I Introduction
ReedMuller (RM) codes [1, 2] are very well known in the classical coding theory. It was recently proved that this family of codes achieves the capacity of the binary erasure channel under ML decoding [3]. The equivalent question for general BMS channels is still open and so is lowcomplexity nearML decoding of RM codes.
ReedMuller codes have rich structural properties, such as invariance w.r.t. a large group of permutations that can be expressed as actions on monomials. The best decoding algorithms for RM codes exploit this invariance and in particular the fact that RM code can be represented as Plotkin concatenation of two smaller RM codes in several different ways. The projectionaggregation algorithm [4] approaches ML performance for short and moderate lengths but has a complexity that grows exponentially with the code order. This makes it feasible only for lowrate codes. Recursive list algorithm with permuted factor graphs of DumerShabunov [5] and its variations achieve ML performance with list size that grows exponentially with a code length. The use of multiple factor graph permutations brings the additional benefit of parallelism, which might lead to latency reduction and simplification of hardware implementation [6].
Polar codes [7] achieve the capacity of an arbitrary BMS channel. Contrary to RM codes, they are specifically constructed so that successive cancellation list (SCL) decoding with small list size [8] (which works similarly to DumerShabunov list decoder) is sufficient for nearML performance. However, this property comes at the cost of the code structure, so both methods designed for RM codes are inefficient for polar codes and polarlike constructions with better finitelength performance, such as CRCaided polar codes [8] or polar subcodes [9].
One can now ask whether it would be possible to find codes that have a smaller group of symmetries than ReedMuller codes but also require a smaller decoding complexity for nearML performance. Previous works include an efficient construction for two factor graph permutations [10]. It performs worse compared to polar codes under list decoding but allows turbolike decoding with significantly smaller latency. Polar codes tailored to decoding with permuted factor graphs are proposed in [11] with the main focus on performance.
In this paper, we continue this line of research and investigate this question from a code structure point of view. Here we consider codes that can be obtained via evaluations of monomials [12]. Polar and ReedMuller codes can both be described in this framework. We introduce a family of codes with certain symmetries and show the lower bound on their parameters. A channelindependent construction achieving this bound is proposed and it is shown that in some cases the obtained codes have the recursive structure.
Ii Monomial codes
Iia Polar codes
A polar code with the set of frozen symbols is a binary linear block code generated by rows with indices of the matrix , where and denotes times Kronecker product of a matrix with itself. For a given BMS channel , the set contains indices of the least reliable bit subchannels under successive cancellation decoding.
IiB ReedMuller codes
The ReedMuller code RM has length , dimension and minimum distance . Its generator matrix consists of all rows of with Hamming weight at least . As a consequence, any code RM can be represented as a polar code with the set of frozen symbols
where denotes the number of nonzero bits in binary representation of integer .
IiC Monomial codes
Given some integers such that , consider the generating set of monomials
(1) 
where all take binary values. It is easy to see that and .
For some polynomial , let us denote by
its evaluation vector, i.e. length
vector obtained by the evaluation of this polynomial in all points of . For convenience, we use natural digit ordering, i.e. .Consider now some and an enumeration of its elements with natural numbers. It defines monomial code
where are information symbols. Minimum distance of the monomial code can be calculated as , where
(2) 
Another way of defining a monomial code is to see the correspondence between monomials and rows of matrix . Indeed, th row of is the evaluation vector of monomial
where is the set of zero bit positions in binary representation of integer .
Examples of monomial codes:

polar code with the set of frozen symbols () is a monomial code with

ReedMuller code RM is a monomial code with .
Iii Symmetries
Iiia Factor graph permutations
The propagation of LLR values during the decoding of polar code can be represented with layer factor graph [13]. An example of this graph is presented at Figure 1. Consider a permutation of its layers, or, equivalently, permutation of the input LLR vector performed by applying
to the binary representation of elements’ positions. It can be seen that the bit estimation order also becomes permuted according to
, and thereafter the subchannel reliabilities.It is easy to see that any factor graph layer permutation can also be expressed as action on monomials for permutation matrix .
Polar codes are perfectly fitted for the particular but their performance for is rather poor since no longer contains worst bit positions. On the other hand, the automorphism group of ReedMuller codes includes permutations for any invertible , so they are invariant under factor graph permutations and hence all have similar performance under SC/SCL decoding.
IiiB Projections
Consider a linear code with generating set and the action of the translation group : . One can see that it permutes the codewords of (in particular, swaps the evaluation points and ). On the other hand, it performs a change of variables , so that the permuted code has generating set
It can be seen that the permutation defined by belongs to iff all elements of can be represented as sum of monomials from (one can also recall the definition of the weakly decreasing codes from [12] and verify that is equivalent to the code being weakly decreasing). Note that in general may not define a monomial code.
A directional derivative of code is the linear code with a generating set
(3) 
It can be seen that this code has the same values at position and , so it has generator matrix of the form , where is a column permutation matrix and is the generator matrix of some () code . will subsequently be denoted as projected code or projection. Let us also introduce the set of trivial projections . Note that for any the corresponding projection is the partial derivative w.r.t. :
Since the monomial code is defined by its generating set, we will also use the equivalent notation .
Trivial projections can be considered as a first step of the SC algorithm for different factor graph permutations. Polar codes are optimized for one particular such that the projection of a polar code with rate constructed for BMS channel is again a polar code with rate , where is the "" channel in polar coding notation.
Iv Partially symmetric monomial codes
For BMS channel , consider the decoding of some rate code via its projections. Here we focus on the SCL algorithm, but a similar argument holds for other projectionbased approaches. If the rate of the projection exceeds the capacity of channel , it means that asymptotically one gets a constant fraction of "bad" polarized data subchannels (in particular, ) and therefore the list size for ML decoding of is exponential in the code length.
Polar codes are constructed for one particular projection, corresponding to factor graph permutation , so that it has rate . However, for all the projected codes have much higher rates, which makes the decoding with permuted factor graphs inefficient. ReedMuller codes demonstrate similar performance for any due to their automorphism group, but these symmetries also constraint the projectionbased decoding performance. Namely, since any projection of RM gives RM (with the dimension greater than ), we can immediately deduce that ML performance cannot be achieved with the fixed list size. It is also possible to show that e.g. if we fix the code rate to , the rate of the projected code also converges to when the code length goes to infinity.
It is possible to establish the link between symmetries of ReedMuller codes and the (in)efficiency of SCL decoding. By construction, all projections of RM codes are identical. As we will show further in this section, it puts a lower bound on the dimension of projections and RM codes, in fact, achieve this bound.
One can now ask the question: if we sacrifice some of the code symmetries, what can we potentially gain? Is it possible to achieve nearML lowcomplexity decoding? In this paper, we try to answer this question and investigate the properties of such codes. We only focus on trivial projections due to their connection with SC/SCL decoding with different factor graph permutations.
Definition 1.
A partially symmetric code is a binary linear code such that the dimensions of of its trivial projections are equal and the dimensions of others are strictly greater.
In other words, there exists some set of target projections , such that and . Note that ReedMuller codes are partially monomial with . Without loss of generality, we assume . In this paper, only monomial codes are considered. General case is a topic for future research.
Since we are concerned about the performance under lowcomplexity decoding via projections, the achievable values of for a given code dimension are of interest and in particular, the lower bound
(4) 
Iva Lower bounds
The problem of determining the achievable , or equivalently the minimum achievable rate , for monomial codes is essentially combinatorial. Consider the set . The number of monomials that have variables in is ( variables out of can be selected in ways with any combination of the remaining ). Removing a monomial with variables in from decreases the dimension of trivial projections by 1. Consequently, for , we need to remove more than one monomial to keep the dimensions of the projected codes equal. This is summarized in Table I. Since the goal is to calculate the lower bound, we first remove monomials that correspond to the first row of Table I, then to the second, etc. until the target is reached. Note that some values of cannot be achieved due to the granularity constraints. Setting and removing all monomials corresponding to the first several rows of Table I give ReedMuller codes.
Number of variables in  Granularity of  Granularity of  Number of monomials with variables in 
1  1  
⋮  ⋮  ⋮  ⋮ 
1 
Figure 2 demonstrates the lower bound on , computed for the case and . This result can be interpreted as follows. If a curve lies above the reference BEC/BSC lines, the rate of the projected code exceeds the capacity of the underlying channel and SCL decoding needs exponential list size for its nearML decoding. We can see that for efficient decoding cannot be performed except for high and low rate regimes. For something can be potentially done for the BSC, and for efficient decoding can be performed. ReedMuller codes are on the curve, and for polar codes the bound is trivial since they lie exactly on the reference curves. An important observation here is that even though partially symmetric codes do not admit efficient SCL decoding, their rates scale better compared to RM codes and therefore they might perform better with a rather small list size.
The procedure used for obtaining the lower bound also allows to estimate the best possible minimum distance of codes achieving this bound. In order to maximize , for every we sort the monomials with variables in by the total degree and perform the removal procedure from highest to lowest.
Proposition 1.
Consider some code which achieves the combinatorial lower bound. Assume the monomial removal procedure stopped at some . Then the upper bound on the minimum distance of is , where if less than first entries at stage were removed and otherwise.
This result follows directly from the construction. For any , the maximal total degree of monomials considered in this stage is ( variables from and all from ), and there are such monomials.
It can be seen that for small values of partially symmetric codes achieving the lower bound would have rather small minimum distance (worse than polar codes) and therefore poor ML performance. To overcome this issue, we suggest in practice to first remove all monomials up to a certain degree , i.e. to construct partially symmetric codes as subcodes of ReedMuller codes.
IvB Code construction
In order to construct codes that achieve for a given , one can directly follow the procedure used to compute the bound. It is easy to see that the first three steps of the code construction are rather trivial. In particular, for :

Take , .

Set . While , remove from all monomials with variables in and decrease by one, by .

Set . While , remove all degree monomials with variables in and decrease by 1, by .
Example 1.
Consider and , . Table II contains all monomials with at least one variable in .
Impact on dimension  Monomials  

Remove 1 monomial  ,  
decreases by 1  
Remove 3 monomials  , , ,  
decreases by 2  , , ,  
1  Remove 3 monomials  , , 
decreases by 1  , , 
Start from and and go to step 2. Take and remove all such monomials ( and ), now . For , there are such monomials and , so we go to step 3. Take and remove all such monomials (, , ), now and the construction procedure is terminated. The constructed code has generating set . Its target directional derivatives have generating sets , , and it is easy to see that each of them has cardinality .
For the case , at step 1 we need to take instead of , at step 2 term is replaced with and at step 3 the initial value of becomes (since after step 1 all monomials with degree greater than are already removed and therefore out of consideration).
Objective.
(Final step of the procedure)
Given and , remove degree monomials with variables in so that all target projections have the same dimensions.
The solution for this step can be found with the following model. Again for simplicity assume that .
Consider bipartite graph with left vertices isomorphic to trivial projections and right vertices isomorphic to all degree monomials with variables in . We draw an edge between and if contains variable (i.e. is in the generating set of code ).
Graph has partitions of size and . Vertices in these partitions have degrees and , respectively.
We need to keep all for equal, so we want to construct some regular subgraph of . Observe that for we can split into partitions that correspond to different monomials from , so it is sufficient to focus only on the case . To simplify the notations, we also assume . Figure 3 demonstrates graph for and one of its possible regular subgraphs (in red).
To keep the graph regular, should hold, where is the left degree and is the number of right vertices, which gives
for some integer . The maximum value of is . Let us denote this value as and consider for each the corresponding graph .
Proposition 2.
Any can be viewed as a valid solution of the certain maxflow problem.
Consider the flow network that consists of source with capacity edges to all , sink with capacity edges from all and edges of capacity 1. It is easy to see that edges of corresponds to the flow of size and this flow is maximal (it matches the total capacity of source edges). Note that the minimum cut of this network corresponds to the set of source edges.
Proposition 2 implies that can be constructed e.g. with FordFulkerson algorithm.
Theorem 1.
Consider an increasing sequence . Take some value and the corresponding graph , where is an empty graph and . Then one can always construct graphs such that .
Proof.
Consider flow network from proposition 2 and its maxflow solution .

Remove from the network edges that are not present in and set source edges capacities equal to (as for ). Maxflow in this network is , and the corresponding solution can be represented with graph . Removing the edges of from gives the desired graph .

Remove from the network edges that are present in . As above, change the source capacities and find maxflow solution . Adding edges of to gives the desired graph .
∎
Note that only partial symmetry is used for the code design and therefore the whole construction is channelindependent.
V Structure of partially symmetric codes
We define as the code obtained using steps 13 of the procedure from Section IVB, and as the code obtained after its final step for some graph . Observe that graph defines a generating set which we denote as .
Proposition 3.
For any holds .
This property follows directly from the code construction. Consider a monomial from , such that and assume it has variables in . Any of its divisors has either less than variables in or smaller degree, so it could not be removed from in code construction process. As a consequence [12], is also monomial and .
Theorem 2.
Assume that the code achieves (i.e. the lower bound is achieved after steps 13 of the construction procedure). Then

is invariant under the permutation of variables from (or equivalently for any ).

For any code achieves .
Proof.
Without loss of generality assume and consider the generating set . It contains all monomials of two types:

Monomials with variables in .

Degree monomials with variables in .
If we now look at the generating sets of the directional derivatives, firsttype monomials ensure that all monomials of variables in are in , and the secondtype ensure that all degree monomials of variables from are also in . Both of these sets are invariant under the permutation of elements of . Since contains no other monomials, neither does . This proves the first part of the theorem.
As for the second part, one just needs to take the generating set of code and notice that there is a onetoone correspondence between its elements and the entries of . ∎
Note that permutationtailored polar codes from [11] can be considered as a variation of the procedure from Section IVB, where a set of degree monomials with all possible variables in is removed if it contains a monomial that corresponds to "bad" channel in polar notation. It is easy to see that first part of theorem 2 also holds for these codes.
Proposition 4.
For any code , there exist codes and such that .
Since code corresponds to a certain graph , one can apply theorem 1 to obtain graphs and use them to construct the corresponding codes.
Conjecture.
For any code and any codes and are permutation equivalent.
From theorem 1 we get , where denotes the edge removal. Each bipartite graph has the same structure:

Its biadjacency matrix has constant row and column weight (not equal to each other in general);

Rows of are isomorphic to monomials from ;

Rows of with nonzero values in column are isomorphic to monomials from the directional derivative .
Hence, in order to prove this conjecture one needs to show the following. Consider a binary matrix with row weight and column weight . Define as the set of its rows with nonzero entries in column . For any there exists a column permutation which maps to for any .
Vi Numeric results
We demonstrate the performance of partially symmetric monomial codes in BEC(), where the polynomialtime ML decoding is available. Figure 4 shows the frame error rate of codes of length and rate , constructed for different values of with . The minimum distance of the constructed codes for is equal to 16, for we get the ReedMuller code with . The polar code given at the figure is constructed for each value of
. Its minimum distance depends on the target erasure probability and jumps from
to between and , which can be observed at the figure.One conclusion that can be made from the picture is that the ML performance does not strictly improve with . However, partially symmetric codes for some values of demonstrate better performance compared to the polar code, although the gap is not large.
As for future work, there are two main research directions. The first one regards the lowcomplexity decoding of these codes, especially in the AWGN channel. The second is about how to construct the partially symmetric polynomial codes. It is known that nonsymmetric polynomial codes can bring significant performance boost under SCL decoding with a small list size [9]. One can wonder whether a similar improvement can be achieved with (partially) symmetric codes.
Vii Conclusion
In this paper, we introduce the new family of monomial codes. These codes have a smaller group of automorphisms compared to RM codes but are more adapted for lowcomplexity decoding. A construction of such codes is proposed and it is shown that the obtained codes in some cases demonstrate the recursive structure.
References
 [1] D. E. Muller, “Application of boolean algebra to switching circuit design and to error detection,” Transactions of the I.R.E. Professional Group on Electronic Computers, vol. EC3, no. 3, pp. 6–12, Sept 1954.
 [2] I. Reed, “A class of multipleerrorcorrecting codes and the decoding scheme,” Transactions of the IRE Professional Group on Information Theory, vol. 4, no. 4, pp. 38–49, September 1954.

[3]
S. Kudekar, S. Kumar, M. Mondelli, H. D. Pfister, E. Şaşoğlu, and
R. Urbanke, “Reedmuller codes achieve capacity on erasure channels,” in
Proceedings of the Fortyeighth Annual ACM Symposium on Theory of Computing
, ser. STOC ’16. New York, NY, USA: ACM, 2016, pp. 658–669. [Online]. Available: http://doi.acm.org/10.1145/2897518.2897584  [4] M. Ye and E. Abbe, “Recursive projectionaggregation decoding of ReedMuller codes,” in 2019 IEEE International Symposium on Information Theory (ISIT), July 2019, pp. 2064–2068.
 [5] I. Dumer and K. Shabunov, “Softdecision decoding of reedmuller codes: recursive lists,” IEEE Transactions on Information Theory, vol. 52, no. 3, pp. 1260–1266, March 2006.
 [6] M. Kamenev, Y. Kameneva, O. Kurmaev, and A. Maevskiy, “A new permutation decoding method for ReedMuller codes,” CoRR, vol. abs/1901.04433, 2019. [Online]. Available: http://arxiv.org/abs/1901.04433
 [7] E. Arikan, “Channel polarization: A method for constructing capacityachieving codes,” in 2008 IEEE International Symposium on Information Theory, July 2008, pp. 1173–1177.
 [8] I. Tal and A. Vardy, “List decoding of polar codes,” in 2011 IEEE International Symposium on Information Theory Proceedings, July 2011, pp. 1–5.
 [9] P. Trifonov and V. Miloslavskaya, “Polar subcodes,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 2, pp. 254–266, Feb 2016.
 [10] X. Wang, H. Zhang, R. Li, J. Tong, Y. Ge, and J. Wang, “On the construction of coset codes for parallel decoding,” CoRR, vol. abs/1904.13182, 2019. [Online]. Available: http://arxiv.org/abs/1904.13182
 [11] M. Kamenev, Y. Kameneva, O. Kurmaev, and A. Maevskiy, “Permutation decoding of polar codes,” CoRR, vol. abs/1901.05459, 2019. [Online]. Available: http://arxiv.org/abs/1901.05459
 [12] M. Bardet, V. Dragoi, A. Otmani, and J. Tillich, “Algebraic properties of polar codes from a new polynomial formalism,” in 2016 IEEE International Symposium on Information Theory (ISIT), July 2016, pp. 230–234.
 [13] N. Hussami, S. B. Korada, and R. Urbanke, “Performance of polar codes for channel and source coding,” in 2009 IEEE International Symposium on Information Theory, June 2009, pp. 1488–1492.
Comments
There are no comments yet.