q−2, |
and define a word ˉfj associated to fj(x) by
ˉfj:=(fj(D),ck−1(fj(x))). |
Then uj(x)=λjfj(x)+νjxk−1+f(j)≤k−2(x) which implies that
ck−1(uj(x))=λjck−1(fj(x))+νj. | (4.1) |
It follows from (4.1) that
(uj(D),ck−1(uj(x)))=(λjfj(D)+νjxk−1(D)+f(j)≤k−2(D),λjck−1(fj(x))+νj)=(λjfj(D),λjck−1(fj(x)))+(νjxk−1(D)+f(j)≤k−2(D),νj)=λjˉfj+(νjxk−1(D)+f(j)≤k−2(D),νj). |
But
deg(νjxk−1(x)+f(j)≤k−2(x))≤k−1 |
and
ck−1(νjxk−1(x)+f(j)≤k−2(x))=νj. |
Hence
(νjxk−1(D)+f(j)≤k−2(D),νj)∈GPRSq(D,k). |
It follows from Lemmas 2.1 and 2.2 that the received word (uj(D),ck−1(uj(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if ˉfj is a deep hole of GPRSq(D,k).
Let G be the generator matrix of GPRSq(D,k) as given in (2.5). Since yi≠aj for all integers i with 1≤i≤q−l, we have (yi−aj)q−2=(yi−aj)−1. It then follows that
(Gˉfj)=(1…10y1…yq−l0⋮⋮⋮⋮yk−21…yk−2q−l0yk−11…yk−1q−l1(y1−aj)−1…(yq−l−aj)−1ck−1(fj(x))):=(ˆG1,…,ˆGq−l+1). | (4.2) |
On the other hand, from Lemma 2.7 we can deduce that ˉfj=(fj(D),ck−1(fj(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k), if and only if (Gˉfj) generates a MDS code, by Lemma 2.3, if and only if any k+1 columns of (Gˉfj) are linear independent, if and only if for all k+1 integers j1,…,jk+1 with 1≤j1<⋯<jk+1≤q−l+1, one has
det(ˆGj1,…,ˆGjk+1)≠0. | (4.3) |
In what follows, we choose arbitrarily k+1 integers j1,…,jk+1 such that 1≤j1<⋯<jk+1≤q−l+1. Consider the following two cases.
Case 1. jk+1≠q−l+1. Then k+1≤jk+1≤q−l and by (4.2), one has
(ˆGj1,…,ˆGjk+1)=(1…1yj1…yjk+1⋮⋮⋮yk−1j1…yk−1jk+1(yj1−aj)−1…(yjk+1−aj)−1). |
Thus one can deduce that
det(ˆGj1,…,ˆGjk+1)=(k+1∏i=1(yji−aj)−1)det(yj1−aj…yjk+1−ajyj1(yj1−aj)…yjk+1(yjk+1−aj)⋮⋮⋮yk−1j1(yj1−aj)…yk−1jk+1(yjk+1−aj)1…1)=(k+1∏i=1(yji−aj)−1)det(yj1…yjk+1⋮⋮⋮ykj1…ykjk+11…1) |
=(−1)k(k+1∏i=1(yji−aj)−1)V(yj1,…,yjk+1)=(−1)k(k+1∏i=1(yji−aj)−1)∏1≤s<t≤k+1(yjt−yjs)≠0 |
since yj1,…,yjk+1 are pairwise distinct.
Case 2. jk+1=q−l+1. Then 1≤j1<⋯<jk≤q−l. From (4.2) and Lemma 2.4, we can deduce that
det(ˆGj1,…,ˆGjk,ˆGjq−l+1)=det(1…10yj1⋯yjk0⋮⋮⋮⋮yk−2j1…yk−2jk0yk−1j1…yk−1jk1(yj1−aj)−1…(yjk−aj)−1ck−1(fj(x)))=ck−1(fj(x))det(1…1yj1⋯yjk⋮⋮⋮yk−1j1…yk−1jk)−det(1…1yj1⋯yjk⋮⋮⋮yk−2j1…yk−2jk(yj1−aj)−1…(yjk−aj)−1)=ck−1(fj(x))V(yj1,…,yjk)−det(1…1yj1⋯yjk⋮⋮⋮yk−2j1…yk−2jk(yj1−aj)−1…(yjk−aj)−1)=ck−1(fj(x))V(yj1,…,yjk)−(k∏i=1(yji−aj)−1)det(yj1…yjk⋮⋮⋮yk−1j1…yk−1jk1…1)=ck−1(fj(x))V(yj1,…,yjk)+(−1)k(k∏i=1(yji−aj)−1)V(yj1,…,yjk)=(ck−1(fj(x))+(−1)kk∏i=1(yji−aj)−1))∏1≤s<t≤k(yjt−yjs)=(ck−1(fj(x))+k∏i=1(aj−yji)−1))∏1≤s<t≤k(yjt−yjs). | (4.4) |
Now from Cases 1 and 2, we can deduce by (4.4) that (4.3) holds for all k+1 integers j1,…,jk+1 with 1≤j1<⋯<jk+1≤q−l+1 if and only if for all integers j1,…,jk with 1≤j1<⋯<jk≤q−l, one has
ck−1(fj(x))+k∏i=1(aj−yji)−1≠0, |
which is equivalent to
ck−1(fj(x))k∏i=1(aj−yji)+e≠0. | (4.5) |
Since fj(x)=(x−aj)q−2, the binomial theorem gives us that
ck−1(fj(x))=(q−2k−1)(−aj)q−k−1. |
Then one derives that (4.5) holds for all integers j1,…,jk with 1≤j1<⋯<jk≤q−l if and only if the following is true:
(q−2k−1)(−aj)q−k−1k∏i=1(aj−yji)+e≠0, | (4.6) |
or equivalently,
(q−2k−1)aq−k−1jk∏i=1(yji−aj)+e≠0 | (4.7) |
since q is odd. In other words, ˉfj=(fj(D),ck−1(fj(x))) is a deep hole of the generalized projective Reed-Solomon code GPRSq(D,k) if and only if the sum
(q−2k−1)aq−1−kj∏y∈I(y−aj)+e |
is nonzero for any subset I⊆D with #(I)=k. Hence the desired result follows immediately. The proof of Theorem 1.5 is complete.
We can now present the proof of Corollary 1.7 as the conclusion of this paper.
Proof of Corollary 1.7. Letting l=1 and a1=0 gives us that D=F∗q. Then it follows from a1=0 that
(q−2k−1)aq−1−kj∏y∈I(y−aj)+e=0⋅(q−2k−1)∏y∈I(y−aj)+e=e≠0 |
for any subset I⊆D with #(I)=k. Hence by Theorem 1.5, one can deduce that (uj(D),ck−1(uj(x)))=(u(F∗q),δ) is a deep hole of PPRSq(F∗q,k). This ends the proof of Corollary 1.7.
The authors would like to thank the anonymous referees for their very careful reading of the manuscript and helpful comments. This work was supported partially by National Science Foundation of China Grant #11771304, by the Fundamental Research Funds for the Central Universities and by Foundation of Sichuan Provincial Department of Education under Grant # 2016ZB0342.
We declare that we have no conflict of interest.
[1] |
Y. Li, D. Wan, On error distance of Reed-Solomon codes, Sci. China, Ser. A: Math., 51 (2008), 1982-1988. doi: 10.1007/s11425-008-0066-3
![]() |
[2] |
V. Guruswami, M. Sudan, Improved decoding of Reed-Solomon and algebraic-geometry codes, IEEE Trans. Inform. Theory, 45 (1999), 1757-1767. doi: 10.1109/18.782097
![]() |
[3] |
V. Guruswami, A. Vardy, Maximum-likelihood decoding of Reed-Solomon codes is NP-hard, IEEE Trans. Inform. Theory, 51 (2005), 2249-2256. doi: 10.1109/TIT.2005.850102
![]() |
[4] |
A. Dür, The decoding of extended Reed-Solomon codes, Discrete Math., 90 (1991), 21-40. doi: 10.1016/0012-365X(91)90093-H
![]() |
[5] |
J. Li, D. Wan, On the subset sum problem over finite fields, Finite Fields Th. App., 14 (2008), 911-929. doi: 10.1016/j.ffa.2008.05.003
![]() |
[6] |
R. Wu, S. Hong, On deep holes of standard Reed-Solomon codes, Sci. China Math., 55 (2012), 2447-2455. doi: 10.1007/s11425-012-4499-3
![]() |
[7] |
S. Hong, R. Wu, On deep holes of generalized Reed-Solomon codes, AIMS Math., 1 (2016), 96-101. doi: 10.3934/Math.2016.2.96
![]() |
[8] |
J. Zhuang, D. Lin, C. Lv, Determining deep hole trees of generalized Reed-Solomon codes and an application (in Chinese), Sci. Sin. Math., 47 (2017), 1615-1620. doi: 10.1360/N012017-00014
![]() |
[9] | J. Zhang, D. Wan, On deep holes of projective Reed-Solomon codes, 2016 IEEE Internal Symposium on Information Theory, (2016), 925-929. |
[10] |
X. Xu, S. Hong, Y. Xu, On deep holes of primitive projective Reed-Solomon codes (in Chinese), Sci. Sin. Math., 48 (2018), 1087-1094. doi: 10.1360/N012017-00064
![]() |
[11] | J. Van lint, Introduction to coding theory, 3 Eds., Heidelberg: Springer-Verlag Berlin, 1998. |
1. | Xiaofan Xu, Yongchao Xu, Shaofang Hong, Some results on ordinary words of standard Reed-Solomon codes, 2019, 4, 2473-6988, 1336, 10.3934/math.2019.5.1336 | |
2. | Daniele Bartoli, Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco, On planes through points off the twisted cubic in PG(3,q) and multiple covering codes, 2020, 67, 10715797, 101710, 10.1016/j.ffa.2020.101710 | |
3. | Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco, On the weight distribution of the cosets of MDS codes, 2021, 0, 1930-5346, 0, 10.3934/amc.2021042 |