
5.3. Encodings 93
that v and w are close to Cn while V0 requires that both are indeed codewords.
Under the assumption that the coding scheme C is (r, q)-robust where log kn
is in
(9(r(n))
and logsn is in
(9(q(n))
we will now show that we can turn the
extended verifier Vo into an (r, q)-restricted extended verifier V1 which works for
all inputs. Note that we construct 1/1 just in order to show an application of
robust coding schemes and that in particular verifier 1/1 is not necessarily more
efficient than the extended verifier constructed in Example 5.9.
So let ~ < 1/8 be a positive rational which witnesses that the coding scheme C
is (r, q)-robust and let V~ and
Vb
be corresponding verifiers which witness that
C is (r, q)-checkable and (r, q)-correctable, respectively.
On an input (0 n,
vw)
the new verifier V1 first checks probabilistically whether v
and w are both ~-close to Cn by simulating V~ on inputs (0n,v) and (0n,w). In
case V~ rejects for at least one of these inputs, V1 rejects immediately. Otherwise
V1 starts simulating Vo on input (0 ~,
vw)
and random string T. While simulating
V0 for a single random string 7- the extended verifier 1/1 checks probabilistically
whether the constantly many symbols read by V0 while working on random
string T agree with the corresponding nearest codeword by simulating for each
such symbol the extended verifier Vb with an appropriate input. In case Vb rejects
during some of the latter simulations, then so does V1 for the random string ~- of
V0 under consideration, but otherwise 1/1 just simulates Vo and accepts or rejects
according to the latter simulation.
By construction 1/1 accepts an input
(O'~,vw)
in case v and w are identical
codewords in C,~. We show that 1/1 rejects such an input in case either, firstly,
the strings v or w are not t~-close to Cn or, secondly, both are ~-close to C,~
but the corresponding nearest codewords are different. In case v is not ~-close
to Cn then Va on input (O n, v) rejects for at least 3/4 of its random strings,
and then so does V~ due its simulation of V~. By symmetry the same holds for
w. So we can restrict the remainder of the verification to the case where both
strings are ~-close to Cn and we let y and z be the nearest codewords of v and
w, respectively.
Now consider the simulating computation on a single random string r of Vo. In
case all symbols read by V0 while working on this random string agree with y
and z, respectively, then V will behave like V0 would behave on input (O n,
yz).
On the other hand, in case some of the symbols read do not agree with y or z,
respectively, then the simulation of
Vb
results in rejecting with constant proba-
bility which can be chosen as close to 1 as desired, say with probability 9/10. But
we can assume that also Vo in case of rejection rejects its input for a fraction of
9/10 of all random strings, and consequently V1 rejects the input (0 n,
wv)
with
probability at least 81/100.
In the proof of Proposition 5.14 we apply robust coding schemes in essentially the
same way as in Example 5.12. The former application is however more involved
because the alleged codewords might belong to various codes in some given