Abstract
A new interpolation-based decoding principle for interleaved Gabidulin codes is presented. The approach consists of two steps: First, a multi-variate linearized polynomial is constructed which interpolates the coefficients of the received word and second, the roots of this polynomial have to be found. Due to the specific structure of the interpolation polynomial, both steps (interpolation and root-finding) can be accomplished by solving a linear system of equations. This decoding principle can be applied as a list decoding algorithm (where the list size is not necessarily bounded polynomially) as well as an efficient probabilistic unique decoding algorithm. For the unique decoder, we show a connection to known unique decoding approaches and give an upper bound on the failure probability. Finally, we generalize our approach to incorporate not only errors, but also row and column erasures.
Similar content being viewed by others
Notes
Throughout this paper, \([a,b]\) is a short-hand notation for the set of integers \( \{i:a \le i \le b\}\).
References
Ahlswede R., Cai N., Li S., Yeung R.: Network information flow. IEEE Trans. Inf. Theory 46(4), 1204–1216 (2000).
Bachoc C., Vallentin F., Passuello A.: Bounds for projective codes from semidefinite programming. Adv. Math. Commun. 7(2), 127–145 (2013).
Delsarte P.: Bilinear forms over a finite field with applications to coding theory. J. Comb. Theory Ser. A 25(3), 226–241 (1978).
Etzion T., Silberstein N.: Error-correcting codes in projective spaces via rank-metric codes and Ferrers diagrams. IEEE Trans. Inf. Theory 55(7), 2909–2919 (2009).
Etzion T., Vardy A.: Error-correcting codes in projective space. IEEE Trans. Inf. Theory 57(2), 1165–1173 (2011).
Gabidulin E.M.: Theory of codes with maximum rank distance. Probl. Inf. Transm. 21(1), 3–16 (1985).
Gabidulin E.M., Pilipchuk N.I.: Error and erasure correcting algorithms for rank codes. Des. Codes Cryptogr. 49(1–3), 105–122 (2008).
Gadouleau M., Yan Z.: Complexity of decoding Gabidulin codes. In: 42nd Annual Conference on Information Sciences Sciences and Systems (CISS), pp. 1081–1085 (2008).
Guruswami V.: Linear-algebraic list decoding of folded Reed–Solomon codes. In: IEEE Conference on Computational Complexity, pp. 77–85 (2011).
Guruswami V., Sudan M.: Improved decoding of Reed–Solomon and algebraic-geometry codes. IEEE Trans. Inf. Theory 45(6), 1757–1767 (1999).
Guruswami V., Wang C.: Linear-algebraic list decoding for variants of Reed–Solomon codes. IEEE Trans. Inf. Theory 59(6), 3257–3268 (2013).
Ho T., Kötter R., Médard M., Karger D.R., Effros M.: The benefits of coding over routing in a randomized setting. In IEEE International Symposium on Information Theory (ISIT), p. 442 (2003).
Ho T., Médard M., Kötter R., Karger D.R., Effros M., Shi J., Leong B.: A random linear network coding approach to multicast. IEEE Trans. Inf. Theory 52(10), 4413–4430 (2006).
Kötter R., Kschischang F.R.: Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory 54(8), 3579–3591 (2008).
Li W., Sidorenko V.R., Chen D.: On transform-domain decoding of Gabidulin codes. In: International Workshop on Coding and Cryptography (WCC) (2013).
Lidl R., Niederreiter H.: Finite Fields, Series. Encyclopedia of Mathematics and Its Applications. Cambridge University Press, Cambridge (1996).
Loidreau P., Overbeck R.: Decoding rank errors beyond the error correcting capability. In: International Workshop on Algebraic and Combinatorial Coding Theory (ACCT), pp. 186–190 (2006).
Loidreau P.: A Welch–Berlekamp like algorithm for decoding Gabidulin codes. In: Coding and Cryptography-Revised Selected Papers of WCC 2005, vol. 3969, pp. 36–45 (2006).
Mahdavifar H., Vardy A.: List-decoding of subspace codes and rank-metric codes up to singleton bound. In: IEEE International Symposium on Information Theory (ISIT), pp. 1488–1492 (2012).
McEliece R.J.: On the average list size for the Guruswami–Sudan decoder. In: International Symposium on Communications Theory and Applications (ISCTA) (2003).
Menezes A.J., Blake I.F., Gao X., Mullin R.C., Vanstone S.A., Yaghoobian T.: Applications of Finite Fields, 1st edn. Springer, New York (1993).
Ore Ø.: On a special class of polynomials. Trans. Am. Math. Soc. 35, 559–584 (1933).
Ore Ø.: Theory of non-commutative polynomials. Ann. Math. 34(3), 480–508 (1933).
Overbeck R.: Public key cryptography based on coding theory. Ph.D. dissertation, TU Darmstadt, Darmstadt, Germany (2007).
Overbeck R.: Structural attacks for public key cryptosystems based on Gabidulin codes. J. Cryptol. 21(2), 280–301 (2008).
Roth R.M.: Maximum-rank array codes and their application to crisscross error correction. IEEE Trans. Inf. Theory 37(2), 328–336 (1991).
Sidorenko V.R., Bossert M.: Decoding interleaved Gabidulin codes and multisequence linearized shift-register synthesis. In: IEEE International Symposium on Information Theory (ISIT), pp. 1148–1152 (2010).
Sidorenko V.R., Jiang L., Bossert M.: Skew-feedback shift-register synthesis and decoding interleaved Gabidulin codes. IEEE Trans. Inf. Theory 57(2), 621–632 (2011).
Silva D.: Error control for network coding. Ph.D. dissertation, University of Toronto, Toronto, Canada (2009).
Silva D., Kschischang F.R.: Rank-metric codes for priority encoding transmission with network coding. In: Canadian Workshop on Information Theory (CWIT), pp. 81–84 (2007).
Silva D., Kschischang F.R.: Fast encoding and decoding of Gabidulin codes. In: IEEE International Symposium on Information Theory (ISIT), pp. 2858–2862 (2009).
Silva D., Kschischang F.R., Kötter R.: A rank-metric approach to error control in random network coding. IEEE Trans. Inf. Theory 54(9), 3951–3967 (2008).
Skachek V.: Recursive code construction for random networks. IEEE Trans. Inf. Theory 56(3), 1378–1382 (2010).
Sudan M.: Decoding of Reed–Solomon codes beyond the error-correction bound. J. Complex. 13(1), 180–193 (1997).
Wachter-Zeh A.: Bounds on list decoding of rank-metric codes. IEEE Trans. Inf. Theory 59(11), 7268–7277 (2013).
Wachter-Zeh A.: Decoding of block and convolutional codes in rank metric. Ph.D. dissertation, Ulm University, Ulm, Germany and Université de Rennes 1, Rennes, France (2013).
Wachter-Zeh A., Zeh A.: Interpolation-based decoding of interleaved Gabidulin codes. In: International Workshop on Coding and Cryptography (WCC) (2013).
Wang H., Xing C., Safavi-Naini R.: Linear authentication codes: bounds and constructions. IEEE Trans. Inf. Theory 49(4), 866–872 (2003).
Xia S., Fu F.: Johnson type bounds on constant dimension codes. Des. Codes Cryptogr. 50(2), 163–172 (2009).
Xie H., Yan Z., Suter B.W.: General linearized polynomial interpolation and its applications. In: IEEE International Symposium on Network Coding (Netcod), pp. 1–4 (2011).
Acknowledgments
The authors thank Vladimir Sidorenko for the valuable discussions and the reviewers for their suggestions that helped to improve the presentation of the paper. The work of A. Wachter-Zeh has been supported by the German Research Council (DFG) under Grant No. Bo867/21 and a Minerva Postdoctoral Fellowship. The work of A. Zeh has been supported by the German Research Council (DFG) under Grants No. Bo867/22 and Ze1016/01.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was partly presented at the International Workshop on Coding and Cryptography (WCC), Apr. 2013, Bergen, Norway [37].
This is one of several papers published in Designs, Codes and Cryptography comprising the “Special Issue on Coding and Cryptography”.
Appendix
Appendix
Lemma 12
(Row Space of Composition)
Let \({a}(x)\) and \({b}(x)\) denote two linearized polynomials in \(\mathbb {L}_{q^m}[x]\) with \(\deg _q {a}(x),\) \(\deg _q {b}(x) < m\). Let \(c(x) = b(a(x))\) and let \(\varvec{\beta }= (\beta _0 \ \beta _1 \ \dots \ \beta _{m-1})\) be a basis of \(\mathbb F_{q^m}\) over \(\mathbb F_{q}\). Let \(\mathbf A\in \mathbb F_{q}^{m \times m}\), \(\mathbf {C}\in \mathbb F_{q}^{m \times m}\) denote the matrix representations according to \(\mathcal {B}\) of
respectively. Then, for the row spaces the following holds:
Proof
Consider the linearized polynomials as linear maps over \(\mathbb F_{q^m}\). Then, the kernel of the map \({a}\) is equivalent to the set of roots of \({a}(x)\) in \(\mathbb F_{q^m}\), considered as a vector space over \(\mathbb F_{q}\). Since the roots of \({a}(x)\) are also roots of \(c(x) = {b}({a}(x))\), the kernels are connected by \(\ker ({a}) \subseteq \ker (c)\). For the right kernels of the matrices \(\ker (\mathbf A) \subseteq \ker (\mathbf C)\) holds, and the row spaces are related by \(\mathcal {R}_q\left( \mathbf C\right) \subseteq \mathcal {R}_q\left( \mathbf A\right) \). \(\square \)
Rights and permissions
About this article
Cite this article
Wachter-Zeh, A., Zeh, A. List and unique error-erasure decoding of interleaved Gabidulin codes with interpolation techniques. Des. Codes Cryptogr. 73, 547–570 (2014). https://doi.org/10.1007/s10623-014-9953-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-014-9953-5