Prerequisites & Notation

Before You Begin

Chapter 13 opens Part IV with classical PIR — the Sun-Jafar capacity result. The chapter sits at the intersection of network information theory and applied cryptography. Prerequisites are Chapter 3's secret sharing and Chapter 4's finite-field interference alignment, plus basic information-theoretic fluency from Book ITA.

  • Finite-field IA (Chapter 4 §4.1, §4.4)(Review ch04)

    Self-check: Why does finite-field IA achieve K/2K/2 DoF in the KK-user interference channel?

  • Shamir secret sharing (Chapter 3 §3.2)(Review ch03)

    Self-check: State the privacy guarantee of an (t,n)(t, n)-Shamir scheme in mutual-information terms.

  • Mutual information / data processing inequality(Review ch01)

    Self-check: Restate I(X;Y)I(X;Z)I(X; Y) \leq I(X; Z) for ZZ a function of YY.

  • Cut-set bounds (Chapter 2 §2.1)(Review ch02)

    Self-check: Recall the four-step cut-set converse recipe.

  • Basic geometric series

    Self-check: Sum: i=0K1xi=(1xK)/(1x)\sum_{i = 0}^{K-1} x^i = (1 - x^K)/(1 - x).

Notation for This Chapter

PIR uses different conventions from coded computing: NN now denotes the number of databases (not workers), and KK denotes the number of files (not the recovery threshold). Where collision with earlier chapters' usage occurs, we flag it explicitly.

SymbolMeaningIntroduced
NNNumber of databases (each storing all KK files)s01
KKNumber of files in the library (collision: KK = recovery threshold in Ch. 5)s01
LLFile length (in bits or symbols of Fq\mathbb{F}_q)s01
WkW_kThe kk-th file, k=1,,Kk = 1, \ldots, Ks01
θ\thetaThe user's desired file index, θ[K]\theta \in [K], uniformly randoms01
Q(θ,n)Q^{(\theta, n)}Query sent by the user to database nn for desired index θ\thetas01
A(θ,n)A^{(\theta, n)}Answer returned by database nn in response to Q(θ,n)Q^{(\theta, n)}s01
DDTotal download size (sum of all AA's lengths)s02
R=L/DR = L / DPIR rate (useful bits per downloaded bit)s02
CPIRC_{\text{PIR}}PIR capacity (supremum of achievable RR)s02