IIIT Hyderabad Publications |
|||||||||
|
Higher Order MDS Codes for Combinatorial List Decoding and Distributed Multi-User Secret SharingAuthor: Harshithanjani Athi 20171199 Date: 2023-11-04 Report no: IIIT/TH/2023/153 Advisor:Lalitha Vadlamani AbstractIn this thesis two problems have been considered. The first one is related to the structure of higher order MDS codes which are a generalization of traditional MDS codes and the second one is related to distributed multi-user secret sharing. When data is transmitted over noisy channels, errors can occur, corrupting the received information. Traditional error-correcting codes like Reed-Solomon or Hamming codes are designed to correct a specific number of errors. However, they have a limitation that they can only correct up to a certain number of errors beyond which they fail to recover the original message. In many scenarios, such as wireless communication or storage systems, the number of errors can be quite high, and standard error-correction techniques might not be sufficient. This is where list decoding, proposed independently by Elias and Wozencraft, comes into play. Instead of trying to pinpoint the exact original message, list decoding provides a list of possible messages that could have been transmitted. By doing so, it offers a more flexible and robust approach to error correction, allowing for a higher number of correctable errors. The decoding radius is the maximum number of errors that can be corrected by the code. By increasing the decoding radius and allowing for a list of possible codewords, list decodable codes can handle a higher number of errors and provide a more robust approach to error correction. In a recent work by Shangguan and Tamo, an upper bound on the size of a list deocodable codes, called the Generalized Singleton bound, is derived for a given list size and decoding radius. The codes which meet this bound with equality are optimally list decodable codes. In our first problem, we study a recently introduced class of higher order MDS codes which are closely related to the optimally list decodable codes. For certain parameter regimes, we identify conditions under which performing expurgation and shortening (see Section 2.2) like operations on the higher order MDS codes based on Reed-Solomon codes obtained using Vandermonde matrix results in new higher order MDS codes with a related set of parameters. More specifically, we identify the conditions under which (n1, k1)-MDS(ℓ1) codes can be obtained from (n2, k2)-MDS(ℓ2) codes via various techniques where (n, k)-MDS(ℓ) codes denote higher order MDS codes of length n, dimension k and order ℓ ≥ 1. We also obtain a new field size upper bound for the existence of such codes which arguably improves over the best known existing bound in some parameter regimes. We believe that these results will aid in efficient constructions of higher order MDS codes. In the second problem, we focus on a Distributed Multi-User Secret Sharing (DMUSS) problem. Distributed Multi-User Secret Sharing is motivated by the need for secure and efficient ways to share sensitive information among multiple users in a decentralized manner. The traditional secret sharing scheme involves a single dealer dividing a secret into shares and distributing them among a group of users. However, this centralized approach has limitations, especially when dealing with large-scale systems or scenarios with multiple secrets and a large number of users. In DMUSS, each user can request access to a specific subset of secrets. This access control mechanism ensures that users only gain access to the secrets they are authorized to see. In this thesis we consider a DMUSS setting involving a dealer, n storage nodes and m secrets. Each user requests a subset of t out of the m secrets. Previous work in this setting addressed the case of t = 1 which we extend to handle general values of t. The users download shares from storage nodes based on the access structure and reconstruct their secrets. We establish a necessary condition on the access structure to ensure certain privacy conditions. Additionally, we establish a connection between access structures and disjunct matrices which are majorly used in the Group testing. In the Distributed Secret Sharing Protocol proposed for our setting, we utilize various disjunct matrix constructions and compare their performance in terms of the number of storage nodes and communication complexity. Moreover, we derive bounds on the optimal communication complexity of a distributed secret sharing protocol. Full thesis: pdf Centre for Others |
||||||||
Copyright © 2009 - IIIT Hyderabad. All Rights Reserved. |