Chapter Summary

Chapter Summary

Key Points

  • 1.

    Classical PIR hides the desired file index from NN replicated databases. The user retrieves one file from a KK-file library; each database, seen in isolation, learns nothing about which file was requested. The trivial baseline (download everything) achieves rate 1/K1/K but with no privacy beyond not revealing the requested-content; classical PIR achieves a strictly higher rate while preserving query privacy.

  • 2.

    The Sun-Jafar capacity formula is CtextPIR=(1+1/N+cdots+1/NKβˆ’1)βˆ’1C_{\\text{PIR}} = (1 + 1/N + \\cdots + 1/N^{K-1})^{-1}. It approaches 11 as NtoinftyN \\to \\infty (more databases = less overhead) and 1βˆ’1/N1 - 1/N as KtoinftyK \\to \\infty (more files = bounded asymptote). For typical (N,K)=(4,100)(N, K) = (4, 100): capacity approx0.75\\approx 0.75.

  • 3.

    Achievability via finite-field IA: the Sun-Jafar scheme uses a KK-level XOR structure where each level cancels one layer of interferer file contributions. Each file is split into NKN^K chunks; coordinated queries across the NN databases enable the user to reconstruct W_\\theta from a download of size D=Lcdotsumi=0Kβˆ’1Nβˆ’iD = L \\cdot \\sum_{i=0}^{K-1} N^{-i}.

  • 4.

    Matching converse via cut-set: the four-step Chapter 2 recipe (cut, entropy bound, symmetrize, normalize) gives the lower bound, with a key inductive step on the file count KK. Achievability and converse meet exactly at CtextPIRC_{\\text{PIR}}, closing the rate region of classical PIR.

  • 5.

    Many extensions exist β€” coded storage, TT-colluding, symmetric, cache-aided. Each trades off some constraint (storage cost, collusion threshold, two-sided privacy, side information) against the achievable rate. Chapter 14 develops the first three; Chapter 15 develops cache-aided PIR with a CommIT-relevant contribution on demand-private settings.

Looking Ahead

Chapter 14 extends classical PIR to coded-storage settings (MDS-coded files at the databases), TT-colluding databases, and symmetric PIR (two- sided privacy). The capacity formulas adapt to each constraint, all derivable from variations of Chapter 13's cut-set recipe and finite-field IA achievability. Chapter 15 closes Part IV with cache-aided PIR β€” the connection between PIR and coded caching (Book CC) β€” including a CommIT-relevant variant on demand-private cached PIR.