Open Access
Issue
Wuhan Univ. J. Nat. Sci.
Volume 28, Number 1, February 2023
Page(s) 15 - 19
DOI https://doi.org/10.1051/wujns/2023281015
Published online 17 March 2023

© Wuhan University 2023

Licence Creative CommonsThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

0 Introduction

In 1960, Reed and Solomon[1] presented an important error correcting code, that is the so-called Reed-Solomon code. In 1987, Dur[2] defined a double extended Reed-Solomon code, which was later called projective Reed-Solomon code. He further studied the covering radius, decoding problem and the deep holes of projective Reed-Solomon codes in Refs.[3-5].

Now, we first recall the following definition of projective Reed-Solomon codes.

Definition 1[2]Let FqMathematical equation be a finite field and let Fq={α1,,αq=0}Mathematical equation. Then the projective Reed-Solomon codes of length q+1Mathematical equation with dimension kMathematical equation over FqMathematical equation can defined as

P R S ( F q , k ) : = { ( f ( α 1 ) , f ( α 2 ) , , f ( α q ) , c k - 1 ( f ) ) F q q + 1 f ( x ) F q [ x ] , d e g f ( x ) k - 1 } Mathematical equation(1)

where ck-1(f)Mathematical equation is the coefficient of xk-1Mathematical equation in f(x)Mathematical equation.

Subsequently, we give the definition of deep holes of linear code CMathematical equation. To do this, for a received vector uMathematical equation, we first define the error distance d(u,C)Mathematical equation and the covering radius ρ(C)Mathematical equation of linear code CMathematical equation.

Definition 2[5] Let CMathematical equation be an [n,k]Mathematical equation linear code over FqMathematical equation. The error distance of a received vector uFqnMathematical equation to code CMathematical equation is defined by

d ( u , C ) : = m i n v C { d ( u , v ) } , Mathematical equation

where d(u,v)Mathematical equation is the Hamming distance of uMathematical equation and vMathematical equation.

Clearly, d(u,C)=0Mathematical equation if and only if uCMathematical equation .

For a given projective Reed-Solomon code PRS(Fq,k),Mathematical equation we define the Lagrange interpolation polynomial u(x)Mathematical equation of the first qMathematical equation components of received vector u=(u1,,uq,uq+1)Fqq+1Mathematical equation by

u ( x ) : = i = 1 q u i j = 1 j i q x - α j α i - α j Mathematical equation(2)

Obviously, one has u(αi)=uiMathematical equation for 1iqMathematical equation and further d(u,PRS(Fq,k))=0Mathematical equation if and only if degu(x)k-1,ck-1(u(x))=uq+1.Mathematical equation

Definition 3 [5]Let CMathematical equation be an [n,k]Mathematical equation linear code over FqMathematical equation. Then

ρ ( C ) : = m a x { d ( u , C ) u F q n } Mathematical equation

is called as the covering radius of CMathematical equation.

In fact, there is a well known conjecture on the covering radius of projective Reed-Solomon codes.

Conjecture 1[6] Let kMathematical equation be an integer with 2kq-2.Mathematical equation Suppose 2q,k{2,q-2}Mathematical equation, then

ρ ( P R S ( F q , k ) ) = q - k + 1 . Mathematical equation

otherwise, ρ(PRS(Fq,k))=q-k.Mathematical equation

Now we can propose the definition of deep holes of linear code as follows.

Definition 4 [7] Let CMathematical equation be a [n,k]Mathematical equation linear code over FqMathematical equation. If the received vector uMathematical equation such that d(u,C)=ρ(C)Mathematical equation, then uMathematical equation is called a deep hole of CMathematical equation.

In 2016, Zhang et al[8] proved that (u(α1),,Mathematical equationu(αq),0)+PRS(Fq,k)Mathematical equation is a deep hole of projective Reed-Solomon codes PRS(Fq,k)Mathematical equation by solving the subset problem over finite field FqMathematical equation , where u(x)=axk+fk-1(x)Mathematical equation, aFq*Mathematical equation , and fk-1(x)Mathematical equation is a polynomial over FqMathematical equation with degree no more than k-1Mathematical equation. Then, in 2017, Kaipa [9] studied the deep holes of projective Reed-Solomon codes PRS(Fq,q-2)Mathematical equation over FqMathematical equation with odd characteristic. In 2018, Xu et al[10] proved that (u(α1),,u(αq-1),0)+PRS(Fq*,k)Mathematical equation is a deep hole of PRS(Fq*,k)Mathematical equation, where u(x)=axq-2+fk-2(x)Mathematical equation with aFq*Mathematical equation and fk-2(x)Mathematical equation being a polynomial over FqMathematical equation whose degree not exceed k-2Mathematical equation. In 2020, Zhang et al[6] completely determined all the deep holes of projective Reed-Solomon codes PRS(Fq,q-3)Mathematical equation by using the polynomial theory over finite fields and applying the finite geometry method. Meanwhile, they raised the following open problem.

Problem 1[6] For a given projective Reed-Solomon code PRS(Fq,k)Mathematical equation, how to determine all its deep holes?

More results on deep holes of Reed-Solomon codes, one can see Refs.[11-15].

The main purpose of this paper is to study problem 1 over finite fields with even characteristic. Now, we describe the main theorem of this paper as following.

Theorem 1   Let FqMathematical equation be finite field with even characteristic, k{2,q-2}Mathematical equation. Let u(x)Mathematical equation be the Lagrange interpolation polynomial of the first qMathematical equation components of the received vector uFqq+1Mathematical equation . Suppose that the (q+1)Mathematical equation-th component of uMathematical equation is 0, and

u ( x ) = λ x k + f k - 2 ( x ) Mathematical equation

or

u ( x ) = λ x q - 2 + f k - 2 ( x ) , Mathematical equation

where λFq*Mathematical equation , and fk-2(x)Mathematical equation is a polynomial over FqMathematical equation with degree no more than k-2Mathematical equation. Then the received vector uMathematical equation is a deep hole of PRS(Fq,k)Mathematical equation.

Actually, Theorem 1 partially solved Problem 1 raised by Ref.[6]. This paper is organized as follows. In Section 1, we supply some preliminary lemmas that are needed in the proof of Theorem 1. Then in Section 2, we present the proof of Theorem 1.

1 Preliminary Lemmas

In this section, we give some lemmas needed in the proof of Theorem 1. First, a formula of a special determinant over finite fields given as follows.

Lemma 1   Let {β1,,βn}Fq*Mathematical equation.Then

d e t ( 1 1 1 β 1 2 β 2 2 β n 2 β 1 n β 2 n β n n ) = ( i = 1 n β i - 1 ) ( i = 1 n β i ) 1 i < j n ( β j - β i ) . Mathematical equation

Proof   Noticed that

d e t ( 1 1 1 1 β 1 β 2 β n x β 1 2 β 2 2 β n 2 x 2 β 1 n β 2 n β n n x n ) = ( i = 1 n ( x - β i ) ) 1 i < j n ( β j - β i ) . Mathematical equation

Then, one can immediately get Lemma 1 by comparing the coefficients of xMathematical equation on both sides of the above equality. This completes the proof of Lemma 1.

Next, we prove the following result on subset sum over finite fields with even characteristic.

Lemma 2   Let FqMathematical equation be finite field with even characteristic. If l{1,2,q-3,q-2}Mathematical equation, then the sum of any lMathematical equation different elements in Fq*Mathematical equation is nonzero.

Proof   The Lemma 2 obviously holds when l=1Mathematical equation. Put Fq*={γ1,,γq-1}.Mathematical equation Now we give the proof for l=2,q-3,q-2Mathematical equation, respectively.

Case 1. l=2Mathematical equation. Without loss of generality, one can take two distinct elements of Fq*Mathematical equation as γ1,γ2Mathematical equation. Since FqMathematical equation is a finite filed with characteristic 2, hence one can get

γ 1 + γ 2 = γ 1 - γ 2 0 . Mathematical equation

Case 2. l=q-3Mathematical equation. Without loss of generality, one can also choose q-3Mathematical equation distinct elements of Fq*Mathematical equation as γ1,,γq-3Mathematical equation. Notice that FqMathematical equation is a finite filed with characteristic 2, therefore

i = 1 q - 3 γ i = i = 1 q - 1 γ i - γ q - 2 - γ q - 1 = γ q - 2 - γ q - 1 , Mathematical equation

and also γq-2γq-1Mathematical equation, thus i=1q-3γi0.Mathematical equation

Case 3. l=q-2Mathematical equation. Without loss of generality, one can pick q-2Mathematical equation distinct elements γ1,,γq-2Fq*Mathematical equation. The character of FqMathematical equation is 2 can tell us that

i = 1 q - 2 γ i = i = 1 q - 1 γ i - γ q - 1 = γ q - 1 0 . Mathematical equation

The proof of Lemma 2 is complete.

In 1991, Dur[3] had given the following result on covering radius of projective Reed-Solomon codes over finite fields with even characteristic by using the finite geometry method.

Lemma 3[3]Let 2qMathematical equation, k{2,q-2}Mathematical equation. Then

ρ ( P R S ( F q , k ) ) = q - k + 1 . Mathematical equation

Finally, we recall a theorem on the received vector uMathematical equation is whether or not a deep hole of maximal distance separable code CMathematical equation.

Lemma 4[16] Let CMathematical equation be [n,k]Mathematical equation maximal distance separable code over finite field FqMathematical equation. If the covering radius ρ(C)Mathematical equation of code CMathematical equation is n-kMathematical equation, then the received vector uFqnMathematical equation is a deep hole of CMathematical equation if and only if any k+1Mathematical equation columns of the (k+1)×nMathematical equation matrix (Gu)Mathematical equation is linearly independent, where GMathematical equation is the generator matrix of code CMathematical equation.

2 Proof of Theorem 1

In this section, we use the lemmas presented in Section 1 to give the proof of Theorem 1.

Proof   Let Fq={x1,,xq=0}Mathematical equation. By (1) and (2), one can immediately get that

( G u ) = ( 1 1 1 0 x 1 x 2 x q 0 x 1 2 x 2 2 x q 2 0 x 1 k - 1 x 2 k - 1 x q k - 1 1 u ( x 1 ) u ( x 2 ) u ( x q ) 0 ) : = ( G ¯ 1 , G ¯ 2 , , G ¯ q + 1 ) . Mathematical equation

Assume that G¯j1,G¯j2,,G¯jk+1Mathematical equation are any k+1Mathematical equation columns of (Gu),Mathematical equation where j1,j2,,jk+1Mathematical equation are arbitrary k+1Mathematical equation integers with 1j1<j2<<jk+1q+1.Mathematical equation To complete the proof of the Theorem, it suffices to show

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) 0 Mathematical equation(3)

To do so, we give the proof as the following eight cases.

Case 1. u(x)=λxk+fk-2(x)Mathematical equation. The four cases are considered as follows.

Case 1-1. jk+1<qMathematical equation. At this time, one has

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) = d e t ( 1 1 1 x j 1 x j 2 x j k + 1 x j 1 2 x j 2 2 x j k + 1 2 x j 1 k - 1 x j 2 k - 1 x j k + 1 k - 1 u ( x j 1 ) u ( x j 2 ) u ( x j k + 1 ) ) [ = λ 1 s < t k + 1 ( x j t - x j s ) 0 ] Mathematical equation(4)

Case 1-2. jk+1=qMathematical equation. By xq=0Mathematical equation, one can know that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) = λ d e t ( 1 1 1 1 x j 1 x j 2 x j k 0 x j 1 2 x j 2 2 x j k 2 0 x j 1 k - 1 x j 2 k - 1 x j k k - 1 0 x j 1 k x j 2 k x j k k 0 ) = ( - 1 ) k + 2 λ ( i = 1 k x j i ) 1 s < t k ( x j t - x j s ) 0 Mathematical equation(5)

Case 1-3. jkq-1,jk+1=q+1Mathematical equation. One can deduce that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) = λ d e t ( 1 1 1 0 x j 1 x j 2 x j k 0 x j 1 2 x j 2 2 x j k 2 0 x j 1 k - 1 x j 2 k - 1 x j k k - 1 1 x j 1 k x j 2 k x j k k 0 ) = ( - 1 ) 2 k + 1 λ ( i = 1 k x j i ) 1 s < t k ( x j t - x j s ) . Mathematical equation

And also 2|q,k{2,q-2}Mathematical equation, it follows from Lemma 2 that i=1kxji0.Mathematical equation Then one can derive that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) 0 Mathematical equation(6)

Case 1-4. jk=q,jk+1=q+1Mathematical equation. By xq=0Mathematical equation, one can derive that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) ( 1 1 1 1 0 x j 1 x j 2 x j k - 1 0 0 x j 1 2 x j 2 2 x j k - 1 2 0 0 x j 1 k - 1 x j 2 k - 1 x j k - 1 k - 1 0 1 x j 1 k x j 2 k x j k - 1 k 0 0 ) = λ d e t = ( - 1 ) 3 k + 2 λ ( i = 1 k - 1 x j i ) ( i = 1 k - 1 x j i ) 1 s < t k - 1 ( x j t - x j s ) Mathematical equation

Notice that k-1=1,q-3Mathematical equation, by Lemma 2, one can get i=1k-1xji0Mathematical equation. It follows that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) 0 Mathematical equation(7)

Case 2.v(x)=λxq-2+fk-2(x)Mathematical equation. One only need to deal with the four cases as follows.

Case 2-1. jk+1<qMathematical equation. Notice that for any integer iMathematical equation with 1ik+1Mathematical equation, one has xjiq-2=xji-1Mathematical equation. It then follows that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) = λ d e t ( 1 1 1 x j 1 x j 2 x j k + 1 x j 1 2 x j 2 2 x j k + 1 2 x j 1 k - 1 x j 2 k - 1 x j k + 1 k - 1 x j 1 - 1 x j 2 - 1 x j k + 1 - 1 ) = ( - 1 ) k λ ( i = 1 k + 1 x j i - 1 ) d e t ( 1 1 1 x j 1 x j 2 x j k + 1 x j 1 2 x j 2 2 x j k + 1 2 x j 1 k x j 2 k x j k + 1 k ) = ( - 1 ) k λ ( i = 1 k + 1 x j i - 1 ) 1 s < t k + 1 ( x j t - x j s ) 0 Mathematical equation(8)

Case 2-2. jk+1=qMathematical equation. Since xjiq-2=xji-1(1ik)Mathematical equation and xq=0Mathematical equation, so

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) = λ d e t ( 1 1 1 1 x j 1 x j 2 x j k 0 x j 1 2 x j 2 2 x j k 2 0 x j 1 k - 1 x j 2 k - 1 x j k k - 1 0 x j 1 - 1 x j 2 - 1 x j k - 1 0 ) = ( - 1 ) k + 2 λ ( i = 1 k x j i - 1 ) d e t ( x j 1 2 x j 2 2 x j k 2 x j 1 3 x j 2 3 x j k 3 x j 1 k x j 2 k x j k k 1 1 1 ) Mathematical equation

Then by Lemma 1, one can derive that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) = ( - 1 ) 2 k + 1 λ ( i = 1 k x j i - 1 ) 1 s < t k ( x j t - x j s ) . Mathematical equation

Now note that k{2,q-2}Mathematical equation and xji-1Fq*Mathematical equation. Then Lemma 2 can tell us that i=1kxji-10.Mathematical equation This implies

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) 0 Mathematical equation(9)

Case 2-3. jkq-1,jk+1=q+1.Mathematical equation Since xjiq-2=xji-1(1ik),Mathematical equation one then can deduce that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) = λ d e t ( 1 1 1 0 x j 1 x j 2 x j k 0 x j 1 2 x j 2 2 x j k 2 0 x j 1 k - 1 x j 2 k - 1 x j k k - 1 1 x j 1 - 1 x j 2 - 1 x j k - 1 0 ) = ( - 1 ) 2 k + 1 λ ( i = 1 k x j i - 1 ) d e t ( x j 1 x j 2 x j k x j 1 2 x j 2 2 x j k 2 x j 1 k - 1 x j 2 k - 1 x j k k - 1 1 1 1 ) = ( - 1 ) 3 k λ ( i = 1 k x j i - 1 ) 1 s < t k ( x j t - x j s ) 0 Mathematical equation(10)

Case 2-4. jk =q,jk+1=q+1.Mathematical equation Owing to xjiq-2=xji-1(1ik-1)Mathematical equation and xq=0,Mathematical equation one then can get

= λ d e t ( 1 1 1 1 0 x j 1 x j 2 x j k - 1 0 0 x j 1 2 x j 2 2 x j k - 1 2 0 0 x j 1 k - 1 x j 2 k - 1 x j k - 1 k - 1 0 1 x j 1 - 1 x j 2 - 1 x j k - 1 - 1 0 0 ) = ( - 1 ) 3 k + 2 λ ( i = 1 k - 1 x j i - 1 ) d e t ( x j 1 2 x j 2 2 x j k - 1 2 x j 1 3 x j 2 3 x j k - 1 3 x j 1 k - 1 x j 2 k - 1 x j k - 1 k - 1 1 1 1 ) Mathematical equation

By Lemma 1, one can deduce that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) = ( - 1 ) 4 k λ ( i = 1 k - 1 x j i - 1 ) ( i = 1 k - 1 x j i - 1 ) ( i = 1 k - 1 x j i - 1 ) 1 s < t k - 1 ( x j t - x j s ) = λ ( i = 1 k - 1 x j i - 1 ) 1 s < t k - 1 ( x j t - x j s ) Mathematical equation

Notice that k-1=1,q-3Mathematical equation and xji-1Fq*Mathematical equation. Applying Lemma 2, one can obtain i=1k-1xji-10.Mathematical equation It yields that

d e t ( G ¯ j 1 , G ¯ j 2 , , G ¯ j k + 1 ) 0 Mathematical equation(11)

Thus, (3) can be immediately obtained from (4)-(11), that is, any k+1Mathematical equationcolumns of (Gu)Mathematical equation are linearly independent. On the other hand, PRS(Fq,k)Mathematical equation is a maximal distance separable code and Lemma 3 also tell us that the covering radius of PRS(Fq,k)Mathematical equation is

ρ ( P R S ( F q , k ) ) = q - k + 1 = n - k . Mathematical equation

Therefore, by Lemma 4, one can know that uMathematical equation is a deep hole of projective Reed-Solomon codes PRS(Fq,k)Mathematical equation. This finish the proof of Theorem 1.

References

  1. Reed S, Solomon G. Polynomial codes over certain finite fields[J]. Journal of the Society for Industrial and Applied Mathematics, 1960, 8(2): 300-304. [CrossRef] [MathSciNet] [Google Scholar]
  2. Dur A. The automorphism groups of Reed-Solomon codes[J]. J Combin Theory, Ser A, 1987, 44(1): 69-82. [CrossRef] [MathSciNet] [Google Scholar]
  3. Dur A. The decoding of extended Reed-Solomon codes[J]. Discrete Math, 1991, 90(1): 21-40. [CrossRef] [MathSciNet] [Google Scholar]
  4. Dur A. Complete decoding of doubly-extended Reed-Solomon codes of minimum distance 5 and 6[J]. Discrete Appl Math, 1991, 33(1/2/3): 95-107. [CrossRef] [MathSciNet] [Google Scholar]
  5. Dur A. On the covering radius of Reed-Solomon codes[J]. Discrete Math, 1994, 126(1/2/3): 99-105. [CrossRef] [MathSciNet] [Google Scholar]
  6. Zhang J, Wan D Q, Kaipa K. Deep holes of projective Reed-Solomon codes[J]. IEEE Trans Inform Theory, 2020, 66(4): 2392-2401. [CrossRef] [MathSciNet] [Google Scholar]
  7. Cheng Q, Murray E. On deciding deep holes of Reed-Solomon codes[J]. Lecture Notes in Comput Sci, 2007, 4484: 296-305. [CrossRef] [Google Scholar]
  8. Zhang J, Wan D Q. On deep holes of projective Reed-Solomon codes[C]//2016 IEEE International Symposium Information Theory. Washington D C: IEEE, 2016: 925-929. [Google Scholar]
  9. Kaipa K. Deep holes and MDS extensions of Reed-Solomon codes[J]. IEEE Trans Inform Theory, 2017, 63(8): 4940-4948. [CrossRef] [MathSciNet] [Google Scholar]
  10. Xu X F, Hong S F, Xu Y C. On deep holes of primitive projective Reed-Solomon codes[J]. Sci Sin Math, 2018, 48(8): 1087-1094. [CrossRef] [Google Scholar]
  11. Hong S F, Wu R J. On deep holes of generalized Reed-Solomon codes[J]. AIMS Math, 2016, 1(2): 96-101. [CrossRef] [Google Scholar]
  12. Keti M, Wan D. Deep holes in Reed-Solomon codes based on Dickson polynomials[J]. Finite Fields Appl, 2016, 40: 110-125. [CrossRef] [MathSciNet] [Google Scholar]
  13. Li Y J, Wan D Q. On error distance of Reed-Solomon codes[J]. Sci China Ser A, 2008, 51(11): 1982-1988. [CrossRef] [MathSciNet] [Google Scholar]
  14. Li Y J, Zhu G Z. On the error distance of extended Reed-Solomon codes[J]. Adv Math Commun, 2016, 10(2): 413-427. [CrossRef] [MathSciNet] [Google Scholar]
  15. Wu R J, Hong S F. On deep holes of standard Reed-Solomon codes[J]. Science China Math, 2012, 55(12): 2447-2455. [NASA ADS] [CrossRef] [MathSciNet] [Google Scholar]
  16. Zhuang J C, Cheng Q, Li J Y. On determing deep holes of generalized Reed-Solomon codes[J]. IEEE Trans Inform Theory, 2016, 62(1): 199-207. [CrossRef] [MathSciNet] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.