Heterogeneous Side-Information Cardinalities in DPIC
- Heterogeneous side-information cardinalities are defined by varying client side-information sizes, leading to unique recursion-based DPIC methods and precise target-size security.
- The protocol uses a linearly progressive set model with fixed overlaps, ensuring each client decodes exactly the required number of new messages without overshoot.
- Distinct XOR-based coding strategies and increased communication overhead differentiate this approach from homogeneous DPIC, opening avenues for advanced secure coding research.
Heterogeneous side-information cardinalities arise in decentralized pliable index coding (DPIC) when clients hold side-information subsets whose sizes are not uniform across the network. This regime contrasts with the extensively studied homogeneous case and better models many real network conditions, such as time-varying data acquisition and non-uniform knowledge distributions among clients. The technical challenges and capacities induced by heterogeneity—both in side-information sizes and in demands—result in fundamentally different coding strategies and communication costs, especially when combined with stringent security objectives.
1. Formal Problem Formulation: Heterogeneous Cardinalities
In the secure decentralized pliable index coding framework with heterogeneous side-information, there is a library of distinct messages shared among clients . The th client holds a side-information set of cardinality . Under the linearly progressive sets with fixed overlap (LPS–FO) model, each consists of consecutive messages, and adjacent clients have a fixed overlap of messages (the last of coincide with the first of ).
Clients operate under a pliable demand regime: a client is satisfied not by a predetermined message but by decoding any messages previously unknown, provided the final cardinality of its knowledge meets a prescribed target . The common target is set to the maximum initial side-information size plus one,
so every client ends with messages. The decoding requirement is strict: client must decode exactly new messages—no more, no fewer. This formalizes both functional justification (network efficiency) and an individual security objective.
2. Security Constraint and Target-Size Guarantee
Security in this heterogeneous DPIC context mandates that no client acquires more than the target messages; equivalently, no client may decode more than its assigned new messages. This so-called “target-size” individual security constraint is enforced throughout the protocol so that by the conclusion of the protocol, each client has precisely messages and cannot infer any additional information beyond those messages. Unlike classical information-theoretic secrecy (which might aim to obscure knowledge from external or colluding adversaries), the constraint here is per-client and deterministic.
This security criterion critically interacts with the heterogeneity. For instance, a client with a smaller initial side-information set must acquire more new messages, whereas those whose initial side-information is larger need fewer. The protocol must ensure that no client learns even a single extra message beyond these prescribed increments, across all recursion levels.
3. Decentralized Transmission Scheme for Heterogeneous Side-Information
In the absence of a central server, clients collaboratively broadcast coded packets using a recursive algorithm. At each recursion level , a block of active clients attempts to augment their side-information to achieve ; the number of clients served in the current round, , is selected as the unique integer satisfying
The first clients (in a canonical ordering) are served with XOR-coded transmissions (possibly three-wise XORs in special sub-cases); the remaining clients neither contribute nor gain additional information in this round. The procedure recurses, renumbering the non-served clients for the subsequent level.
Each coded transmission is an XOR of two or (occasionally) three messages, strategically chosen from overlapping and unique portions of client side-information sets. For example, a packet may be of the form
where (first in leading overlap), (first in trailing overlap), and (the -th unique message for ) are message indices determined by the LPS–FO structure.
Only targeted clients—those with the exact required overlap—can resolve these XORs to recover a new message. The partitioning and coding design at every recursion level guarantee that security is maintained, strictly preventing non-targeted clients from leveraging any transmission for additional knowledge.
4. Communication Cost: Bounds, Recursion, and Overhead
The communication cost for this secure DPIC with heterogeneously sized side-information is fundamentally higher than the homogeneous scenario, driven by both the recursive protocol and the need to enforce exact per-client targets. Specifically, if denotes the number of transmissions for clients, then
with seeds . The lower bound (even absent the security constraint) is transmissions, with this minimum realized only for . In general, the recursive overhead quantifies the penalty paid for maintaining strict "no-more-than-" security.
When the overlap and initial side-information cardinalities match LPS–FO model assumptions and security is not enforced, a single round suffices. Under the exact target-size constraint, however, the communication cost unrolls as the sum of steps needed to serve successive smaller blocks of clients. The protocol achieves an explicit closed-form expression via recursion in terms of and the triangular-number structure determined by .
5. Comparison to Homogeneous Decentralized Pliable Index Coding
In the homogeneous DPIC model—where every client holds side-information sets of identical cardinality and seeks only a single new message—coding strategies are considerably simpler. One round of XOR-coded packets, each satisfying one client, achieves optimality both in the presence and absence of (individual) security constraints. The additive communication overhead in the heterogeneous regime has no analog in the homogeneous case; here, flexibility (supporting variable demands matching heterogeneity) and “no-overshoot” privacy strictly increase communication complexity.
This gap emphasizes that decentralized systems with significant heterogeneity cannot inherit optimal homogeneous DPIC coding directly. Instead, new code constructions must explicitly track which clients have been served and ensure no overshoot—fundamentally changing the protocol’s design philosophy and efficiency.
6. Model Assumptions, Limitations, and Prospects for Extension
The presented protocol (Padmanabhan et al., 3 Feb 2026) and its analysis presume:
- An LPS–FO side-information structure: side-information sizes increase linearly, and each pair of consecutive clients has a fixed overlap .
- to ensure each client has sufficient unique messages for the prescribed XOR coding steps.
- when entering special subcases of the recursion.
Optimality is achieved only for ; for larger , the protocol is non-optimal but remains provably correct and secure. Security is per-client (“individual”) but does not provide information-theoretic secrecy against external or colluding adversaries.
Potential extensions include tightening the excess communication gap , designing for alternative side-information overlap patterns (e.g., arbitrary graphs, probabilistic or random set structures), and introducing block or strong security (protecting against colluding subsets or eavesdroppers). Applicability in federated learning—where heterogeneity is induced by network topology or geographical distribution rather than strict LPS–FO structure—suggests practical relevance and the need for further generalization.
7. Relation to Broader Secure DPIC Literature
In classical secure decentralized pliable index coding with homogeneous side-information (notably, circular shift models (Liu et al., 2020, Liu et al., 2020)), various results establish cases of infeasibility, tight lower and upper bounds under linear coding, and performance multiplicative gaps between centralized and decentralized models (up to a factor of three for secure regimes). However, the introduction of heterogeneous cardinalities—especially with incremental side-information sizes and strict per-client security—necessitates recursive, level-wise allocation and coding decisions not present in the homogeneous setting.
The unique challenges of heterogeneity motivate new research directions in both code design and analytical characterization for secure DPIC, especially as real distributed systems increasingly diverge from homogeneous idealizations.