Cyclic-Addition Degree Tables (CAT)
- CAT is a degree table construction in private distributed matrix multiplication that uses cyclic (modular) addition to assign unique polynomial degrees.
- It reduces communication overhead and worker count by exploiting root-of-unity evaluation points and modular arithmetic, achieving up to 5–15% worker savings in low-privacy regimes.
- The framework extends to quantum protocols using entanglement-assisted super-dense coding, doubling the effective transmission rate.
Cyclic-Addition Degree Tables (CAT) are a family of degree table constructions used in coding schemes for private distributed matrix multiplication (PDMM), particularly designed to reduce communication overhead and worker count while preserving information-theoretic privacy. The CAT framework exploits cyclic (modular) addition of degree exponents together with root-of-unity evaluation points in finite fields, enabling more efficient polynomial code construction than classical integer-addition-based schemes, especially in the low-privacy regime where the number of colluding adversaries is small relative to the number of matrix partitions (Nomeir et al., 28 Nov 2025, Hofmeister et al., 21 Jan 2025).
1. Formulation and Definition
The CAT approach encodes two private input matrices, and , for distributed matrix multiplication across servers, in such a way that any colluding servers do not learn anything about or . The matrices are partitioned into row blocks and column blocks respectively, yielding block products that must be recovered.
CAT codes assign integer degree vectors and for the polynomial encoding of and , forming a degree table :
Each entry uniquely designates the polynomial degree corresponding to the block product . The cyclic addition modulo is the critical innovation, enabling the mapping of all possible sums into a smaller index set and facilitating efficient Vandermonde interpolation.
2. Encoding, Evaluation, and Decoding Procedures
The user defines two polynomials for encoding:
Random matrices , with degree exponents , (chosen from the interference set disjoint from the block-product degrees) serve as privacy masks. The user chooses field elements as evaluation points, commonly chosen as distinct roots of unity of order .
Each server receives the tuple and returns . The user collects all responses and interpolates the univariate polynomial , extracting the coefficients at the degrees to recover the block products .
3. Privacy and Feasibility Conditions
CAT codes guarantee -privacy: any colluding servers, even with access to all their values, obtain no information about or . This security is derived from the random mask terms spanning a -dimensional subspace that completely obscures any possible combination revealed to the adversaries.
For correct matrix recovery (decodability), the message degrees must be pairwise distinct. Privacy demands that the interference set size satisfies , and the noise exponents are distinct from the message degrees as well as from each other. For the quantum setting, a further feasibility requirement is imposed: the longest consecutive chain to support super-dense coding for quantum rates (Nomeir et al., 28 Nov 2025).
4. Parameter Selection and Structural Distinctions
To satisfy all constraints, the modulus is set as
with and , such that are coprime to . The auxiliary variables are chosen to meet these coprimality requirements.
Exponents and are constructed via selectable parameters and (with coprime to and such that ) to ensure both non-collision in and invertibility of the evaluation/interpolation matrix. This explicit construction enables tight worker counts in contrast to GASP or DOG schemes (Hofmeister et al., 21 Jan 2025).
5. Comparative Performance and Asymptotics
CAT coding schemes are advantageous in the low-privacy regime (), where the number of colluding servers is much less than the block partitioning. The worker count and rate for the CAT scheme are:
For comparison, the GASP and DOG coding schemes yield:
| Scheme | Worker Count | Rate |
|---|---|---|
| GASP | ||
| DOG | ||
| CAT |
Numerical results demonstrate that for small , CAT can save up to $5$– in the number of workers relative to GASP, and may also outperform DOG for moderate (Hofmeister et al., 21 Jan 2025). In the high-privacy regime (), CAT becomes suboptimal due to diminished interference dimensions, in which case GASP or multivariate schemes are preferable (Nomeir et al., 28 Nov 2025).
6. Quantum Adaptation and Super-Dense Coding
Cyclic-addition degree tables admit a natural extension to quantum protocols. When the feasibility condition on the interference set’s longest consecutive chain is satisfied, CAT codes enable an entanglement-assisted protocol where servers, sharing an -partite entangled state, perform Pauli operations parameterized by the encoded messages and masks. The user then recovers two classical symbols per quantum transmission via super-dense coding, doubling the download rate:
This quantum extension leverages the SSO-generator matrix for the dual GRS code on CAT exponents, with the key property that the interference set structure supports the required stabilizer measurements (Nomeir et al., 28 Nov 2025).
7. Extensions, Optimizations, and Example
Potential optimizations to the baseline CAT design include:
- Enlarged Modulus: Replacing by a larger divisor of can reduce collisions in and enhance flexibility.
- Discretely Optimized Parameters (DOG): Allowing “gaps” in degree assignments interpolates between CAT and GASP, optimizing performance for intermediate .
- Explicit CATx Construction: The paper "CAT and DOG: Improved Codes for Private Distributed Matrix Multiplication" introduces CATx, realizing these improvements in practical settings (Hofmeister et al., 21 Jan 2025).
Illustrative Example (for ):
- , ,
- Degree vectors: , mod $10$
- Degree table: ; interference set
- Classical rate: $4/10 = 0.4$; Quantum rate (via super-dense coding): $0.8$
A plausible implication is that such parameter choices yield practical schemes with reduced worker requirements and strong privacy guarantees for distributed matrix multiplication in both classical and quantum-augmented regimes (Nomeir et al., 28 Nov 2025, Hofmeister et al., 21 Jan 2025).
References
- "Quantum Private Distributed Matrix Multiplication With Degree Tables" (Nomeir et al., 28 Nov 2025)
- "CAT and DOG: Improved Codes for Private Distributed Matrix Multiplication" (Hofmeister et al., 21 Jan 2025)