Exercises

ex-ch13-01

Easy

State the classical PIR threat model and give the privacy guarantee in mutual-information terms.

ex-ch13-02

Easy

Compute the Sun-Jafar PIR capacity for the following (N,K)(N, K) pairs: (2,3)(2, 3), (5,5)(5, 5), (10,10)(10, 10).

ex-ch13-03

Easy

Why does the trivial "download everything" PIR achieve rate 1/K1/K? What's the privacy guarantee?

ex-ch13-04

Easy

Why must classical PIR have Nβ‰₯2N \geq 2 databases? What goes wrong with N=1N = 1?

ex-ch13-05

Medium

Sketch the Sun-Jafar PIR scheme for N=2N = 2, K=2K = 2, file length L=4L = 4 chunks each. Specify the queries, answers, and rate.

ex-ch13-06

Medium

Show that the Sun-Jafar capacity formula can be rewritten as CPIR=(1βˆ’1/N)/(1βˆ’1/NK)C_{\text{PIR}} = (1 - 1/N)/(1 - 1/N^K). Verify for N=3,K=4N = 3, K = 4.

ex-ch13-07

Medium

Derive the asymptotic limits of CPIR(N,K)C_{\text{PIR}}(N, K) as (a) Nβ†’βˆžN \to \infty with fixed KK, and (b) Kβ†’βˆžK \to \infty with fixed NN.

ex-ch13-08

Medium

Show that no PIR scheme can achieve rate R>1R > 1 β€” even ignoring privacy. What does this mean operationally?

ex-ch13-09

Medium

Explain why classical PIR cannot use a single database with information-theoretic privacy.

ex-ch13-10

Medium

Compare PIR (this chapter) with secure aggregation (Chapter 10) in terms of what is hidden and who the adversary is.

ex-ch13-11

Hard

Sketch the Sun-Jafar capacity converse: prove R≀(1+1/N+β‹―+1/NKβˆ’1)βˆ’1R \leq (1 + 1/N + \cdots + 1/N^{K-1})^{-1} for any classical PIR scheme.

ex-ch13-12

Hard

Why does the Sun-Jafar scheme require file length L=NKL = N^K? Why not smaller?

ex-ch13-13

Hard

Compose Sun-Jafar PIR with TT-colluding extension (Chapter 14 Β§14.2). Derive the capacity formula informally and identify when the protocol becomes infeasible.

ex-ch13-14

Hard

Discuss why PIR's privacy guarantee is non-adaptive: the user's queries are designed before observing answers. Could an adaptive variant improve the rate?

ex-ch13-15

Challenge

Open problem. The Sun-Jafar PIR scheme uses file length L=NKL = N^K. Can capacity-achieving PIR be constructed for smaller block lengths? Sketch what tradeoffs arise.