{"title":"Explicit Constructions of Capacity-Achieving T-PIR Schemes Over Small Fields via Generalized Minor Matrices","authors":"Jingke Xu;Weijun Fang","doi":"10.1109/TIT.2025.3565288","DOIUrl":null,"url":null,"abstract":"Suppose a distributed storage system containing <italic>M</i> files is replicated across <italic>N</i> servers, and a user wants to privately retrieve one file by accessing the servers such that the identity of the retrieved file is kept secret from any subset of up to <italic>T</i> servers, where each file can be viewed as a vector over the <italic>q</i>-ary finite field <inline-formula> <tex-math>$\\mathbb {F}_{q}$ </tex-math></inline-formula>. A scheme designed for this purpose is called a <italic>T</i>-private information retrieval (<italic>T</i>-PIR) scheme. We consider the problem of explicitly constructing capacity-achieving <italic>T</i>-PIR schemes over small finite fields. In this paper, we first provide a general framework for constructing explicit capacity-achieving <italic>T</i>-PIR schemes for all parameters, which only relies on an MDS array matrix with a special information set. To construct such an MDS array matrix, we propose a new family of matrices over finite fields, called the generalized minor matrices of the Moore matrix, and establish a series of key identities. By combining favourable properties of generalized minor matrices with our framework, we construct an explicit capacity-achieving <italic>T</i>-PIR scheme with optimal sub-packetization over the field <inline-formula> <tex-math>$\\mathbb {F}_{q}$ </tex-math></inline-formula>, as small as possible, for three classes of parameters <inline-formula> <tex-math>$N,T,M\\geq 3$ </tex-math></inline-formula>. Specifically, the first class of construction works for all <inline-formula> <tex-math>$N=d(2t-1), T=dt$ </tex-math></inline-formula>, and the field size <italic>q</i> is the least prime power satisfying <inline-formula> <tex-math>$q^{t-1}\\geq N$ </tex-math></inline-formula>. Moreover, this construction generalizes the scheme proposed by Xu and Wang in 2022, which only considers the case of <inline-formula> <tex-math>$N=d(2t-1), T=dt$ </tex-math></inline-formula> with <inline-formula> <tex-math>$2^{t-1}\\geq N$ </tex-math></inline-formula>. For all <inline-formula> <tex-math>$N=d(2t+1), T=dt$ </tex-math></inline-formula>, our second <italic>T</i>-PIR scheme is the first explicit construction, and the field size <italic>q</i> is the least prime power satisfying <inline-formula> <tex-math>$q^{t} \\geq N$ </tex-math></inline-formula>, which is the smallest field size among all known explicit capacity-achieving <italic>T</i>-PIR schemes. Particularly, when <inline-formula> <tex-math>$2^{t}\\geq N$ </tex-math></inline-formula>, the field size of such constructions can be reduced to 2. In the case of <inline-formula> <tex-math>$N=4s$ </tex-math></inline-formula> and <inline-formula> <tex-math>$T=2s+1$ </tex-math></inline-formula>, our scheme is the first one to reduce the field size to <inline-formula> <tex-math>$q=2$ </tex-math></inline-formula>. Compared with all known explicitly capacity-achieving <italic>T</i>-PIR schemes, the required field of our schemes has the smallest size.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 7","pages":"5109-5129"},"PeriodicalIF":2.2000,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Theory","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10980207/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Suppose a distributed storage system containing M files is replicated across N servers, and a user wants to privately retrieve one file by accessing the servers such that the identity of the retrieved file is kept secret from any subset of up to T servers, where each file can be viewed as a vector over the q-ary finite field $\mathbb {F}_{q}$ . A scheme designed for this purpose is called a T-private information retrieval (T-PIR) scheme. We consider the problem of explicitly constructing capacity-achieving T-PIR schemes over small finite fields. In this paper, we first provide a general framework for constructing explicit capacity-achieving T-PIR schemes for all parameters, which only relies on an MDS array matrix with a special information set. To construct such an MDS array matrix, we propose a new family of matrices over finite fields, called the generalized minor matrices of the Moore matrix, and establish a series of key identities. By combining favourable properties of generalized minor matrices with our framework, we construct an explicit capacity-achieving T-PIR scheme with optimal sub-packetization over the field $\mathbb {F}_{q}$ , as small as possible, for three classes of parameters $N,T,M\geq 3$ . Specifically, the first class of construction works for all $N=d(2t-1), T=dt$ , and the field size q is the least prime power satisfying $q^{t-1}\geq N$ . Moreover, this construction generalizes the scheme proposed by Xu and Wang in 2022, which only considers the case of $N=d(2t-1), T=dt$ with $2^{t-1}\geq N$ . For all $N=d(2t+1), T=dt$ , our second T-PIR scheme is the first explicit construction, and the field size q is the least prime power satisfying $q^{t} \geq N$ , which is the smallest field size among all known explicit capacity-achieving T-PIR schemes. Particularly, when $2^{t}\geq N$ , the field size of such constructions can be reduced to 2. In the case of $N=4s$ and $T=2s+1$ , our scheme is the first one to reduce the field size to $q=2$ . Compared with all known explicitly capacity-achieving T-PIR schemes, the required field of our schemes has the smallest size.
期刊介绍:
The IEEE Transactions on Information Theory is a journal that publishes theoretical and experimental papers concerned with the transmission, processing, and utilization of information. The boundaries of acceptable subject matter are intentionally not sharply delimited. Rather, it is hoped that as the focus of research activity changes, a flexible policy will permit this Transactions to follow suit. Current appropriate topics are best reflected by recent Tables of Contents; they are summarized in the titles of editorial areas that appear on the inside front cover.