Capacity Achieving Codes From Randomness Conductors

被引:4
|
作者
Cheraghchi, Mahdi [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland
来源
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4 | 2009年
关键词
EXTRACTORS; ERROR;
D O I
10.1109/ISIT.2009.5205931
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We give a general framework for construction of small ensembles of capacity achieving linear codes for a wide range of (not necessarily memoryless) discrete symmetric channels, and in particular, the binary erasure and symmetric channels. The main tool used in our constructions is the notion of randomness extractors and lossless condensers that are regarded as central tools in theoretical computer science. Same as random codes, the resulting ensembles preserve their capacity achieving properties under any change of basis. Our methods can potentially lead to polynomial-sized ensembles; however, using known explicit constructions of randomness conductors we obtain specific ensembles whose size is as small as quasipolynomial in the block length. By applying our construction to Justesen's concatenation scheme (Justesen, 1972) we obtain explicit capacity achieving codes for BEC (resp., BSC) with almost linear time encoding and almost linear time (resp., quadratic time) decoding and exponentially small error probability. The explicit code for BEC is defined and capacity achieving for every block length.
引用
收藏
页码:2639 / 2643
页数:5
相关论文
共 22 条
  • [1] Capacity Achieving Two-Write WOM Codes
    Shpilka, Amir
    LATIN 2012: THEORETICAL INFORMATICS, 2012, 7256 : 631 - 642
  • [2] Low Complexity Product Codes with LDPC Codes Achieving Ultra Low BER
    Chen, Weigang
    Dong, Tongxin
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 1312 - 1316
  • [3] On the Capacity-Achieving Input of Channels With Phase Quantization
    Bernardo, Neil Irwin
    Zhu, Jingge
    Evans, Jamie
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (09) : 5866 - 5888
  • [4] Sunflowers and Robust Sunflowers from Randomness Extractors
    Li, Xin
    Lovett, Shachar
    Zhang, Jiapeng
    THEORY OF COMPUTING, 2022, 18 : 1 - 18
  • [5] Secure Computation from Leaky Correlated Randomness
    Gupta, Divya
    Ishai, Yuval
    Maji, Hemanta K.
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 701 - 720
  • [6] Reed-Muller Codes Achieve Capacity on Erasure Channels
    Kudekar, Shrinivas
    Kumar, Santhosh
    Mondelli, Marco
    Pfister, Henry D.
    Sasoglu, Eren
    Urbanke, Rudiger
    STOC'16: PROCEEDINGS OF THE 48TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2016, : 658 - 669
  • [7] Reed-Muller Codes Achieve Capacity on Erasure Channels
    Kudekar, Shrinivas
    Kumar, Santhosh
    Mondelli, Marco
    Pfister, Henry D.
    Sasoglu, Eren
    Urbanke, Rudiger L.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (07) : 4298 - 4316
  • [8] Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model
    Pinto, Adriana C. B.
    Dowsley, Rafael
    Morozov, Kirill
    Nascimento, Anderson C. A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) : 5566 - 5571
  • [9] Capacity-Achieving Iterative LMMSE Detection for MIMO-NOMA Systems
    Liu, Lei
    Yuen, Chau
    Guan, Yong Liang
    Li, Ying
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 868 - 873
  • [10] A Two-Stage Capacity-Achieving Demodulation/Decoding Method for Random Matrix Channels
    Truhachev, Dmitri
    Schlegel, Christian
    Krzymien, Lukasz
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (01) : 136 - 146