Johnson type bounds on constant dimension codes

被引:92
作者
Xia, Shu-Tao [2 ,3 ]
Fu, Fang-Wei [1 ,4 ]
机构
[1] Nankai Univ, Key Lab Pure Math & Combinator, Tianjin 300071, Peoples R China
[2] Tsinghua Univ, Grad Sch, Shenzhen 518055, Guangdong, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing, Jiangsu, Peoples R China
[4] Nankai Univ, Chern Inst Math, Tianjin 300071, Peoples R China
关键词
Constant dimension codes; Linear authentication codes; Binary constant weight codes; Johnson bounds; Steiner structures; Random network coding;
D O I
10.1007/s10623-008-9221-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Very recently, an operator channel was defined by Koetter and Kschischang when they studied random network coding. They also introduced constant dimension codes and demonstrated that these codes can be employed to correct errors and/or erasures over the operator channel. Constant dimension codes are equivalent to the so-called linear authentication codes introduced by Wang, Xing and Safavi-Naini when constructing distributed authentication systems in 2003. In this paper, we study constant dimension codes. It is shown that Steiner structures are optimal constant dimension codes achieving the Wang-Xing-Safavi-Naini bound. Furthermore, we show that constant dimension codes achieve the Wang-Xing-Safavi-Naini bound if and only if they are certain Steiner structures. Then, we derive two Johnson type upper bounds, say I and II, on constant dimension codes. The Johnson type bound II slightly improves on the Wang-Xing-Safavi-Naini bound. Finally, we point out that a family of known Steiner structures is actually a family of optimal constant dimension codes achieving both the Johnson type bounds I and II.
引用
收藏
页码:163 / 172
页数:10
相关论文
共 8 条
[1]   Perfect byte-correcting codes [J].
Etzion, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (07) :3140-3146
[2]  
Ho T, 2003, 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, P442
[3]   A random linear network coding approach to multicast [J].
Ho, Tracey ;
Medard, Muriel ;
Koetter, Ralf ;
Karger, David R. ;
Effros, Michelle ;
Shi, Jun ;
Leong, Ben .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (10) :4413-4430
[4]   Coding for errors and erasures in random network coding [J].
Koetter, Ralf ;
Kschischang, Frank R. .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :791-+
[5]  
MACWILLIAMS FJ, 1981, THEORY ERROR CORRECT
[6]   Codes and anticodes in the Grassman graph [J].
Schwartz, M ;
Etzion, T .
JOURNAL OF COMBINATORIAL THEORY SERIES A, 2002, 97 (01) :27-42
[7]  
Tonchev V.D., 1998, HDB CODING THEORY
[8]   Linear authentication codes: Bounds and constructions [J].
Wang, HX ;
Xing, CP ;
Safavi-Naini, R .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (04) :866-872