Prerequisites & Notation
Before You Begin
Chapter 13 opens Part IV with classical PIR — the Sun-Jafar capacity result. The chapter sits at the intersection of network information theory and applied cryptography. Prerequisites are Chapter 3's secret sharing and Chapter 4's finite-field interference alignment, plus basic information-theoretic fluency from Book ITA.
- Finite-field IA (Chapter 4 §4.1, §4.4)(Review ch04)
Self-check: Why does finite-field IA achieve DoF in the -user interference channel?
- Shamir secret sharing (Chapter 3 §3.2)(Review ch03)
Self-check: State the privacy guarantee of an -Shamir scheme in mutual-information terms.
- Cut-set bounds (Chapter 2 §2.1)(Review ch02)
Self-check: Recall the four-step cut-set converse recipe.
- Basic geometric series
Self-check: Sum: .
Notation for This Chapter
PIR uses different conventions from coded computing: now denotes the number of databases (not workers), and denotes the number of files (not the recovery threshold). Where collision with earlier chapters' usage occurs, we flag it explicitly.
| Symbol | Meaning | Introduced |
|---|---|---|
| Number of databases (each storing all files) | s01 | |
| Number of files in the library (collision: = recovery threshold in Ch. 5) | s01 | |
| File length (in bits or symbols of ) | s01 | |
| The -th file, | s01 | |
| The user's desired file index, , uniformly random | s01 | |
| Query sent by the user to database for desired index | s01 | |
| Answer returned by database in response to | s01 | |
| Total download size (sum of all 's lengths) | s02 | |
| PIR rate (useful bits per downloaded bit) | s02 | |
| PIR capacity (supremum of achievable ) | s02 |