Next Article in Journal
MCMC Correction of Score-Based Diffusion Models for Model Composition
Next Article in Special Issue
Secure Multiplicative Aggregation and Key-Reuse Optimization: Achieving Dropout Resilience with Amortized Efficiency
Previous Article in Journal
Can Information and Entropic Dynamics Bridge the Gap Between Biology and the Physical Sciences?
Previous Article in Special Issue
Locally Encoded Secure Distributed Batch Matrix Multiplication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Communication–Key Rate Region of Hierarchical Vector Linear Secure Aggregation

1
Guangxi Key Laboratory of Multimedia Communications and Network Technology, Guangxi University, Nanning 530004, China
2
Department of Electrical Engineering and Computer Science, Technical University of Berlin, 10623 Berlin, Germany
*
Author to whom correspondence should be addressed.
Entropy 2026, 28(3), 352; https://doi.org/10.3390/e28030352
Submission received: 9 February 2026 / Revised: 18 March 2026 / Accepted: 19 March 2026 / Published: 20 March 2026
(This article belongs to the Special Issue Secure Aggregation for Federated Learning and Distributed Computation)

Abstract

Motivated by heterogeneous data distributions and task-dependent aggregation requirements in federated learning, we study information-theoretic secure aggregation of linear functions over a two-hop hierarchical network. The system comprises an aggregation server, an intermediate layer of U relays, and U V users, where each relay serves a disjoint cluster of V users. Each relay observes all uplink transmissions within its cluster and forwards a coded message to the server. The server is authorized to compute a prescribed linear function F of the users’ inputs with zero error, while being prevented from learning any additional information about an unauthorized linear function G. Moreover, each relay must obtain no information about any non-trivial linear function B u of the inputs in its own cluster. We define the communication rates on both hops as the number of transmitted symbols per input symbol. By deriving matching information-theoretic converse and achievability bounds, we fully characterize the optimal communication rates and propose an explicit linear coding scheme that achieves the resulting optimal region. Our results demonstrate that hierarchical architectures can attain optimal communication rates while substantially reducing the server-side masking burden, thereby enabling scalable secure aggregation of authorized linear functions.

1. Introduction

With the rapid proliferation of machine learning and data analytics applications, massive amounts of data are continuously generated by geographically distributed users and devices. In many practical scenarios, such as healthcare analytics, intelligent transportation, and personalized recommendation systems, these data are highly sensitive. Directly collecting or centrally storing raw user data therefore poses significant privacy risks and regulatory challenges. Secure aggregation has emerged as a fundamental primitive to address this tension, enabling an aggregator to compute desired statistics over distributed data while preventing the disclosure of individual user information.
From an information-theoretic perspective, secure aggregation inherently incurs simultaneous costs in communication efficiency and randomness consumption. A classical starting point is secure aggregation, where each of K users holds a private input and transmits a masked message to a server. The server is required to recover the sum of all inputs with zero error while learning no additional information. Prior work [1] has shown that achieving perfect secure inevitably requires a nontrivial amount of randomness, and that reducing communication cost typically increases the required key rate. This communication and randomness relationship has been fully characterized for secure aggregation and several of its variants, establishing randomness as a fundamental resource rather than a mere implementation detail.
As distributed learning systems evolve, secure aggregation alone is insufficient to capture practical requirements. First, the desired computation is often more general than a scalar sum and can be modeled as an arbitrary linear transformation of the users’ data. Second, security requirements are frequently function-specific: while the server is authorized to learn a prescribed linear function F of the users’ data, it must be prevented from inferring other sensitive linear functions, denoted by G. This motivates the formulation of vector linear secure aggregation, in which the security cost is no longer determined solely by the number of users, but also by the algebraic relationship between the authorized function F and the protected functions G. In particular, the additional information contained in G beyond what is revealed by F is quantified by the conditional rank rank ( G F ) , which directly determines the minimum amount of randomness required for security.
Most existing information-theoretic results on vector linear secure aggregation focus on single-hop network architectures [2,3], where all users communicate directly with a central server. While such models are analytically convenient, they do not fully reflect the structure of large-scale practical systems. In real deployments, direct communication between a server and a massive number of users can lead to scalability and access limitations. As a result, hierarchical or edge-assisted architectures are widely adopted, in which users first communicate with nearby relays or gateways, and the relays subsequently forward aggregated messages to the server.
Introducing a hierarchical architecture fundamentally changes the secure aggregation problem [4]. Unlike the classical single-hop setting, where only the server’s inference needs to be controlled, a two-hop network creates an additional inference layer: each relay observes all transmissions from users in its cluster and may infer extra intra-cluster linear information unless properly constrained. Meanwhile, the server should recover only a prescribed global linear function of the cluster aggregates and remain ignorant of other unauthorized linear combinations.
Information-theoretic secure aggregation has been extended to a variety of settings, including user dropout [5,6], secure aggregation with user selection [7], designs resilient to user collusion [8,9,10], schemes employing groupwise keys [11,12], secure aggregation with oblivious servers [13], secure aggregation under unreliable communication [14], and hierarchical secure aggregation [15,16,17,18,19]. Other related works on secure aggregation from different perspectives can be found in [20,21,22,23].
However, existing works do not characterize the vector linear two-hop hierarchical setting within a unified information-theoretic framework, where relay-side protection against unauthorized intra-cluster linear inference and server-side recovery of only a prescribed global function must be enforced simultaneously. Our contribution is not only to unify hierarchical secure aggregation and vector linear secure aggregation within a single information-theoretic model, but also to show that the resulting two-hop formulation exhibits genuinely coupled relay-side and server-side security constraints, leading to a new optimal key-rate characterization and requiring a joint algebraic coding design.
To further clarify the distinction from prior single-hop vector linear secure aggregation schemes, Table 1 summarizes the main differences between those formulations and the proposed two-hop hierarchical setting.
In this work, we study information-theoretic vector linear secure aggregation over a two-hop hierarchical network consisting of U relays, each serving a disjoint cluster of V users. The server is required to recover, with zero error, a prescribed linear function F of the cluster aggregates while learning no additional information about an unauthorized linear function G. At the same time, each relay may assist local aggregation but must remain ignorant of the unauthorized intra-cluster linear functions characterized by B u within its own cluster. Our goal is to completely characterize the fundamental communication and randomness limits of this problem.
We prove that, in the unified hierarchical vector linear secure aggregation model, the communication optimality remains unchanged compared with the single-hop setting: the first-hop rate still satisfies R X = 1 , and the second-hop rate can still achieve R Y = 1 even after introducing an additional relay layer. However, the minimum source key rate changes from depending only on rank ( G F ) in the single-hop model to being jointly determined by the relay-side intra-cluster protection requirement K u and the server-side protection constraint rank ( G F ) . This shows that, although the hierarchical structure does not increase the communication cost, it introduces a coupling between relay-side security and server-side function security in the key design.
From a technical standpoint, establishing the fundamental limits is challenging because both the converse and the achievability must simultaneously account for relay-side intra-cluster secrecy and server-side function authorization. In particular, the converse requires a joint information-theoretic argument for the two levels of security, while the achievability calls for a unified linear coding design that preserves local privacy, enables authorized global recovery, and maintains optimal communication rates over both hops.
We further provide an explicit linear coding scheme that achieves these fundamental limits.

2. Problem Statement

Consider a three-layer hierarchical secure aggregation system consisting of an aggregation server, an intermediate layer of U 2 relays, and a bottom layer of U V users. The network operates over two hops, where the server communicates with all relays and each relay serves a disjoint cluster of exactly V users, as illustrated in Figure 1. All communication links are assumed to be error-free. We consider a static system model with fixed cluster size, where no user dropout occurs during the protocol. We further assume that no collusion takes place among users, relays, and the server, and that all entities follow the prescribed protocol without adversarial or Byzantine behavior. The v-th user associated with the u-th relay is indexed by ( u , v ) [ U ] × [ V ] . Each user ( u , v ) holds a private input W u , v over a finite field F q with entropy H ( W u , v ) = L measured in q-ary units, and the inputs are assumed to be independent and uniformly distributed across users. In addition, each user ( u , v ) is equipped with a local key variable Z u , v , satisfying H ( Z u , v ) = L Z . The collection of individual keys Z [ U ] × [ V ] { Z u , v } u [ U ] , v [ V ] is deterministically generated from a common source key variable Z Σ , where H ( Z Σ ) = L Z Σ . The source key Z Σ is generated and securely distributed by a trusted third-party entity. The key variables Z [ U ] × [ V ] are statistically independent of the user inputs W [ U ] × [ V ] { W u , v } u [ U ] , v [ V ] .
H Z [ U ] × [ V ] , W [ U ] × [ V ] = H Z [ U ] × [ V ] + u [ U ] , v [ V ] H ( W u , v ) ,
H Z [ U ] × [ V ] | Z Σ = 0 .
The system adopts a two-hop communication protocol. In the first hop, User ( u , v ) transmits a message X u , v to its associated relay. The message X u , v is generated as a function of the local input W u , v and the local key Z u , v , and consists of L X symbols. In the second hop, relay u transmits a message Y u to the aggregation server. The message Y u consists of L Y symbols and is generated as a function of the received messages { X u , v } v [ V ] from Users in cluster u.
H X u , v W u , v , Z u , v = 0 , ( u , v ) [ U ] × [ V ] ,
H Y u { X u , v } v [ V ] = 0 , u [ U ] .
We define the cluster aggregate at relay u as the sum of the users’ inputs within cluster u, i.e.,
S u v [ V ] W u , v , u [ U ] .
In general, the relay message Y u can be an arbitrary function of the received messages { X u , v } v [ V ] . Specifically, in this work, we restrict attention to schemes in which the relay message Y u is a deterministic function of the cluster aggregate S u and the local keys { Z u , v } v [ V ] , i.e.,
H Y u S u , { Z u , v } v [ V ] = 0 , u [ U ] .
From the relay messages, the aggregation server aims to recover an authorized linear function F while revealing no information about an unauthorized linear function G in the information-theoretic sense. Define S [ S 1 ; ; S U ] F q U × L . The functions F and G are given by
F = F S F q M × L , G = G S F q N × L ,
where F F q M × U and G F q N × U are assumed to have full row rank, i.e., M = rank ( F ) and N = rank ( G ) , without loss of generality.
To prevent trivial cases, we assume that F contains no zero columns. A zero column associated with S u would indicate that S u has no effect on the computation of F and could thus be excluded without affecting the problem.
From the relay’s messages, the server should be able to recover the desired linear function F, i.e.,
[ Correctness ] H F | { Y u } u [ U ] = 0 .
The security constraints require that each relay should not gain any information about any unauthorized linear function B u from the messages transmitted by its associated users. Specifically, let W u [ W u , 1 ; ; W u , V ] F q V × L , and define the unauthorized function
B u = B u W u F q K u × L ,
where B u F q K u × V is assumed to have full row rank without loss of generality, i.e., K u = rank ( B u ) , u [ U ] . The relay security constraint can then be expressed as
I B u ; { X u , v } v [ V ] = 0 , u [ U ] .
In addition, the server must not learn any information about the unauthorized function G beyond what is already contained in the authorized function F. This server security constraint is written as
I G ; { Y u } u [ U ] F = 0 .
The communication rates R X and R Y are defined as the numbers of symbols in each transmitted message X u , v and Y u , respectively, normalized by the input length L. Similarly, the source key rate R Z Σ represents the number of symbols in the key variable Z Σ per input symbol. Formally,
R X L X L , R Y L Y L , R Z Σ L Z Σ L .
A rate tuple ( R X , R Y , R Z Σ ) is said to be achievable if there exists a secure aggregation scheme, specified by the key variable Z Σ , and the transmitted messages { X u , v } ( u , v ) [ U ] × [ V ] and { Y u } u [ U ] , satisfying (3) and (4), such that the communication and key rates are ( R X , R Y , R Z Σ ) and the correctness constraint (8) together with the security constraints (10) and (11) are all met. The optimal rate region R is defined as the closure of the set of all achievable rate tuples.

3. Main Results

In this section, we present the main results of this work. The optimal vector linear communication and key rate region for the hierarchical vector linear secure aggregation problem is characterized in Theorem 1.
Theorem 1.
For the hierarchical vector linear secure aggregation problem described above, the optimal vector linear communication and key rate region is
R = ( R X , R Y , R Z Σ ) | R X 1 , R Y 1 , R Z Σ max max u [ U ] K u , rank ( G F ) ,
where
rank ( G F ) = rank [ F ; G ] rank ( F ) .
Moreover, the converse holds under the stated model, and the above region is achievable by a vector linear coding scheme over sufficiently large finite fields.

4. Motivating Example (U = 4, V = 3, M = 2, N = 1)

Prior to describing the general achievability scheme in Theorem 1, we introduce a representative example to convey the key principles behind the proposed hierarchical vector linear secure aggregation problem. These examples serve to build intuition for the design, after which the complete construction is presented.
Consider a two-hop hierarchical system with U = 4 relays and V = 3 users per cluster. In the first hop, each relay aggregates the messages from users in its corresponding cluster while being prevented from learning any information about the linear function B u W , where W [ W u , 1 , W u , 2 , W u , 3 ] T F 7 3 × 1 , and B u is specified as follows.
B 1 = 2 4 6 , B 2 = 3 5 1 , B 3 = 1 3 2 3 6 1 row / column   operations 1 0 4 0 1 4 , B 4 = 1 2 3 4 5 6 5 0 2 row / column   operations 1 0 6 0 1 2 0 0 0 .
In the second hop, the server aims to recover F S from the messages uploaded by all relays with zero error, where S [ S 1 , S 2 , S 3 , S 4 ] T F 7 4 × 1 ,   S u = v [ 3 ] W u , v , u [ 4 ] . Moreover, the server must not obtain any additional information about G S beyond what is implied by F S .
F = 1 2 3 4 0 1 2 3 , G = 3 2 0 1 .
F = 1 2 3 4 0 1 2 3 row / column operations 1 0 6 5 0 1 2 3 .
Consequently, we have
F S = S 1 + 2 S 2 + 3 S 3 + 4 S 4 S 2 + 2 S 3 + 3 S 4 = v [ 3 ] W 1 , v + 2 v [ 3 ] W 2 , v + 3 v [ 3 ] W 3 , v + 4 v [ 3 ] W 4 , v v [ 3 ] W 2 , v + 2 v [ 3 ] W 3 , v + 3 v [ 3 ] W 4 , v ,
G S = 3 S 1 + 2 S 2 + S 4 = 3 v [ 3 ] W 1 , v + 2 v [ 3 ] W 2 , v + v [ 3 ] W 4 , v .
where G S is a scalar linear combination of the components of S .
Consider the second hop and set L = 1 . Based on (17), suppose we have two independent and uniformly distributed noise variables T 1 , T 2 over F 7 . Then we have
Y 1 = S 1 6 T 1 5 T 2 = W 1 , 1 + W 1 , 2 + W 1 , 3 6 T 1 5 T 2 , Y 2 = S 2 2 T 1 3 T 2 = W 2 , 1 + W 2 , 2 + W 2 , 3 2 T 1 3 T 2 , Y 3 = S 3 + T 1 = W 3 , 1 + W 3 , 2 + W 3 , 3 + T 1 , Y 4 = S 4 + T 2 = W 4 , 1 + W 4 , 2 + W 4 , 3 + T 2 .
For the server security constraint, only 1 key symbol is required. It turns out that T 1 and T 2 need not be independent; introducing correlation between them in the next step is the most technical part of the proof.
We then seek a 1 × 2 matrix Q F q 1 × 2 that characterizes the correlation between ( T 1 , T 2 ) , such that
F G 0 0 Q has full rank 4 .
Note that such a matrix Q exists since rank ( [ F ; G ] ) = 3 . Consequently, there always exists a nonzero 1 × 2 vector Q that completes (21) to full rank. Any valid choice of Q suffices for our purpose.
We then compute the right null space of Q , denoted by Q F q 2 × 1 , which satisfies
Q = 1 3 , Q = 4 1 .
Then the key symbols T 1 and T 2 can be generated from a single uniformly distributed key symbol P 1 by precoding with Q ,
T 1 T 2 = Q P 1 = 4 P 1 P 1 .
We may write out the final message assignment using the single key symbol P 1 :
Y 1 = W 1 , 1 + W 1 , 2 + W 1 , 3 P 1 , Y 2 = W 2 , 1 + W 2 , 2 + W 2 , 3 4 P 1 , Y 3 = W 3 , 1 + W 3 , 2 + W 3 , 3 + 4 P 1 , Y 4 = W 4 , 1 + W 4 , 2 + W 4 , 3 + P 1 .
The signal observed at relay u can be expressed as
Y u S u + Z u Y ,
where Z u Y denotes the key component embedded in Y u .
In Example 1, this decomposition admits an explicit representation:
Z 1 Y Z 2 Y Z 3 Y Z 4 Y = 1 4 4 1 P 1 .
Next, we investigate the security of relay 4 under the proposed key assignment. Since rank ( B 4 ) = 2 , relay 4 requires at least K 4 = 2 independent keys, denoted by N 1 and N 2 . There exists a matrix A F q 1 × 2 such that
P 1 = A N = a 11 N 1 + a 12 N 2 .
Since the coefficients of A can be any nonzero values in F q , for simplicity we set a 11 = a 12 = 1 , yielding
P 1 = N 1 + N 2 .
Therefore, the relay messages can be written as
Y 1 = S 1 ( N 1 + N 2 ) , Y 2 = S 2 4 ( N 1 + N 2 ) , Y 3 = S 3 + 4 ( N 1 + N 2 ) , Y 4 = S 4 + ( N 1 + N 2 ) .
To prevent relay 4 from obtaining any information regarding the linear function B 4 X , we require
B 4 X 1 X 2 X 3 = B 4 W 4 , 1 W 4 , 2 W 4 , 3 + B 4 Z 4 , 1 Z 4 , 2 Z 4 , 3 0 .
Specifically, the interference term is constructed using the keys as
B 4 Z 4 , 1 Z 4 , 2 Z 4 , 3 = B 4 R 4 0 N 1 N 2 , R 4 F q 3 × 2 .
Equivalently, we can write
Z 4 , 1 Z 4 , 2 Z 4 , 3 = R 4 N 1 N 2 , R 4 F q 3 × 2 .
To ensure that the noise term fully masks the signal space and cannot be nullified via linear projection, the product B 4 R 4 must have full rank, i.e.,
rank ( B 4 R 4 ) = 2 .
Specifically, we construct the first two rows of R 4 as a full-rank block to ensure linear independence, and utilize the last row to satisfy the aggregation coefficient constraints. Consequently, as shown in (26), the aggregated interference term Z 4 Y yields the summation of the keys:
Z 4 Y = 1 · P 1 = 1 1 N 1 N 2 = N 1 + N 2 .
The corresponding precoding matrix is
R 4 = 1 0 0 1 2 2 F q 3 × 2 .
The left null space of R 4 is
R 4 = 2 2 1 F q 1 × 3 , with R 4 R 4 = 0 .
This construction ensures that R 4 has full column rank, rank ( R 4 ) = 2 , satisfying the required rank condition.
Similarly, for relay 1, since rank ( B 1 ) = 1 , it requires only one independent key, namely ( N 1 + N 2 ) . To satisfy the condition rank ( B 1 R 1 ) = 1 , we construct R 1 as follows:
Z 1 Y = 1 · P 1 = 1 [ N 1 + N 2 ] .
R 1 = 1 1 3 .
Consequently, the left null space of R 1 is given by
R 1 = 6 1 0 3 0 1 , satisfying R 1 R 1 = 0 .
Similarly, for the other relays 2 and 3, we construct R 2 and R 3 , from which the individual user keys are obtained as follows:
Z 1 , 1 = N 1 + N 2 , Z 1 , 2 = N 1 + N 2 , Z 1 , 3 = 3 N 1 3 N 2 , Z 2 , 1 = N 1 + N 2 , Z 2 , 2 = N 1 + N 2 , Z 2 , 3 = 6 N 1 6 N 2 , Z 3 , 1 = N 1 , Z 3 , 2 = N 2 , Z 3 , 3 = 3 N 1 + 3 N 2 , Z 4 , 1 = N 1 , Z 4 , 2 = N 2 , Z 4 , 3 = 2 N 1 + 2 N 2 .
Since L X = L Y = 1 and L Z Σ = 2 , the resulting rates are
R X = R Y = 1 , R Z Σ = 2 ,
which match the converse bound established in Theorem 1.
  • Correctness: From the received signals Y 1 , Y 2 , Y 3 , Y 4 , the server applies the linear transform F and successfully recovers
    F = F S
    with zero error.
  • Relay security: From the transformation in (15), it follows that
    K u = 1 for u { 1 , 2 } , K u = 2 for u { 3 , 4 } .
Since relays whose B u have the same rank require the same total number of independent masking key symbols, it suffices to establish the security proof for relays 1 and 4; the cases of relays 2 and 3 follow by analogous arguments.
Consider relay 4, for example:
I ( { B 4 } ; { X 4 , v } v [ 3 ] )
= H ( X 4 , 1 , X 4 , 2 , X 4 , 3 ) H X 4 , 1 , X 4 , 2 , X 4 , 3 B 4
3 H X 4 , 1 , X 4 , 2 , X 4 , 3 , R 4 [ X 4 , 1 , X 4 , 2 , X 4 , 3 ] B 4
= 3 H X 4 , 1 , X 4 , 2 , X 4 , 3 , R 4 [ W 4 , 1 , W 4 , 2 , W 4 , 3 ] B 4
= 3 H R 4 [ W 4 , 1 , W 4 , 2 , W 4 , 3 ] B 4 H X 4 , 1 , X 4 , 2 , X 4 , 3 R 4 [ W 4 , 1 , W 4 , 2 , W 4 , 3 ] , B 4
= 3 rank ( R 4 ) H ( N 1 , N 2 )
= 3 1 2 = 0 .
In (40), we adopt a zero-forcing strategy by constructing the precoding matrix R 4 so that the key components are perfectly eliminated in its left null space, i.e., R 4 R 4 = 0 . In (42), the second term holds because R 4 R 4 = 0 , and R 4 [ W 4 , 1 , W 4 , 2 , W 4 , 3 ] is independent of B 4 . Moreover, the matrix formed by R 4 [ W 4 , 1 , W 4 , 2 , W 4 , 3 ] and B 4 has full rank, and hence is invertible with respect to W 4 , 1 , W 4 , 2 , W 4 , 3 .
Consider relay 1, for example:
I ( { B 1 } ; { X 1 , v } v [ 3 ] ) = H ( X 1 , 1 , X 1 , 2 , X 1 , 3 ) H X 1 , 1 , X 1 , 2 , X 1 , 3 B 1
3 H X 1 , 1 , X 1 , 2 , X 1 , 3 , R 1 [ X 1 , 1 , X 1 , 2 , X 1 , 3 ] B 1
= 3 H X 1 , 1 , X 1 , 2 , X 1 , 3 , R 1 [ W 1 , 1 , W 1 , 2 , W 1 , 3 ] B 1
= ( 35 ) 3 H R 1 [ W 1 , 1 , W 1 , 2 , W 1 , 3 ] B 1 H X 1 , 1 , X 1 , 2 , X 1 , 3 R 1 [ W 1 , 1 , W 1 , 2 , W 1 , 3 ] , B 1
= 3 rank ( R 1 ) H ( N 1 + N 2 )
= 3 2 1 = 0 .
In (46), we adopt a zero-forcing strategy by constructing the precoding matrix R 1 so that the key components are perfectly eliminated in its left null space, i.e., R 1 R 1 = 0 . In (48), the second term holds because R 1 R 1 = 0 , and R 1 [ W 1 , 1 , W 1 , 2 , W 1 , 3 ] is independent of B 1 . Moreover, the matrix formed by R 1 [ W 1 , 1 , W 1 , 2 , W 1 , 3 ] and B 1 has full rank, and hence is invertible with respect to W 1 , 1 , W 1 , 2 , W 1 , 3 .
We now proceed to present the security proof for the server.
I ( G ; Y 1 , Y 2 , Y 3 , Y 4 F )
= H ( Y 1 , Y 2 , Y 3 , Y 4 F ) H ( Y 1 , Y 2 , Y 3 , Y 4 G , F )
= [ H ( Y 1 , Y 2 , Y 3 , Y 4 , F ) H ( F ) ] H ( Y 1 , Y 2 , Y 3 , Y 4 , Q [ Y 3 , Y 4 ] G , F )
= [ H ( Y 1 , Y 2 , Y 3 , Y 4 , F ) H ( F ) ] H ( Y 1 , Y 2 , Y 3 , Y 4 , Q [ S 3 , S 4 ] G , F )
( 4 2 ) H ( Q [ S 3 , S 4 ] G , F ) H ( Y 1 , Y 2 , Y 3 , Y 4 Q [ S 3 , S 4 ] , G , F )
= 2 1 H ( P 1 )
= 2 1 H ( N 1 + N 2 ) = 2 1 1 = 0 ,
where (52) follows from the orthogonality Q Q = 0 , which implies that the noise components precoded by Q are completely eliminated (zero-forced) when left-multiplied by Q , cf. (22) and (23). Concerning (54), we leverage the full-rank properties of Q [ S 3 ; S 4 ] , G S , and F S , which ensure the unique solvability of S 1 , , S 4 (see (21)).

5. General Achievability Proof of Theorem 1

5.1. Conceptual Overview of the Construction

Before introducing the detailed algebraic construction, we briefly explain the guiding idea of the scheme. Transforming F into systematic form makes its right null space explicit. For
F = I M F ˜ M × ( U M ) , F F ˜ M × ( U M ) I U M = 0 .
Therefore, the systematic form of F explicitly characterizes all key-injection directions that preserve the authorized function F S , thereby ensuring correctness. The role of Q is then to further restrict key injection to a smaller effective subspace within Null ( F ) , containing only the minimum number of directions needed to perfectly hide the unauthorized function G S conditioned on F S .
At this stage, the aggregate noise Z u Y at relay u has already been specified by the server-side design. It remains to assign user-level keys such that their aggregate equals Z u Y , while satisfying the relay-side privacy and aggregation constraints.
For the relay-side privacy requirement, writing B u in systematic form enables a compatible canonical parametrization of the key-assignment matrix R u , under which the full-rank condition on B u R u is reduced to an invertibility constraint on L u , as shown in (68)–(70); such a constraint is always feasible over a sufficiently large finite field. Meanwhile, enforcing 1 V R u = e 1 in (73), equivalently (74), ensures that the user-level noise aggregates precisely into the prescribed cluster-level noise Z u Y . Meanwhile, R u is not part of the construction of R u itself, but is introduced for the relay privacy proof, where its left-null-space property is used to zero-force the injected keys.

5.2. General Construction

We now present the general achievability scheme for the two-hop hierarchical vector linear secure aggregation problem. Building on the intuition provided by the motivating example, we construct a unified linear coding scheme and show that it simultaneously guarantees correctness, relay-side security, and server-side function authorization while achieving the claimed communication and key rates.
Given that F has full row rank, we may, without loss of generality, transform it into the following systematic form via column permutations and invertible row operations:
F = I M F ˜ M × ( U M ) ,
where I M denotes the M × M identity matrix, and F ˜ F q M × ( U M ) represents the remaining submatrix.
The rows of Q are constructed to be linearly independent of the row space of [ F ; G ] , thereby completing a basis of F q U . Specifically, we select any U rank ( [ F ; G ] ) row vectors that are linearly independent of [ F ; G ] , and then use the identity submatrix in the first M columns of F to linearly eliminate their first M components, yielding Q .
The resulting ( U rank ( [ F ; G ] ) ) × ( U M ) matrix Q satisfies
F G 0 ( U rank ( [ F ; G ] ) ) × M Q has full rank U ,
which guarantees that the row spaces of F , G , and Q together span the entire ambient space F q U .
Intuitively, Q selects and compresses the residual degrees of freedom that are linearly independent of the row space of F into lower-dimensional injection directions. This enables key injection without affecting the F -related structure and avoids using degrees of freedom observable through G . By reordering the columns if necessary, Q can be written in the following block form:
Q = I U rank ( [ F ; G ] ) Q ˜ , Q = Q ˜ I rank ( [ F ; G ] ) M ( U M ) × ( rank ( [ F ; G ] ) M ) , Q Q = 0 .
We are now ready to describe the secure aggregation protocol. Set L = 1 and define L Z Σ max max u [ U ] K u , rank ( G F ) . Let N [ N 1 ; ; N L Z Σ ] consist of mutually independent and uniformly distributed key symbols.
We generate the key vector P = A N ,   P F q rank ( G F ) × 1 , where A F q rank ( G F ) × L Z Σ is chosen to be full row rank over F q . The injected key symbols are then defined as
T [ T 1 ; ; T U M ] = Q P = Q A N .
The transmitted symbols are constructed as
[ Y 1 ; ; Y M ] = [ S 1 ; ; S M ] F ˜ [ T 1 ; ; T U M ] , Y M + 1 ; ; Y U ] = [ S M + 1 ; ; S U ] + [ T 1 ; ; T U M ] .
Based on (60), the key design for each relay Z u Y is constructed as follows:
T [ T 1 ; ; T U M ] = Q P = Q A N [ Z 1 Y ; ; Z M Y ] = F ˜ Q P = F ˜ Q A N [ Z M + 1 Y ; ; Z U Y ] = [ T 1 ; ; T U M ] = Q P = Q A N .
Z 1 Y Z U Y = F ˜ I U M Q A Φ F q U × L Z Σ N .
Let β u F q 1 × L Z Σ denote the u-th row of Φ .
Thus, for each u [ U ] , we have
Z u Y = β u N .
Next, we extend the achievability to the general relay case. Without loss of generality, let B u be represented in its systematic form:
B u = I K u B ˜ K u × ( V K u ) ,
as any B u can be transformed into this form via column permutations and invertible row operations.
Let N ( u ) D u N , where D u F q K u × L Z Σ is a full-row-rank matrix that maps the global key vector to a relay-specific key vector ( rank ( D u ) = K u ).
At this stage, the noise Z u Y has already been fixed by the server-side design. Moreover, D u is chosen such that
e 1 D u = β u ,
where e 1 = [ 1 , 0 , , 0 ] F q K u selects the first row of D u . Hence,
e 1 D u N = β u N ,
so that the first component of N ( u ) coincides with the prescribed cluster-level aggregate noise, namely,
Z u Y = β u N = e 1 D u N .
With B u = I K u B ˜ u F q K u × V , where B ˜ u F q K u × ( V K u ) . Choose
R u = I K u L u , L u F q ( V K u ) × K u .
Then
B u R u = I K u B ˜ u I K u L u = I K u + B ˜ u L u .
Since the right-hand side is a K u × K u square matrix, we have
rank ( B u R u ) = K u det I K u + B ˜ u L u 0 .
Among all solutions of the linear constraint, we choose L u such that I K u + B ˜ u L u is nonsingular; such a choice exists over a sufficiently large finite field F q .
Using a common user-level encoding matrix R u for the V users in cluster u, define
Z u , 1 Z u , V R u N ( u ) = R u D u N .
To ensure correctness after relay aggregation, we impose
1 V Z u , 1 Z u , V = Z u Y = 1 V R u N ( u ) .
From (67) and (72), it follows that:
1 V R u = e 1 .
Substituting R u = I K u L u yields the equivalent condition
1 V K u L u = e 1 1 K u .
Since rank ( R u ) = K u , the left null space of R u has dimension V K u . Thus there exists a full-row-rank R u F q ( V K u ) × V with R u R u = 0 .
Let us prove the above scheme is correct and secure. For correctness (refer to (8)), we have
F = F S = ( 56 ) [ S 1 ; ; S M ] + F ˜ [ S M + 1 ; ; S U ] = ( 60 ) [ Y 1 ; ; Y M ] + F ˜ [ Y M + 1 ; ; Y U ] .
so that F can be decoded correctly from ( Y u ) u [ U ] .
For relay security (refer to (10)), we have
I ( { B u } ; { X u , v } v [ V ] )
= H ( { X u , v } v [ V ] ) H { X u , v } v [ V ] B u
V H { X u , v } v [ V ] , R u [ X u , 1 ; ; X u , V ] B u
= V H R u [ W u , 1 ; ; W u , V ] B u H { X u , v } v [ V ] R u [ W u , 1 ; ; W u , V ] , B u
= V ( V K u ) H ( N ( u ) )
= V V + K u K u = 0 .
In (79), R u R u = 0 guarantees that the injected keys are zero-forced in R u [ X u , 1 ; ; X u , V ] , and the last equality follows from rank ( R u ) = V K u and rank ( [ B u ; R u ] ) = V .
For server security (refer to (11)), we have
I G ; ( Y u ) u [ U ] F = H ( Y u ) u [ U ] F H ( Y u ) u [ U ] G , F
= H ( Y u ) u [ U ] , F H ( F ) H ( Y u ) u [ U ] , Q [ Y M + 1 ; ; Y U ] G , F
= ( 8 ) ( 60 ) H ( Y u ) u [ U ] H ( F ) H ( Y u ) u [ U ] , Q [ S M + 1 ; ; S U ] G , F ( U M ) H Q [ S M + 1 ; ; S U ] G , F
H ( Y u ) u [ U ] Q [ S M + 1 ; ; S U ] , G , F
= ( 57 ) ( U M ) U rank ( [ F ; G ] ) H ( Y u ) u [ U ] ( S u ) u [ U ]
= ( 60 ) rank ( [ F ; G ] ) M H T ( S u ) u [ U ]
= ( 60 ) rank ( [ F ; G ] ) M H Q P ( S u ) u [ U ]
= rank ( [ F ; G ] ) M H P ( S u ) u [ U ]
= rank ( [ F ; G ] ) M H A N ( S u ) u [ U ]
= rank ( [ F ; G ] ) M rank ( G F )
= rank ( [ F ; G ] ) M [ rank ( [ F ; G ] ) M ] = 0 .
Fundamentally, our design methodology reconstructs the solution by working backward from the security requirement in (11). The condition of vanishing mutual information implies that the conditional entropy H ( ( Y u ) u [ U ] G , F ) must saturate the value U M . We accomplish this by utilizing Q to isolate a signal-bearing subspace independent of channel realizations and maximizing its rank. Consequently, the keys injection is projected exclusively onto Q . This geometric arrangement ensures that the security threshold is satisfied with the minimum necessary keys dimensions.

6. Converse

We begin with a useful lemma. It states that each user message X u , v must contain at least L symbols of information, even when all other inputs are revealed. Similarly, each relay message Y u must carry at least L symbols whenever there exists at least one connected input X u , v that remains unknown.
Lemma 1.
For any u [ U ] , v [ V ] , we have
H X u , v | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) } L ,
H Y u | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) } L .
Proof. 
Consider (93), we have
H X u , v | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) }
I X u , v ; F | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) } = H F | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) }
H F | X u , v , { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) } = ( 3 ) , ( 4 ) H W u , v | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) }
H F | X u , v , { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) } , Y [ U ] = ( 8 ) 0
= ( 1 ) H W u , v = L .
where the last step is due to the independence of the inputs and the keys.
The proof of (94) is similar to that of (93):
H Y u | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) }
= I Y u ; F | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) } = H F | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) }
H F | Y u , { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) } = ( 3 ) , ( 4 ) , ( 8 ) 0
= H ( W u , v ) = L .
Note that in the proof of (93) and (94), only the correctness constraint (8) is imposed and the security constraints (10) and (11) are not used.
Lemma 2.
For any u [ U ] , we demonstrate that the messages must not disclose excessive information regarding the inputs, as doing so would violate the security constraint (10).
I { X u , v } v [ V ] ; { W u , v } v [ V ] V rank ( B u ) L . u [ U ] .
Proof. 
I { X u , v } v [ V ] ; { W u , v } v [ V ]
I { X u , v } v [ V ] ; { W u , v } v [ V ] , B u
= I { X u , v } v [ V ] ; B u = ( 10 ) 0 + I { X u , v } v [ V ] ; { W u , v } v [ V ] B u
H { W u , v } v [ V ] B u
H { W u , v } v [ V ] , B u H B u
= V rank ( B u ) L .
The first term in (104) is zero due to the relay security constraint (10).
Lemma 3.
Consider any G and F, the received signals must not reveal any information about the individual inputs beyond the aggregated result, as otherwise, the server security constraint (11) would be violated. we have
I { Y u } u [ U ] ; { S u } u [ U ] U rank ( G F ) L .
Proof. 
I { Y u } u [ U ] ; { S u } u [ U ]
= I { Y u } u [ U ] ; { S u } u [ U ] , G
= I { Y u } u [ U ] ; G + I { Y u } u [ U ] ; { S u } u [ U ] | G
I { Y u } u [ U ] , F ; G + H { S u } u [ U ] | G
= I ( F ; G ) + I G ; { Y u } u [ U ] | F = ( 11 ) 0 + H { S u } u [ U ] , G H ( G )
= H ( G ) H ( G | F ) + H { S u } u [ U ] , G H ( G )
( rank ( G ) rank ( G F ) ) L + ( U rank ( G ) ) L
= ( U rank ( G F ) ) L .
The third term in (113) is zero due to the server security constraint (11).
Proof of
R Z Σ max max u [ U ] K u , rank ( G F ) . Building on the above lemmas, we complete the proof of the converse.
  • First, we show that R Z Σ max u [ U ] K u . By Lemma 2, we have
L Z Σ H ( Z Σ )
H { Z u , v } v [ V ]
I { Z u , v } v [ V ] ; { X u , v } v [ V ] | { W u , v } v [ V ]
= H { X u , v } v [ V ] | { W u , v } v [ V ]
= H { X u , v } v [ V ] I { X u , v } v [ V ] ; { W u , v } v [ V ]
v [ V ] H X u , v | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , v ) } I { X u , v } v [ V ] ; { W u , v } v [ V ]
( 93 ) ( 102 ) V L V rank ( B u ) L = K u L .
Therefore,
R Z Σ = L Z Σ L max u [ U ] K u .
Second, we show that R Z Σ rank ( G F ) . By Lemma 3, we have
L Z Σ H ( Z Σ )
H Z [ U ] × [ V ]
I Z [ U ] × [ V ] ; { Y u } u [ U ] | { S u } u [ U ]
= H { Y u } u [ U ] | { S u } u [ U ] H { Y u } u [ U ] | { S u } u [ U ] , Z [ U ] × [ V ] = ( 6 ) 0
= H { Y u } u [ U ] I { S u } u [ U ] ; { Y u } u [ U ]
u = 1 U H Y u | { W i , j , Z i , j } ( i , j ) [ U ] × [ V ] { ( u , j ) : j [ V ] } I { S u } u [ U ] ; { Y u } u [ U ]
( 94 ) ( 108 ) U L U rank ( G F ) L
= rank ( G F ) L .
Hence,
R Z Σ = L Z Σ L rank ( G F ) .
Combining (124) and (133), we obtain
R Z Σ max max u [ U ] K u , rank ( G F ) .

7. Conclusions

This paper investigates information theoretic secure aggregation of linear functions over a two hop hierarchical network with relay-assisted communication. By jointly accounting for relay-level privacy constraints and server-side function-specific security requirements, we establish a unified framework for hierarchical vector linear secure aggregation.
Our main contribution is a complete characterization of the optimal communication key rate region. We show that both hops achieve the minimum possible communication rate of one symbol per input symbol, while the required source key rate is governed by the maximum of the intra-cluster security requirement and the conditional rank rank ( G F ) . This result demonstrates that hierarchical architectures incur no additional communication cost compared to single hop systems, while substantially reducing the masking burden at the server through structured key injection.
To achieve these fundamental limits, we propose an explicit linear coding scheme based on systematic precoding, subspace alignment, and zero forcing. The scheme exploits the algebraic structure of the authorized and unauthorized functions to inject randomness exclusively into dimensions that do not interfere with the authorized computation. The achievability and converse proofs together establish that the derived rate region is information theoretically tight.
Overall, this work clarifies the fundamental role of hierarchy in secure aggregation and provides theoretical guidance for the design of scalable privacy preserving distributed learning systems. Future work includes extending the framework to scenarios with collusion among servers, relays, and users, as well as investigating robustness under user dropouts, heterogeneous cluster sizes, and asymmetric communication constraints.

Author Contributions

Conceptualization, J.L. and Z.L.; methodology, J.L., X.Z. and Z.L.; formal analysis, J.L. and Z.L.; investigation, J.L. and X.Z.; writing—original draft preparation, J.L. and Z.L.; writing—review and editing, J.L., X.Z. and Z.L.; funding acquisition, Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Key Research and Development Program of Guangxi (No. AD25069071), the Guangxi Natural Science Foundation (Grant No. 2025GXNSFBA069315), the National Natural Science Foundation of China (Grant No. 62401266), and the Jiangsu Natural Science Foundation (Grant No. BK20241452).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zhao, Y.; Sun, H. Secure Summation: Capacity Region, Groupwise Key, and Feasibility. IEEE Trans. Inf. Theory 2023, 70, 1376–1387. [Google Scholar] [CrossRef]
  2. Yuan, X.; Sun, H. Vector Linear Secure Aggregation. arXiv 2025, arXiv:2502.09817. [Google Scholar] [CrossRef]
  3. Hu, L.; Ulukus, S. On the Capacity Region of Individual Key Rates in Vector Linear Secure Aggregation. arXiv 2026, arXiv:2601.03241. [Google Scholar] [CrossRef]
  4. Zhang, X.; Wan, K.; Sun, H.; Wang, S.; Ji, M.; Caire, G. Optimal Communication and Key Rate Region for Hierarchical Secure Aggregation with User Collusion. arXiv 2024, arXiv:2410.14035. [Google Scholar] [CrossRef]
  5. Zhao, Y.; Sun, H. Information Theoretic Secure Aggregation with User Dropouts. IEEE Trans. Inf. Theory 2022, 68, 7471–7484. [Google Scholar] [CrossRef]
  6. Zhang, Z.; Liu, J.; Wan, K.; Sun, H.; Ji, M.; Caire, G. On Secure Aggregation with Uncoded Groupwise Keys Against User Dropouts and User Collusion. IEEE Trans. Inf. Theory 2025, 71, 8391–8413. [Google Scholar] [CrossRef]
  7. Zhao, Y.; Sun, H. The Optimal Rate of MDS Variable Generation. In Proceedings of the 2023 IEEE International Symposium on Information Theory (ISIT); IEEE: Piscataway, NJ, USA, 2023; pp. 832–837. [Google Scholar]
  8. Jahani-Nezhad, T.; Maddah-Ali, M.A.; Li, S.; Caire, G. Swiftagg: Communication-efficient and dropout-resistant secure aggregation for federated learning with worst-case security guarantees. In Proceedings of the 2022 IEEE International Symposium on Information Theory (ISIT); IEEE: Piscataway, NJ, USA, 2022; pp. 103–108. [Google Scholar]
  9. Jahani-Nezhad, T.; Maddah-Ali, M.A.; Li, S.; Caire, G. SwiftAgg+: Achieving asymptotically optimal communication loads in secure aggregation for federated learning. IEEE J. Sel. Areas Commun. 2023, 41, 977–989. [Google Scholar] [CrossRef]
  10. Li, Z.; Zhao, Y.; Sun, H. Weakly secure summation with colluding users. IEEE Trans. Inf. Theory 2025, 71, 5672–5683. [Google Scholar] [CrossRef]
  11. Wan, K.; Sun, H.; Ji, M.; Mi, T.; Caire, G. The Capacity Region of Information Theoretic Secure Aggregation with Uncoded Groupwise Keys. IEEE Trans. Inf. Theory 2024, 70, 6932–6949. [Google Scholar] [CrossRef]
  12. Wan, K.; Yao, X.; Sun, H.; Ji, M.; Caire, G. On the information theoretic secure aggregation with uncoded groupwise keys. IEEE Trans. Inf. Theory 2024, 70, 6596–6619. [Google Scholar] [CrossRef]
  13. Sun, H. Secure Aggregation with an Oblivious Server. arXiv 2023, arXiv:2307.13474. [Google Scholar] [CrossRef]
  14. Weng, S.; Ren, C.; Zhao, Y.; Xiao, M.; Skoglund, M. Coding-Enforced Robust Secure Aggregation for Federated Learning Under Unreliable Communication. arXiv 2025, arXiv:2507.07565. [Google Scholar]
  15. Zhang, X.; Li, Z.; Wan, K.; Sun, H.; Ji, M.; Caire, G. Communication-Efficient Hierarchical Secure Aggregation with Cyclic User Association. In Proceedings of the 2025 IEEE International Symposium on Information Theory (ISIT); IEEE: Piscataway, NJ, USA, 2025; pp. 1–6. [Google Scholar] [CrossRef]
  16. Egger, M.; Hofmeister, C.; Wachter-Zeh, A.; Bitar, R. Private aggregation in wireless federated learning with heterogeneous clusters. In Proceedings of the 2023 IEEE International Symposium on Information Theory (ISIT); IEEE: Piscataway, NJ, USA, 2023; pp. 54–59. [Google Scholar]
  17. Xu, M.; Han, X.; Wan, K.; Ge, G. On hierarchical secure aggregation against relay and user collusion. arXiv 2025, arXiv:2511.20117. [Google Scholar] [CrossRef]
  18. Li, Z.; Zhang, X.; Lv, J.; Chen, H.; Fan, J.; Caire, G. Hierarchical Secure Aggregation with Heterogeneous Security Constraints and Arbitrary User Collusion. arXiv 2025, arXiv:2507.14768. [Google Scholar]
  19. Lu, Q.; Cheng, J.; Kang, W.; Liu, N. Capacity of Hierarchical Secure Coded Gradient Aggregation with Straggling Communication Links. arXiv 2024, arXiv:2412.11496. [Google Scholar] [CrossRef]
  20. Zhang, X.; Luo, Y.; Li, T. A Review of Research on Secure Aggregation for Federated Learning. Future Internet 2025, 17, 308. [Google Scholar] [CrossRef]
  21. Xing, L.; Luo, Z.; Deng, K.; Wu, H.; Ma, H.; Lu, X. FedHSQA: Robust Aggregation in Hierarchical Federated Learning via Anomaly Scoring-Based Adaptive Quantization for IoV. Electronics 2025, 14, 1661. [Google Scholar] [CrossRef]
  22. Gao, Q.; Sun, Y.; Chen, X.; Yang, F.; Wang, Y. An Efficient Multi-Party Secure Aggregation Method Based on Multi-Homomorphic Attributes. Electronics 2024, 13, 671. [Google Scholar] [CrossRef]
  23. Park, S.; Chi, J. V-MHESA: A Verifiable Masking and Homomorphic Encryption-Combined Secure Aggregation Strategy for Privacy-Preserving Federated Learning. Mathematics 2025, 13, 3687. [Google Scholar] [CrossRef]
Figure 1. Illustration of hierarchical secure linear aggregation. The aggregation server is permitted to compute information about the linear function F, but is not permitted to compute any information about the linear function G. In addition, each relay is required to be unable to compute any intra-cluster information about the linear function B u (intra-cluster privacy constraint).
Figure 1. Illustration of hierarchical secure linear aggregation. The aggregation server is permitted to compute information about the linear function F, but is not permitted to compute any information about the linear function G. In addition, each relay is required to be unable to compute any intra-cluster information about the linear function B u (intra-cluster privacy constraint).
Entropy 28 00352 g001
Table 1. Comparison between representative single-hop vector linear schemes and the proposed two-hop hierarchical scheme.
Table 1. Comparison between representative single-hop vector linear schemes and the proposed two-hop hierarchical scheme.
AspectRepresentative Single-Hop Vector Linear SchemesProposed Two-Hop Hierarchical Scheme
ArchitectureSingle-hopTwo-hop hierarchical
Trust modelHonest-but-curious serverSemi-trusted relays and honest-but-curious server
Security targetServer-side target-function privacyRelay-side B u -function privacy and server-side target-function privacy
Communication efficiencyOptimal communication rate: R X = 1 Optimal communication rates on both hops: R X = 1 , R Y = 1
Technical challengeSingle-layer code designUnified linear design under coupled relay/server security constraints
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lv, J.; Zhang, X.; Li, Z. On the Communication–Key Rate Region of Hierarchical Vector Linear Secure Aggregation. Entropy 2026, 28, 352. https://doi.org/10.3390/e28030352

AMA Style

Lv J, Zhang X, Li Z. On the Communication–Key Rate Region of Hierarchical Vector Linear Secure Aggregation. Entropy. 2026; 28(3):352. https://doi.org/10.3390/e28030352

Chicago/Turabian Style

Lv, Jiawen, Xiang Zhang, and Zhou Li. 2026. "On the Communication–Key Rate Region of Hierarchical Vector Linear Secure Aggregation" Entropy 28, no. 3: 352. https://doi.org/10.3390/e28030352

APA Style

Lv, J., Zhang, X., & Li, Z. (2026). On the Communication–Key Rate Region of Hierarchical Vector Linear Secure Aggregation. Entropy, 28(3), 352. https://doi.org/10.3390/e28030352

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop