Paper 2025/190

Binary Codes for Error Detection and Correction in a Computationally Bounded World

Jad Silbak, Northeastern University
Daniel Wichs, Northeastern University
Abstract

We study error detection and correction in a computationally bounded world, where errors are introduced by an arbitrary $\textit{polynomial-time}$ adversarial channel. Our focus is on $\textit{seeded}$ codes, where the encoding and decoding procedures can share a public random seed, but are otherwise deterministic. We can ask for either $\textit{selective}$ or $\textit{adaptive}$ security, depending on whether the adversary can choose the message being encoded before or after seeing the seed. For large alphabets, a recent construction achieves essentially optimal rate versus error tolerance trade-offs under minimal assumptions, surpassing information-theoretic limits. However, for the binary alphabet, the only prior improvement over information theoretic codes relies on non-standard assumptions justified via the random oracle model. We show the following: $\textbf{Selective Security under LWE:}$ Under the learning with errors (LWE) assumption, we construct selectively secure codes over the binary alphabet. For error detection, our codes achieve essentially optimal rate $R \approx 1$ and relative error tolerance $\rho \approx \frac{1}{2}$. For error correction, they can uniquely correct $\rho < 1/4$ relative errors with a rate $R$ that essentially matches that of the best list-decodable codes with error tolerance $\rho$. Both cases provide significant improvements over information-theoretic counterparts. The construction relies on a novel form of 2-input correlation intractable hash functions that we construct from LWE. $\textbf{Adaptive Security via Crypto Dark Matter:}$ Assuming the exponential security of a natural collision-resistant hash function candidate based on the ``crypto dark matter'' approach of mixing linear functions over different moduli, we construct adaptively secure codes over the binary alphabet, for both error detection and correction. They achieve essentially the same trade-offs between error tolerance $\rho$ and rate $R$ as above, with the caveat that for error-correction they only do so for sufficiently small values of $\rho$.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint.
Keywords
LWEError CorrectionError DetectionCorrelation Intractable Hash
Contact author(s)
jadsilbak @ gmail com
danwichs @ gmail com
History
2025-02-10: approved
2025-02-09: received
See all versions
Short URL
https://ia.cr/2025/190
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/190,
      author = {Jad Silbak and Daniel Wichs},
      title = {Binary Codes for Error Detection and Correction in a Computationally Bounded World},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/190},
      year = {2025},
      url = {https://eprint.iacr.org/2025/190}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.