Hermitian-Curve XSTPIR Scheme
- The paper introduces a Hermitian-curve-based XSTPIR scheme that leverages maximal rational points and a novel two-tier block basis to achieve superior PIR rates.
- Advanced algebraic geometry codes are constructed via refined divisor structures on the Hermitian curve to ensure both X-security and T-privacy in distributed setups.
- Methodological innovations such as interference alignment and optimized pole placement guarantee correct file recovery and enhanced capacity over previous curve-based constructions.
A Hermitian-curve-based XSTPIR scheme is a protocol for -secure, -private information retrieval (XSTPIR) using algebraic geometry codes constructed from the Hermitian curve over . These schemes leverage the maximality and large supply of rational points of the Hermitian curve to attain higher PIR rates for fixed parameters than previous constructions using rational, elliptic, or hyperelliptic curves. The protocols operate in a distributed storage setting with servers, each storing codeword symbols corresponding to evaluations of carefully chosen Riemann–Roch space functions, with parameters tailored to guarantee both -security (data remains secret against colluding servers) and -privacy (the file index remains private against colluding servers) (Ghiandoni et al., 26 Aug 2025, Gao et al., 12 Jan 2026, Christensen et al., 2018).
1. Hermitian Curve and Rational Points
The Hermitian curve over the field is defined by the affine equation: It is a smooth, projective, 0-maximal curve, with genus
1
and exactly 2 rational points (including the unique point at infinity 3). Maximality indicates that 4 attains the Hasse-Weil upper bound on the number of rational points for its genus (Ghiandoni et al., 26 Aug 2025, Gao et al., 12 Jan 2026).
The abundance of rational points is critical: it enables construction of long AG codes and, thus, large numbers of servers or stored symbols without diminishing minimum distance or security parameters.
2. Construction of Hermitian AG Codes and Subspace Design
The protocol utilizes AG codes associated with divisors on 5, and exploits advanced bases for multiplier spaces:
- Evaluation Set: The scheme selects a subset of the 6 rational points (excluding a small number used in the support of noise and pole divisors).
- Divisor Structure: The "full" global divisor 7 is constructed as a sum of the zeros of 8 chosen irreducible quadratics 9, a multiple of 0, plus small contributions from 1 and 2.
- Data-Multiplier Basis: The core innovation is a two-level basis for the data-multiplier space:
- Functions are constructed as 3, where the block basis 4 aggregates monomials supported on the irreducible 5's.
- All 6 such basis elements 7 are then multiplied by a global factor 8, yielding basis elements whose zeros and poles are efficiently concentrated, minimizing overlap with storage evaluation points (Gao et al., 12 Jan 2026).
Subspaces for each file coordinate 9 are defined as: 0 with the information space 1 and noise space composed of all relevant combinations of 2, 3, 4 (Ghiandoni et al., 26 Aug 2025, Gao et al., 12 Jan 2026).
3. PIR Protocol Instantiation and Interference Alignment
The retrieval protocol encodes files across servers as evaluations of functions from the information space, while queries are generated with superpositions of random elements from 5 (to achieve 6-security and 7-privacy) and a designated 8 for the requested file index: 9 Each server, holding evaluations at a point 0, responds with 1. The user collects all 2 and projects onto the information space, extracting 3 and thus recovering the desired file symbol.
The disjointness property 4 is enforced by the degree and location of divisors, ensuring precise cross-subspace alignment: all "noise" aligns in a subspace orthogonal to the useful signal (Ghiandoni et al., 26 Aug 2025).
4. Privacy, Security, and Correctness Guarantees
Security is formalized as follows:
- 5-security: Any coalition of up to 6 servers, observing their response and storage symbols, sees at most 7 linear combinations in 8. The dual code distances guarantee this reveals no information about file contents.
- 9-privacy: Any coalition of up to 0 servers observes only evaluations of the query in 1; the dual code again protects the file index privacy.
- Correctness: The separation between 2 and 3 ensures the user can recover the requested symbol uniquely (Ghiandoni et al., 26 Aug 2025).
When instantiated as an XSTPIR scheme, the Hermitian-curve construction realizes both privacy and security thresholds as dictated by Riemann–Roch space dimensions and minimum distances (Gao et al., 12 Jan 2026, Christensen et al., 2018).
5. Retrieval Rate and Parameter Optimization
The PIR rate is given by
4
where 5. Maximizing 6 (while adhering to divisors and support overlap constraints) yields the maximum rate: 7 The existence condition is
8
This rate strictly exceeds prior Hermitian-curve and hyperelliptic schemes for 9 and 0, and can be quantitatively larger (the improvement can exceed 0.14 in absolute rate for large 1 and suitable 2) (Gao et al., 12 Jan 2026).
Comparison Table: Maximal PIR Rate Formulas
| Curve family | Maximal rate | Existence condition |
|---|---|---|
| Rational curve | 3 | 4 |
| Hyperelliptic (genus 5) | 6 | 7 |
| Old Hermitian-curve | 8 | 9 |
| New Hermitian-curve | 0 | 1 |
6. Technical Innovations and Impact
The principal innovation is the new block basis for the polynomial space, which replaces Lagrange-type interpolation. By arranging poles at a few fixed locations (zeros of 2, 3, 4, and 5), the construction minimizes the loss in available rational points (storage places) to divisor support. This enables the use of nearly all 6 points for storage and evaluation, rather than paying a linear cost in 7 as in earlier approaches (Gao et al., 12 Jan 2026).
This efficient utilization unlocks the highest known capacity for Hermitian-curve-based XSTPIR, with performance exceeding that of all earlier rational-curve, hyperelliptic, and Hermitian constructions under the stated parameter regimes.
This suggests that further advances in XSTPIR rate may critically depend on similar innovations in basis and divisor management, rather than simply moving to curves of ever-higher genus.
7. Relationship to Other Hermitian-Curve Key Constructions
Earlier works constructed XSTPIR using nested pairs of one-point Hermitian codes:
- The codes 8 built from divisors 9 and 0 (with 1), deliver a rate 2, with 3 and 4 (Christensen et al., 2018).
- The new block-basis and multi-divisor schemes allow much larger 5 for the same 6, and strictly higher rates except in cases of very small field size or privacy/security threshold.
In summary, by leveraging the maximality of the Hermitian curve and introducing a two-tiered block basis, Hermitian-curve-based XSTPIR schemes represent a significant advancement in the construction of high-rate, robustly private and secure PIR protocols for distributed storage systems (Ghiandoni et al., 26 Aug 2025, Gao et al., 12 Jan 2026, Christensen et al., 2018).