Secure Storage Codes Over Graphs
- The paper introduces secure storage codes that encode independent source symbols across graph-structured nodes while ensuring edge-wise decodability and data security.
- It leverages graph-theoretic models to define characteristic and non-degenerate subgraphs, which are key to assessing optimal rate and capacity under various edge conditions.
- The study employs algebraic and probabilistic constructions, including random linear mappings, to achieve extremal capacities and robust node-erasure correction in distributed storage.
Secure storage codes over graphs constitute a class of coding schemes designed to reliably and confidentially encode multiple independent source symbols into storage nodes structured as a graph, subject to stringent edge-wise correctness and data security constraints. The extremal rate and key efficiency of such codes depend critically on the graphical structure and the specific access pattern enforced on the edges. This article provides a comprehensive treatment of the core problem, optimal rate characterizations, graph-theoretic foundations, code constructions, examples, and their relevance to distributed storage and secure computation.
1. Problem Formulation and Security Constraints
Let be an undirected graph with storage nodes. The encoder maps independent source symbols (each of bits) to coded symbols (each of bits) stored at the nodes. Each edge is labeled by a subset , either of cardinality (qualified) or zero (unqualified).
A secure storage code must satisfy:
- Decodability: For every qualified edge with , , the indexed source symbols must be recoverable from :
- Security: The remaining source symbols must remain statistically independent, conditioned on the recovered subset:
- Edge-unqualified privacy: For edges with , reveals no information about any source symbol.
The performance metric is the symbol rate ; the supremum over achievable rates is the secure storage capacity (Li et al., 2022, Li, 12 Jan 2026).
2. Graph-Theoretic Modeling and Characteristic Subgraphs
For each source symbol index , define the characteristic graph with an edge qualified iff . Nodes possess a common-source set .
Degenerate nodes: Any node where all incident edges are labeled by the same set .
Non-degenerate subgraph : The induced subgraph after removing degenerate nodes. Edge-labeled graphs are characterized by the interplay between qualified edges, unqualified components, and the node-wise intersection of source sets.
3. Extremal Capacity Theorems for Secure Storage over Graphs
Single-Symbol Edge Case
Theorem (Capacity ):
if and only if, in every qualified component of , for every , the characteristic subgraph contains no internal qualified edge, i.e., every qualified edge bridges two distinct unqualified components (Li et al., 2022, Li, 12 Jan 2026).
General Multi-Symbol Case
Under the "mild condition" (no non-degenerate node has a common source):
the capacity iff each has no internal qualified edge.
$2/D$ Capacity
Without the mild condition, precisely for graphs where (i) every non-degenerate node has and (ii) for all qualified edges , .
Source Key Rate
A variant introduces a shared source key of entropy , with source key rate . The source key capacity has been fully characterized for several fundamental cases (Li, 12 Jan 2026).
4. Algebraic and Probabilistic Constructions
Achievability at extremal rates uses explicit random linear mappings:
- Single-symbol edges :
- For each , assign to each unqualified component a distinct coefficient , and global noise :
- Aggregate over :
- Ensures decodability via unique coefficients and security by noise alignment.
General :
- Replace scalar coefficients by -vectors and random -dimensional noise vector .
- Qualified edge recovery exploits matrix invertibility over large field .
- $2/D$ case:
- Each , for random matrices.
- Determinant non-vanishing guarantees full recovery.
- Zero-key storage:
- Codes dispense with shared randomness if for every qualified edge; then each coded symbol is a deterministic function of the local common sources.
5. Decoding Mechanisms and Node-Erasures
For edge-coded storage, node failures erase all associated incident edges. Coding-theoretic approaches employ linear constraints (neighborhood parities, diagonal sums, etc.) for node-erasure correction:
| Code Type | Redundancy | Field Size Condition |
|---|---|---|
| MDS (general ) | ||
| Binary, double-node () | $2n-1$ | prime; |
| Binary, triple-node () | $3n-2$ | prime, $2$ primitive mod ; |
Decoding leverages syndrome polynomials constructed from unaffected neighborhoods, enabling efficient recovery in time for (Yohananov et al., 2018, Yohananov et al., 2017).
6. Applications and Examples
Secure storage codes over graphs underpin reliability and confidentiality in various distributed systems, including distributed storage, neural networks, and associative memories. Key scenarios:
- Tree graphs: Achieve for single-symbol edges.
- Cycles and complete graphs: Internal qualified edges reduce capacity below $1$.
- Bipartite and layered graphs: Admit zero-key storage under union condition.
- Regenerating codes on graphs: Repair bandwidth and integrity depend on graphical distance, helper selection, and adversarial node count; stacked MSR codes and Gabidulin concatenation achieve optimal functional and adversarial repair bounds (Patra et al., 2024, Koyluoglu et al., 2012).
7. Connections to Secure Computation and Secret Sharing
Secure storage codes over graphs are tightly linked to conditional disclosure of secrets and secret-sharing schemes with access structures defined by graph topology. Proofs and constructions exploit entropy bounds, combinatorial alignment, and matrix invertibility. The balance between global randomness (key size) and optimal rate has foundational implications for randomized complexity and the design of secure multiparty protocols.
References and Further Reading
- Z. Li, H. Sun: "On Extremal Rates of Secure Storage over Graphs" (Li et al., 2022).
- Z. Li, H. Sun: "On the Extremal Source Key Rates for Secure Storage over Graphs" (Li, 12 Jan 2026).
- D. S. Papailiopoulos et al.: "Secure Cooperative Regenerating Codes for Distributed Storage Systems" (Koyluoglu et al., 2012).
- V. Skachek: "Double and Triple Node-Erasure-Correcting Codes over Graphs" (Yohananov et al., 2018).
- V. Skachek: "Codes for Graph Erasures" (Yohananov et al., 2017).
- I. Duursma, X. Li: "Johnson Graph Codes" (Duursma et al., 2019).
- Y. Hu, A. Barg: "Generalized regenerating codes and node repair on graphs" (Patra et al., 2024).