skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: More on codes for combinatorial composite DNA
Abstract In this paper, we focus on constructing unique-decodable and list-decodable codes for the recently studied (t, e)-composite-asymmetric error-correcting codes ((t, e)-CAECCs). Let$$\mathcal {X}$$ X be an$$m \times n$$ m × n binary matrix in which each row has Hamming weightw. If at mosttrows of$$\mathcal {X}$$ X contain errors, and in each erroneous row, there are at mosteoccurrences of$$1 \rightarrow 0$$ 1 0 errors, we say that a (t, e)-composite-asymmetric error occurs in$$\mathcal {X}$$ X . For general values ofm, n, w, t, ande, we propose new constructions of (t, e)-CAECCs with redundancy at most$$(t-1)\log (m) + O(1)$$ ( t - 1 ) log ( m ) + O ( 1 ) , whereO(1) is independent of the code lengthm. In particular, this yields a class of (2, e)-CAECCs that are optimal in terms of redundancy. Whenmis a prime power, the redundancy can be further reduced to$$(t-1)\log (m) - O(\log (m))$$ ( t - 1 ) log ( m ) - O ( log ( m ) ) . To further increase the code size, we introduce a combinatorial object called a weak$$B_e$$ B e -set. When$$e = w$$ e = w , we present an efficient encoding and decoding method for our codes. Finally, we explore potential improvements by relaxing the requirement of unique decoding to list-decoding. We show that when the list size ist! or an exponential function oft, there exist list-decodable (t, e)-CAECCs with constant redundancy. When the list size is two, we construct list-decodable (3, 2)-CAECCs with redundancy$$\log (m) + O(1)$$ log ( m ) + O ( 1 ) more » « less
Award ID(s):
2212437
PAR ID:
10590771
Author(s) / Creator(s):
; ; ; ;
Publisher / Repository:
Springer Science + Business Media
Date Published:
Journal Name:
Designs, Codes and Cryptography
Volume:
93
Issue:
8
ISSN:
0925-1022
Format(s):
Medium: X Size: p. 3437-3462
Size(s):
p. 3437-3462
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract We continue the program of proving circuit lower bounds via circuit satisfiability algorithms. So far, this program has yielded several concrete results, proving that functions in$$\mathsf {Quasi}\text {-}\mathsf {NP} = \mathsf {NTIME}[n^{(\log n)^{O(1)}}]$$ Quasi - NP = NTIME [ n ( log n ) O ( 1 ) ] and other complexity classes do not have small circuits (in the worst case and/or on average) from various circuit classes$$\mathcal { C}$$ C , by showing that$$\mathcal { C}$$ C admits non-trivial satisfiability and/or#SAT algorithms which beat exhaustive search by a minor amount. In this paper, we present a new strong lower bound consequence of having a non-trivial#SAT algorithm for a circuit class$${\mathcal C}$$ C . Say that a symmetric Boolean functionf(x1,…,xn) issparseif it outputs 1 onO(1) values of$${\sum }_{i} x_{i}$$ i x i . We show that for every sparsef, and for all “typical”$$\mathcal { C}$$ C , faster#SAT algorithms for$$\mathcal { C}$$ C circuits imply lower bounds against the circuit class$$f \circ \mathcal { C}$$ f C , which may bestrongerthan$$\mathcal { C}$$ C itself. In particular:#SAT algorithms fornk-size$$\mathcal { C}$$ C -circuits running in 2n/nktime (for allk) implyNEXPdoes not have$$(f \circ \mathcal { C})$$ ( f C ) -circuits of polynomial size.#SAT algorithms for$$2^{n^{{\varepsilon }}}$$ 2 n ε -size$$\mathcal { C}$$ C -circuits running in$$2^{n-n^{{\varepsilon }}}$$ 2 n n ε time (for someε> 0) implyQuasi-NPdoes not have$$(f \circ \mathcal { C})$$ ( f C ) -circuits of polynomial size. Applying#SAT algorithms from the literature, one immediate corollary of our results is thatQuasi-NPdoes not haveEMAJ∘ACC0∘THRcircuits of polynomial size, whereEMAJis the “exact majority” function, improving previous lower bounds againstACC0[Williams JACM’14] andACC0∘THR[Williams STOC’14], [Murray-Williams STOC’18]. This is the first nontrivial lower bound against such a circuit class. 
    more » « less
  2. Abstract Let$$\mathbb {F}_q^d$$ F q d be thed-dimensional vector space over the finite field withqelements. For a subset$$E\subseteq \mathbb {F}_q^d$$ E F q d and a fixed nonzero$$t\in \mathbb {F}_q$$ t F q , let$$\mathcal {H}_t(E)=\{h_y: y\in E\}$$ H t ( E ) = { h y : y E } , where$$h_y:E\rightarrow \{0,1\}$$ h y : E { 0 , 1 } is the indicator function of the set$$\{x\in E: x\cdot y=t\}$$ { x E : x · y = t } . Two of the authors, with Maxwell Sun, showed in the case$$d=3$$ d = 3 that if$$|E|\ge Cq^{\frac{11}{4}}$$ | E | C q 11 4 andqis sufficiently large, then the VC-dimension of$$\mathcal {H}_t(E)$$ H t ( E ) is 3. In this paper, we generalize the result to arbitrary dimension by showing that the VC-dimension of$$\mathcal {H}_t(E)$$ H t ( E ) isdwhenever$$E\subseteq \mathbb {F}_q^d$$ E F q d with$$|E|\ge C_d q^{d-\frac{1}{d-1}}$$ | E | C d q d - 1 d - 1
    more » « less
  3. Abstract Given a compact doubling metric measure spaceXthat supports a 2-Poincaré inequality, we construct a Dirichlet form on$$N^{1,2}(X)$$ N 1 , 2 ( X ) that is comparable to the upper gradient energy form on$$N^{1,2}(X)$$ N 1 , 2 ( X ) . Our approach is based on the approximation ofXby a family of graphs that is doubling and supports a 2-Poincaré inequality (see [20]). We construct a bilinear form on$$N^{1,2}(X)$$ N 1 , 2 ( X ) using the Dirichlet form on the graph. We show that the$$\Gamma $$ Γ -limit$$\mathcal {E}$$ E of this family of bilinear forms (by taking a subsequence) exists and that$$\mathcal {E}$$ E is a Dirichlet form onX. Properties of$$\mathcal {E}$$ E are established. Moreover, we prove that$$\mathcal {E}$$ E has the property of matching boundary values on a domain$$\Omega \subseteq X$$ Ω X . This construction makes it possible to approximate harmonic functions (with respect to the Dirichlet form$$\mathcal {E}$$ E ) on a domain inXwith a prescribed Lipschitz boundary data via a numerical scheme dictated by the approximating Dirichlet forms, which are discrete objects. 
    more » « less
  4. Abstract We propose a generic compiler that can convert any zero-knowledge (ZK) proof for SIMD circuits to general circuits efficiently, and an extension that can preserve the space complexity of the proof systems. Our compiler can immediately produce new results improving upon state of the art.By plugging in our compiler to Antman, an interactive sublinear-communication protocol, we improve the overall communication complexity for general circuits from$$\mathcal {O}(C^{3/4})$$ O ( C 3 / 4 ) to$$\mathcal {O}(C^{1/2})$$ O ( C 1 / 2 ) . Our implementation shows that for a circuit of size$$2^{27}$$ 2 27 , it achieves up to$$83.6\times $$ 83.6 × improvement on communication compared to the state-of-the-art implementation. Its end-to-end running time is at least$$70\%$$ 70 % faster in a 10Mbps network.Using the recent results on compressed$$\varSigma $$ Σ -protocol theory, we obtain a discrete-log-based constant-round zero-knowledge argument with$$\mathcal {O}(C^{1/2})$$ O ( C 1 / 2 ) communication and common random string length, improving over the state of the art that has linear-size common random string and requires heavier computation.We improve the communication of a designatedn-verifier zero-knowledge proof from$$\mathcal {O}(nC/B+n^2B^2)$$ O ( n C / B + n 2 B 2 ) to$$\mathcal {O}(nC/B+n^2)$$ O ( n C / B + n 2 ) .To demonstrate the scalability of our compilers, we were able to extract a commit-and-prove SIMD ZK from Ligero and cast it in our framework. We also give one instantiation derived from LegoSNARK, demonstrating that the idea of CP-SNARK also fits in our methodology. 
    more » « less
  5. A<sc>bstract</sc> In this paper we explorepp→W±(ℓ±ν)γto$$ \mathcal{O}\left(1/{\Lambda}^4\right) $$ O 1 / Λ 4 in the SMEFT expansion. Calculations to this order are necessary to properly capture SMEFT contributions that grow with energy, as the interference between energy-enhanced SMEFT effects at$$ \mathcal{O}\left(1/{\Lambda}^2\right) $$ O 1 / Λ 2 and the Standard Model is suppressed. We find that there are several dimension eight operators that interfere with the Standard Model and lead to the same energy growth, ~$$ \mathcal{O}\left({E}^4/{\Lambda}^4\right) $$ O E 4 / Λ 4 , as dimension six squared. While energy-enhanced SMEFT contributions are a main focus, our calculation includes the complete set of$$ \mathcal{O}\left(1/{\Lambda}^4\right) $$ O 1 / Λ 4 SMEFT effects consistent with U(3)5flavor symmetry. Additionally, we include the decay of theW±→ ℓ±ν, making the calculation actually$$ \overline{q}{q}^{\prime}\to {\ell}^{\pm}\nu \gamma $$ q ¯ q ± νγ . As such, we are able to study the impact of non-resonant SMEFT operators, such as$$ \left({L}^{\dagger }{\overline{\sigma}}^{\mu }{\tau}^IL\right)\left({Q}^{\dagger }{\overline{\sigma}}^{\nu }{\tau}^IQ\right) $$ L σ ¯ μ τ I L Q σ ¯ ν τ I Q Bμν, which contribute to$$ \overline{q}{q}^{\prime}\to {\ell}^{\pm}\nu \gamma $$ q ¯ q ± νγ directly and not to$$ \overline{q}{q}^{\prime}\to {W}^{\pm}\gamma $$ q ¯ q W ± γ . We show several distributions to illustrate the shape differences of the different contributions. 
    more » « less