Papers
Topics
Authors
Recent
Search
2000 character limit reached

Hermitian-Curve XSTPIR Scheme

Updated 19 January 2026
  • The paper introduces a Hermitian-curve-based XSTPIR scheme that leverages maximal rational points and a novel two-tier block basis to achieve superior PIR rates.
  • Advanced algebraic geometry codes are constructed via refined divisor structures on the Hermitian curve to ensure both X-security and T-privacy in distributed setups.
  • Methodological innovations such as interference alignment and optimized pole placement guarantee correct file recovery and enhanced capacity over previous curve-based constructions.

A Hermitian-curve-based XSTPIR scheme is a protocol for XX-secure, TT-private information retrieval (XSTPIR) using algebraic geometry codes constructed from the Hermitian curve over Fq2\mathbb{F}_{q^2}. These schemes leverage the maximality and large supply of rational points of the Hermitian curve to attain higher PIR rates for fixed parameters (q,X,T)(q,X,T) than previous constructions using rational, elliptic, or hyperelliptic curves. The protocols operate in a distributed storage setting with NN servers, each storing codeword symbols corresponding to evaluations of carefully chosen Riemann–Roch space functions, with parameters tailored to guarantee both XX-security (data remains secret against colluding servers) and TT-privacy (the file index remains private against colluding servers) (Ghiandoni et al., 26 Aug 2025, Gao et al., 12 Jan 2026, Christensen et al., 2018).

1. Hermitian Curve and Rational Points

The Hermitian curve Hq\mathcal{H}_q over the field Fq2\mathbb{F}_{q^2} is defined by the affine equation: xq+1=yq+yx^{q+1} = y^q + y It is a smooth, projective, TT0-maximal curve, with genus

TT1

and exactly TT2 rational points (including the unique point at infinity TT3). Maximality indicates that TT4 attains the Hasse-Weil upper bound on the number of rational points for its genus (Ghiandoni et al., 26 Aug 2025, Gao et al., 12 Jan 2026).

The abundance of rational points is critical: it enables construction of long AG codes and, thus, large numbers of servers or stored symbols without diminishing minimum distance or security parameters.

2. Construction of Hermitian AG Codes and Subspace Design

The protocol utilizes AG codes associated with divisors on TT5, and exploits advanced bases for multiplier spaces:

  • Evaluation Set: The scheme selects a subset of the TT6 rational points (excluding a small number used in the support of noise and pole divisors).
  • Divisor Structure: The "full" global divisor TT7 is constructed as a sum of the zeros of TT8 chosen irreducible quadratics TT9, a multiple of Fq2\mathbb{F}_{q^2}0, plus small contributions from Fq2\mathbb{F}_{q^2}1 and Fq2\mathbb{F}_{q^2}2.
  • Data-Multiplier Basis: The core innovation is a two-level basis for the data-multiplier space:
    • Functions are constructed as Fq2\mathbb{F}_{q^2}3, where the block basis Fq2\mathbb{F}_{q^2}4 aggregates monomials supported on the irreducible Fq2\mathbb{F}_{q^2}5's.
    • All Fq2\mathbb{F}_{q^2}6 such basis elements Fq2\mathbb{F}_{q^2}7 are then multiplied by a global factor Fq2\mathbb{F}_{q^2}8, yielding basis elements whose zeros and poles are efficiently concentrated, minimizing overlap with storage evaluation points (Gao et al., 12 Jan 2026).

Subspaces for each file coordinate Fq2\mathbb{F}_{q^2}9 are defined as: (q,X,T)(q,X,T)0 with the information space (q,X,T)(q,X,T)1 and noise space composed of all relevant combinations of (q,X,T)(q,X,T)2, (q,X,T)(q,X,T)3, (q,X,T)(q,X,T)4 (Ghiandoni et al., 26 Aug 2025, Gao et al., 12 Jan 2026).

3. PIR Protocol Instantiation and Interference Alignment

The retrieval protocol encodes files across servers as evaluations of functions from the information space, while queries are generated with superpositions of random elements from (q,X,T)(q,X,T)5 (to achieve (q,X,T)(q,X,T)6-security and (q,X,T)(q,X,T)7-privacy) and a designated (q,X,T)(q,X,T)8 for the requested file index: (q,X,T)(q,X,T)9 Each server, holding evaluations at a point NN0, responds with NN1. The user collects all NN2 and projects onto the information space, extracting NN3 and thus recovering the desired file symbol.

The disjointness property NN4 is enforced by the degree and location of divisors, ensuring precise cross-subspace alignment: all "noise" aligns in a subspace orthogonal to the useful signal (Ghiandoni et al., 26 Aug 2025).

4. Privacy, Security, and Correctness Guarantees

Security is formalized as follows:

  • NN5-security: Any coalition of up to NN6 servers, observing their response and storage symbols, sees at most NN7 linear combinations in NN8. The dual code distances guarantee this reveals no information about file contents.
  • NN9-privacy: Any coalition of up to XX0 servers observes only evaluations of the query in XX1; the dual code again protects the file index privacy.
  • Correctness: The separation between XX2 and XX3 ensures the user can recover the requested symbol uniquely (Ghiandoni et al., 26 Aug 2025).

When instantiated as an XSTPIR scheme, the Hermitian-curve construction realizes both privacy and security thresholds as dictated by Riemann–Roch space dimensions and minimum distances (Gao et al., 12 Jan 2026, Christensen et al., 2018).

5. Retrieval Rate and Parameter Optimization

The PIR rate is given by

XX4

where XX5. Maximizing XX6 (while adhering to divisors and support overlap constraints) yields the maximum rate: XX7 The existence condition is

XX8

This rate strictly exceeds prior Hermitian-curve and hyperelliptic schemes for XX9 and TT0, and can be quantitatively larger (the improvement can exceed 0.14 in absolute rate for large TT1 and suitable TT2) (Gao et al., 12 Jan 2026).

Comparison Table: Maximal PIR Rate Formulas

Curve family Maximal rate Existence condition
Rational curve TT3 TT4
Hyperelliptic (genus TT5) TT6 TT7
Old Hermitian-curve TT8 TT9
New Hermitian-curve Hq\mathcal{H}_q0 Hq\mathcal{H}_q1

6. Technical Innovations and Impact

The principal innovation is the new block basis for the polynomial space, which replaces Lagrange-type interpolation. By arranging poles at a few fixed locations (zeros of Hq\mathcal{H}_q2, Hq\mathcal{H}_q3, Hq\mathcal{H}_q4, and Hq\mathcal{H}_q5), the construction minimizes the loss in available rational points (storage places) to divisor support. This enables the use of nearly all Hq\mathcal{H}_q6 points for storage and evaluation, rather than paying a linear cost in Hq\mathcal{H}_q7 as in earlier approaches (Gao et al., 12 Jan 2026).

This efficient utilization unlocks the highest known capacity for Hermitian-curve-based XSTPIR, with performance exceeding that of all earlier rational-curve, hyperelliptic, and Hermitian constructions under the stated parameter regimes.

This suggests that further advances in XSTPIR rate may critically depend on similar innovations in basis and divisor management, rather than simply moving to curves of ever-higher genus.

7. Relationship to Other Hermitian-Curve Key Constructions

Earlier works constructed XSTPIR using nested pairs of one-point Hermitian codes:

  • The codes Hq\mathcal{H}_q8 built from divisors Hq\mathcal{H}_q9 and Fq2\mathbb{F}_{q^2}0 (with Fq2\mathbb{F}_{q^2}1), deliver a rate Fq2\mathbb{F}_{q^2}2, with Fq2\mathbb{F}_{q^2}3 and Fq2\mathbb{F}_{q^2}4 (Christensen et al., 2018).
  • The new block-basis and multi-divisor schemes allow much larger Fq2\mathbb{F}_{q^2}5 for the same Fq2\mathbb{F}_{q^2}6, and strictly higher rates except in cases of very small field size or privacy/security threshold.

In summary, by leveraging the maximality of the Hermitian curve and introducing a two-tiered block basis, Hermitian-curve-based XSTPIR schemes represent a significant advancement in the construction of high-rate, robustly private and secure PIR protocols for distributed storage systems (Ghiandoni et al., 26 Aug 2025, Gao et al., 12 Jan 2026, Christensen et al., 2018).

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Hermitian-Curve-Based XSTPIR Scheme.