Reed Solomon Codes Against Adversarial Insertions and Deletions

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this work, we study the performance of Reed-Solomon codes against adversarial insertion-deletion (insdel) errors.We prove that over fields of size nO(k) there are [n, k] Reed-Solomon codes that can decode from n - 2k + 1 insdel errors and hence attain the half-Singleton bound. We also give a deterministic construction of such codes over much larger fields (of size nk O(k)). Nevertheless, for k = O(log n/ log log n) our construction runs in polynomial time. For the special case k = 2, which received a lot of attention in the literature, we construct an [n, 2] Reed-Solomon code over a field of size O(n4) that can decode from n - 3 insdel errors. Earlier constructions required an exponential field size. Lastly, we prove that any such construction requires a field of size Ω(n3).

Original languageEnglish
Title of host publication2022 IEEE International Symposium on Information Theory, ISIT 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2940-2945
Number of pages6
ISBN (Electronic)9781665421591
DOIs
StatePublished - 2022
Event2022 IEEE International Symposium on Information Theory, ISIT 2022 - Espoo, Finland
Duration: 26 Jun 20221 Jul 2022

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2022-June
ISSN (Print)2157-8095

Conference

Conference2022 IEEE International Symposium on Information Theory, ISIT 2022
Country/TerritoryFinland
CityEspoo
Period26/06/221/07/22

Fingerprint

Dive into the research topics of 'Reed Solomon Codes Against Adversarial Insertions and Deletions'. Together they form a unique fingerprint.

Cite this