Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/FOCS.2006.13guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Approximately List-Decoding Direct Product Codes and Uniform Hardness Amplification

Published: 21 October 2006 Publication History

Abstract

We consider the problem of approximately locally listdecoding direct product codes. For a parameter k, the kwise direct product encoding of an N-bit message msg is an N^{k}-length string over the alphabet {0, 1}^k indexed by ktuples (i_1, . . . , i_k) \in {1, . . . ,N}^k so that the symbol at position (i_1, . . . , i_k) of the codeword is msg(i_1) . . . msg(i_k). Such codes arise naturally in the context of hardness amplification of Boolean functions via the Direct Product Lemma (and the closely related Yao's XOR Lemma), where typically k \ll N (e.g., k = poly logN). We describe an efficient randomized algorithm for approximate local list-decoding of direct product codes. Given access to a word which agrees with the k-wise direct product encoding of some message msg in at least an \in fraction of positions, our algorithm outputs a list of poly(1/\in) Boolean circuits computing N-bit strings (viewed as truth tables of logN-variable Boolean functions) such that at least one of them agrees with msg in at least 1 - \deltafraction of positions, for \delta = O(k^{-0.1}), provided that \in =\Omega(poly(1/k)); the running time of the algorithm is polynomial in logN and 1/\in. When \in \ge e-^{k^{\alpha} } for a certain constant \alpha> 0, we get a randomized approximate listdecoding algorithm that runs in time quasi-polynomial in 1/\in (i.e., (1/\in)^{poly log 1/\in}). By concatenating the k-wise direct product codes with Hadamard codes, we obtain locally list-decodable codes over the binary alphabet, which can be efficiently approximately list-decoded from fewer than 1/2 - \in fraction of corruptions as long as \in = \Omega(poly(1/k)). As an immediate application, we get uniform hardness amplification for P^{NP_\parallel}, the class of languages reducible to NP through one round of parallel oracle queries: If there is a language in P^{NP_\parallel} that cannot be decided by any BPP algorithm on more that 1 - 1/n^{\Omega(1)} fraction of inputs, then there is another language in P^{NP_\parallel} that cannot be decided by any BPP algorithm on more than 1/2 + 1/n^{\omega(1)} fraction of inputs.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
FOCS '06: Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science
October 2006
748 pages
ISBN:0769527205

Publisher

IEEE Computer Society

United States

Publication History

Published: 21 October 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2012)Certifiable quantum diceProceedings of the forty-fourth annual ACM symposium on Theory of computing10.1145/2213977.2213984(61-76)Online publication date: 19-May-2012
  • (2011)On Yao's XOR-lemmaStudies in complexity and cryptography10.5555/2028116.2028141(273-301)Online publication date: 1-Jan-2011
  • (2011)General hardness amplification of predicates and puzzlesProceedings of the 8th conference on Theory of cryptography10.5555/1987260.1987263(19-36)Online publication date: 28-Mar-2011
  • (2011)Hardness amplification within NP against deterministic algorithmsJournal of Computer and System Sciences10.1016/j.jcss.2010.06.00877:1(107-121)Online publication date: 1-Jan-2011
  • (2011)Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access CodesRevised Selected Papers of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography - Volume 674510.1007/978-3-642-54429-3_11(164-173)Online publication date: 24-May-2011
  • (2010)Near-optimal extractors against quantum storageProceedings of the forty-second ACM symposium on Theory of computing10.1145/1806689.1806713(161-170)Online publication date: 5-Jun-2010
  • (2009)The uniform hardcore lemma via approximate Bregman projectionsProceedings of the twentieth annual ACM-SIAM symposium on Discrete algorithms10.5555/1496770.1496899(1193-1200)Online publication date: 4-Jan-2009
  • (2009)New direct-product testers and 2-query PCPsProceedings of the forty-first annual ACM symposium on Theory of computing10.1145/1536414.1536435(131-140)Online publication date: 31-May-2009
  • (2008)Hardness amplification proofs require majorityProceedings of the fortieth annual ACM symposium on Theory of computing10.1145/1374376.1374461(589-598)Online publication date: 17-May-2008
  • (2008)Uniform direct product theoremsProceedings of the fortieth annual ACM symposium on Theory of computing10.1145/1374376.1374460(579-588)Online publication date: 17-May-2008
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media