On Determining Deep Holes of Generalized
Reed-Solomon Codes ⋆
Qi Cheng1 and Jiyou Li2 and Jincheng Zhuang1
arXiv:1309.3546v2 [cs.IT] 16 Dec 2013
1
School of Computer Science
The University of Oklahoma
Norman, OK 73019, USA.
Email: qcheng@cs.ou.edu, jzhuang@ou.edu
2
Department of Mathematics
Shanghai Jiao Tong University
Shanghai, PR China
Email: lijiyou@sjtu.edu.cn
Abstract. For a linear code, deep holes are defined to be vectors that
are further away from codewords than all other vectors. The problem of
deciding whether a received word is a deep hole for generalized ReedSolomon codes is proved to be co-NP-complete [9][5]. For the extended
Reed-Solomon codes RSq (Fq , k), a conjecture was made to classify deep
holes in [5]. Since then a lot of effort has been made to prove the
conjecture, or its various forms. In this paper, we classify deep holes
completely for generalized Reed-Solomon codes RSp (D, k), where p is a
prime, |D| > k > p−1
. Our techniques are built on the idea of deep hole
2
trees, and several results concerning the Erdös-Heilbronn conjecture.
Keywords: Reed-Solomon code, deep hole, deep hole tree, Erdös-Heilbronn
conjecture.
1
Introduction
Reed-Solomon codes are of special interest and importance both in theory and
practice of error-correcting.
Definition 1. Let Fq be a finite field with q elements and characteristic p. Let
D = {α1 , . . . , αn } ⊆ Fq be the evaluation set and vi ∈ F∗q , 1 6 i 6 n, be the
column multipliers. The set of codewords of the generalized Reed-Solomon code
RSq (D, k) of length n and dimension k over Fq is defined as
RSq (D, k) = {(v1 f (α1 ), . . . , vn f (αn )) ∈ Fnq | f (x) ∈ Fq [x], deg(f ) 6 k − 1}.
⋆
The research is partially supported by NSF under grants CCF-0830522 and CCF0830524 for Q.C. and J.Z., and by National Science Foundation of China (11001170)
and Ky and Yu-Fen Fan Fund Travel Grant from the AMS for J.L.
We will write generalized Reed-Solomon codes as GRS codes for short in the
sequel. If D = F∗q , it is called primitive. If D = Fq , it is called a singly-extended
GRS code. A GRS code is called normalized if its column multipliers are all
equal to 1. In this paper, we will work on the normalized GRS without loss of
generality.
The encoding algorithm of the GRS code can be described by the linear
map ϕ : Fkq → Fnq , in which a message (a1 , . . . , ak ) is mapped to a codeword
(f (α1 ), . . . , f (αn )), where f (x) = ak xk−1 + ak−1 xk−2 + · · · + a1 ∈ Fq [x].
The Hamming distance between two words is the number of their distinct
coordinates. The error distance of a received word u ∈ Fnq to the code is defined
as its minimum Hamming distance to codewords. The minimum distance of a
code, which is denoted by d, is the smallest distance between any two distinct
codewords of the code. The covering radius of a code is the maximum distance
from any vector in Fnq to the nearest codeword. A deep hole is a vector achieving
the covering radius. A linear code [n, k]q is called maximum distance separable
(in shot, MDS) if it attains the Singleton bound, i.e., d = n − k + 1. GRS code
is a linear MDS code, and its minimum distance is known to be n − k + 1 and
the covering radius is known to be n − k. Thus for the GRS code, u is a deep
hole if d(u, RSq (D, k)) = n − k. A linear code can be represented by a generator
matrix. In this paper, we assume that the rows of a generator matrix form a
basis for the code.
1.1
Related work
Efforts have been made to obtain an efficient decoding algorithm for GRS codes.
√
Given a received word u ∈ Fnq , if the error distance is smaller than n − nk,
then the list decoding algorithm of Sudan [17] and Guruswami-Sudan [8] solves
the decoding in polynomial time. However, in general, the maximum likelihood
decoding of GRS codes is NP-hard [9].
We would like to determine all the deep holes of the code. To this end, given
a received word u = (u1 , u2 , . . . , un ) ∈ Fnq , we consider the following Lagrange
interpolating polynomial
Q
n
X
j6=i (x − αj )
Q
∈ Fq [x],
u(x) =
ui
j6=i (αi − αj )
i=1
where D = {α1 , . . . , αn } is the evaluation set. The Lagrange interpolating polynomial is the only polynomial in Fq [x] of degree less than n that satisfies u(αi ) =
ui , 1 6 i 6 n. In this paper, we say that a function u(x) generates a vector u ∈ Fnq
if u = (u(α1 ), u(α2 ), . . . , u(αn )). We have the following conclusions:
– If deg(u) 6 k − 1, then u ∈ RSq (D, k) by definition and d(u, RSq (D, k)) = 0.
– If deg(u) = k, then it can be shown that u is a deep hole by the following
proposition [10], i.e., d(u, RSq (D, k)) = n − k.
Proposition 1. ([10]) For k 6 deg(u) 6 n − 1, we have the inequality
n − deg(u) 6 d(u, RSq (D, k)) 6 n − k.
2
When the degree of u(x) becomes larger than k, the situation becomes complicated for GRS codes. However, in the case of (singly-)extended GRS codes,
the situation seems to be much simpler. Cheng and Murray [5] conjectured in
2007 that the vectors generated by polynomial of degree k are the only possible
deep holes.
Conjecture 1. ([5]) A word u is a deep hole of RSq (Fq , k) if and only if deg(u) =
k.
There is an analogous conjecture for deep holes of primitive Reed-Solomon
codes by Wu and Hong [20].
Conjecture 2. ([20]) A word u is a deep hole of RSq (Fq∗ , k) if and only if:
u(x) = axk + f6k−1 (x), a 6= 0;
or
u(x) = bxq−2 + f6k−1 (x), b 6= 0;
where f6k−1 (x) denotes a polynomial with degree not larger than k − 1.
Cheng and Murray [5] got the first result by reducing the problem to the
existence of rational points on a hypersurface over Fq .
Theorem 1. [5] Let u ∈ Fqq such that 1 6 d := deg(u) − k 6 q − 1 − k. If
13
q > max(k 7+ǫ , d 3 +ǫ ) for some constant ǫ > 0, then u is not a deep hole.
Following a similar approach of Cheng-Wan [6], Li and Wan [12] improved
the above result with Weil’s character sum estimate.
Theorem 2. [12] Let u ∈ Fqq such that 1 6 d := deg(u) − k 6 q − 1 − k. If
2
8
q > max((k + 1)2 , d2+ǫ ), k > ( + 1)d + + 2
ǫ
ǫ
for some constant ǫ > 0, then u is not a deep hole.
Then Liao [13] proved the following result:
Theorem 3. [13] Let r > 1 be an integer. For any received word u ∈ Fqq , r 6
d := deg(u) − k 6 q − 1 − k, if
2r + 4
2
k+r
q > max(2
+2
+ d, d2+ǫ ), k > ( + 1)d +
ǫ
ǫ
2
for some constant ǫ > 0, then d(u, RSq (Fq , k)) 6 q − k − r, which implies that u
is not a deep hole.
Antonio Cafure ect. [4] proved the following result with tools of algebraic
geometry:
3
Theorem 4. [4] Let u ∈ Fqq such that 1 6 d := deg(u) − k 6 q − 1 − k. If
2
q > max((k + 1)2 , 14d2+ǫ ), k > ( + 1)d,
ǫ
for some constant ǫ > 0, then u is not a deep hole.
Using Weil’s character sum estimate and Li-Wan’s new sieve [11] for distinct
coordinates counting, Zhu and Wan [21] showed the following result:
Theorem 5. [21] Let r > 1 be an integer. For any received word u ∈ Fqq , r 6
d := deg(u) − k 6 q − 1 − k, there are positive constants c1 and c2 such that if
d < c1 q 1/2 , (
d+r
+ 1) log2 (q) < k < c2 q,
2
then d(u, RSq (Fq , k)) 6 q − k − r.
The deep hole problem for Reed-Solomon codes are also closely related to
the famous MDS conjecture in coding theory. On one hand, GRS codes are
MDS codes. On the other hand, it is known that all long enough MDS codes
are essentially GRS codes. Following the notation of [14], let Nmin (k, q) be the
minimal integer, if any, such that every [n, k] MDS code over GF (q) with n >
Nmin (k, q) is GRS and be q + 2 if no such integer exists. For the case of k = 3,
Segre [15] obtained the following result:
Theorem
6. [15] If q is odd, every [n, 3] MDS code over GF (q) with q −
√
q−7
< n 6 q + 1 is GRS.
4
When q = p is a prime, Voloch [18] obtained the following result:
Theorem 7. [18] If p is an odd prime number, every [n, 3] MDS code over
p
GF (p) with p −
+ 2 < n 6 p + 1 is GRS.
45
Further, there is a relation for Nmin (k + 1, q) and Nmin (k, q) [14] as follows:
Lemma 1. [14] For 3 6 k 6 q − 2, we have
Nmin (k + 1, q) 6 Nmin (k, q) + 1.
Simeon Ball [2] showed the following result:
Theorem 8. [2] Let S be a set of vectors of the vector space Fkq , with the property that every subset of S of size k is a basis. If |S| = q + 1 and k 6 p or
3 6 q − p + 1 6 k 6 q − 2, where p is the characteristic of Fq , then S is
equivalent to the following set:
{(1, α, α2 , . . . , αk−1 ) | α ∈ Fq } ∪ {(0, . . . , 0, 1)}.
4
1.2
Our result
In this paper, we classify the deep holes in many cases. Firstly, we show:
Theorem 9. Let p > 2 be a prime number, k > p−1
2 , D = {α1 , α2 , . . . , αn } with
k < n 6 p. The only deep holes of RSp (D, k) are generated by functions which
are equivalent to the following:
f (x) = xk ,
fδ (x) =
1
,
x−δ
where δ ∈ Fp \ D. Here two functions f (x) and g(x) are equivalent if and only
if there exists a ∈ F∗p and h(x) with degree less than k such that
g(x) = af (x) + h(x).
Our techniques are built on the idea of deep hole trees, and several results
concerning the Erdös-Heilbronn conjecture. We also show the following theorem
based on some results of finite geometry.
Theorem 10. Given a finite filed Fq with characteristic p > 2, we have
– If k + 1 6 p√or 3 6 q − p + 1 6 k + 1 6 q − 2, then Conjecture 1 is true.
q+1
, then Conjecture 2 is true.
– If 3 6 k <
4
p
– If 3 6 k <
, where q = p is prime, then Conjecture 2 is true.
45
This paper is organized as follows: Section 2 presents some preliminaries;
Section 3 describes the idea of the deep hole tree; Section 4 demonstrates the
proof of Theorem 9; Section 5 gives the proof of Theorem 10.
2
2.1
Preliminaries
A criterion for deep holes of linear MDS codes
By definition, deep holes of a linear code are words that has a maximum distance
to the code. In the case of linear MDS codes, there is another way to characterize
the deep hole as follows, which connects the concept of deep holes with the MDS
codes. The following is well known:
Proposition 2. Let Fq be a finite field with characteristic p. Suppose G is a
generator matrix for a linear MDS code C = [n, k]q with covering radius ρ =
n − k, then u ∈ Fnq is a deep hole of C if and only if
G
′
G =
u
generates another linear MDS code.
A proof is included in Appendix A for the sake of completeness.
5
2.2
Some additive combinatorics results
In this section, we introduce some additive combinatorics results that we will
use later. The first theorem is about the estimation of the size of restricted sum
sets, which is first proved by Dias da Silva and Hamidoune [16]. Then Alon et
al. [1] gave a simple proof using the polynomial method.
Theorem 11. [16,1] Let F be a field with characteristic p and n be a positive
integer. Then for any finite subset S ⊂ F we have
|n∧ S| > min{p, n|S| − n2 + 1},
where n∧ S denotes the set of all sums of n distinct elements of S.
Brakemeier [3] and Gallardo et al. [7] established the following theorem:
Theorem 12. [3,7] Let n be a positive integer and S ⊂ Z/nZ. If |S| >
then
2∧ S = Z/nZ,
n
2
+ 1,
where 2∧ S denotes the set of all sums of 2 distinct elements of S.
Hence we have the following corollary:
Corollary 1. Let Fp be a prime finite field, S ⊂ F∗p . If |S| >
element of F∗p is the product of two distinct elements of S.
p+1
2 ,
then each
Proof. Let g be a generator of F∗p . Let
S ′ = {e|g e ∈ S} ⊂ Z/(p − 1)Z.
For any given element α = g a ∈ F∗p , we need to show that there exist two distinct
elements b 6= c such that
ga = gbgc,
where b, c ∈ S ′ . This is equivalent to
a = b + c,
which follows from Theorem 12.
3
Construction of the deep hole tree
Let Fq = {α1 , α2 , · · · , αq = 0}. The polynomials in Fq [x] of degree less than q
form a Fq -linear space, with a basis
{1, x, . . . , xk−1 ,
k
Y
(x − αi ), . . . ,
i=1
6
q−1
Y
i=1
(x − αi )}.
Given a polynomial f (x) ∈ Fq [x] with degree q − 1 we have
f (x) = l(x) + c1
q−1
k
Y
Y
(x − αi ),
(x − αi ) + · · · + cq−k
i=1
i=1
where l(x) is of degree less than k, we want to determine when f (x) generates
a deep hole. By Proposition 2, f (x) generates a deep hole of RSq (Fq , k) if and
only if
G
′
G =
u
generates an MDS code, where G is the generator matrix of RSq (Fq , k), and
u = (f (α1 ), . . . , f (αq )).
Observe that the function, which generates a deep hole for RSq (D2 , k), also
generates a deep hole for RSq (D1 , k) if D1 ⊂ D2 . Instead of considering the
deep holes for RSq (Fq , k) at the first step, we propose to consider a smaller
evaluation set at the beginning and make it increase gradually. The advantage
of doing so is that we can prune as we increase the evaluation set instead of
exhausting search (c1 , . . . , cq−k ). To be more precise, firstly we determine c1 over
D1 = {α1 , . . . , αk+1 }, then we determine c2 over D2 = {α1 , . . . , αk+2 } based on
the knowledge of c1 , so on and so forth. We present the result as a tree, which
we will call a deep hole tree in the sequel.
Remark 1. Wu and Hong [19] showed that if D = Fq \ {β1 , . . . , βl } then fβi (x) =
1
x−βi generates a deep hole for RSq (D, k), where 1 6 i 6 l. We can also deduce
this from Proposition 2. For convenience, we will call these deep holes and deep
holes generated by a function of degree k expected deep holes.
Motivated by Remark 1, firstly we construct the expected deep hole tree as
follows:
– The root node is 1 without loss of generality, i.e., c1 = 1.
– There are p−k −1 branches of the tree, each with distinct length in [2, p−k].
And we designate the sequence of nodes in a branch with length l as bl .
• If l = p − k, then bp−k = {0, . . . , 0}.
• If 2 6 l 6 p− k − 1, then bl = (c1 , . . . , cl ), where f = x−α1 l+1 is equivalent
Qk+l−1
Qk
to c1 i=1 (x − αi ) + · · · + cl i=1 (x − αi ).
Proposition 3. The expected deep hole tree is a part of the full deep hole tree.
Proof. This follows from Remark 1.
Now we can construct the full deep hole tree based on the expected deep hole
tree.
– The root node is 1 without loss of generality, i.e., c1 = 1.
7
– The children {ci+1 } of a node ci , 1 6 i 6 q − k − 1 are defined as follows:
given the ancestors (c1 , . . . , ci ), for γ ∈ GF (q), if γ is the child of ci in the
expected deep hole tree, then keep it; otherwise, if
c1
k
Y
i=1
(x − αi ) + · · · + ci
k+i−1
Y
i=1
(x − αi ) + γ
k+i
Y
i=1
(x − αi )
satisfies the property of the function which generates a deep hole as in Proposition 2, then γ is a child of ci .
That is, we keep the nodes of the expected deep hole tree and add additional
ones if necessary. Now we illustrate the procedure to construct the deep hole
tree by one example.
Example 1. Let p = 7, k = 2. The evaluation set is ordered such that
αi = i, 1 6 i 6 7.
(1) The expected deep hole tree is as follows:
1
1
4
5
0
4
6
0
6
0
0
The root is corresponding to the evaluation set D1 = {1, 2, 3}. The expected
Q2
deep holes are generated by functions equivalent to f = i=1 (x − i). In depth
2, the evaluation set is D2 = {1, 2, 3, 4}. One of the expected deep holes is
Q2
Q3
generated by the function f = i=1 (x − i) + i=1 (x − i), which is equivalent
1
. In depth 3, the evaluation set is D3 = {1, 2, 3, 4, 5}. One of the
to f = x−5
Q3
Q2
expected deep holes is generated by the function f = i=1 (x − i) + 4 i=1 (x −
Q4
1
i) + 4 i=1 (x − i), which is equivalent to f = x−6
. In depth 4, the evaluation
set is D4 = {1, 2, 3, 4, 5, 6}. One of the expected deep holes is generated by the
Q2
Q3
Q4
Q5
function f = i=1 (x − i) + 5 i=1 (x − i) + 6 i=1 (x − i) + 6 i=1 (x − i), which
1
is equivalent to f = x . In depth 5, the evaluation set is D5 = {1, 2, 3, 4, 5, 6, 7}.
Q2
One of the expected deep holes is generated by the function f = i=1 (x − i).
(2) The full deep hole tree is as follows:
8
1
1
3
4
6
4
5
1
3
0
6
0
6
0
0
Note that there are more nodes here than the expected ones. For example,
in
depth
3, there
deep hole generated by the function f =
Q2
Q3 is an additional
Q4
there is an additional deep hole
i=1 (x − i) +
i=1 (x − i) + 3 Q
i=1 (x − i). Also,Q
Q
generated by the function f = 2i=1 (x − i) + 5 3i=1 (x − i) + 4i=1 (x − i).
4
Proof of Theorem 9
The basic idea of the proof of Theorem 9 is reducing the problem to some additive
number theory problems. We first present several lemmas.
Lemma 2. In depth d = 2, the nodes are the same in both the expected deep
hole tree and full deep hole tree.
Proof. We need to show that in depth d = 2, the nodes are the same in both
the expected deep hole tree and full deep hole tree.
In depth d = 2, the evaluation set is D = {α1 , α2 , . . . , αk+2 }, the candidate
generating function is
f (x) =
k
Y
i=1
(x − αi ) + c2
k+1
Y
i=1
(x − αi ),
c2 ∈ F p .
Designate the set of nodes in depth 2 of the expected deep hole tree as S.
Firstly, we show that if c2 ∈ S, then f (x) generates a deep hole. This follows
from Theorem 3. Note that there are p − (k + 1) of them. Now we show that
they are all distinct. Considering the following square matrix
1
1 ···
1
.
..
..
..
..
.
.
.
k−1
k−1
k−1 ,
G=
α2
· · · αk+2
α1
1
1
1
α1 −δ1 α2 −δ1 · · · αk+2 −δ1
1
1
1
α1 −δ2 α2 −δ2 · · · αk+2 −δ2
9
we compute
α1 − δ1
···
αk+2 − δ1
α1 ∗ (α1 − δ1 ) · · · αk+2 ∗ (αk+2 − δ1 )
..
..
k+2
..
Y
.
.
(αi − δ1 ) det(G) = k−1 .
k−1
α
∗
(α
−
δ
)
·
·
·
α
∗
(α
1
1
k+2 − δ1 )
1
k+2
i=1
1
···
1
αk+2 −δ1
α1 −δ1
···
α1 −δ2
αk+2 −δ2
=
α1
α21
..
.
αk1
1
α1 −δ1
α1 −δ2
= (−1)k
···
···
..
.
···
···
···
αk+2
α2k+2
..
.
αkk+2
1
αk+2 −δ1
αk+2 −δ2
1
α1
α21
..
.
···
···
···
..
.
1
αk+2
α2k+2
..
.
αk1
···
···
αkk+2
αk+2 −δ1
αk+2 −δ2
α1 −δ1
α1 −δ2
= (−1)k
1+
1
α1
α21
..
.
···
···
···
..
.
αk1
···
αkk+2
δ2 −δ1
· · · 1 + αk+2
−δ2
δ2 −δ1
α1 −δ2
= (−1)k (δ2 − δ1 )
1
αk+2
α2k+2
..
.
1
α1
α21
..
.
···
···
···
..
.
1
αk+2
α2k+2
..
.
αk1
···
···
αkk+2
1
α1 −δ2
6= 0.
1
αk+2 −δ2
The last step follows from the same argument as above. Hence we prove that c2
1
1
are different for f1 = x−δ
and f2 = x−δ
.
1
2
10
Next, we show that if c2 ∈
/ S then f (x) does not generate a deep hole.
Consider the following matrix
1
1 ···
1
α1
α2 · · · αk+2
..
..
..
..
G= .
,
.
.
.
k−1 k−1
k−1
α
α2
· · · αk+2
1
f (α1 ) f (α2 ) · · · f (αk+2 )
Qk
Qk
where f (i) = 0, 1 6 i 6 k, f (αk+1 ) = i=1 (αk+1 − αi ), f (αk+2 ) = i=1 (αk+2 −
Qk+1
αi ) + c2 i=1 (αk+2 − αi ).
Case 1. If
k+1
k
Y
Y
(αk+2 − αi )
(αk+2 − αi ) + c2
f (αk+2 ) =
i=1
i=1
=
k
Y
i=1
(αk+2 − αi )[1 + c2 (αk+2 − αk+1 )]
= 0,
1
i.e., c2 = αk+1 −α
, then there are k + 1 columns of G which are linearly
k+2
dependent. Thus f (x) does not generate a deep hole in this case.
Case 2. Suppose f (αk+2 ) 6= 0. For any k−1 elements {β1 , . . . , βk−1 } ⊂ {α1 , . . . , αk },
consider the submatrix
1 ··· 1
1
1
β1 · · · βk−1 αk+1
αk+2
.. . .
..
..
..
′
G = .
.
.
.
.
.
k−1
k−1
k−1
k−1
β
·
·
·
β
α
α
1
k−1
k+1
k+2
0 · · · 0 f (αk+1 ) f (αk+2 )
Thus det(G′ ) = 0 is equivalent to
f (αk+1 )
k−1
Y
i=1
(αk+2 − βi ) = f (αk+2 )
k−1
Y
i=1
(αk+1 − βi ),
that is,
k−1
Y αk+2 − βi
f (αk+2 )
=
f (αk+1 )
α
− βi
i=1 k+1
=
k−1
Y
(1 +
i=1
αk+2 − αk+1
).
αk+1 − βi
Hence for each subset of {β1 , . . . , βk−1 } ⊂ {α1 , . . . , αk }, there is a unique c2 such
that det(G′ ) = 0.
11
In total, there are k + 1 elements of candidate c2 such that the corresponding
f (x) does not generate a deep hole. This implies that if c2 ∈
/ S then f (x) does
not generate a deep hole.
In conclusion, in depth d = 2, the nodes in the full deep hole tree are exactly
those in the expected deep hole tree.
Lemma 3. Let p be an odd prime, k > p−1
2 , d > 2 be a positive integer and
Dd = {α1 , . . . , αk+d } ⊂ Fp , δ ∈ Fp \ Dd . For any γ ∈ Fp , there exists a subset
{β1 , . . . , βk } ⊂ Dd such that the matrix
1 ··· 1
1
β1 · · · βk
δ
..
..
.. . .
A= .
,
. .
.
k−1
k−1
k−1
β1 · · · β
δ
k
1
1
·
·
·
γ
β1 −δ
βk −δ
is singular.
Proof. Note that det(A) = det(A′ ) + det(A′′ ), where
1
1 ··· 1
1
β1
β1 · · · βk
δ
.
.. ′′ ..
.
A′ = .. . . . ..
,A = .
.
k−1
k−1
β1
β1 · · · β k−1 δ k−1
k
1
1
1
·
·
·
0
β1 −δ
βk −δ
β1 −δ
··· 1
· · · βk
.
..
. ..
· · · βkk−1
· · · βk1−δ
0
0
.
0
0
γ
Since
β1 − δ
···
βk − δ
1
β
(β
−
δ)
·
·
·
β
(β
−
δ)
δ
1
1
k
k
k
Y
..
..
..
′
.
.
(βi − δ) det(A ) =
.
.
.
.
k−1
k−1
i=1
k−1
β1 (β1 − δ) · · · βk (βk − δ) δ
1
···
1
0
β1
β12
= ...
···
···
..
.
k
β1 · · ·
1 ···
= (−1)k
βk
βk2
..
.
1
2δ
..
.
βkk kδ k−1
1
0
1
β1
β12
..
.
···
···
···
..
.
1
βk
βk2
..
.
0
1
2δ
..
.
β1k · · · βkk kδ k−1
12
1 ··· 1
d
dx 1
β1 · · · βk
d
dx x
= (−1)k β 2 · · · β 2
1
k
d 2
dx x
.. . . ..
. .
.
β1k · · · βkk
1
β1
d β2
1
= (−1)k
dx ..
.
x=δ
x=δ
x=δ
..
.
d k
dx x
···
···
···
..
.
1
βk
βk2
..
.
x=δ
1
x
x2
..
.
x=δ
β1k · · · βkk xk
k
Y
Y
d
(βj − βi ) (x − βi )
= (−1)k
dx
i=1
16i<j6k
thus
′
det(A ) = Qk
(−1)k
i=1 (βi
= Qk
=
Y
16i<j6k
#
" k
d Y
(x − βi )
(βj − βi )
dx i=1
Y
(βj − βi )
− δ) 16i<j6k
(−1)k
i=1 (βi
Y
− δ) 16i<j6k
(βj − βi )
k
X
i=1
k
Y
i=1
(δ − βi )
k
X
i=1
,
x=δ
x=δ
1
δ − βi
1
.
δ − βi
It follows that
det(A) = det(A′ ) + det(A′′ )
=
Y
16i<j6k
(βj − βi )
k
X
i=1
1
+γ
δ − βi
Y
16i<j6k
(βj − βi )
Hence det(A) = 0 is equivalent to
k
X
i=1
1
+ γ = 0.
δ − βi
1
{ δ−β
|i
i
Designate the set
∈ Dd } as S1 with cardinality k + d. Since
k, 2 6 d, from Theorem 11, we conclude that
|k ∧ S1 | > min{p, k|S1 | − k 2 + 1}
= p,
13
p−1
2
6
which implies that for each γ ∈ Fp , there exists a subset {β1 , . . . , βk } ⊂ Dk such
P
1
that ki=1 δ−β
+ γ = 0.
i
Lemma 4. Let p be an odd prime, k > p−1
2 , d > 2 be a positive integer and
Dd+1 = {α1 , . . . , αk+d+1 = δ} ⊂ Fp . For any δ ′ ∈ Fp , δ ′ ∈
/ Dd+1 , γ ∈ Fp , γ 6=
1
,
there
exists
a
subset
{β
,
.
.
.
,
β
}
⊂
D
\
{δ}
such
that
the matrix
′
1
k
d+1
δ−δ
is singular.
1
β1
..
.
···
···
..
.
1
βk
..
.
1
δ
..
.
B=
k−1
β1
· · · βkk−1 δ k−1
1
1
γ
β1 −δ ′ · · · βk −δ ′
Proof. Note that det(B) = det(B ′ ) + det(B ′′ ), where
1 ··· 1
0
1 ··· 1
1
β1 · · · βk
β1 · · · βk
0
δ
.. ′′ .. . .
..
..
.. . .
′
,
B
=
B = .
.
.
. .
.
.
0
.
k−1
k−1 k−1
k−1
k−1
β1
· · · βk
δ
β1
· · · βk
0
1
1
1
1
1
1
β1 −δ ′ · · · βk −δ ′ δ−δ ′
β1 −δ ′ · · · βk −δ ′ γ − δ−δ ′
Since
β1 − δ ′
···
βk − δ ′
δ − δ′
′
′
β1 (β1 − δ ) · · · βk (βk − δ )
δ(δ − δ ′ )
k
Y
.
.
..
..
..
..
(βi − δ) det(B ′ ) =
.
.
k−1
k−1
i=1
′
′
k−1
β1 (β1 − δ ) · · · βk (βk − δ ) δ
(δ − δ ′ )
1
···
1
1
β1
β12
= ...
···
···
..
.
k
β1 · · ·
1 ···
βk
βk2
..
.
δ
δ2
..
.
βkk δ k
1 1
1
β1
2
= (−1)k β1
..
.
···
···
···
..
.
1
βk
βk2
..
.
1
δ
δ2
..
.
β1k · · · βkk δ k
Y
= (−1)k
16i<j6k
14
(βj − βi )
k
Y
i=1
(δ − βi ),
we have
det(B ′ ) =
k
Y
Y
(−1)k
(δ − βi )
(β
−
β
)
Qk
j
i
(δ − δ ′ ) i=1 (βi − δ ′ ) 16i<j6j
i=1
1
=
δ − δ′
Y
16i<j6k
k
Y
βi − δ
,
(βj − βi )
β
− δ′
i=1 i
and
det(B ′′ ) = (γ −
1
)
δ − δ′
Hence
det(B) =
1
δ − δ′
Y
16i<j6k
(βj − βi )
Y
16i<j6k
(βj − βi ).
k
Y
βi − δ
1
+ (γ −
)
′
β
−
δ
δ
−
δ′
i
i=1
16i<j6k
k
γ(δ − δ ′ ) − 1
1 Y βi − δ
+
=
(βj − βi )
δ − δ ′ i=1 βi − δ ′
δ − δ′
16i<j6k
"
#
Q
k
Y
βi − δ
16i<j6k (βj − βi )
=
+ γ(δ − δ ′ ) + 1 .
′
δ − δ′
β
−
δ
i
i=1
Y
"
Y
#
(βj − βi )
.
It follows that det(B) = 0 is equivalent to
k
Y
δ′ − δ
(1 +
) = 1 − γ(δ − δ ′ ).
′
β
−
δ
i
i=1
If |Dd | = k+2, we consider the “dual” version of the equality. From Corollary
δ ′ −δ
δ ′ −δ
1, there exist two distinct elements x, y ∈ Dd such that (1 + x−δ
′ )(1 + y−δ ′ ) = θ
for any θ ∈ F∗p , hence there exist k distinct elements in Dd such that
k
Y
δ′ − δ
(1 +
) = 1 − γ(δ − δ ′ ),
αi − δ ′
i=1
1
for any γ 6= δ−δ
′.
If |Dd | > k + 2, we select a subset D′ ⊂ Dd such that |D′ | = k + 2, then
apply the same argument as above.
Lemma 5. Let p be an odd prime, k > p−1
2 , d > 2 be a positive integer and
Dd+1 = {α1 , . . . , αk+d+1 = δ} ⊂ Fp . For any γ ∈ Fp , γ 6= δ k , there exists a
subset {β1 , . . . , βk } ⊂ Dd+1 \ {δ} such that the matrix
1 ··· 1
1
β1 · · · βk
δ
.. . .
..
..
B= .
.
.
.
k−1
k−1 k−1
β
· · · βk δ
1
β1k · · · βkk
γ
15
is singular.
Proof. Note that det(B) = det(B ′ ) + det(B ′′ ), where
1
β1
..
.
···
···
..
.
1
βk
..
.
1
δ
..
.
1
β1
..
.
···
···
..
.
1
βk
..
.
0
0
′′
B =
.
,B =
0
k−1
k−1 k−1
k−1
k−1
β1
· · · βk
δ
β1
· · · βk
0
1
1
1
1
k
·
·
·
δ
·
·
·
γ
−
δk
′
′
′
′
β1 −δ
βk −δ
β1 −δ
βk −δ
′
Since
Y
det(B ′ ) =
16i<j6k
Y
det(B ′′ ) =
(βj − βi )
16i<j6k
we have
Q
k
Y
(δ − βi ),
i=1
(βj − βi )(γ − δ k ),
k
Y
1
(δ − βi ) + γ − δ k .
det(B) =
1≤i<j≤k (βj − βi )
i=1
Thus det(B) = 0 is equivalent to
k
Y
i=1
(δ − βi ) = δ k − γ.
Consider S = {δ − α|α ∈ D}. If |Dd | = k + 2, we consider the “dual” version of
the equality. From Corollary 1, there exist two distinct elements x, y ∈ S such
that xy = δ k − γ for any δ k − γ ∈ F∗p , hence there exist k distinct elements in S
such that
k
Y
(δ − βi ) = δ k − γ,
i=1
k
for any γ 6= δ .
If |Dd | > k + 2, we select a subset S ′ ⊂ S such that S = k + 2, then apply
the same argument as above.
Now we prove Theorem 9.
Proof. (of Theorem 9) Proceed by induction on the depth of the full deep hole
tree.
Basis case This follows from Lemma 2.
Inductive step We need to show that if the set of nodes of the full deep hole
tree coincide with the nodes of the expected deep hole tree in the same depth
d > 2, then there are no additional nodes in depth d + 1 except the expected
ones. Denote the corresponding evaluation set by Dd = {α1 , . . . , αk+d } in depth
16
d and Dd+1 = {α1 , . . . , αk+d , αk+d+1 = δ} in depth d + 1. In order to show there
are no new nodes in depth d + 1, There are three cases to consider.
Case 1: We need to show the branch, which is corresponding to the function
1
f = x−δ
, will not continue in the depth d+ 1. It suffices to show that there exists
a subset {β1 , . . . , βk } ⊂ {α1 , . . . , αk+d } such that for any γ ∈ Fp and matrix
1 ··· 1
1
β1 · · · βk
δ
..
..
.. . .
A= .
. .
.
k−1
β1 · · · β k−1 δ k−1
k
1
1
γ
β1 −δ · · · βk −δ
we have det(A) = 0. This follows from Lemma 3.
Case 2: We need to show that the branch, which is corresponding to the function
1
′
f = x−δ
/ Dk+1 , has only one child in depth d + 1. It suffices to show
′ , where δ ∈
that there exists a subset {β1 , . . . , βk } ⊂ Dd such that for any δ ′ ∈
/ Dd+1 , γ ∈
1
Fp , γ 6= δ−δ
′ and matrix
1
β1
..
.
···
···
..
.
1
βk
..
.
1
δ
..
.
B=
k−1
β1
· · · βkk−1 δ k−1
1
1
γ
β1 −δ ′ · · · βk −δ ′
we have det(B) = 0. This follows from Lemma 4.
Case 3: We need to show that the branch, which is corresponding to the function
f = xk has only one child in each depth. It suffices to show that there exists a
subset {β1 , . . . , βk } ⊂ Dd such that for any γ 6= δ k and matrix
1 ··· 1
1
β1 · · · βk
δ
.. . .
..
..
B= .
.
.
.
k−1
k−1 k−1
β
·
·
·
β
δ
1
k
β1k · · · βkk
γ
we have det(B) = 0. This follows from Lemma 5.
From the principle of induction, the theorem is proved.
5
Proof of Theorem 10
Proof. There are 3 cases to prove.
17
Case 1. Let RSq (Fq , k) be an extended GRS code over the finite field Fq whose
characteristic p is odd. Let one of its generator matrix be
1
1 ··· 1
α1 α2 · · · αq
2
2
2
G = α1 α2 · · · αq ,
..
.. . .
.
.
. ..
.
α1k−1 α2k−1 · · · αqk−1
where α1 , . . . , αq are distinct element of Fq .
Suppose a word u ∈ Fqq is a deep hole of RSq (Fq , k). From proposition 2, this
is equivalent to the fact that
G
G′ =
u
generates another linear MDS code, where
u = (u1 , u2 , . . . , uq ).
Thus the set
S = {c1 , . . . , cq } ∪ {(0, . . . , 0, 1)},
where ci is the i-th column of G′ for 1 6 i 6 q, has size q + 1 and has the
property that every subset of S of size k + 1 is a basis.
Since k + 1 6 p or 3 6 q − p + 1 6 k + 1 6 q − 2, by Theorem 8, we deduce
that S is equivalent to the set
{(1, α, α2 , . . . , αk ) | α ∈ Fq } ∪ {(0, . . . , 0, 1)}.
Thus we conclude that
u(x) = axk + f6k−1 (x), a 6= 0;
where f6k−1 (x) denotes a polynomial with degree not larger than k − 1.
Case 2. Firstly, we get an estimation of Nmin (k, q). Combining Theorem 6 and
Lemma 1, we conclude that
Nmin (k, q) 6 Nmin (3, q) + k − 3
√
q−7
6 ⌈q −
⌉+k−3
4
6 q − 1.
Now let G be a generator matrix of RSq (Fq∗ , k) of the following form
1
1 ··· 1
α1 α2 · · · αq−1
2
2
2
G = α1 α2 · · · αq−1 ,
..
.. . .
..
.
. .
.
k−1
α1k−1 α2k−1 · · · αq−1
18
where α1 , . . . , αq−1 are distinct element of F∗q . From proposition 2, a word u ∈
Fqq−1 is a deep hole of RSq (Fq∗ , k) if and only if
G′ =
G
u
generates another linear MDS code C2 , where
u = (u1 , u2 , . . . , uq−1 ).
Since C2 is of length q − 1, thus the matrix G′ is equivalent to a Vandermonde
matrix of rank k. Notice that G is the given Vandermonde matrix of rank k − 1.
Thus there are two possibilities of u, i.e., its Lagrange interpolation polynomial
satisfies the following conditions:
u(x) = axk + f6k−1 (x), a 6= 0;
or
u(x) = bxq−2 + f6k−1 (x), b 6= 0;
where f6k−1 (x) denotes a polynomial with degree not larger than k − 1.
Case 3. This is similar with the proof of case 2 and we will make use of Theorem
7.
6
Concluding Remarks
In this paper, we classify deep holes completely for Generalized Reed-Solomon
codes RSp (D, k), where p is a prime, |D| > k > p−1
2 . We suspect that a similar
result hold over finite fields of composite order, and leave it as an open problem.
References
1. M. Nathanson A. Alon and I. Ruzsa. The polynomial method and restricted sums
of congruence classes. Journal of Number Theory, 56(2):404–417, 1996.
2. S. Ball. On sets of vectors of a finite vector space in which every subset of basis
size is a basis. Journal of the European Mathematical Society, 14(3):733–748, 2012.
3. W. Brakemeier. Eine anzahlformel von zahlen modulo n. Monatshefte für Mathematik, 85:277–282, 1978.
4. A. Cafure, G. Matera, and M. Privitelli. Singularities of symmetric hypersurfaces
and an application to reed-solomon codes. Advances in Mathematics of Communications, 6(1):69–94, 2012.
5. Q. Cheng and E. Murray. On deciding deep holes of Reed-Solomon codes. In
TAMC, pages 296–305, 2007.
6. Q. Cheng and D. Wan. On the list and bounded distance decodability of ReedSolomon codes. SIAM Journal on Computing, 37(1):195–209.
7. L. Gallardo, G. Grekos, and J. Pihko. On a variant of the Erdös-Ginzburg-Ziv
theorem. Acta Arithmetica, 89:331–336, 1999.
19
8. V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraicgeometry codes. IEEE Transaction on Information Theory, 45(6):1757–1767, 1999.
9. V. Guruswami and A. Vardy. Maximum-likelihood decoding of Reed-Solomon
codes is NP-hard. In Proceeding of SODA, 2005.
10. J. Li and D. Wan. On the subset sum problem over finite fields. Finite Fields and
Their Applications, 14:911–929, 2008.
11. J. Li and D. Wan. A new sieve for distinct coordinate counting. Science China
Mathematics, 53(9):2351–2362, 2010.
12. Y. Li and D. Wan. On error distance of Reed-Solomon codes. Science in China
Series A: Mathematics, 51:1982–1988, 2008.
13. Q. Liao. On Reed-Solomon codes. Chinese Annals of Mathematics, Series B,
32B:89–98, 2011.
14. R. M. Roth and A. Lempel. On MDS codes via cauchy matrices. IEEE Transactions
on Information Theory, 35:1314–1319, 1989.
15. B. Segre. Curve razionali normali e k-archi negli spazi finiti. Annali di Matematica
Pura ed Applicata, 39(1):357–379, 1955.
16. J. A. Dias Da Silva and Y. O. Hamidoune. Cyclic spaces for grassmann derivatives
and additive theory. Bulletin of the London Mathematical Society, 26:140–146,
1994.
17. M. Sudan. Decoding of Reed-Solomon codes beyond the error-correction bound.
Journal of Complexity, 13:180–193, 1997.
18. J. F. Voloch. Arcs in projective plans over prime fields. Journal of Geometry,
38:198–200, 1990.
19. R. Wu and S. Hong. On deep holes of generalized Reed-Solomon codes. 2012.
arXiv:1205.7016.
20. R. Wu and S. Hong. On deep holes of standard Reed-Solomon codes. Science
China Mathematics, 55(12):2447–2455, 2012.
21. G. Zhu and D. Wan. Computing error distance of Reed-Solomon codes. In
TAMC2012, LNCS 7287, pages 214–224.
A
Proof of Proposition 2
Proof. ⇒ Suppose u is a deep hole of C = [n, k]q , we need to show that G′ is
a generator matrix for another MDS code. Equivalently, we need to show that
any k + 1 columns of G′ are linearly independent.
Assume there exist k + 1 columns of G′ which are linearly dependent. Without loss of generality, we assume that the first k + 1 columns of G′ are linear
dependent. Consider the submatrix consisting of the intersection of the first k +1
rows and the first k + 1 columns of G′ . Hence there exist a1 , . . . , ak ∈ Fq , not all
zero, such that
(u1 , . . . , uk+1 ) = a1 r1,k+1 + · · · + ak rk,k+1 ,
where ri,k+1 is the vector consisting of the first k + 1 elements of the i-th row of
G for 1 6 i 6 k. Let v = a1 r1 + · · · + ak rk ∈ C, where ri is the i-th row of G for
1 6 i 6 k. We have
d(u, v) 6 n − (k + 1) < ρ,
which is a contradiction with the assumption that u is a deep hole of C.
20
⇐ Now suppose G′ is a generator matrix for an MDS code, i.e., any k + 1
columns of G′ are linearly independent. We need to show that d(u, C) = n − k.
Assume that d(u, C) < n − k. Equivalently, there exist a1 , . . . , ak ∈ Fq such
that u and v = a1 r1 + · · · + ak rk have more than k common coordinates, where
ri is the i-th row of G for 1 6 i 6 k. Without loss of generality, we assume
that the first k + 1 coordinates of u and v are the same. Consider the submatrix
consisting of the first k + 1 columns. Since the rank of the matrix is less than
k + 1, thus the first k + 1 columns of G′ are linearly dependent, which contradicts
the assumption.
21