{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T21:49:25Z","timestamp":1649022565514},"reference-count":27,"publisher":"Association for Computing Machinery (ACM)","issue":"2","funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0830756CCF-1018060"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ACM Trans. Comput. Theory"],"published-print":{"date-parts":[[2012,1]]},"abstract":"\n Locally decodable codes are error-correcting codes with the extra property that, in order to retrieve the value of a single input position, it is sufficient to read a small number of positions of the codeword. We refer to the probability of getting the correct value as the\n correctness<\/jats:italic>\n of the decoding algorithm.\n <\/jats:p>\n \n A breakthrough result by Yekhanin [2007] showed that 3-query linear locally decodable codes may have subexponential length. The construction of Yekhanin, and the three query constructions that followed, achieve correctness only up to a certain limit which is 1\u2009\u2212\u20093\n \u03b4<\/jats:italic>\n for nonbinary codes, where an adversary is allowed to corrupt up to\n \u03b4<\/jats:italic>\n fraction of the codeword. The largest correctness for a subexponential length 3-query binary code is achieved in a construction by Woodruff [2008], and it is below 1\u2009\u2212\u20093\n \u03b4<\/jats:italic>\n .\n <\/jats:p>\n \n We show that achieving slightly larger correctness (as a function of\n \u03b4<\/jats:italic>\n ) requires exponential codeword length for 3-query codes. Previously, there were no larger than quadratic lower bounds known for locally decodable codes with more than 2 queries, even in the case of 3-query linear codes. Our lower bounds hold for linear codes over arbitrary finite fields and for binary nonlinear codes. Considering larger number of queries, we obtain lower bounds for q-query codes for\n q<\/jats:italic>\n \u2009>\u20093, under certain assumptions on the decoding algorithm that have been commonly used in previous constructions. We also prove bounds on the largest correctness achievable by these decoding algorithms, regardless of the length of the code. Our results explain the limitations on correctness in previous constructions using such decoding algorithms. In addition, our results imply trade-offs on the parameters of error-correcting data structures.\n <\/jats:p>","DOI":"10.1145\/2077336.2077338","type":"journal-article","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T15:39:28Z","timestamp":1328629168000},"page":"1-34","source":"Crossref","is-referenced-by-count":5,"title":["Three-Query Locally Decodable Codes with Higher Correctness Require Exponential Length"],"prefix":"10.1145","volume":"3","author":[{"given":"Anna","family":"Gal","sequence":"first","affiliation":[{"name":"University of Texas at Austin"}]},{"given":"Andrew","family":"Mills","sequence":"additional","affiliation":[{"name":"University of Texas at Austin"}]}],"member":"320","reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(86)90019-2"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103428"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the Symposium on Theoritical Aspects of Computer Science (STACS\u201990)","author":"Beaver D."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.45"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.88"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the Symposium on Theoritical Aspects of Computer Science (STACS\u201909)","author":"de Wolf R.","year":"2009"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20069"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2010.35"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060678"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.73"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536422"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the Symposium on Theoritical Aspects of Computer Science (STACS\u201911)","author":"Gal A."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00037-006-0216-3"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335315"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/780542.780560"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993660"},{"key":"e_1_2_1_17_1","volume-title":"Advances in Data Structures Workshop.","author":"Miltersen P. B.","year":"1999"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646978.711825"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the Electronic Colloquium on Computational Complexity (ECCC TR07-016)","author":"Raghavendra P.","year":"2007"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2005.11.009"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301397"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the Electronic Colloquium on Computational Complexity (ECCC TR04-043)","author":"Trevisan L.","year":"2004"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_115"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the Electronic Colloquium on Computational Complexity (ECCC TR07-006)","author":"Woodruff D.","year":"2006"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85363-3_46"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1886521.1886580"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250830"}],"container-title":["ACM Transactions on Computation Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2077336.2077338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T16:56:09Z","timestamp":1613926569000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2077336.2077338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1145\/2077336.2077338"],"URL":"http:\/\/dx.doi.org\/10.1145\/2077336.2077338","relation":{},"ISSN":["1942-3454","1942-3462"],"issn-type":[{"value":"1942-3454","type":"print"},{"value":"1942-3462","type":"electronic"}],"subject":["Computational Theory and Mathematics","Theoretical Computer Science"],"published":{"date-parts":[[2012,1]]}}}