Proceedings of the Forty-Eighth Annual ACM Symposium on Theory of Computing 2016
DOI: 10.1145/2897518.2897584
|View full text |Cite
|
Sign up to set email alerts
|

Reed-Muller codes achieve capacity on erasure channels

Abstract: Abstract-We introduce a new approach to proving that a sequence of deterministic linear codes achieves capacity on an erasure channel under maximum a posteriori decoding. Rather than relying on the precise structure of the codes our method exploits code symmetry. In particular, the technique applies to any sequence of linear codes where the blocklengths are strictly increasing, the code rates converge, and the permutation group of each code is doubly transitive. In other words, we show that symmetry alone impl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(33 citation statements)
references
References 80 publications
(87 reference statements)
0
33
0
Order By: Relevance
“…EXIT functions figure prominently in the study of belief propagation decoding [22], as well as in the recent proof by Kudekar et al that Reed-Muller codes achieve capacity on erasure channels [5]. Let us briefly recall their proof; we will then be able to see how Theorem 4 offers a potential route to generalizing the argument for other channels.…”
Section: Theorem 4 For Any Symmetric Cq Channel W With Input Alphabementioning
confidence: 94%
See 1 more Smart Citation
“…EXIT functions figure prominently in the study of belief propagation decoding [22], as well as in the recent proof by Kudekar et al that Reed-Muller codes achieve capacity on erasure channels [5]. Let us briefly recall their proof; we will then be able to see how Theorem 4 offers a potential route to generalizing the argument for other channels.…”
Section: Theorem 4 For Any Symmetric Cq Channel W With Input Alphabementioning
confidence: 94%
“…Instead, for a length-n code C encoding length-k messages, the corresponding randomness extractor function is given by f px n q "M . As a simple example of the use of Theorem 3, consider the recent result that Reed-Muller codes achieve the capacity of the binary erasure channel [5]. By duality, this implies that Reed-Muller codes can also extract randomness at the optimal rate from the source describing the joint input and output to the BEC.…”
Section: Theorem 3 For |ψY As Inmentioning
confidence: 99%
“…Although Abbe et al did not provide an efficient decoding algorithm, the algorithm we present directly applies here (Section 3.2). The abstraction of the "error-locating pairs" method presented in Section 3 should hopefully be applicable in other contexts too, especially considering the generality of the results of [KP15,KMŞU15].…”
Section: Our Contributionsmentioning
confidence: 99%
“…The results above are obtained by applying recent results of Abbe, Shpilka and Wigderson (STOC, 2015), Kumar and Pfister (2015) and Kudekar et al (2015) regarding the ability of Reed-Muller codes to correct random erasures.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation