Abstract
A storage code is an assignment of symbols to the vertices of a connected graph G(V, E) with the property that the value of each vertex is a function of the values of its neighbors, or more generally, of a certain neighborhood of the vertex in G. In this work we introduce a new construction method of storage codes, enabling one to construct new codes from known ones via an interleaving procedure driven by resolvable designs. We also study storage codes on \({\mathbb Z}\) and \({\mathbb Z}^2\) (lines and grids), finding closed-form expressions for the capacity of several one and two-dimensional systems depending on their recovery set, using connections between storage codes, graphs, anticodes, and difference-avoiding sets.

Similar content being viewed by others
Notes
We only require each column to contain all the elements from the block and do not impose any ordering.
Every 2-(v, k, 1) resolvable design yields \((k!)^{\frac{v(v-1)}{k(k-1)}} (s!)^{\frac{v-1}{k-1}}\) orthogonal families. To see this, note that there are \(v(v-1)/k(k-1)\) blocks and \((v-1)/(k-1)\) parallel classes, and we can rearrange elements in each column and permute the columns of each matrix.
The Cartesian product of two graphs \(G_1 = (V_1, E_1)\) and \(G_2 = (V_2, E_2)\) is defined by \(G = (V,E)\), where \(V = V_1 \times V_2\); \(((u,u'),(v,v'))\in E\) if and only if \(u=v\) and \((u',v') \in E_2\) or \(u' = v'\) and \((u,v) \in E_1\).
The proof follows the proof of Lemma 4.1, with the only difference that we take \(A_n = \{ (m,\mu ) \in [n] \times \{1,\ldots , s\}: m + R \notin [n]\}\).
References
Ahlswede R., Aydinian H., Khachatryan L.: On perfect codes and related concepts. Des. Codes Cryptogr. 22(3), 221–237 (2001).
Arbabjolfaei F., Kim Y.-H.: Three stories on a two-sided coin: Index coding, locally recoverable distributed storage, and guessing games on graphs. In: 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 843–850 (2015).
Arbabjolfaei F., Kim Y.-H.: Fundamentals of index coding. Found. Trends Commun. Inf. Theory 14(3–4), 163–346 (2018).
Bar-Yossef Z., Birk Y., Jayram T.S., Kol T.: Index coding with side information. IEEE Trans. Inf. Theory 57(3), 1479–1494 (2011).
Barg A., Elishco O., Gabrys R., Yaakobi E.: Recoverable systems on lines and grids. In: IEEE International Symposium on Information Theory (ISIT), pp. 2637–2642 (2022).
Barg A., Schwartz M., Yohananov L.: Storage codes on coset graphs with asymptotically unit rate. Combinatorica (2024). https://doi.org/10.1007/s00493-024-00114-2.
Barg A., Zémor G.: High-rate storage codes on triangle-free graphs. IEEE Trans. Inf. Theory 68(12), 7787–7797 (2022).
Capobianco S.: Multidimensional cellular automata and generalization of Fekete’s lemma. Discret. Math. Theoret. Comput. Sci. (2008). https://doi.org/10.46298/dmtcs.442.
Capobianco S.: Fekete’s lemma for componentwise subadditive functions of two or more real variables. Acta Commentationes Univ. Tartuensis Math. (2022). https://doi.org/10.12697/ACUTM.2022.26.04.
Colbourn C.J., Dinitz J.H. (eds.): Handbook of Combinatorial Designs, 2nd edn., ser. Discrete Mathematics and its Applications (Boca Raton). Chapman & Hall/CRC, Boca Raton (2007).
Delsarte P.: An algebraic approach to the association schemes of coding theory. Philips Res. Repts. Suppl. 10, 5–97 (1973).
Elishco O., Barg A.: Recoverable systems. IEEE Trans. Inf. Theory 68(6), 3681–3699 (2022).
Etzion T.: Product constructions for perfect Lee codes. IEEE Trans. Inf. Theory 57(11), 7473–7481 (2011).
Etzion T.: Perfect Codes and Related Structures. World Scientific, Singapore (2022).
Georgii H.-O.: Gibbs Measures and Phase Transitions, 2nd edn Walter de Gruyter & Co., Berlin/New York (2011).
Golovnev A., Haviv I.: The (Generalized) Orthogonality Dimension of (Generalized) Kneser Graphs: Bounds and Applications. Theory of Computing, vol. 18, pp. 1–22 (2022), also: Proceedings of the 36th Computational Complexity Conference (2021).
Gopalan P., Huang C., Simitci H., Yekhanin S.: On the locality of codeword symbols. IEEE Trans. Inf. Theory 58(11), 6925–6934 (2011).
Huang H., Xiang Q.: Construction of storage codes of rate approaching one on triangle-free graphs. Des. Codes Cryptogr. 91(12), 3901–3913 (2023).
Knuth D.E.: The Art of Computer Programming: Fundamental Algorithms, vol. 1, 2nd edn Addison-Wesley Pub. Co., Reading (1973).
Krieger F.: The Ornstein-Weiss lemma for discrete amenable groups. Max Planck Institute for Mathematics, MPIM Preprint 48 (2010).
Mazumdar A.: Storage capacity of repairable networks. IEEE Trans. Inf. Theory 61(11), 5810–5821 (2015).
Mazumdar A., McGregor A., Vorotnikova S.: Storage capacity as an information-theoretic vertex cover and the index coding rate. IEEE Trans. Inf. Theory 65(9), 5580–5591 (2019).
Ornstein D.S., Weiss B.: Entropy and isomorphism theorems for actions of amenable groups. J. d’Analyse Math. 48(1), 1–141 (1987).
Ramkumar V., Balaji S.B., Sasidharan B., Vajha M., Krishnan M.N., Kumar P.V.: Codes for distributed storage. Found. Trends Commun. Inf. Theory 19(4), 547–813 (2022).
Rice A.: A maximal extension of the best-known bounds for the Furstenberg-Sárközy theorem. Acta Arith. 187(1), 1–41 (2019).
Riis S.: Information flows, graphs and their guessing numbers. Electron. J. Comb. 14(1), 17 (2007).
Sárkŏzy A.: On difference sets of sequences of integers. I. Acta Math. Hungar. 31(1–2), 125–149 (1978).
Shanmugam K., Dimakis A.G.: Bounding multiple unicasts through index coding and locally repairable codes. In: IEEE International Symposium on Information Theory, pp. 296–300 (2014).
Shi M., Xia Y., Krotov D.S.: A family of diameter perfect constant-weight codes from Steiner systems (2022).
Zhang T., Ge G.: On linear diameter perfect Lee codes with diameter 6. J. Comb. Theory Ser. A 201, 105816 (2024).
Zhang T., Zhou Y.: On the nonexistence of lattice tilings of \({Z}^n\) by Lee spheres. J. Comb. Theory Ser. A 165, 225–257 (2019).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by C. Mitchell.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The work of Alexander Barg was supported in part by NSF Grants CCF2104489, CCF2110113 (NSF-BSF), and CCF2330909. The work of Ohad Elishco was supported in part by NSF-BSF Grant CCF2020762. The work of Ryan Gabrys and Eitan Yaakobi was supported in part by NSF Grant CCF2212437. The work of Geyang Wang was supported in part by NSF-BSF Grant CCF2110113.
Linear programming bound
Linear programming bound
To describe the linear programming bound of Mazumdar et al. [22], let us first define a \(\tau \)-cover by gadgets on a graph \(G = (V, E)\). For a subset of vertices \(A\subset G\), let \(\textrm{cl}(A):=\{v: {\mathcal {N}}(v) \subseteq A \}\) be the closure of A which contains all vertices in A and their neighbors. A tuple \(g = (S_1, S_2, c_1,c_2)\) is called a gadget if
-
(1)
There exist two sets of vertices \(A,B \subseteq V\) such that \(S_1 = \textrm{cl}(A) \cup \textrm{cl}(B)\) and \(S_2 = \textrm{cl}(A) \cap \textrm{cl}(B)\). We call \(S_1\) the outside and \(S_2\) the inside of the gadget.
-
(2)
Colors \(c_1\) and \(c_2\) are picked from a fixed set of size \(\tau \), and they are assigned to all the vertices in \(S_1\), \(S_2\) respectively. Note that each vertex can have multiple assigned colors.
We call \((\{v\}, \emptyset , c_1,c_2)\) a trivial gadget, and \(w(g) = |A| + |B|\) the weight of gadget g. A collection of gadgets forms a \(\tau \)-cover if, for every color c, all the vertices with color c form a vertex cover. It was shown in [22, Theorem 8] that the total weight of the gadgets that form a \(\tau \)-cover provides an upper bound on \(\textsf{cap}(G)\). More formally, we have the following theorem.
Theorem A.1
(Linear programming (LP) bound [22]) Let \(\tau > 0\) be a fixed integer. For each gadget that contains \(S \subseteq V\), define \(\chi _{g,S} = {\mathbb {1}}\{g\text { is involved in the cover}\}\), where S is a part of g. Thus, each gadget g corresponds to two variables \(\chi _{g, S_1}\) and \(\chi _{g, S_2}\), where \(S_1\) and \(S_2\) are the outside and the inside of g, respectively. Denote by \(c_g(S)\) the color of the vertex set S in gadget g.
The capacity \(\textsf{cap}(G)\) is bounded above by the solution to the following linear program:
Note that conditions (12) guarantee that the sets form a vertex cover, and (13) states that the inside is involved in the gadget cover if and only if the outside is also involved.
Proof of Proposition 3.7:
Let \(g = (S_1, S_2, c_1, c_2)\) be a gadget on G and define \(\bar{g} = ({\bar{S}}_1, {\bar{S}}_2,c_1,c_2),\) where \(S_1:= \bigcup _{v \in S_1} \bar{v}\) and \(S_2:= \bigcup _{v \in S_2} \bar{v}\). If \(g_1, \ldots , g_m\) forms a \(\tau \)-cover of G, then it is straightforward to check that \(\bar{g}_1, \ldots , \bar{g}_m\) forms a \(\tau \)-cover of \(\bar{G}\).
Note that \(w(\bar{g}) = s w(g)\), thus \(\frac{1}{n\tau } w(g) = \frac{1}{ns\tau } w(\bar{g})\), and \(\bar{g}_1, \ldots , \bar{g}_m\) induce an upper bound that equals to the bound by \(g_1, \ldots , g_m\), which is \(\textsf{cap}(G)\) by our assumption. In other words, we have \(\textsf{cap}_{q^k}(\bar{G}) \le \textsf{cap}(G)\). The matching lower bound follows by Proposition 3.3.\(\square \)
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Barg, A., Elishco, O., Gabrys, R. et al. Storage codes and recoverable systems on lines and grids. Des. Codes Cryptogr. 92, 4145–4168 (2024). https://doi.org/10.1007/s10623-024-01481-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-024-01481-z