2017
DOI: 10.1109/tit.2017.2702660
|View full text |Cite
|
Sign up to set email alerts
|

Repairing Reed-Solomon Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
25
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 83 publications
(27 citation statements)
references
References 25 publications
2
25
0
Order By: Relevance
“…We argue that this property of SSS is directly related to the existence of linear exact repairing structures for Reed-Solomon codes [GW16,YB16]. The latter can indeed be viewed as polynomial interpolation formulae that optimize the amount of information which needs to be extracted from a reconstruction tuple to recover the shared value.…”
Section: Contributionsmentioning
confidence: 95%
“…We argue that this property of SSS is directly related to the existence of linear exact repairing structures for Reed-Solomon codes [GW16,YB16]. The latter can indeed be viewed as polynomial interpolation formulae that optimize the amount of information which needs to be extracted from a reconstruction tuple to recover the shared value.…”
Section: Contributionsmentioning
confidence: 95%
“…Though schemes with optimal decoding bandwidth exist, improving the decoding bandwidth of Shamir's scheme remains an important problem as it is extensively used due to its simplicity. Below we describe a new family of Shamir's scheme with asymptotically optimal decoding bandwidth by extending the ideas recently developed in [5], [14] on repairing Reed-Solomon codes.…”
Section: Shamir's Scheme With Asymptotically Optimal Decoding Banmentioning
confidence: 99%
“…To reduce the decoding bandwidth, we follow the framework proposed in [5] of interpolating polynomials by querying partial polynomial evaluation. Specifically, let F be the extension field of degree l of a subfield K. During decoding, each of the n nodes applies K-linear transforms to the share over F that it holds to obtain a set of symbols over K. The decoder collects these sets of symbols and performs K-linear transforms to them to assemble the secret message over F .…”
Section: Shamir's Scheme With Asymptotically Optimal Decoding Banmentioning
confidence: 99%
See 2 more Smart Citations