Extensions: A Preview of Chapters 14β15
Beyond Classical PIR
Sections 13.1β13.3 established classical PIR: replicated databases, non-colluding, honest-but-curious. The Sun-Jafar capacity closes this case. Real systems often deviate from the classical assumptions:
-
Coded storage: databases store MDS-coded versions of the files, not full replicas. This reduces total storage cost from file-equivalents to for an -MDS code. Capacity formula changes.
-
Colluding databases: any databases may pool their queries. Privacy must hold against this stronger adversary. Capacity decreases as grows.
-
Symmetric PIR (SPIR): the user must learn only β not the other files. Two-sided privacy.
-
Cache-aided PIR: the user has cached some files locally. Cached content can be exploited to reduce the download. CommIT contribution in Chapter 15.
Section 13.4 previews each of these extensions. Chapters 14 and 15 develop them in detail. The point is that PIR is a rich problem family β the classical Sun-Jafar result is the starting point, not the endpoint.
Definition: PIR with Coded Storage (Preview)
PIR with Coded Storage (Preview)
In PIR with coded storage, the files are not replicated across databases β instead, they are stored using an MDS code: each database stores one -share of every file, such that any databases collectively store the full library.
- Storage cost: file-units across all databases (vs. for replication). Reduction factor: .
- PIR rate: modified geometric formula (Chapter 14 Theorem 14.2.1).
- Trade-off: lower storage cost but typically lower PIR rate. The exact rate depends on .
Coded-storage PIR is the canonical extension when storage cost is a concern. Real cloud deployments routinely use Reed-Solomon coded storage anyway (for redundancy); making the PIR scheme compatible with coded storage is a natural fit.
Coded-Storage PIR
PIR variant where the files are stored across databases via an -MDS code (each database holds one share of every file). Reduces aggregate storage by factor over replication; PIR rate is reduced accordingly.
Definition: -Colluding PIR (Preview)
-Colluding PIR (Preview)
In -colluding PIR, the privacy guarantee is strengthened: any subset of databases may pool their queries, and the privacy must hold against this combined adversary. Specifically: for every with .
The PIR capacity becomes (Sun-Jafar 2018). Setting recovers the classical case; setting collapses to the trivial rate (no privacy at all).
Operationally: each unit of additional collusion tolerance costs a multiplicative reduction in the capacity. The exact reduction depends on the geometric-series structure of the formula.
-Colluding PIR
PIR variant where any databases may collude to learn the user's desired index. Privacy must hold against this stronger adversary. Capacity reduces from Sun-Jafar's formula by a factor depending on .
Definition: Symmetric PIR (SPIR) (Preview)
Symmetric PIR (SPIR) (Preview)
In symmetric PIR (SPIR), two privacy requirements hold:
-
User privacy (as in classical PIR): databases learn nothing about .
-
Database privacy: the user learns only , not the other files. The user's knowledge after the protocol is exactly , and nothing about for .
SPIR is strictly stronger than classical PIR (which allows the user to learn arbitrary derived information about other files). The extra requirement reduces the capacity: for all (Wang, Banawan, Ulukus 2018) β a stronger bound that does not depend on .
Operationally: SPIR is for settings where both sides need privacy β e.g., genomic research where both the researcher's query and the database's other records must be protected.
Symmetric PIR (SPIR)
PIR variant where both sides have privacy: the databases learn nothing about , and the user learns nothing about other files beyond . Capacity is β strictly less than classical PIR.
Definition: Cache-Aided PIR (Preview)
Cache-Aided PIR (Preview)
In cache-aided PIR, the user has a local cache containing partial information about the library β typically prefetched during a placement phase before the user knows their desired . The PIR protocol exploits the cached content to reduce the download requested from the databases.
Two flavors:
-
Cached files known to databases: the cache content is publicly known (e.g., a CDN delivered cached files in a prefetch round). The PIR protocol can exploit the cache to reduce the active download.
-
Cached files unknown to databases: the user's cache content is private β the databases don't know which files are cached. This adds an additional layer of complexity.
Cache-aided PIR is the topic of Chapter 15. The CommIT group's contribution (Wan/Tuninetti/Caire 2021, double-booked in Chapter 7) extends to demand-privacy in cached settings β connecting PIR to the coded-caching framework of Book CC.
Cache-Aided PIR
PIR variant where the user has a local cache of partial library content. The cache reduces the required download from databases. CommIT- relevant variants (Wan/Tuninetti/Caire 2021) handle demand-privacy in cached settings.
PIR Variants and Their Capacities
| PIR Variant | Storage | Privacy | Capacity / formula | Chapter |
|---|---|---|---|---|
| Classical (Sun-Jafar) | Replicated, | Non-colluding | 13 | |
| Coded-storage PIR | MDS-coded, | Non-colluding | Modified formula | 14 Β§1 |
| -Colluding PIR | Replicated | -colluding | 14 Β§2 | |
| Symmetric PIR | Replicated | Two-sided | 14 Β§3 | |
| Cache-aided PIR | Replicated + user cache | Variable | -tilde improvements | 15 |
| Cache-aided + demand-private (CommIT) | Replicated + cache | User cache hidden from DBs | Open characterization | 15 |
PIR Capacity Across Variants
Plot the PIR capacity for the four major variants (Classical, Coded-storage, -Colluding, Symmetric) as a function of for fixed . Each variant trades off storage, privacy, and rate differently. The classical Sun-Jafar capacity is the highest (most permissive assumptions); SPIR is the lowest (strongest privacy). The plot illustrates the privacy-rate Pareto frontier.
Parameters
Example: PIR Capacities at
Compute the capacity for each PIR variant at databases, files. Compare with the classical Sun-Jafar baseline.
Classical Sun-Jafar
.
$T = 2$-colluding
. About lower than non-colluding.
Symmetric PIR
. Surprisingly close to classical, because is small. For larger , classical approaches SPIR's .
Coded-storage at $r = 3$
(exact formula in Chapter 14). Lower rate, less storage.
Operational
Classical: best rate, weakest privacy. -colluding: trade rate for stronger privacy. SPIR: trade rate for two-sided privacy. Coded-storage: trade rate for less storage. Each variant occupies a different point on the privacy-storage-rate Pareto frontier.
Cross-Cutting Themes Across PIR Extensions
Three themes recur across the PIR extensions:
-
Storage vs. rate trade-off: any reduction in aggregate storage (coded-storage PIR) costs a corresponding reduction in PIR rate.
-
Privacy vs. rate trade-off: stronger privacy (-colluding, SPIR, demand- private cache) costs rate. The exact cost is quantified by the variant-specific capacity formula.
-
Side information improves rate: when the user has cached content (Chapter 15), the PIR rate can exceed the classical Sun-Jafar rate β extra information at the user is always beneficial.
Each chapter of Part IV explores one of these themes in depth. The information-theoretic framework remains constant: cut-set converse + finite-field IA achievability. The variants differ in which constraints are tight.
Common Mistake: PIR Variants Don't Compose Trivially
Mistake:
Compose two PIR extensions (e.g., coded-storage + -colluding) by simply applying both constraints, expecting the capacity to be the product of the two individual capacities.
Correction:
PIR variants combine non-trivially. For example, coded-storage + -colluding PIR has a capacity formula that is not simply the product of the two individual capacities β it requires its own analysis (Tajeddine, El Rouayheb 2018; Sun, Jafar 2018b). Generally, the joint capacity is lower than what either individual extension would predict β additional constraints further restrict the achievable rate region. Always verify the joint capacity is characterized in the literature before deploying compound PIR variants.
Choosing a PIR Variant for Production
Production guidance for PIR variant selection:
-
Multi-cloud PIR (typical): classical Sun-Jafar with non-colluding providers. Highest rate; standard threat model.
-
Untrusted-collaboration PIR (cross-org): -colluding with or to handle a small number of malicious participants colluding with the server.
-
Two-sided privacy (medical, financial): Symmetric PIR. Lower rate () but both database and user are protected.
-
Storage-constrained (large libraries): Coded-storage PIR with chosen to balance storage cost vs. PIR rate.
-
Cache-augmented (wireless edge): cache- aided PIR (Chapter 15). Extra information at the user reduces required download.
Production deployments often combine variants: coded-storage + -colluding for cross-cloud queries with mild collusion tolerance.
- β’
Multi-cloud: , classical Sun-Jafar
- β’
Cross-org: -colluding for collusion tolerance
- β’
Medical/financial: SPIR for two-sided privacy
- β’
Storage-constrained: coded-storage trade-off
Key Takeaway
Classical Sun-Jafar PIR is the starting point; Chapters 14β15 explore extensions. Each extension trades the classical assumptions for a different operational constraint β coded storage, colluding databases, two-sided privacy, side information β and quantifies the capacity reduction. The CommIT-relevant contribution in Chapter 15 connects cache-aided PIR to the coded-caching framework of Book CC.
Why This Matters: Looking Ahead: Wireless Variants and AirComp
Part IV (PIR) emphasizes coded / cached structure for privacy-preserving retrieval. Part V (Chapters 16β18) shifts to the wireless setting: AirComp (Chapter 16), wireless FL (Chapter 17), and open problems (Chapter 18). The AirComp framework can be applied to PIR over wireless channels β with specific implications for the retrieval rate. Chapter 17 carries the fifth and final CommIT-group contribution: information-theoretically secure federated representation learning over wireless channels.
Quick Check
For a setting with strong privacy requirements where both the user and the databases need protection, the right PIR variant is:
Classical Sun-Jafar (highest rate, single-sided privacy).
Symmetric PIR (SPIR) β both the user and the databases have privacy guarantees.
-colluding PIR β handles malicious databases.
Coded-storage PIR β saves storage.
Correct. SPIR's two-sided privacy is designed for exactly this setting. The rate cost is β independent of .