Computational hardness and explicit constructions of error correcting codes

Mahdi Cheraghchi, Amin Shokrollahi, Avi Wigderson

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

We outline a procedure for using pseudorandom generators to construct binary codes with good properties, assuming the existence of sufficiently hard functions. Specifically, we give a polynomial time algorithm, which for every integers n and k, constructs polynomially many linear codes of block length n and dimension k, most of which achieving the Gilbert-Varshamov bound. The success of the procedure relies on the assumption that the exponential time class of E def = DTIME[2O(n)] is not contained in the sub-exponential space class DSPACE[2o(n)]. The methods used in this paper are by now standard within computational complexity theory, and the main contribution of this note is observing that they are relevant to the construction of optimal codes. We attempt to make this note self contained, and describe the relevant results and proofs from the theory of pseudorandomness in some detail.

Original languageEnglish
Title of host publication44th Annual Allerton Conference on Communication, Control, and Computing 2006
PublisherUniversity of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering
Pages1173-1179
Number of pages7
ISBN (Electronic)9781604237924
StatePublished - 2006
Externally publishedYes
Event44th Annual Allerton Conference on Communication, Control, and Computing 2006 - Monticello, United States
Duration: 27 Sep 200629 Sep 2006

Publication series

Name44th Annual Allerton Conference on Communication, Control, and Computing 2006
Volume3

Conference

Conference44th Annual Allerton Conference on Communication, Control, and Computing 2006
Country/TerritoryUnited States
CityMonticello
Period27/09/0629/09/06

Fingerprint

Dive into the research topics of 'Computational hardness and explicit constructions of error correcting codes'. Together they form a unique fingerprint.

Cite this