Towards 3-query locally decodable codes of subexponential length

被引:126
作者
Yekhanin, Sergey [1 ]
机构
[1] MIT, Cambridge, MA 02139 USA
关键词
theory; locally decodable codes; private information retrieval; Mersenne primes;
D O I
10.1145/1326554.1326555
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A q-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit code-word C(x), such that one can probabilistically recover any bit xi of the message by querying only q bits of the codeword C(x), even after some constant fraction of codeword bits has been corrupted. We give new constructions of three query LDCs of vastly shorter length than that of previous constructions. Specifically, given any Mersenne prime p = 2(t) - 1, we design three query LDCs of length N = exp(O(n(1/t))), for every n. Based on the largest known Mersenne prime, this translates to a length of less than exp(O(n(10) (7))), compared to exp(O(n(1/2))) in the previous constructions. It has often been conjectured that there are infinitely many Mersenne primes. Under this conjecture, our constructions yield three query locally decodable codes of length N = exp(n(O(1/log log n))) for infinitely many n. We also obtain analogous improvements for Private Information Retrieval (PIR) schemes. We give 3-server PIR schemes with communication complexity of O(n(10-7)) to access an n-bit database, compared to the previous best scheme with complexity O(n(1/5.25)). Assuming again that there are infinitely many Mersenne primes, we get 3-server PIR schemes of communication complexity n(O(1/log log n)) for infinitely many n. Previous families of LDCs and PIR schemes were based on the properties of low-degree multivariate polynomials over finite fields. Our constructions are completely different and are obtained by constructing a large number of vectors in a small dimensional vector space whose inner products are restricted to lie in an algebraically nice set.
引用
收藏
页数:16
相关论文
共 31 条
[1]  
Ambainis A, 1997, LECT NOTES COMPUT SC, V1256, P401
[2]  
Babai L., 1998, LINEAR ALGEBRA METHO
[3]  
Babai Laszlo, 1991, P 23 ANN ACM S THEOR, P21, DOI [10.1145/103418.103428, DOI 10.1145/103418.103428]
[4]   A tight lower bound for restricted pir protocols [J].
Beigel, R ;
Fortnow, L ;
Gasarch, W .
COMPUTATIONAL COMPLEXITY, 2006, 15 (01) :82-91
[5]   General constructions for information-theoretic private information retrieval [J].
Beimel, A ;
Ishai, Y ;
Kushievitz, E .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2005, 71 (02) :213-247
[6]  
Beimel A, 2002, ANN IEEE SYMP FOUND, P261, DOI 10.1109/SFCS.2002.1181949
[7]  
Chor B, 1995, AN S FDN CO, P41, DOI 10.1109/SFCS.1995.492461
[8]   Private information retrieval [J].
Chor, B ;
Goldreich, O ;
Kushilevitz, E ;
Sudan, M .
JOURNAL OF THE ACM, 1998, 45 (06) :965-982
[9]   Better lower bounds for locally decodable codes [J].
Deshpande, A ;
Jain, R ;
Kavitha, T ;
Lokam, SV ;
Radhakrishnan, J .
17TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2002, :184-193
[10]  
Gasarch W.I., 2004, B EATCS, V82, P72