Papers
Topics
Authors
Recent
2000 character limit reached

Gap Additive Secure Polynomial Code

Updated 5 December 2025
  • GASP code is a family of polynomial codes that uses structured additive gaps in exponent choices to securely encode matrix products for distributed multiplication.
  • It leverages degree tables and arithmetic progression designs to minimize server requirements while guaranteeing T-security and efficient recovery of matrix blocks.
  • Extensions to quantum PDMM and GGASP offer rate enhancements and robustness, illustrating the method’s adaptability across diverse privacy and system regimes.

The Gap Additive Secure Polynomial (GASP) code is a family of polynomial codes for secure distributed matrix multiplication (SDMM) that achieves a favorable trade-off between privacy, communications overhead, and decoding complexity by means of a combinatorial arrangement of additive “gaps” in exponent choices. GASP codes operate by encoding matrix blocks as polynomials evaluated at specific points, such that any TT colluding servers (from NN total) learn nothing about the matrices, while the user can efficiently recover all submatrix products given responses from the servers. The code’s constructions leverage degree tables and careful arithmetic progression designs to minimize the required number of servers, with quantum generalizations that further optimize rates under additional feasibility constraints.

1. Secure Matrix Multiplication and Degree Table Framework

SDMM is the problem in which a user, lacking local resources, wishes to compute C=ABC = AB for matrices AA and BB using NN servers, while protecting the privacy of AA and BB from any subset of TT colluding servers. The standard approach partitions AA and BB into KK and LL blocks, respectively. The user constructs two univariate encoding polynomials: f(x)=k=1KAkxαk+t=1TRtxαK+t,g(x)==1LBxβ+t=1TStxβL+tf(x) = \sum_{k=1}^K A_k\,x^{\alpha_k} + \sum_{t=1}^T R_t\,x^{\alpha_{K+t}}, \qquad g(x) = \sum_{\ell=1}^L B_\ell\,x^{\beta_\ell} + \sum_{t=1}^T S_t\,x^{\beta_{L+t}} with {Rt}\{R_t\} and {St}\{S_t\} as independent random masks. The user evaluates f(x)f(x) and g(x)g(x) at NN distinct points {an}\{a_n\}, and each server receives (f(an),g(an))(f(a_n), g(a_n)) and returns the product f(an)g(an)f(a_n)g(a_n). The coefficients of xαk+βx^{\alpha_k+\beta_\ell} in f(x)g(x)f(x)g(x) encode AkBA_kB_\ell.

A central structural tool is the degree table PMi,j=αi+βjPM_{i,j} = \alpha_i + \beta_j (of size (K+T)×(L+T)(K+T)\times(L+T)), which records all resulting exponents in the product f(x)g(x)f(x)g(x). Achieving privacy and recoverability forces requirements on the arrangement and distinctness of these exponents, motivating the design of the “gap” structure that gives GASP codes their name (D'Oliveira et al., 2018, D'Oliveira et al., 2021).

2. GASP Construction: Gap Placement and Exponent Patterns

GASP codes select exponent vectors α\alpha and β\beta as structured arithmetic progressions, segmented by controlled “gaps.” For outer-product partitioning (AA partitioned by rows, BB by columns), canonical choices are:

  • α\alpha prefix: (0,1,,K1)(0,1,\ldots,K-1), suffix: arithmetic progression(s) chosen to produce TT “random” terms positioned to form non-overlapping security gaps.
  • β\beta prefix: (0,K,2K,,K(L1))(0,K,2K,\ldots,K(L-1)), suffix: progression(s) offset to maximize distinctness and separation.

The explicit construction for K=L=T=nK=L=T=n in the “small GASP” regime is: αi=i,i=0,1,,T1,βj=jT,j=0,1,,T1,\alpha_i = i,\quad i=0,1,\dots, T-1,\qquad \beta_j = jT,\quad j=0,1,\dots,T-1, with “random” exponents appended as blocks to create disjoint intervals (gaps). The arithmetic structure ensures that any TT colluding servers receive shares corresponding to polynomials whose evaluated degrees have at least one block of length TT devoted solely to random coefficients, achieving perfect TT-security (D'Oliveira et al., 2018, D'Oliveira et al., 2021, Nomeir et al., 28 Nov 2025).

A generalization—GASPr_r—introduces the gap size parameter rr, controlling the arrangement of the random exponents in the degree table. By optimizing rr, one minimizes NN, the total number of evaluations (servers).

3. Decodability, Security, and Recovery Threshold

For correctness, the table’s (K×L)(K\times L) “upper-left” block (signal exponents corresponding to AkBA_kB_\ell products) must consist of pairwise-distinct entries, and these must not collide with any exponents associated with random masks. The download rate is RC=KL/NR_C=KL/N.

The conditions for a valid GASP code are:

  1. (k,)[K]×[L],(i,j)[K+T]×[L+T]\forall (k, \ell)\in[K]\times[L],\, (i, j)\in[K+T]\times[L+T] with (k,)(i,j)(k, \ell)\neq(i, j): αk+βαi+βj\alpha_k+\beta_\ell\ne\alpha_i+\beta_j (distinct exponents for all signal and random terms).
  2. The extra exponents {αK+1,,αK+T}\{\alpha_{K+1},\ldots,\alpha_{K+T}\} and {βL+1,...,βL+T}\{\beta_{L+1},...,\beta_{L+T}\} are mutually distinct among themselves (Nomeir et al., 28 Nov 2025).

Efficient algorithms for discovering optimal degree tables (integer programming, greedy search) validate the construction’s optimality for small and moderate parameter regimes, minimizing NN subject to the above constraints (D'Oliveira et al., 2021).

4. Extension to Quantum PDMM: Feasibility and Rate Doubling

Recent developments extend the classical GASP design to the quantum private distributed matrix multiplication (PDMM) model, where servers share an NN-partite entangled state and communicate over quantum channels (Nomeir et al., 28 Nov 2025). In this setting, the quantum protocol allows two independent instances to be encoded in each round (“super-dense coding”), potentially doubling the classical download rate to RQ=2KL/NR_Q=2KL/N^*.

A feasibility constraint is necessary: the largest consecutive chain (LCC) in the set of interference exponents in the degree table must satisfy LCC(J)N/2|LCC(\mathcal{J})|\geq\lceil N^*/2\rceil. If this is met, the protocol achieves RQ=2RCR_Q=2R_C. When the feasibility constraint fails, either TT is increased until it holds, or fully quantum-native codes using new exponent arrangements are adopted. Explicit constructions are provided for numerous high-privacy quantum settings, each yielding RQ>RCR_Q>R_C.

A quadratic regression quantifies the minimal privacy parameter TT required for feasibility as a function of KK and LL—for K=LK=L, T0.5K2103K+0.772T\approx0.5\,K^2-10^{-3}K+0.772 (Nomeir et al., 28 Nov 2025).

5. Low-Privacy Regime and Comparisons to Other Code Families

In the regime T<min(K,L)T<\min(K,L), GASP is not rate-optimal. Alternative constructions—the cyclic-addition degree table (CAT) and discretely optimized GASP (DOG)—offer improved performance. Each is subject to the same quantum feasibility criterion, but only in specific parameter regimes (e.g., CAT2_2(2,2,2)) does the quantum rate doubling persist. When no classical TT-private code meets the feasibility requirement, additional dummy noise slots are introduced (enhanced privacy level Tˉ>T\bar{T}>T) to force the desired interference structure and enable partial quantum gains (up to 1.5×1.5\times the classical rate) (Nomeir et al., 28 Nov 2025).

6. Generalizations: Grid Partitioning, GGASP, and Straggler Robustness

GASP can be extended to grid partitionings, leading to the Generalized GASP (GGASP) codes with explicit recovery thresholds and optimality properties for a broad class of distributed matrix multiplication problems (Karpuk et al., 2023). GGASP encodes both matrices over partitions indexed by (K,M,L)(K,M,L), exploits similar gap structures, and achieves provable TT-security and decodability. Empirical results confirm that for moderate to large TT, GGASP outperforms previous polynomial-based and entangled polynomial codes.

Straggler-robustness is preserved: GGASP achieves the optimal threshold in the absence of privacy, and modular polynomial (MP) codes can outperform GGASP with respect to decoding cost and recovery flexibility when there are failures.

7. Summary of Key Results and Connections

  • GASP codes provide an explicit, tunable framework for constructing SDMM codes that are provably optimal or near-optimal in many regimes. The codes are grounded in combinatorial designs of degree tables and allow precise control over the download rate for required privacy thresholds (D'Oliveira et al., 2021, D'Oliveira et al., 2018).
  • In the quantum setting, rate doubling is achievable when the interference block in the degree table contains a sufficiently long consecutive chain; otherwise, tailored quantum-native code constructions or enhanced masking restore functionality (Nomeir et al., 28 Nov 2025).
  • GGASP extends the approach to grid partitions, preserving rate and privacy guarantees while allowing efficient decoding and robustness to stragglers (Karpuk et al., 2023).
  • Comparative studies confirm GASP and its generalizations outperform prior art in tested scenarios, and systematic construction methods are available for a wide range of matrix partition schemes and privacy levels.

References:

Whiteboard

Follow Topic

Get notified by email when new papers are published related to Gap Additive Secure Polynomial (GASP) Code.