Next Article in Journal
An Extended Epistemic Framework Beyond Probability for Quantum Information Processing with Applications in Security, Artificial Intelligence, and Financial Computing
Previous Article in Journal
On the Coupling Between Cosmological Dynamics and Quantum Behavior: A Multiscale Thermodynamic Framework
Previous Article in Special Issue
HCSS-GB and IBESS: Secret Image Sharing Schemes with Enhanced Shadow Management and Visual-Gradient Access Control
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Storage–Communication Trade-Off in Graph-Based X-Secure T-Private Linear Computation

by
Yueyang Liu
,
Haobo Jia
and
Zhuqing Jia
*
School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(9), 975; https://doi.org/10.3390/e27090975
Submission received: 10 August 2025 / Revised: 14 September 2025 / Accepted: 15 September 2025 / Published: 18 September 2025
(This article belongs to the Special Issue Information-Theoretic Security and Privacy)

Abstract

The problem of graph-based X-secure T-private linear computation (GXSTPLC) is to allow a user to retrieve a linear combination of K messages from a set of N distributed servers that store the messages in a graph-based fashion, i.e., each message is restricted to be distributed among a subset of servers. T-privacy requires that the coefficients of the linear combination are not revealed to any group of up to T colluding servers, and X-security guarantees that any set of up to X colluding servers learns nothing about the messages. In this paper, we propose an achievability scheme for GXSTPLC that enables a storage–communication trade-off by exploiting non-replicated storage codes. Novel aspects of our achievability scheme include the usage of the idea of cross-subspace alignment null shaper that addresses various challenges posed by the graph-based storage structure. In addition, unlike previous works, our scheme allows a direct transformation into a quantum one to achieve a superdense coding gain by leveraging the idea of N-Sum Box abstraction of quantum “over-the-air” computing.

1. Introduction

Escalating concerns regarding security and privacy in distributed systems motivate the problem of private linear computation (PLC). PLC considers a scenario where K messages are stored (possibly replicated or coded) across N distributed servers. The user aims to retrieve a linear combination of these messages without revealing the coefficients of the linear combination to any group of up to T colluding servers, where T, representing the maximum number of tolerable colluding servers, is referred to as the privacy threshold. Notably, PLC is a non-trivial generalization of private information retrieval (PIR), as PIR corresponds to the special case where the user uses a one-hot coefficient vector to retrieve a single message. Recent advancements in the study of PIR and PLC from an information-theoretic perspective have yielded a series of capacity (i.e., the reciprocal of the minimum possible normalized download cost across N servers) characterizations and novel coding schemes for these problems and their variants [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45].
Existing paradigms like PIR and PLC often assume global data availability, where each message can be stored across all servers, which is cumbersome in real-world applications due to constraints such as geographic blocking, network connectivity, and data security, so that data are not uniformly available at all servers, and data must be secure against storage eavesdroppers. Driven by this problem, a PLC variant known as graph-based X-secure T-private linear computation (GXSTPLC) incorporates two key constraints. First, the non-uniform data availability, or graph-based PLC, where each message is restricted to be stored among a specific subset of servers, referred to as the storage pattern. This pattern can be naturally represented by a hypergraph where servers are nodes and the storage subset for each message forms a hyperedge. Second, X-security of the storage, a standard requirement ensuring that no information about the messages is revealed to any set of up to X colluding servers. While several prior works address graph-based PIR/PLC [35,36,37,38], and the asymptotic (i.e., in the limit as the number of messages K approaches infinity) capacity of GXSTPLC was fully characterized in [38], a subtle observation arises. To the best of our knowledge, the storage codes in related prior graph-based PIR/PLC works are essentially repetition codes (meaning each stored portion of a message is at least as large as the original message). Furthermore, the achievability scheme in [38] may necessitate storage exceeding simple replication, which can be highly storage-inefficient. Our work is motivated by this potential storage inefficiency; i.e., we are interested in the trade-off between the download cost and storage efficiency by leveraging coding techniques in the storage construction. We note that deriving the tight converse bound (i.e., the full capacity characterization) for the storage–download trade-off of GXSTPLC remains a challenging open problem. The focus of this work is to establish the first achievability scheme that enables such a trade-off.
The main result of this work is an achievability scheme for GXSTPLC that allows a trade-off between the download cost and storage cost. Specifically, we first propose an achievability scheme for a closely related problem, namely Asymmetric MDS-GXSTPLC, where security and privacy requirements are non-uniform across the messages; i.e., each message and the corresponding coefficient are specified with individual security and privacy thresholds. In addition, the storage code for each message is an MDS code that results in a reduction in storage cost (by trading off the communication efficiency). Then, based on the achievability scheme for Asymmetric MDS-GXSTPLC, our achievability scheme is finalized by adapting the idea of the augmented system in [38]. The key novelty that distinguishes our scheme from previous state-of-the-art is summarized as follows:
  • The idea of exploiting MDS codes for the storage in graph-based PIR/PLC: Ref. [38] achieves a single point (minimum download cost) using replication codes that turn out to be storage-inefficient, while our scheme leverages MDS-coded storage to allow a storage–download trade-off. To the best of our knowledge, this is the first scheme to incorporate MDS codes in graph-based PIR/PLC.
  • The technique used to handle the challenges introduced by the graph-based storage structure: Our work introduces a novel technique centered around the idea of a cross-subspace alignment (CSA) null shaper introduced in [27] to address the challenges introduced by the graph-based storage structure. The CSA null shaper was originally designed for storage-consistent private updates with unavailable servers. However, in this work, this idea is adapted to ensure that the overall storage conforms to valid CSA codewords under the graph-based storage constraints. This distinguishes our scheme from the scheme in [38], where the PLC under graph-based storage structure is enabled by a combination of techniques including CSA codes, dual Generalized Reed–Solomon (GRS) codes, and a Vandermonde decomposition of Cauchy matrices. Intuitively, CSA codes can be viewed as evaluation codes, and the CSA null shaper carefully places zeros at certain evaluation points, which correspond precisely to the servers prohibited by the graph-based storage pattern from storing codewords of a particular message. Consequently, the codewords for these servers are explicitly set to zero, requiring no storage at all, and the overall codewords (including zeros) remain valid CSA codewords. It should be noted that the idea of placing zeros in the storage construction for graph-based PIR/PLC may be profound, as the storage code of many known PIR/PLC schemes can be viewed as evaluation codes (e.g., polynomial codes based PIR/PLC in [12,24,46,47,48,49]). This idea may transform known PIR/PLC schemes into graph-based ones.
  • Reduced decoding complexity and quantum adaptability: Unlike schemes based on dual GRS codes properties, where a pre-processing step of interference cancellation during decoding is generally necessary, in our scheme, the user can recover the desired linear combination by merely solving linear systems defined by Cauchy–Vandermonde matrices, hence the reduction in decoding complexity. Moreover, our scheme is compatible with the N-Sum Box abstraction of quantum “over-the-air” computing [44,50], enabling a direct transformation of our scheme into a quantum one to achieve the superdense coding gain.
Notations:  Z > 0 denotes the set of positive integers. The set of rational numbers is denoted as Q , while Q 0 denotes the set of non-negative rational numbers. For any two positive integers M < N , [ M : N ] denotes the set { M , M + 1 , , N } , and [ N ] denotes [ 1 : N ] . For any set of random variables X 1 , X 2 , , X N indexed by [ N ] , and an index set I [ N ] , X I denotes { X i i I } . For any x R , ( x ) + denotes max ( x , 0 ) .

2. Problem Statement

Let us consider a private linear computation problem with N servers, denoted as Server n , n [ N ] , and K messages. As depicted in Figure 1, the messages are partitioned into M disjoint sets, i.e., W = m [ M ] W m , W i W j = , i j , i , j [ M ] , where W m is the m t h message set and W is the set of all messages. For each m [ M ] , we define W m = { W m , 1 , W m , 2 , , W m , K m } ; i.e., the message set W m consists of K m messages, and each of the messages comprises L i.i.d. symbols from a finite field F q . Formally, for all m [ m ] , k [ K m ] , we have W m , k = [ W m , k ( 1 ) , W m , k ( 2 ) , , W m , k ( L ) ] , and
H ( ( W m , k ) m [ M ] , k [ K m ] ) = K L ,
in q-ary units. Due to non-uniform data availability, each message set is only allowed to be stored among a subset of the N servers. To characterize this graph-based storage fashion, let us define
R = { R 1 , R 2 , , R M } ,
R m = { R m ( 1 ) , R m ( 2 ) , , R m ( ρ m ) } [ N ] ,
where R m corresponds to the m t h message set W m , and for all m [ M ] , R m represents a subset of servers; i.e., the message set W m is allowed to be stored among Server n , n R m . The collection of server subsets R is referred to as the storage pattern. Note that it is occasionally more convenient to consider the dual representation of the storage pattern,
M = { M 1 , M 2 , , M N } ,
M n = { m [ M ] R m n } ,
i.e., for all n [ N ] , Server n is allowed to store a securely coded codeword of the messages W m , m M n . In other words, denoting the codeword of the message W m , k , m [ M ] , k [ K m ] stored at Server n , n R m as W ˜ m , k ( n ) , the storage at server n , n [ N ] , denoted as S n , is, thus,
S n = { W ˜ m , k ( n ) m M n , k [ K m ] } .
Moreover, the X-secure storage constraint guarantees that the collusion of any up to X servers discloses nothing about the message, i.e.,
I ( S X ; W ) = 0 , X [ N ] , | X | = X .
Let us further elaborate on the above notations via the following example. Assume that we have M = 4 message sets W 1 , W 2 , W 3 , W 4 that are stored at N = 7 servers, as shown in the following table.
Server 1Server 2Server 3Server 4Server 5Server 6Server 7Server 8
W 2 W 1 W 1 W 2 W 2 W 1 W 1 , W 2 W 1
For this example, we have
R 1 = { 2 , 3 , 6 , 7 } , ρ 1 = 4 R 2 = { 1 , 4 , 5 , 7 , 8 } , ρ 2 = 5
M 1 = { 2 } , M 2 = { 1 } , M 3 = { 1 } , M 4 = { 2 } ,
M 5 = { 2 } , M 6 = { 1 } , M 7 = { 1 , 2 } , M 8 = { 1 } .
In our private linear computation problem, the user is interested in a linear combination of the K messages of the following form
λ Λ ( W ) m [ M ] k [ K m ] λ m , k W m , k ,
where Λ = ( λ m , k ) m [ M ] , k [ K m ] is the coefficient of the linear combination and λ m , k , l F q , m [ M ] , k [ K m ] , l [ L ] are generated by the user privately, uniformly i.i.d. over the finite field F q . For this purpose, the user generates a total of N queries, Q n ( Λ ) , n [ N ] , where Q n ( Λ ) is intended for Server n, without prior awareness of messages or server storage
I ( S [ N ] ; Λ , Q 1 ( Λ ) , , Q n ( Λ ) ) = 0 ,
so that any set of up to T colluding servers learns nothing about the coefficients Λ . Formally, we have
I ( Q T ( Λ ) ; Λ ) = 0 , T [ N ] , | T | = T .
Once the query Q n ( Λ ) is available at Server n, n [ N ] , an answer string A n ( Λ ) is generated as a function of Q n ( Λ ) and its storage S n , i.e.,
H ( A n ( Λ ) Q n ( Λ ) , S n ) = 0 .
A private linear computation scheme is correct if and only if the desired linear combination is resolvable from the collection of downloaded server answers, i.e.,
H ( λ Λ ( W ) A [ N ] ( Λ ) , Q [ N ] ( Λ ) , Λ ) = 0 .
To characterize the communication efficiency of a private linear computation scheme per server, we define the normalized total download cost D n as the expected number of q-ary symbols downloaded from the n-th server, normalized by L, that is, D n = H ( A n ( Λ ) ) L . In addition, to measure the storage efficiency per server, we define the normalized storage cost for all n [ N ] as follows:
C n = H ( S n ) K L .

3. Main Result

The main result of this work is an achievability scheme for the problem of GXSTPLC that allows a trade-off between the download cost and storage cost, formally presented in the following theorem.
Theorem 1.
Let η = ( η 1 , η 2 , , η M ) Q M be a vector of rational numbers such that for all m [ M ] , η m 1 , and each η m = p m / q m , with p m , q m being co-prime. Consider a target vector of per-server normalized download costs ( D 1 , D 2 , , D N ) Q 0 N , where each D n = p n / q n , with p n , q n being co-prime. If the vector ( D 1 , D 2 , , D N ) lies within the achievable region D , defined as
D ( η ) ( D 1 , , D N ) Q 0 N m [ M ] , R m R m with | R m | = | R m | X T , n R m D n η m ,
then this vector of download costs is achievable by the proposed GXSTPLC scheme. The corresponding normalized storage cost C n , n [ N ] is given by
C n = 1 K m M n min ( τ n , γ m ) K m q 0 ( η m 1 ) + 1 ,
where the integers τ n are defined as τ n = q 0 D n with q 0 = l c m ( q 1 , q 2 , , q N , q 1 , q 2 , , q M ) , and for each m [ M ] , γ m is the ( X + T ) -th largest value in the multiset { τ n n R m } when its elements are sorted in non-increasing order.
Remark 1.
It is remarkable that by setting η m = 1 for all m [ M ] , our result reduces to that of [38], which is capacity-achievable; i.e., it achieves the minimum possible normalized total download cost D = n [ N ] D n via the optimal configuration of D n s. It is also worth mentioning that by setting η m = 1 for all m [ M ] , the closure of our achievable region D ( 1 ) in the real space R N exactly matches the converse region established in [38] (Theorem 1).

The Storage–Communication Trade-Off in the Proposed GXSTPLC Scheme

In this section, we investigate the fundamental trade-off between the normalized storage cost C n and the normalized download cost D n of our proposed GXSTPLC scheme. To facilitate this analysis, we can bound the expression for C n as follows.
C n = 1 K m M n min ( τ n , γ m ) K m q 0 ( η m 1 ) + 1
1 K m M n τ n K m q 0 ( η m 1 + 1 q 0 )
= D n K m M n K m η m 1 + 1 q 0 ,
where (18) holds by noting that min ( τ n , γ m ) τ n . To further simplify our analysis, let us consider a symmetric scenario where K m = K / M for all m [ M ] . In addition, by definition, q 0 tends to be large, so the bound can then be approximated as
C n D n M m M n 1 η m 1 .
This approximation explicitly shows that for operating points within the achievable region D ( η ) , for a given server n, its storage cost C n is directly proportional to its own download cost D n and inversely related to the term η m 1 for each message set m it stores. This relationship suggests that one potential strategy to reduce C n is to increase the corresponding values of η m while keeping D n fixed. However, according to the definition of the achievable region D ( η ) , increasing any η m tightens the feasibility constraint associated with the message set m, requiring a larger sum of download costs from the relevant servers. To satisfy this stricter condition, the download costs of other servers (i.e., those in R m ) must collectively increase. This increase in another server’s download cost, namely D n , is likely to elevate its own storage cost C n . Therefore, an attempt to locally optimize storage cost on one server can inadvertently shift the burden, increasing both download and storage costs elsewhere in the system.
On the other hand, it is also of interest to explore the trade-off between the total normalized storage cost, denoted by C = n = 1 N C n , and the total normalized download cost, D = n = 1 N D n . To construct the optimal trade-off curve of D versus C for a given total download cost D target , our goal is to find the minimum possible total storage cost C min . This is formulated as an optimization problem:
C min ( D target ) = min η , ( D n ) n [ N ] n = 1 N C n
s . t . n = 1 N D n D target ,
( D 1 , D 2 , , D N ) D ( η ) ,
η m 1 , m [ M ] .
By solving this optimization problem for a range of D target values, we obtain a set of optimal operating points ( D target , C min ( D target ) ) . Figure 2 presents such a storage–communication trade-off curve for a specific setting. It is crucial to note that this figure is plotted by numerically solving the optimization problem (21)–(24) via an exhaustive search-based strategy. In particular, for the specific system setting, we first discretize and sweep over a range of plausible values for the parameters η 1 and η 2 (subject to η 1 , η 2 1 ). Then, for each candidate pair ( η 1 , η 2 ) , we find achievable download cost vector ( D 1 , D 2 , , D N ) that minimizes the total download cost D target = n D n for the specific η . For each feasible ( η 1 , η 2 ) and its associated optimal download vector ( D 1 , D 2 , , D N ) , the corresponding total storage cost C = n = 1 N C n is calculated. This results in a point ( D target , C ) on the D-C plane for the given η . The set of all points ( D target , C ) obtained from all feasible ( η 1 , η 2 ) pairs forms a set of achievable ( D target , C ) points, and the trade-off curve is obtained by finding its lower convex hull. Although this numerical method does not guarantee the exploration of the entire feasible region, the resulting curve provides a conservative approximation of the optimal solution. In other words, the true optimal trade-off curve can only lie on or to the lower left of the curve presented in the figure, which serves as a bound for the ( D target , C min ( D target ) ) curve.

4. An Achievability Scheme for Asymmetric Setting

As discussed in the introduction, our achievability scheme construction begins with a scheme for Asymmetric MDS-GXSTPLC. Specifically, in this asymmetric variant, the security and privacy constraints are parameterized by two tuples X = ( X 1 , X 2 , , X M ) and T = ( T 1 , T 2 , , T M ) , and for each message set m [ M ] , the corresponding constraints are X m -security and T m -privacy, i.e.,
I ( S X ; W m ) = 0 , X [ N ] , | X | = X m ,
I ( Q T ( Λ ) ; ( λ m , k ) k [ K m ] ) = 0 , T [ N ] , | T | = T m .
Moreover, for each message set m [ M ] , the codewords distributed among the servers n R m must form an ( N , X m + η m ) -MDS code; i.e., the messages W m must be recoverable from any X m + η m of its codewords, and the size of any of the codeword is at most L / η m in q-ary units, where η m Z > 0 for all m [ M ] . In particular, we show that the following (uniform) normalized download cost is achievable for Asymmetric MDS-GXSTPLC for all n [ N ]
D n = 1 min m [ M ] ρ m X m T m η m + 1 + .
Once the achievability scheme for the asymmetric setting is established, we then employ the idea of the augmented system adapted from [38] to show that the normalized download cost in Theorem 1 is achievable. The remainder of this section is devoted to the presentation of the achievability scheme for the problem of Asymmetric MDS-GXSTPLC.

4.1. Preliminaries

Recall that the security and privacy level are parameterized by two tuples X = ( X 1 , X 2 , , X M ) and T = ( T 1 , T 2 , , T M ) . Also, the MDS code constraint is parameterized by a set of M positive integers η 1 , η 2 , , η M . Moreover, let us assume that for all m [ M ] , we have ρ m > X m + T m + η m 1 ; otherwise, our scheme is infeasible. Let us define μ = min m [ M ] ρ m X m T m η m + 1 , and set L = lcm ( μ , η 1 , η 2 , , η M ) ; i.e., each of the K messages consists of L i.i.d. symbols from the finite field F q . Recall that setting L = lcm ( μ , η 1 , η 2 , , η M ) allows us to define a positive integer J m = L / η m as we must have η m L . Now for all m [ M ] , let us define a mapping ϕ m : [ J m ] × [ η m ] [ L ] as ϕ m ( , κ ) = + ( κ 1 ) J m , i.e., the column-major order reshaping of [ L ] . It is obvious that ϕ m is invertible, denoted as ϕ m 1 . Note that the mapping ϕ m allows us to reshape message vectors ( W m , k ) k [ K m ] into J m × η m matrices for all m [ M ] , where J m = L / η m . In other words, for all m [ M ] , k [ K m ] , [ J m ] , κ [ η m ] , we define W m , k ( , κ ) = W m , k ( ϕ m ( , κ ) ) . Also, we need a total of N + L distinct elements from F q , denoted as α 1 , α 2 , , α N , f 1 , f 2 , , f L . The existence of such distinct elements is guaranteed by selecting a sufficiently large field q N + L . For all m [ M ] , [ J m ] , κ [ η m ] , let us define f , κ ( m ) = f ϕ m ( , κ ) . Finally, for all m [ M ] , [ J m ] , κ [ η m ] , let us define W m , , κ = [ W m , 1 ( , κ ) , W m , 2 ( , κ ) , , W m , K m ( , κ ) ] and for all m [ M ] , define λ m = [ λ m , 1 , λ m , 2 , , λ m , K m ] . Clearly, the desired linear combination can be equivalently written in the following form
λ Λ ( W ) = m [ M ] W m , , κ λ m [ J m ] , κ [ η m ] .

4.2. Construction of the Storage

For all m [ M ] , let us define the following null-shaper polynomial in α
N m ( α ) = n [ N ] R m ( α α n ) ,
and for all m [ M ] , [ J m ] , let us define the following (vector-valued) rational function in α
W ˜ m , ( α ) = N m ( α ) κ [ η m ] N m ( f , κ ( m ) ) 1 α f , κ ( m ) W m , , κ + x [ X m ] α x 1 Z m , , x
where for all m [ M ] , [ J m ] , x [ X m ] , Z m , , x are uniformly i.i.d. column vectors from F q K m , independent of the messages. Note that by the definition of N ( α ) , for all m [ M ] , n [ N ] R m , we have W ˜ m , ( α n ) = 0 , i.e., the rational function W ˜ m , ( α ) , evaluated at the points corresponding to the servers that are prohibited from storing codewords of the m t h message set, is zero. Moreover, by partial fraction decomposition, we can also write
W ˜ m , ( α ) = κ [ η m ] 1 α f , κ ( m ) W m , , κ + i [ X m + N ρ m ] α i 1 Y m , , i ,
where for all m [ M ] , [ J m ] , ( Y m , , i ) i [ X m + N ρ m ] are various linear combinations of ( W m , , κ ) κ [ η m ] and ( Z m , , x ) x [ X m ] . Now, for all n [ N ] , the storage at Server n is constructed as follows
S n = W ˜ m , ( α n ) m [ M ] , [ J m ] .
Again, while evaluating the rational function W ˜ m , ( α ) for all α n , n [ N ] might seem to violate the graph-based storage pattern, this paradox is resolved because our construction guarantees that for each message set m [ M ] , the evaluations for servers that refrain from storing any codeword of that message set are explicitly set to zero; hence, no storage is necessary. Moreover, for all m [ M ] , k [ K m ] , the size of the codeword of W m , k for Server n , n R m is J m = L / η m . And for all m [ M ] , [ J m ] and K R m such that | K | = η m + X m , given ( W ˜ m , ( α n ) ) n K , the message symbols ( W m , , κ ) κ [ η m ] are recoverable. This is because for all n R m , we have N ( α m ) 0 , so from ( N m ( α m ) 1 W ˜ m , ( α n ) ) n K , ( W m , , κ ) κ [ η m ] are recoverable by inverting the following (scaled) Cauchy–Vandermonde matrix
N m ( f , 1 ( m ) ) 1 α i 1 f , 1 ( m ) N m ( f , η m ( m ) ) 1 α i 1 f , η m ( m ) 1 α i 1 X m 1 N m ( f , 1 ( m ) ) 1 α i η m + X m f , 1 ( m ) N m ( f , η m ( m ) ) 1 α i η m + X m f , η m ( m ) 1 α i η m + X m X m 1
where K = { i 1 , i 2 , , i η m + X m } , and for any distinct α i 1 , α i 2 , , α i η m + X m , f , 1 ( m ) , f , 2 ( m ) , , f , η m ( m ) , the Cauchy–Vandermonde matrix must be invertible. Finally, guaranteed by the ( N , X m ) -MDS coded uniform noise terms, for all m [ M ] , the storage at any X m servers is independent of W m , i.e., the storage is X m -secure with respect to the m t h message set.

4.3. Construction of the Queries

For all m [ M ] , [ J m ] , κ [ η m ] , let us define the following polynomial in α
Q m , , κ ( α ) = κ [ η m ] { κ } α f , κ ( m ) f , κ ( m ) f , κ ( m ) λ m + κ [ η m ] ( α f , κ ( m ) ) t [ T m ] α t 1 Z m , , κ , t ,
where for all m [ M ] , [ J m ] , κ [ η m ] , t [ T m ] , Z m , , κ , t are uniformly i.i.d. column vectors from F q K m , independent of the coefficients. Now the query for Server n is constructed as
Q n ( Λ ) = Q m , , κ ( α n ) m [ M ] , [ J m ] , κ [ η m ] .
Similarly, due to the fact that the coefficients are protected by the ( N , T m ) -MDS coded uniform noise terms, for all m [ M ] , the queries are T m -private with respect to the m t h message set.

4.4. Construction of the Answers

Let us define V = L / μ , and note that μ L , V must be a positive integer. Once the query Q n ( Λ ) is available at Server n, for all n [ N ] , the answer A n ( Λ ) is constructed as follows
A n ( Λ ) = m [ M ] ( , κ ) ϕ m 1 [ ( v 1 ) μ + 1 : v μ ] W ˜ m , ( α n ) Q m , , κ ( α n ) | v [ V ] .
To see the correctness of our scheme, note that the term W ˜ m , ( α n ) Q m , , κ ( α n ) can be viewed as the evaluation of the rational function W ˜ m , ( α ) Q m , , κ ( α ) at α n , where, exploiting the equivalent form of W ˜ m , ( α ) in (31), we can write
W ˜ m , ( α ) Q m , , κ ( α ) = 1 α f , κ ( m ) W m , , κ λ m + i [ X m + N ρ m + η m + T m 1 ] α i 1 Y m , , κ , i
where for all m [ M ] , [ J m ] , κ [ η m ] , i [ X m + N ρ m + η m + T m 1 ] , Y m , , κ , i are various linear combinations of ( W m , , κ ) κ [ η m ] , ( Y m , , i ) i [ X m + N ρ m ] , λ m and ( Z m , , κ , t ) t [ T m ] . Note that by the definition of μ , for all m [ M ] , we have μ ρ m X m T m η m + 1 . Therefore X m + N ρ m + η m + T m 1 = N ( ρ m X m T m η m + 1 ) N μ ; i.e., we can equivalently write
W ˜ m , ( α ) Q m , , κ ( α ) = 1 α f , κ ( m ) W m , , κ λ m + i [ N μ ] α i 1 Y m , , κ , i
where for all N ( ρ m X m T m η m + 1 ) < i N μ , we simply set Y m , , κ , i = 0 . Now plug this form into the definition of the answer, and recall that for all m [ M ] , ϕ m represents the column-major order reshaping of [ L ] , we have
m [ M ] , ( , κ ) ϕ m 1 [ ( v 1 ) μ + 1 : v μ ] W ˜ m , ( α n ) Q m , , κ ( α n ) = l [ ( v 1 ) μ + 1 : v μ ] 1 α n f l m [ M ] W m , ( ϕ m 1 ( l ) ) λ m + i [ N μ ] α n i 1 Y v , i
where for all v [ V ] ,
Y v , i = m [ M ] , ( , κ ) ϕ m 1 [ ( v 1 ) μ + 1 : v μ ] Y m , , κ , i .
Now it is clear that for all v [ V ] , the desired linear combination symbols
m [ M ] W m , , κ λ m ( , κ ) ϕ m 1 [ ( v 1 ) μ + 1 : v μ ] can be decoded by inverting the following Cauchy–Vandermonde matrix
1 α 1 f ( v 1 ) μ + 1 1 α 1 f v μ 1 α 1 N μ 1 1 α N f ( v 1 ) μ + 1 1 α N f v μ 1 α N N μ 1 C S A N , μ q ( α , f ) ,
whose invertibility is ensured by the fact that f 1 , f 2 , , f L , α 1 , α 2 , , α N are distinct. Finally, note that for each server n, a total of V symbols are downloaded, and the normalized download cost of the scheme is, thus,
D n = V L = 1 μ = 1 min m [ M ] ρ m X m T m η m + 1 , n [ N ] .

4.5. Motivating Example

Let us elaborate on our scheme via an illustrative example. Consider an example where we have N = 20 servers that store M = 2 message sets according to the following storage pattern.
R 1 = { 3 , 4 , 5 , 6 , 7 , 8 , 13 , 14 , 15 , 16 , 17 , 18 } , ρ 1 = 12 ,
R 2 = { 1 , 2 , 9 , 10 , 11 , 12 , 16 , 17 , 19 , 20 } , ρ 2 = 10 .
Conversely, we can also write
M 1 = { 2 } , M 2 = { 2 } , M 3 = { 1 } , M 4 = { 1 } , M 5 = { 1 } , M 6 = { 1 } , M 7 = { 1 } , M 8 = { 1 } , M 9 = { 2 } , M 10 = { 2 } , M 11 = { 2 } , M 12 = { 2 } , M 13 = { 1 } , M 14 = { 1 } , M 15 = { 1 } , M 16 = { 1 } , M 17 = { 1 } , M 18 = { 1 } , M 19 = { 2 } , M 20 = { 2 } .
Moreover, let us set the asymmetric security and privacy thresholds X 1 = 3 , X 2 = 2 , T 1 = 3 , T 2 = 2 . Also, the MDS code constraint is parameterized by two positive integers η 1 = 2 , η 2 = 2 . According to the definition of Section 4.1, we have μ = 5 , L = 10 . Recall that the K messages are partitioned into two disjoint sets W 1 and W 2 , where
W 1 = { W 1 , 1 , W 1 , 2 , , W 1 , K 1 } ,
W 2 = { W 2 , 1 , W 2 , 2 , , W 2 , K 2 } .
Each message comprises L = 10 symbols from F q , where q 30 , i.e.,
W 1 , k = W 1 , k ( 1 ) , W 1 , k ( 2 ) , , W 1 , k ( 10 ) , k [ K 1 ] ,
W 2 , k = W 2 , k ( 1 ) , W 2 , k ( 2 ) , , W 2 , k ( 10 ) , k [ K 2 ] .
Let α 1 , α 2 , , α 20 , f 1 , 1 , , f 5 , 1 , f 1 , 2 , , f 5 , 2 be 30 distinct constants from the finite field F q . According to the definition of Section 4.1, we have J 1 = L / η 1 = 5 and J 2 = L / η 2 = 5 . For all [ 5 ] , κ [ 2 ] , let us define
W 1 , , κ = [ W 1 , 1 ( + 5 ( κ 1 ) ) , W 1 , 2 ( + 5 ( κ 1 ) ) , , W 1 , K 1 ( + 5 ( κ 1 ) ) ]
W 2 , , κ = [ W 2 , 1 ( + 5 ( κ 1 ) ) , W 2 , 2 ( + 5 ( κ 1 ) ) , , W 2 , K 2 ( + 5 ( κ 1 ) ) ] .
and define
λ 1 = [ λ 1 , 1 , λ 1 , 2 , , λ 1 , K 1 ] ,
λ 2 = [ λ 2 , 1 , λ 2 , 2 , , λ 2 , K 2 ] .
Then the desired linear combination of the two messages can be written in the following form.
λ Λ ( W ) = m [ 2 ] W m , 1 , 1 λ m , , m [ 2 ] W m , 5 , 1 λ m , m [ 2 ] W m , 1 , 2 λ m , , m [ 2 ] W m , 5 , 2 λ m .
For all m [ 2 ] , let us define the following null-shaper polynomial in α ,
N m ( α ) = n [ N ] R m ( α α n ) .
Let us define the following (vector-valued) rational function in α ,
W ˜ 1 , ( α ) N 1 ( α ) N 1 ( f , 1 ) 1 α f , 1 W 1 , , 1 + N 1 ( f , 2 ) 1 α f , 2 W 1 , , 2 + x [ 3 ] α x 1 Z 1 , , x
= 1 α f , 1 W 1 , , 1 + 1 α f , 2 W 1 , , 2 + i [ 11 ] α i 1 Y 1 , , i .
Note that since for all n [ N ] R 1 , N 1 ( α n ) = 0 , we have W ˜ 1 , ( α n ) = 0 for all [ 5 ] . In (55), for all [ 5 ] , ( Y 1 , , i ) i [ 11 ] are various linear combinations of ( W 1 , , κ ) κ [ 2 ] and ( Z 1 , , x ) x [ 3 ] . Since | R 1 | = 12 , the degree of the last term (viewed as a polynomial in α ) in (55) is 10.
Let us define the following (vector-valued) rational function in α ,
W ˜ 2 , ( α ) N 2 ( α ) N 2 ( f , 1 ) 1 α f , 1 W 2 , , 1 + N 2 ( f , 2 ) 1 α f , 2 W 2 , , 2 + x [ 2 ] α x 1 Z 2 , , x
= 1 α f , 1 W 2 , , 1 + 1 α f , 2 W 2 , , 2 + i [ 12 ] α i 1 Y 2 , , i
Note that since for all n [ N ] R 2 , N 2 ( α n ) = 0 , we have W ˜ 2 , ( α n ) = 0 for all [ 5 ] . In (57), for all [ 5 ] , ( Y 2 , , i ) i [ 12 ] are various linear combinations of ( W 2 , , κ ) κ [ 2 ] and ( Z 2 , , x ) x [ 2 ] . Since | R 2 | = 10 , the degree of the last term (viewed as a polynomial in α ) in (57) is 11.
For all n [ 20 ] , the storage at Server n is S n = { W ˜ 1 , ( α n ) , W ˜ 2 , ( α n ) [ 5 ] } . The MDS( 20 , 3 ) coded random noise term in (54) guarantees that the messages ( W 1 , k ) k [ K 1 ] is X 1 = 3 -secure. Similarly, the MDS( 20 , 2 ) coded random noise term in (56) guarantees that the message ( W 2 , k ) k [ K 2 ] is X 2 = 2 -secure. Thus we have
I ( S X ; W 1 ) = 0 , X [ 20 ] , | X | = 3 ,
I ( S X ; W 2 ) = 0 , X [ 20 ] , | X | = 2 .
Note that for all n [ 20 ] , m [ 2 ] M n , [ 5 ] , W ˜ m , ( α n ) = 0 holds, i.e., if the graph-based storage pattern prohibits a server from storing a certain message, the corresponding codeword is explicitly set to zero.
For all [ 5 ] , κ [ 2 ] , t [ 3 ] , let Z 1 , , κ , t be uniformly i.i.d. column vectors from F q K 1 , independent of the coefficients. For all [ 5 ] , let us define the following rational functions in α ,
Q 1 , , 1 ( α ) = α f , 2 f , 1 f , 2 λ 1 + ( α f , 1 ) ( α f , 2 ) t [ 3 ] α t 1 Z 1 , , 1 , t ,
Q 1 , , 2 ( α ) = α f , 1 f , 2 f , 1 λ 1 + ( α f , 1 ) ( α f , 2 ) t [ 3 ] α t 1 Z 1 , , 2 , t ,
For all [ 5 ] , κ [ 2 ] , t [ 2 ] , let Z 2 , , κ , t be uniformly i.i.d. column vectors from F q K 2 , independent of the coefficients. For all [ 5 ] , let us define the following rational functions in α ,
Q 2 , , 1 ( α ) = α f , 2 f , 1 f , 2 λ 2 + ( α f , 1 ) ( α f , 2 ) t [ 2 ] α t 1 Z 2 , , 1 , t ,
Q 2 , , 2 ( α ) = α f , 1 f , 2 f , 1 λ 2 + ( α f , 1 ) ( α f , 2 ) t [ 2 ] α t 1 Z 2 , , 2 , t ,
For all n [ 20 ] , the query sent to Server n is constructed as Q n ( Λ ) = { Q 1 , , κ ( α n ) , Q 2 , , κ ( α n ) [ 5 ] , κ [ 2 ] } . The MDS( 20 , 3 ) coded random noise terms in (59) and (60) guarantee that the coefficient λ 1 is T 1 = 3 –private. Similarly, the MDS( 20 , 2 ) coded random noise terms in (61) and (62) guarantee that the coefficient λ 2 is T 2 = 2 -private. Thus we have
I ( Q T ( Λ ) ; ( λ 1 , k ) k [ K 1 ] ) = 0 , T [ 20 ] , | T | = 3 ,
I ( Q T ( Λ ) ; ( λ 2 , k ) k [ K 2 ] ) = 0 , T [ 20 ] , | T | = 2 .
According to the definition of Section 4.1, V = L / μ = 2 . The answer returned by Server n, n [ 20 ] is constructed as follows.
A n ( Λ ) = m [ 2 ] , [ 5 ] W ˜ m , ( α n ) Q m , , 1 ( α n ) , m [ 2 ] , [ 5 ] W ˜ m , ( α n ) Q m , , 2 ( α n ) , ,
where
m [ 2 ] , [ 5 ] W ˜ m , ( α n ) Q m , , 1 ( α n ) = [ 5 ] 1 α n f , 1 W 1 , , 1 + 1 α n f , 2 W 1 , , 2 + i [ 11 ] α n i 1 Y 1 , , i × α n f , 2 f , 1 f , 2 λ 1 + ( α n f , 1 ) ( α n f , 2 ) t [ 3 ] α n t 1 Z 1 , , 1 , t + 1 α n f , 1 W 2 , , 1 + 1 α n f , 2 W 2 , , 2 + i [ 12 ] α n i 1 Y 2 , , i
× α n f , 2 f , 1 f , 2 λ 2 + ( α n f , 1 ) ( α n f , 2 ) t [ 2 ] α n t 1 Z 2 , , 1 , t
= [ 5 ] 1 α n f , 1 W 1 , , 1 λ 1 + 1 α n f , 1 W 2 , , 1 λ 2 + s [ 15 ] α n s 1 Y , 1 , s
= [ 5 ] 1 α n f , 1 m [ 2 ] W m , , 1 λ m + s [ 15 ] α n s 1 Y ¯ 1 , s
where for all [ 5 ] , s [ 15 ] , Y , 1 , s are various linear combinations of W 1 , , 2 λ 1 , ( Y 1 , , i λ 1 ) i [ 11 ] , ( W 1 , , 2 Z 1 , , 1 , t ) t [ 3 ] , ( Y 1 , , i Z 1 , , 1 , t ) t [ 3 ] , i [ 12 ] , W 2 , , 2 λ 2 , ( Y 2 , , i λ 2 ) i [ 12 ] , ( W 2 , , 2 Z 2 , , 1 , t ) t [ 2 ] , ( Y 2 , , i Z 2 , , 1 , t ) t [ 2 ] , i [ 12 ] , whose exact form is not relevant. Similarly, we have
m [ 2 ] , [ 5 ] W ˜ m , ( α n ) Q m , , 2 ( α n ) = [ 5 ] 1 α n f , 2 m [ 2 ] W m , , 2 λ m + s [ 15 ] α n s 1 Y ¯ 2 , s .
Note that for all n [ 20 ] , m [ 2 ] M n , [ 5 ] , W ˜ m , ( α n ) = 0 always holds; thus, there is no need for the user to upload Q m , , 1 and Q m , , 2 .
Now, we can write the symbols contained in ( A n ( Λ ) ) n [ 20 ] in the following matrix form,
m [ 2 ] , [ 5 ] W ˜ m , ( α 1 ) Q m , , 1 ( α 1 ) m [ 2 ] , [ 5 ] W ˜ m , ( α 2 ) Q m , , 1 ( α 2 ) m [ 2 ] , [ 5 ] W ˜ m , ( α 20 ) Q m , , 1 ( α 20 ) = 1 α 1 f 1 , 1 1 α 1 f 5 , 1 1 α 1 α 1 13 1 α 2 f 1 , 1 1 α 2 f 5 , 1 1 α 2 α 2 13 1 α 20 f 1 , 1 1 α 20 f 5 , 1 1 α 20 α 20 13 × m [ 2 ] W m , 1 , 1 λ m m [ 2 ] W m , 5 , 1 λ m Y ¯ 1 , 1 Y ¯ 1 , 2 Y ¯ 1 , 15
m [ 2 ] , [ 5 ] W ˜ m , ( α 1 ) Q m , , 2 ( α 1 ) m [ 2 ] , [ 5 ] W ˜ m , ( α 2 ) Q m , , 2 ( α 2 ) m [ 2 ] , [ 5 ] W ˜ m , ( α 20 ) Q m , , 2 ( α 20 ) = 1 α 1 f 1 , 2 1 α 1 f 5 , 2 1 α 1 α 1 13 1 α 2 f 1 , 2 1 α 2 f 5 , 2 1 α 2 α 2 13 1 α 20 f 1 , 2 1 α 20 f 5 , 2 1 α 20 α 20 13 × m [ 2 ] W m , , 2 λ m m [ 2 ] W m , , 2 λ m Y ¯ 2 , 1 Y ¯ 2 , 2 Y ¯ 2 , 15
Now it is clear that the desired linear combination symbols m [ M ] W m , , κ λ m [ 5 ] , κ [ 2 ] can be decoded by inverting the Cauchy–Vandermonde matrix in (69) and (70), respectively, whose invertibility is ensured by the fact that f 1 , 1 , , f 5 , 1 , f 1 , 2 , , f 5 , 2 , α 1 , α 2 , , α 20 are distinct. Finally, note that for each server n, a total of two symbols are downloaded, and the normalized download cost of the scheme is, thus, D n = 2 / 10 = 1 / 5 for all n [ 20 ] .
Remark 2.
It is of interest to compare the decoding complexity of our scheme with that of [38]. For the decoding procedure, our scheme directly inverts a Cauchy–Vandermonde matrix, which can be conducted in O ( N 3 ) via standard methods or O ˜ ( N log 2 N ) using fast algorithms. In contrast, the scheme in [38] requires an additional pre-processing step for interference cancellation before a similar inversion, incurring an extra complexity of O ( N 2 ) above the complexity of inverting a Vandermonde matrix (which is also O ( N 3 ) via standard methods or O ˜ ( N log 2 N ) using fast algorithms).

5. Proof of Theorem 1

In this section, adapting from the idea of the augmented system in [38], we show that the download cost and the corresponding storage cost as defined in Theorem 1 are achievable. The augmented system is an Asymmetric MDS-GXSTPLC instance with the same message sets that are to be eventually reduced to the original GXSTPLC setting by merging servers. Specifically, the augmented system consists of N ¯ = n [ N ] τ n servers, denoted as Server ( 1 , 1 ) , ( 1 , 2 ) , , ( 1 , τ 1 ) , , ( N , 1 ) , ( N , 2 ) , , ( N , τ N ) . The storage pattern R ¯ = { R ¯ 1 , R ¯ 2 , , R ¯ M } and security/privacy thresholds for each message set X ¯ = ( X ¯ 1 , X ¯ 2 , , X ¯ M ) , T ¯ = ( T ¯ 1 , , T ¯ 2 , , T ¯ M ) are defined as follows.
X ¯ m = X γ m , m [ M ]
T ¯ m = T γ m , m [ M ]
R ¯ m = ( n , i ) n R m , i [ min ( γ m , τ n ) ]
In addition, for all m [ M ] , we set the MDS coding parameter for the augmented system η ¯ m = q 0 ( η m 1 ) + 1 . Recall that by the definition of q 0 , η ¯ m must be an integer.
Our GXSTPLC scheme is obtained by merging servers ( n , 1 ) , ( n , 2 ) , , ( n , τ n ) into Server n for all n [ N ] , i.e., assigning the storage, queries, and corresponding answers. Note that this recovers the original storage pattern R because for all n [ N ] , we have i [ τ n ] M ¯ ( n , i ) M n , where M ¯ ( n , i ) = { m [ M ] R ¯ m ( n , i ) } is the dual representation of R ¯ . Moreover, due to the fact that for all m [ M ] , n R m , the total number of pairs of the form ( n , ) in R ¯ m cannot be greater than X ¯ m / X and T ¯ m / T , so any X (or T) colluding servers have, at most, X ¯ m (or T ¯ m ) codewords (or queries) of the m t h message set. Guaranteed by the X m -security (or T m -privacy), these colluding servers disclose nothing about the messages (or coefficients); i.e., the scheme is X-secure and T-private. Finally, according to Section 4, for the augmented system, the normalized download cost of
D n , i = 1 min m [ M ] ρ ¯ m X ¯ m T ¯ m η ¯ m + 1
for each server ( n , i ) , n [ N ¯ ] , i [ τ n ] is achievable, where ρ ¯ m = | R ¯ m | , m [ M ] . According to the definition, for all m [ M ] , ρ ¯ m = X ¯ m + T ¯ m + ν m , where ν m is the summation of the smallest ( ρ m X T ) elements in ( τ n ) n R m . Since ( D 1 , D 2 , , D N ) D , we must have ν m q 0 η m for all m [ M ] . Now, since reducing the augmented system to the original setting does not increase the download cost, we can verify that the desired normalized download cost D n for all Server n , n [ N ] is achievable by our scheme, as follows.
i [ τ n ] D n , i = τ n min m [ M ] ρ ¯ m X ¯ m T ¯ m η ¯ m + 1
= τ n min m [ M ] ν m η ¯ m + 1
τ n q 0 η m q 0 ( η m 1 )
= τ n q 0
= D n
Moreover, the normalized storage cost of Server n, C n , can be calculated as follows.
C n = i [ τ n ] , m M ¯ n , i K m / η ¯ m K
= 1 K i = 1 τ n m = 1 M I ( ( n , i ) R ¯ m ) K m η ¯ m
= 1 K m M n min ( τ n , γ m ) K m q 0 ( η m 1 ) + 1
Remark 3.
Recall that our achievability scheme is constructed by reducing the augmented system (i.e., an Asymmetric MDS-GXSTPLC instance) to the original setting. Consequently, the decoding procedure for the scheme consists of inverting a series of Cauchy–Vandermonde matrices defined in (41). Indeed, this can be viewed as a series of instances of the CSA scheme, where the desired linear combination symbols are carried by the Cauchy terms, and the interference symbols are aligned within the Vandermonde terms. Then, according to the N-Sum Box abstraction of CSA codes [44,50], in a quantum setting where servers can send entangled qudits via separate quantum channels to the user, representing encoded classical answer symbols through local quantum operations, the superdense coding gain is achievable. In particular, for any total normalized download cost of D = n [ N ] D n > 2 in the classical setting, the corresponding quantum scheme achieves a total download cost of D 2 . For any classical total normalized download cost of D < 2 , the quantum scheme achieves the (obviously) optimal normalized total download cost of D = 1 . Note that this direct application of the CSA structure and the subsequent quantum gain is not directly applicable to schemes exploiting properties of dual GRS codes [26,38], since their decoding requires a pre-processing procedure of interference cancellation, and the resulting structure does not follow that of CSA codes.

Motivating Example

Consider another motivating example where we have N = 8 servers and K messages, X = 1 and T = 1 . The K messages are partitioned into two disjoint sets W 1 and W 2 . Let us set K 1 = K 2 = K / 2 . The storage pattern for this example is as follows.
R 1 = { 2 , 3 , 6 , 7 } ,
R 2 = { 1 , 4 , 5 , 7 , 8 } .
Let us set η = ( η 1 , η 2 ) = ( 1.2 , 1.2 ) . Moreover, let us also set the target vector of per-server normalized download costs as ( D 1 , D 2 , , D 8 ) = ( 2 / 5 , 3 / 5 , 3 / 5 , 2 / 5 , 2 / 5 , 3 / 5 , 3 / 5 , 2 / 5 ) . It can be easily verified that the selected vector of per-server normalized download costs lies in the feasible region D ( η ) defined in (15). Following the notations defined in Theorem 1 and above, we have q 0 = 5 , ( τ 1 , τ 2 , , τ 6 ) = ( 2 , 3 , 3 , 2 , 2 , 3 , 3 , 2 ) and N ¯ = 20 . The 20 servers in the augmented system are listed as ( ( 1 , 1 ) , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 2 ) , ( 2 , 3 ) , ( 3 , 1 ) , ( 3 , 2 ) , ( 3 , 3 ) , ( 4 , 1 ) , ( 4 , 2 ) , ( 5 , 1 ) , ( 5 , 2 ) , ( 6 , 1 ) , ( 6 , 2 ) , ( 6 , 3 ) , ( 7 , 1 ) , ( 7 , 2 ) , ( 7 , 3 ) , ( 8 , 1 ) , ( 8 , 2 ) ) .
Now we can generate the augmented system. Specifically, for the augmented system, we have X ¯ 3 = T ¯ 1 = 3 , X ¯ 2 = T ¯ 2 = 2 , η ¯ 1 = η ¯ 2 = 2 , and the storage pattern is shown in Table 1.
This is exactly the setting presented in the motivating example in Section 4.5 with server mapping Ψ : ( ( 1 , 1 ) , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 2 ) , ( 2 , 3 ) , ( 3 , 1 ) , ( 3 , 2 ) , ( 3 , 3 ) , ( 4 , 1 ) , ( 4 , 2 ) , ( 5 , 1 ) , ( 5 , 2 ) , ( 6 , 1 ) , ( 6 , 2 ) , ( 6 , 3 ) , ( 7 , 1 ) , ( 7 , 2 ) , ( 7 , 3 ) , ( 8 , 1 ) , ( 8 , 2 ) ) ( 1 , 2 , , 20 ) , and for each server ( n , i ) , n [ 8 ] , i [ τ n ] , the normalized download cost of D n , i = 1 / 5 is achievable. After reducing the augmented system to the original setting, we can calculate that the normalized download costs ( D 1 , D 2 , , D 8 ) = ( 2 / 5 , 3 / 5 , 3 / 5 , 2 / 5 , 2 / 5 , 3 / 5 , 3 / 5 , 2 / 5 ) are achievable, and the normalized storage costs are ( C 1 , C 2 , , C 8 ) = ( 1 / 2 , 3 / 4 , 3 / 4 , 1 / 2 , 1 / 2 , 3 / 4 , 5 / 4 , 1 / 2 ) .
Now let us see why the resulting GXSTPLC scheme is X = 1 –secure and T = 1 –private. Note that for all n { 2 , 3 , 6 } ,
I ( S n ; W ) = I { W ˜ 1 , ( α Ψ ( ( n , i ) ) ) , W ˜ 2 , ( α Ψ ( ( n , i ) ) ) i [ 3 ] , [ 5 ] } ; W 1 , W 2
= I { W ˜ 1 , ( α Ψ ( ( n , i ) ) ) i [ 3 ] , [ 5 ] } ; W 1
= 0 ,
I ( Q n [ Λ ] ; Λ ) = I ( { Q 1 , , κ ( α Ψ ( ( n , i ) ) ) , Q 2 , , κ ( α Ψ ( ( n , i ) ) ) i [ 3 ] , [ 5 ] , κ [ 2 ] } ;   λ m , k m [ 2 ] , k [ K m ] )
= I { Q 1 , , κ ( α Ψ ( ( n , i ) ) ) i [ 3 ] , [ 5 ] , κ [ 2 ] } ; λ 1 , k k [ K 1 ]
= 0 ,
For all n { 1 , 4 , 5 , 8 } ,
I ( S n ; W ) = I { W ˜ 1 , ( α Ψ ( ( n , i ) ) ) , W ˜ 2 , ( α Ψ ( ( n , i ) ) ) i [ 2 ] , [ 5 ] } ; W 1 , W 2
= I { W ˜ 2 , ( α Ψ ( ( n , i ) ) ) i [ 2 ] , [ 5 ] } ; W 2
= 0 ,
I ( Q n [ Λ ] ; Λ ) = I ( { Q 1 , , κ ( α Ψ ( ( n , i ) ) ) , Q 2 , , κ ( α Ψ ( ( n , i ) ) ) i [ 2 ] , [ 5 ] , κ [ 2 ] } ;   λ m , k m [ 2 ] , k [ K m ] )
= I { Q 2 , , κ ( α Ψ ( ( n , i ) ) ) i [ 2 ] , [ 5 ] , κ [ 2 ] } ; λ 2 , k k [ K 2 ]
= 0 ,
and
I ( S 7 ; W ) = I { W ˜ 1 , ( α Ψ ( ( 7 , i ) ) ) , W ˜ 2 , ( α Ψ ( ( 7 , i ) ) ) i [ 3 ] , [ 5 ] } ; W 1 , W 2 = I { W ˜ 1 , ( α Ψ ( ( 7 , i ) ) ) i [ 3 ] , [ 5 ] } ; W 1
+ I { W ˜ 2 , ( α Ψ ( ( 7 , i ) ) ) i [ 2 ] , [ 5 ] } ; W 2
= 0 ,
I ( Q 7 [ Λ ] ; Λ ) = I ( { Q 1 , , κ ( α Ψ ( ( 7 , i ) ) ) , Q 2 , , κ ( α Ψ ( ( 7 , i ) ) ) i [ 3 ] , [ 5 ] , κ [ 2 ] } ;   λ m , k m [ 2 ] , k [ K m ] ) = I { Q 1 , , κ ( α Ψ ( ( 7 , i ) ) ) i [ 3 ] , [ 5 ] , κ [ 2 ] } ; λ 1 , k k [ K 1 ]
+ I ( { Q 2 , , κ ( α Ψ ( ( 7 , i ) ) ) i [ 2 ] , [ 5 ] , κ [ 2 ] } ; λ 2 , k k [ K 2 ] )
= 0 ,
(86), (92), and (98) hold due to (58), (89), (95) and (101) holds due to (63).

6. Conclusions

We explored the problem of GXSTPLC by proposing an achievability scheme that establishes a trade-off between communication cost and storage cost. Notably, our scheme demonstrates the generalization of the CSA null shaper idea beyond its application in storage-consistent private updates. The application of CSA null shaper preserves the standard CSA decoding structure while offering significant advantages, including reduced decoding complexity and a direct framework for quantum transformation. Promising avenues for future research include the complete capacity characterization for the MDS-GXSTPLC problem. Additionally, investigating the potential applicability of the CSA null shaper to other relevant problems is of considerable interest.

Author Contributions

Conceptualization, Y.L., Z.J., and H.J.; methodology, Y.L. and Z.J.; investigation, Y.L. and H.J.; writing—original draft preparation, Y.L., Z.J., and H.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the National Natural Science Foundation of China under grant number 62201080.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CSACross-Subspace Alignment
GXSTPLCGraph-Based X-Secure T-Private Linear Computation
GRSGeneralized Reed–Solomon
PIRPrivate Information Retrieval
PLCPrivate Linear Computation

References

  1. Sun, H.; Jafar, S.A. The Capacity of Private Information Retrieval. IEEE Trans. Inf. Theory 2017, 63, 4075–4088. [Google Scholar] [CrossRef]
  2. Sun, H.; Jafar, S.A. The Capacity of Robust Private Information Retrieval with Colluding Databases. IEEE Trans. Inf. Theory 2018, 64, 2361–2370. [Google Scholar] [CrossRef]
  3. Sun, H.; Jafar, S.A. The Capacity of Private Computation. IEEE Trans. Inf. Theory 2019, 65, 3880–3897. [Google Scholar] [CrossRef]
  4. Tahmasebi, B.; Maddah-Ali, M.A. Private Function Computation. In Proceedings of the 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020; pp. 1118–1123. [Google Scholar] [CrossRef]
  5. Lu, Y.; Jia, Z.; Jafar, S.A. Double blind T-private information retrieval. IEEE J. Sel. Areas Inf. Theory 2021, 2, 428–440. [Google Scholar] [CrossRef]
  6. Raviv, N.; Karpuk, D.A. Private Polynomial Computation From Lagrange Encoding. IEEE Trans. Inf. Forensics Secur. 2020, 15, 553–563. [Google Scholar] [CrossRef]
  7. Chen, Z.; Wang, Z.; Jafar, S.A. The Asymptotic Capacity of Private Search. IEEE Trans. Inf. Theory 2020, 66, 4709–4721. [Google Scholar] [CrossRef]
  8. Yao, X.; Liu, N.; Kang, W. The Capacity of Private Information Retrieval Under Arbitrary Collusion Patterns for Replicated Databases. IEEE Trans. Inf. Theory 2021, 67, 6841–6855. [Google Scholar] [CrossRef]
  9. Banawan, K.; Ulukus, S. The Capacity of Private Information Retrieval From Coded Databases. IEEE Trans. Inf. Theory 2018, 64, 1945–1956. [Google Scholar] [CrossRef]
  10. Freij-Hollanti, R.; Gnilke, O.; Hollanti, C.; Karpuk, D. Private information retrieval from coded databases with colluding servers. SIAM J. Appl. Algebra Geom. 2017, 1, 647–664. [Google Scholar] [CrossRef]
  11. Sun, H.; Jafar, S.A. Private information retrieval from MDS coded data with colluding servers: Settling a conjecture by Freij-Hollanti et al. IEEE Trans. Inf. Theory 2018, 64, 1000–1022. [Google Scholar] [CrossRef]
  12. Tajeddine, R.; Gnilke, O.W.; Karpuk, D.; Freij-Hollanti, R.; Hollanti, C. Private Information Retrieval From Coded Storage Systems with Colluding, Byzantine, and Unresponsive Servers. IEEE Trans. Inf. Theory 2019, 65, 3898–3906. [Google Scholar] [CrossRef]
  13. Tajeddine, R.; Gnilke, O.W.; El Rouayheb, S. Private Information Retrieval From MDS Coded Data in Distributed Storage Systems. IEEE Trans. Inf. Theory 2018, 64, 7081–7093. [Google Scholar] [CrossRef]
  14. Wang, Q.; Skoglund, M. Symmetric Private Information Retrieval from MDS Coded Distributed Storage with Non-Colluding and Colluding Servers. IEEE Trans. Inf. Theory 2019, 65, 5160–5175. [Google Scholar] [CrossRef]
  15. Obead, S.A.; Lin, H.Y.; Rosnes, E.; Kliewer, J. Private Linear Computation for Noncolluding Coded Databases. IEEE J. Sel. Areas Commun. 2022, 40, 847–861. [Google Scholar] [CrossRef]
  16. Wang, Z.; Banawan, K.; Ulukus, S. Private Set Intersection: A Multi-Message Symmetric Private Information Retrieval Perspective. IEEE Trans. Inf. Theory 2022, 68, 2001–2019. [Google Scholar] [CrossRef]
  17. Kadhe, S.; Garcia, B.; Heidarzadeh, A.; El Rouayheb, S.; Sprintson, A. Private Information Retrieval with Side Information. IEEE Trans. Inf. Theory 2020, 66, 2032–2043. [Google Scholar] [CrossRef]
  18. Wei, Y.P.; Banawan, K.; Ulukus, S. Fundamental Limits of Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching. IEEE Trans. Inf. Theory 2019, 65, 3215–3232. [Google Scholar] [CrossRef]
  19. Wei, Y.P.; Banawan, K.; Ulukus, S. The Capacity of Private Information Retrieval with Partially Known Private Side Information. IEEE Trans. Inf. Theory 2019, 65, 8222–8231. [Google Scholar] [CrossRef]
  20. Chen, Z.; Wang, Z.; Jafar, S.A. The capacity of T-private information retrieval with private side information. IEEE Trans. Inf. Theory 2020, 66, 4761–4773. [Google Scholar] [CrossRef]
  21. Sun, H.; Jafar, S.A. Multiround private information retrieval: Capacity and storage overhead. IEEE Trans. Inf. Theory 2018, 64, 5743–5754. [Google Scholar] [CrossRef]
  22. Wang, Q.; Sun, H.; Skoglund, M. The Capacity of Private Information Retrieval with Eavesdroppers. IEEE Trans. Inf. Theory 2019, 65, 3198–3214. [Google Scholar] [CrossRef]
  23. Yang, H.; Shin, W.; Lee, J. Private Information Retrieval for Secure Distributed Storage Systems. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2953–2964. [Google Scholar] [CrossRef]
  24. Jia, Z.; Sun, H.; Jafar, S.A. Cross subspace alignment and the asymptotic capacity of X-secure T-private information retrieval. IEEE Trans. Inf. Theory 2019, 65, 5783–5798. [Google Scholar] [CrossRef]
  25. Jia, Z.; Jafar, S.A. X-secure T-private information retrieval from MDS coded storage with byzantine and unresponsive servers. IEEE Trans. Inf. Theory 2020, 66, 7427–7438. [Google Scholar] [CrossRef]
  26. Jia, Z.; Jafar, S.A. On the asymptotic capacity of X-secure T-private information retrieval with graph-Based replicated storage. IEEE Trans. Inf. Theory 2020, 66, 6280–6296. [Google Scholar] [CrossRef]
  27. Jia, Z.; Jafar, S.A. X-secure T-private federated submodel learning with elastic dropout resilience. IEEE Trans. Inf. Theory 2022, 68, 5418–5439. [Google Scholar] [CrossRef]
  28. Sun, H.; Jafar, S.A. The Capacity of Symmetric Private Information Retrieval. IEEE Trans. Inf. Theory 2019, 65, 322–329. [Google Scholar] [CrossRef]
  29. Zhu, J.; Yan, Q.; Tang, X.; Li, S. Symmetric private polynomial computation from Lagrange encoding. IEEE Trans. Inf. Theory 2022, 68, 2704–2718. [Google Scholar] [CrossRef]
  30. Banawan, K.; Ulukus, S. The Capacity of Private Information Retrieval from Byzantine and Colluding Databases. IEEE Trans. Inf. Theory 2019, 65, 1206–1219. [Google Scholar] [CrossRef]
  31. Banawan, K.; Ulukus, S. Asymmetry hurts: Private information retrieval under asymmetric traffic constraints. IEEE Trans. Inf. Theory 2019, 65, 7628–7645. [Google Scholar] [CrossRef]
  32. Sun, H.; Jafar, S.A. Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2920–2932. [Google Scholar] [CrossRef]
  33. Jia, Z.; Sun, H.; Jafar, S.A. The Capacity of Private Information Retrieval with Disjoint Colluding Sets. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  34. Tian, C.; Sun, H.; Chen, J. Capacity-Achieving Private Information Retrieval Codes with Optimal Message Size and Upload Cost. IEEE Trans. Inf. Theory 2019, 65, 7613–7627. [Google Scholar] [CrossRef]
  35. Raviv, N.; Tamo, I.; Yaakobi, E. Private Information Retrieval in Graph-Based Replication Systems. IEEE Trans. Inf. Theory 2020, 66, 3590–3602. [Google Scholar] [CrossRef]
  36. Sadeh, B.; Gu, Y.; Tamo, I. Bounds on the Capacity of Private Information Retrieval Over Graphs. IEEE Trans. Inf. Forensics Secur. 2023, 18, 261–273. [Google Scholar] [CrossRef]
  37. Banawan, K.; Ulukus, S. Private Information Retrieval from Non-Replicated Databases. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019; pp. 1272–1276. [Google Scholar] [CrossRef]
  38. Jia, H.; Jia, Z. The Asymptotic Capacity of X-Secure T-Private Linear Computation with Graph Based Replicated Storage. IEEE Trans. Inf. Theory 2024, 70, 5269–5288. [Google Scholar] [CrossRef]
  39. Nomeir, M.; Vithana, S.; Ulukus, S. Asymmetric X-Secure T-Private Information Retrieval: More Databases is Not Always Better. In Proceedings of the 2024 58th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 13–15 March 2024; pp. 1–6. [Google Scholar] [CrossRef]
  40. Aytekin, A.; Nomeir, M.; Vithana, S.; Ulukus, S. Quantum Symmetric Private Information Retrieval with Secure Storage and Eavesdroppers. In Proceedings of the 2023 IEEE Globecom Workshops (GC Wkshps), Kuala Lumpur, Malaysia, 4–8 December 2023; pp. 1057–1062. [Google Scholar] [CrossRef]
  41. Song, S.; Hayashi, M. Capacity of Quantum Private Information Retrieval with Multiple Servers. IEEE Trans. Inf. Theory 2021, 67, 452–463. [Google Scholar] [CrossRef]
  42. Song, S.; Hayashi, M. Capacity of Quantum Private Information Retrieval with Colluding Servers. IEEE Trans. Inf. Theory 2021, 67, 5491–5508. [Google Scholar] [CrossRef]
  43. Allaix, M.; Song, S.; Holzbaur, L.; Pllaha, T.; Hayashi, M.; Hollanti, C. On the Capacity of Quantum Private Information Retrieval From MDS-Coded and Colluding Servers. IEEE J. Sel. Areas Commun. 2022, 40, 885–898. [Google Scholar] [CrossRef]
  44. Lu, Y.; Jafar, S.A. Quantum Cross Subspace Alignment Codes via the N-sum Box Abstraction. In Proceedings of the 2023 57th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 29 October–1 November 2023; pp. 670–674. [Google Scholar] [CrossRef]
  45. Lu, Y.; Jafar, S.A. Quantum X-Secure T-Private Information Retrieval From MDS Coded Storage with Unresponsive and Byzantine Servers. IEEE J. Sel. Areas Inf. Theory 2025, 6, 59–73. [Google Scholar] [CrossRef]
  46. Karpuk, D. Private Computation of Systematically Encoded Data with Colluding Servers. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2112–2116. [Google Scholar] [CrossRef]
  47. Obead, S.A.; Lin, H.Y.; Rosnes, E.; Kliewer, J. Private Polynomial Function Computation for Noncolluding Coded Databases. IEEE Trans. Inf. Forensics Secur. 2022, 17, 1800–1813. [Google Scholar] [CrossRef]
  48. Wang, Q.; Skoglund, M. On PIR and Symmetric PIR From Colluding Databases with Adversaries and Eavesdroppers. IEEE Trans. Inf. Theory 2019, 65, 3183–3197. [Google Scholar] [CrossRef]
  49. Yu, Q.; Li, S.; Raviv, N.; Kalan, S.M.M.; Soltanolkotabi, M.; Avestimehr, S.A. Lagrange coded computing: Optimal design for resiliency, security, and privacy. In Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, PMLR, Naha, Japan, 16–18 April 2019; Volume 89, pp. 1215–1225. [Google Scholar]
  50. Allaix, M.; Lu, Y.; Yao, Y.; Pllaha, T.; Hollanti, C.; Jafar, S.A. N-Sum Box: An Abstraction for Linear Computation Over Many-to-One Quantum Networks. IEEE Trans. Inf. Theory 2025, 71, 1121–1139. [Google Scholar] [CrossRef]
Figure 1. The K messages are partitioned into M disjoint message sets, where the m-th message set consists of K m messages.
Figure 1. The K messages are partitioned into M disjoint message sets, where the m-th message set consists of K m messages.
Entropy 27 00975 g001
Figure 2. An illustrating example of the storage–communication trade-off in the proposed GXSTPLC scheme, where N = 8 , X = 1 , T = 1 , K / K m = M = 2 , and the storage pattern is given by R 1 = { 2 , 3 , 6 , 7 } , R 2 = { 1 , 4 , 5 , 7 , 8 } . Notably, the top-left point ( D , C ) = ( 10 3 , 11 ) corresponds to the achievability scheme in [38], i.e., achieves the minimum possible download cost. On the other hand, the achievability of the point ( D , C ) = ( 4 , 5.5 ) is illustrated as a motivating example in Section 4.5 and Section 5.
Figure 2. An illustrating example of the storage–communication trade-off in the proposed GXSTPLC scheme, where N = 8 , X = 1 , T = 1 , K / K m = M = 2 , and the storage pattern is given by R 1 = { 2 , 3 , 6 , 7 } , R 2 = { 1 , 4 , 5 , 7 , 8 } . Notably, the top-left point ( D , C ) = ( 10 3 , 11 ) corresponds to the achievability scheme in [38], i.e., achieves the minimum possible download cost. On the other hand, the achievability of the point ( D , C ) = ( 4 , 5.5 ) is illustrated as a motivating example in Section 4.5 and Section 5.
Entropy 27 00975 g002
Table 1. Storage pattern of the augmented system in Example 1.
Table 1. Storage pattern of the augmented system in Example 1.
Server ( 1 , 1 ) ( 1 , 2 ) ( 2 , 1 ) ( 2 , 2 ) ( 2 , 3 ) ( 3 , 1 ) ( 3 , 2 ) ( 3 , 3 ) ( 4 , 1 )
M ¯ ( n , i ) 221111112
Server ( 4 , 2 ) ( 5 , 1 ) ( 5 , 2 ) ( 6 , 1 ) ( 6 , 2 ) ( 6 , 3 ) ( 7 , 1 ) ( 7 , 2 ) ( 7 , 3 )
M ¯ ( n , i ) 222111111
22
Server ( 8 , 1 ) ( 8 , 2 )
M ¯ ( n , i ) 22
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, Y.; Jia, H.; Jia, Z. On the Storage–Communication Trade-Off in Graph-Based X-Secure T-Private Linear Computation. Entropy 2025, 27, 975. https://doi.org/10.3390/e27090975

AMA Style

Liu Y, Jia H, Jia Z. On the Storage–Communication Trade-Off in Graph-Based X-Secure T-Private Linear Computation. Entropy. 2025; 27(9):975. https://doi.org/10.3390/e27090975

Chicago/Turabian Style

Liu, Yueyang, Haobo Jia, and Zhuqing Jia. 2025. "On the Storage–Communication Trade-Off in Graph-Based X-Secure T-Private Linear Computation" Entropy 27, no. 9: 975. https://doi.org/10.3390/e27090975

APA Style

Liu, Y., Jia, H., & Jia, Z. (2025). On the Storage–Communication Trade-Off in Graph-Based X-Secure T-Private Linear Computation. Entropy, 27(9), 975. https://doi.org/10.3390/e27090975

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop