1. Introduction
With the rapid proliferation of machine learning and data analytics applications, massive amounts of data are continuously generated by geographically distributed users and devices. In many practical scenarios, such as healthcare analytics, intelligent transportation, and personalized recommendation systems, these data are highly sensitive. Directly collecting or centrally storing raw user data therefore poses significant privacy risks and regulatory challenges. Secure aggregation has emerged as a fundamental primitive to address this tension, enabling an aggregator to compute desired statistics over distributed data while preventing the disclosure of individual user information.
From an information-theoretic perspective, secure aggregation inherently incurs simultaneous costs in communication efficiency and randomness consumption. A classical starting point is secure aggregation, where each of
K users holds a private input and transmits a masked message to a server. The server is required to recover the sum of all inputs with zero error while learning no additional information. Prior work [
1] has shown that achieving perfect secure inevitably requires a nontrivial amount of randomness, and that reducing communication cost typically increases the required key rate. This communication and randomness relationship has been fully characterized for secure aggregation and several of its variants, establishing randomness as a fundamental resource rather than a mere implementation detail.
As distributed learning systems evolve, secure aggregation alone is insufficient to capture practical requirements. First, the desired computation is often more general than a scalar sum and can be modeled as an arbitrary linear transformation of the users’ data. Second, security requirements are frequently function-specific: while the server is authorized to learn a prescribed linear function F of the users’ data, it must be prevented from inferring other sensitive linear functions, denoted by G. This motivates the formulation of vector linear secure aggregation, in which the security cost is no longer determined solely by the number of users, but also by the algebraic relationship between the authorized function F and the protected functions G. In particular, the additional information contained in G beyond what is revealed by F is quantified by the conditional rank , which directly determines the minimum amount of randomness required for security.
Most existing information-theoretic results on vector linear secure aggregation focus on single-hop network architectures [
2,
3], where all users communicate directly with a central server. While such models are analytically convenient, they do not fully reflect the structure of large-scale practical systems. In real deployments, direct communication between a server and a massive number of users can lead to scalability and access limitations. As a result, hierarchical or edge-assisted architectures are widely adopted, in which users first communicate with nearby relays or gateways, and the relays subsequently forward aggregated messages to the server.
Introducing a hierarchical architecture fundamentally changes the secure aggregation problem [
4]. Unlike the classical single-hop setting, where only the server’s inference needs to be controlled, a two-hop network creates an additional inference layer: each relay observes all transmissions from users in its cluster and may infer extra intra-cluster linear information unless properly constrained. Meanwhile, the server should recover only a prescribed global linear function of the cluster aggregates and remain ignorant of other unauthorized linear combinations.
Information-theoretic secure aggregation has been extended to a variety of settings, including user dropout [
5,
6], secure aggregation with user selection [
7], designs resilient to user collusion [
8,
9,
10], schemes employing groupwise keys [
11,
12], secure aggregation with oblivious servers [
13], secure aggregation under unreliable communication [
14], and hierarchical secure aggregation [
15,
16,
17,
18,
19]. Other related works on secure aggregation from different perspectives can be found in [
20,
21,
22,
23].
However, existing works do not characterize the vector linear two-hop hierarchical setting within a unified information-theoretic framework, where relay-side protection against unauthorized intra-cluster linear inference and server-side recovery of only a prescribed global function must be enforced simultaneously. Our contribution is not only to unify hierarchical secure aggregation and vector linear secure aggregation within a single information-theoretic model, but also to show that the resulting two-hop formulation exhibits genuinely coupled relay-side and server-side security constraints, leading to a new optimal key-rate characterization and requiring a joint algebraic coding design.
To further clarify the distinction from prior single-hop vector linear secure aggregation schemes,
Table 1 summarizes the main differences between those formulations and the proposed two-hop hierarchical setting.
In this work, we study information-theoretic vector linear secure aggregation over a two-hop hierarchical network consisting of U relays, each serving a disjoint cluster of V users. The server is required to recover, with zero error, a prescribed linear function F of the cluster aggregates while learning no additional information about an unauthorized linear function G. At the same time, each relay may assist local aggregation but must remain ignorant of the unauthorized intra-cluster linear functions characterized by within its own cluster. Our goal is to completely characterize the fundamental communication and randomness limits of this problem.
We prove that, in the unified hierarchical vector linear secure aggregation model, the communication optimality remains unchanged compared with the single-hop setting: the first-hop rate still satisfies , and the second-hop rate can still achieve even after introducing an additional relay layer. However, the minimum source key rate changes from depending only on in the single-hop model to being jointly determined by the relay-side intra-cluster protection requirement and the server-side protection constraint . This shows that, although the hierarchical structure does not increase the communication cost, it introduces a coupling between relay-side security and server-side function security in the key design.
From a technical standpoint, establishing the fundamental limits is challenging because both the converse and the achievability must simultaneously account for relay-side intra-cluster secrecy and server-side function authorization. In particular, the converse requires a joint information-theoretic argument for the two levels of security, while the achievability calls for a unified linear coding design that preserves local privacy, enables authorized global recovery, and maintains optimal communication rates over both hops.
We further provide an explicit linear coding scheme that achieves these fundamental limits.
2. Problem Statement
Consider a three-layer hierarchical secure aggregation system consisting of an aggregation server, an intermediate layer of
relays, and a bottom layer of
users. The network operates over two hops, where the server communicates with all relays and each relay serves a disjoint cluster of exactly
V users, as illustrated in
Figure 1. All communication links are assumed to be error-free. We consider a static system model with fixed cluster size, where no user dropout occurs during the protocol. We further assume that no collusion takes place among users, relays, and the server, and that all entities follow the prescribed protocol without adversarial or Byzantine behavior. The
v-th user associated with the
u-th relay is indexed by
. Each user
holds a private input
over a finite field
with entropy
measured in
q-ary units, and the inputs are assumed to be independent and uniformly distributed across users. In addition, each user
is equipped with a local key variable
, satisfying
. The collection of individual keys
is deterministically generated from a common source key variable
, where
. The source key
is generated and securely distributed by a trusted third-party entity. The key variables
are statistically independent of the user inputs
.
The system adopts a two-hop communication protocol. In the first hop, User
transmits a message
to its associated relay. The message
is generated as a function of the local input
and the local key
, and consists of
symbols. In the second hop, relay
u transmits a message
to the aggregation server. The message
consists of
symbols and is generated as a function of the received messages
from Users in cluster
u.
We define the cluster aggregate at relay
u as the sum of the users’ inputs within cluster
u, i.e.,
In general, the relay message
can be an arbitrary function of the received messages
. Specifically, in this work, we restrict attention to schemes in which the relay message
is a deterministic function of the cluster aggregate
and the local keys
, i.e.,
From the relay messages, the aggregation server aims to recover an authorized linear function
F while revealing no information about an unauthorized linear function
G in the information-theoretic sense. Define
The functions
F and
G are given by
where
and
are assumed to have full row rank, i.e.,
and
, without loss of generality.
To prevent trivial cases, we assume that contains no zero columns. A zero column associated with would indicate that has no effect on the computation of F and could thus be excluded without affecting the problem.
From the relay’s messages, the server should be able to recover the desired linear function
F, i.e.,
The security constraints require that each relay should not gain any information about any unauthorized linear function
from the messages transmitted by its associated users. Specifically, let
and define the unauthorized function
where
is assumed to have full row rank without loss of generality, i.e.,
. The relay security constraint can then be expressed as
In addition, the server must not learn any information about the unauthorized function
G beyond what is already contained in the authorized function
F. This server security constraint is written as
The communication rates
and
are defined as the numbers of symbols in each transmitted message
and
, respectively, normalized by the input length
L. Similarly, the source key rate
represents the number of symbols in the key variable
per input symbol. Formally,
A rate tuple
is said to be achievable if there exists a secure aggregation scheme, specified by the key variable
, and the transmitted messages
and
, satisfying (
3) and (
4), such that the communication and key rates are
and the correctness constraint (
8) together with the security constraints (
10) and (
11) are all met. The optimal rate region
is defined as the closure of the set of all achievable rate tuples.
4. Motivating Example (U = 4, V = 3, M = 2, N = 1)
Prior to describing the general achievability scheme in Theorem 1, we introduce a representative example to convey the key principles behind the proposed hierarchical vector linear secure aggregation problem. These examples serve to build intuition for the design, after which the complete construction is presented.
Consider a two-hop hierarchical system with
relays and
users per cluster. In the first hop, each relay aggregates the messages from users in its corresponding cluster while being prevented from learning any information about the linear function
, where
and
is specified as follows.
In the second hop, the server aims to recover
from the messages uploaded by all relays with zero error, where
Moreover, the server must not obtain any additional information about
beyond what is implied by
.
Consequently, we have
where
is a scalar linear combination of the components of
.
Consider the second hop and set
. Based on (
17), suppose we have two independent and uniformly distributed noise variables
over
. Then we have
For the server security constraint, only 1 key symbol is required. It turns out that and need not be independent; introducing correlation between them in the next step is the most technical part of the proof.
We then seek a
matrix
that characterizes the correlation between
, such that
Note that such a matrix
exists since
. Consequently, there always exists a nonzero
vector
that completes (
21) to full rank. Any valid choice of
suffices for our purpose.
We then compute the right null space of
, denoted by
, which satisfies
Then the key symbols
and
can be generated from a single uniformly distributed key symbol
by precoding with
,
We may write out the final message assignment using the single key symbol
:
The signal observed at relay
u can be expressed as
where
denotes the key component embedded in
.
In
Example 1, this decomposition admits an explicit representation:
Next, we investigate the security of relay 4 under the proposed key assignment. Since
, relay 4 requires at least
independent keys, denoted by
and
. There exists a matrix
such that
Since the coefficients of
can be any nonzero values in
, for simplicity we set
, yielding
Therefore, the relay messages can be written as
To prevent relay 4 from obtaining any information regarding the linear function
, we require
Specifically, the interference term is constructed using the keys as
Equivalently, we can write
To ensure that the noise term fully masks the signal space and cannot be nullified via linear projection, the product
must have full rank, i.e.,
Specifically, we construct the first two rows of
as a full-rank block to ensure linear independence, and utilize the last row to satisfy the aggregation coefficient constraints. Consequently, as shown in (
26), the aggregated interference term
yields the summation of the keys:
The corresponding precoding matrix is
The left null space of
is
This construction ensures that has full column rank, , satisfying the required rank condition.
Similarly, for relay 1, since
, it requires only one independent key, namely
. To satisfy the condition
, we construct
as follows:
Consequently, the left null space of
is given by
Similarly, for the other relays 2 and 3, we construct
and
, from which the individual user keys are obtained as follows:
Since
and
, the resulting rates are
which match the converse bound established in Theorem 1.
Correctness: From the received signals
, the server applies the linear transform
and successfully recovers
with zero error.
Relay security: From the transformation in (
15), it follows that
Since relays whose have the same rank require the same total number of independent masking key symbols, it suffices to establish the security proof for relays 1 and 4; the cases of relays 2 and 3 follow by analogous arguments.
Consider relay 4, for example:
In (
40), we adopt a zero-forcing strategy by constructing the precoding matrix
so that the key components are perfectly eliminated in its left null space, i.e.,
In (
42), the second term holds because
and
is independent of
. Moreover, the matrix formed by
and
has full rank, and hence is invertible with respect to
.
Consider relay 1, for example:
In (
46), we adopt a zero-forcing strategy by constructing the precoding matrix
so that the key components are perfectly eliminated in its left null space, i.e.,
In (
48), the second term holds because
and
is independent of
. Moreover, the matrix formed by
and
has full rank, and hence is invertible with respect to
.
We now proceed to present the security proof for the server.
where (
52) follows from the orthogonality
, which implies that the noise components precoded by
are completely eliminated (zero-forced) when left-multiplied by
, cf. (
22) and (
23). Concerning (
54), we leverage the full-rank properties of
,
, and
, which ensure the unique solvability of
(see (
21)).
7. Conclusions
This paper investigates information theoretic secure aggregation of linear functions over a two hop hierarchical network with relay-assisted communication. By jointly accounting for relay-level privacy constraints and server-side function-specific security requirements, we establish a unified framework for hierarchical vector linear secure aggregation.
Our main contribution is a complete characterization of the optimal communication key rate region. We show that both hops achieve the minimum possible communication rate of one symbol per input symbol, while the required source key rate is governed by the maximum of the intra-cluster security requirement and the conditional rank rank. This result demonstrates that hierarchical architectures incur no additional communication cost compared to single hop systems, while substantially reducing the masking burden at the server through structured key injection.
To achieve these fundamental limits, we propose an explicit linear coding scheme based on systematic precoding, subspace alignment, and zero forcing. The scheme exploits the algebraic structure of the authorized and unauthorized functions to inject randomness exclusively into dimensions that do not interfere with the authorized computation. The achievability and converse proofs together establish that the derived rate region is information theoretically tight.
Overall, this work clarifies the fundamental role of hierarchy in secure aggregation and provides theoretical guidance for the design of scalable privacy preserving distributed learning systems. Future work includes extending the framework to scenarios with collusion among servers, relays, and users, as well as investigating robustness under user dropouts, heterogeneous cluster sizes, and asymmetric communication constraints.