Chapter Summary
Chapter Summary
Key Points
- 1.
Classical PIR hides the desired file index from replicated databases. The user retrieves one file from a -file library; each database, seen in isolation, learns nothing about which file was requested. The trivial baseline (download everything) achieves rate but with no privacy beyond not revealing the requested-content; classical PIR achieves a strictly higher rate while preserving query privacy.
- 2.
The Sun-Jafar capacity formula is . It approaches as (more databases = less overhead) and as (more files = bounded asymptote). For typical : capacity .
- 3.
Achievability via finite-field IA: the Sun-Jafar scheme uses a -level XOR structure where each level cancels one layer of interferer file contributions. Each file is split into chunks; coordinated queries across the databases enable the user to reconstruct W_\\theta from a download of size .
- 4.
Matching converse via cut-set: the four-step Chapter 2 recipe (cut, entropy bound, symmetrize, normalize) gives the lower bound, with a key inductive step on the file count . Achievability and converse meet exactly at , closing the rate region of classical PIR.
- 5.
Many extensions exist β coded storage, -colluding, symmetric, cache-aided. Each trades off some constraint (storage cost, collusion threshold, two-sided privacy, side information) against the achievable rate. Chapter 14 develops the first three; Chapter 15 develops cache-aided PIR with a CommIT-relevant contribution on demand-private settings.
Looking Ahead
Chapter 14 extends classical PIR to coded-storage settings (MDS-coded files at the databases), -colluding databases, and symmetric PIR (two- sided privacy). The capacity formulas adapt to each constraint, all derivable from variations of Chapter 13's cut-set recipe and finite-field IA achievability. Chapter 15 closes Part IV with cache-aided PIR β the connection between PIR and coded caching (Book CC) β including a CommIT-relevant variant on demand-private cached PIR.