Extensions: A Preview of Chapters 14–15

Beyond Classical PIR

Sections 13.1–13.3 established classical PIR: NN replicated databases, non-colluding, honest-but-curious. The Sun-Jafar capacity closes this case. Real systems often deviate from the classical assumptions:

  • Coded storage: databases store MDS-coded versions of the files, not full replicas. This reduces total storage cost from Kβ‹…NK \cdot N file-equivalents to Kβ‹…N/rK \cdot N / r for an (N,r)(N, r)-MDS code. Capacity formula changes.

  • Colluding databases: any TT databases may pool their queries. Privacy must hold against this stronger adversary. Capacity decreases as TT grows.

  • Symmetric PIR (SPIR): the user must learn only WΞΈW_\theta β€” not the other files. Two-sided privacy.

  • Cache-aided PIR: the user has cached some files locally. Cached content can be exploited to reduce the download. CommIT contribution in Chapter 15.

Section 13.4 previews each of these extensions. Chapters 14 and 15 develop them in detail. The point is that PIR is a rich problem family β€” the classical Sun-Jafar result is the starting point, not the endpoint.

Definition:

PIR with Coded Storage (Preview)

In PIR with coded storage, the KK files are not replicated across NN databases β€” instead, they are stored using an (N,r)(N, r) MDS code: each database stores one 1/r1/r-share of every file, such that any rr databases collectively store the full library.

  • Storage cost: Kβ‹…(N/r)K \cdot (N/r) file-units across all databases (vs. Kβ‹…NK \cdot N for replication). Reduction factor: rr.
  • PIR rate: CPIR-MDS(N,K,r)=C_{\text{PIR-MDS}}(N, K, r) = modified geometric formula (Chapter 14 Theorem 14.2.1).
  • Trade-off: lower storage cost but typically lower PIR rate. The exact rate depends on rr.

Coded-storage PIR is the canonical extension when storage cost is a concern. Real cloud deployments routinely use Reed-Solomon coded storage anyway (for redundancy); making the PIR scheme compatible with coded storage is a natural fit.

Coded-Storage PIR

PIR variant where the files are stored across databases via an (N,r)(N, r)-MDS code (each database holds one share of every file). Reduces aggregate storage by factor rr over replication; PIR rate is reduced accordingly.

Definition:

TT-Colluding PIR (Preview)

In TT-colluding PIR, the privacy guarantee is strengthened: any subset of TT databases may pool their queries, and the privacy must hold against this combined adversary. Specifically: I ⁣(ΞΈ; {Q(ΞΈ,n)}n∈T)β€…β€Š=β€…β€Š0I\!\left(\theta;\, \{Q^{(\theta, n)}\}_{n \in \mathcal{T}}\right) \;=\; 0 for every TβŠ†[N]\mathcal{T} \subseteq [N] with ∣Tβˆ£β‰€T|\mathcal{T}| \leq T.

The PIR capacity becomes CPIR(N,K,T)β€…β€Š=β€…β€Š(1+TN+T2N2+β‹―+TKβˆ’1NKβˆ’1)βˆ’1C_{\text{PIR}}(N, K, T) \;=\; \left(1 + \frac{T}{N} + \frac{T^2}{N^2} + \cdots + \frac{T^{K-1}}{N^{K-1}}\right)^{-1} (Sun-Jafar 2018). Setting T=1T = 1 recovers the classical case; setting T=Nβˆ’1T = N - 1 collapses to the trivial rate 1/K1/K (no privacy at all).

Operationally: each unit of additional collusion tolerance costs a multiplicative reduction in the capacity. The exact reduction depends on the geometric-series structure of the formula.

TT-Colluding PIR

PIR variant where any TT databases may collude to learn the user's desired index. Privacy must hold against this stronger adversary. Capacity reduces from Sun-Jafar's formula by a factor depending on T/NT/N.

Definition:

Symmetric PIR (SPIR) (Preview)

In symmetric PIR (SPIR), two privacy requirements hold:

  1. User privacy (as in classical PIR): databases learn nothing about ΞΈ\theta.

  2. Database privacy: the user learns only WθW_\theta, not the other files. The user's knowledge after the protocol is exactly WθW_\theta, and nothing about WjW_j for j≠θj \neq \theta.

SPIR is strictly stronger than classical PIR (which allows the user to learn arbitrary derived information about other files). The extra requirement reduces the capacity: CSPIR(N,K)=1βˆ’1/NC_{\text{SPIR}}(N, K) = 1 - 1/N for all KK (Wang, Banawan, Ulukus 2018) β€” a stronger bound that does not depend on KK.

Operationally: SPIR is for settings where both sides need privacy β€” e.g., genomic research where both the researcher's query and the database's other records must be protected.

Symmetric PIR (SPIR)

PIR variant where both sides have privacy: the databases learn nothing about ΞΈ\theta, and the user learns nothing about other files beyond WΞΈW_\theta. Capacity is 1βˆ’1/N1 - 1/N β€” strictly less than classical PIR.

Definition:

Cache-Aided PIR (Preview)

In cache-aided PIR, the user has a local cache containing partial information about the library β€” typically prefetched during a placement phase before the user knows their desired ΞΈ\theta. The PIR protocol exploits the cached content to reduce the download requested from the databases.

Two flavors:

  1. Cached files known to databases: the cache content is publicly known (e.g., a CDN delivered cached files in a prefetch round). The PIR protocol can exploit the cache to reduce the active download.

  2. Cached files unknown to databases: the user's cache content is private β€” the databases don't know which files are cached. This adds an additional layer of complexity.

Cache-aided PIR is the topic of Chapter 15. The CommIT group's contribution (Wan/Tuninetti/Caire 2021, double-booked in Chapter 7) extends to demand-privacy in cached settings β€” connecting PIR to the coded-caching framework of Book CC.

,

Cache-Aided PIR

PIR variant where the user has a local cache of partial library content. The cache reduces the required download from databases. CommIT- relevant variants (Wan/Tuninetti/Caire 2021) handle demand-privacy in cached settings.

PIR Variants and Their Capacities

PIR VariantStoragePrivacyCapacity / formulaChapter
Classical (Sun-Jafar)Replicated, Kβ‹…NK \cdot NNon-colluding(1+1/N+β‹―+1/NKβˆ’1)βˆ’1(1 + 1/N + \cdots + 1/N^{K-1})^{-1}13
Coded-storage PIRMDS-coded, Kβ‹…N/rK \cdot N / rNon-colludingModified formula14 Β§1
TT-Colluding PIRReplicatedTT-colluding(1+T/N+β‹―+TKβˆ’1/NKβˆ’1)βˆ’1(1 + T/N + \cdots + T^{K-1}/N^{K-1})^{-1}14 Β§2
Symmetric PIRReplicatedTwo-sided1βˆ’1/N1 - 1/N14 Β§3
Cache-aided PIRReplicated + user cacheVariableOO-tilde improvements15
Cache-aided + demand-private (CommIT)Replicated + cacheUser cache hidden from DBsOpen characterization15

PIR Capacity Across Variants

Plot the PIR capacity for the four major variants (Classical, Coded-storage, TT-Colluding, Symmetric) as a function of NN for fixed KK. Each variant trades off storage, privacy, and rate differently. The classical Sun-Jafar capacity is the highest (most permissive assumptions); SPIR is the lowest (strongest privacy). The plot illustrates the privacy-rate Pareto frontier.

Parameters
5
12
2

Example: PIR Capacities at N=5,K=4N = 5, K = 4

Compute the capacity for each PIR variant at N=5N = 5 databases, K=4K = 4 files. Compare with the classical Sun-Jafar baseline.

,

Cross-Cutting Themes Across PIR Extensions

Three themes recur across the PIR extensions:

  • Storage vs. rate trade-off: any reduction in aggregate storage (coded-storage PIR) costs a corresponding reduction in PIR rate.

  • Privacy vs. rate trade-off: stronger privacy (TT-colluding, SPIR, demand- private cache) costs rate. The exact cost is quantified by the variant-specific capacity formula.

  • Side information improves rate: when the user has cached content (Chapter 15), the PIR rate can exceed the classical Sun-Jafar rate β€” extra information at the user is always beneficial.

Each chapter of Part IV explores one of these themes in depth. The information-theoretic framework remains constant: cut-set converse + finite-field IA achievability. The variants differ in which constraints are tight.

Common Mistake: PIR Variants Don't Compose Trivially

Mistake:

Compose two PIR extensions (e.g., coded-storage + TT-colluding) by simply applying both constraints, expecting the capacity to be the product of the two individual capacities.

Correction:

PIR variants combine non-trivially. For example, coded-storage + TT-colluding PIR has a capacity formula that is not simply the product of the two individual capacities β€” it requires its own analysis (Tajeddine, El Rouayheb 2018; Sun, Jafar 2018b). Generally, the joint capacity is lower than what either individual extension would predict β€” additional constraints further restrict the achievable rate region. Always verify the joint capacity is characterized in the literature before deploying compound PIR variants.

⚠️Engineering Note

Choosing a PIR Variant for Production

Production guidance for PIR variant selection:

  • Multi-cloud PIR (typical): classical Sun-Jafar with Nβ‰₯3N \geq 3 non-colluding providers. Highest rate; standard threat model.

  • Untrusted-collaboration PIR (cross-org): TT-colluding with T=1T = 1 or 22 to handle a small number of malicious participants colluding with the server.

  • Two-sided privacy (medical, financial): Symmetric PIR. Lower rate (1βˆ’1/N1 - 1/N) but both database and user are protected.

  • Storage-constrained (large libraries): Coded-storage PIR with rr chosen to balance storage cost vs. PIR rate.

  • Cache-augmented (wireless edge): cache- aided PIR (Chapter 15). Extra information at the user reduces required download.

Production deployments often combine variants: coded-storage + TT-colluding for cross-cloud queries with mild collusion tolerance.

Practical Constraints
  • β€’

    Multi-cloud: Nβ‰₯3N \geq 3, classical Sun-Jafar

  • β€’

    Cross-org: TT-colluding for collusion tolerance

  • β€’

    Medical/financial: SPIR for two-sided privacy

  • β€’

    Storage-constrained: coded-storage trade-off

πŸ“‹ Ref: Beimel survey 2007; Microsoft SealPIR variants

Key Takeaway

Classical Sun-Jafar PIR is the starting point; Chapters 14–15 explore extensions. Each extension trades the classical assumptions for a different operational constraint β€” coded storage, colluding databases, two-sided privacy, side information β€” and quantifies the capacity reduction. The CommIT-relevant contribution in Chapter 15 connects cache-aided PIR to the coded-caching framework of Book CC.

Why This Matters: Looking Ahead: Wireless Variants and AirComp

Part IV (PIR) emphasizes coded / cached structure for privacy-preserving retrieval. Part V (Chapters 16–18) shifts to the wireless setting: AirComp (Chapter 16), wireless FL (Chapter 17), and open problems (Chapter 18). The AirComp framework can be applied to PIR over wireless channels β€” with specific implications for the retrieval rate. Chapter 17 carries the fifth and final CommIT-group contribution: information-theoretically secure federated representation learning over wireless channels.

Quick Check

For a setting with strong privacy requirements where both the user and the databases need protection, the right PIR variant is:

Classical Sun-Jafar (highest rate, single-sided privacy).

Symmetric PIR (SPIR) β€” both the user and the databases have privacy guarantees.

TT-colluding PIR β€” handles malicious databases.

Coded-storage PIR β€” saves storage.