Exercises

ex14-1

Easy

Compute CPIR-MDS(N,K,r)C_{\text{PIR-MDS}}(N, K, r) for N=6N = 6, K=3K = 3, r=2r = 2.

ex14-2

Easy

Compute CPIR(N,K,T)C_{\text{PIR}}(N, K, T) for N=4N = 4, K=3K = 3, T=2T = 2.

ex14-3

Easy

Compute CSPIR(N,K)C_{\text{SPIR}}(N, K) for N=5,K=100N = 5, K = 100 and explain why KK doesn't appear in the formula.

ex14-4

Medium

For N=12,K=4N = 12, K = 4, compute the storage-rate pairs (in (file-units, rate)) for r=1,2,3,4,6r = 1, 2, 3, 4, 6. Plot or tabulate the Pareto frontier.

ex14-5

Medium

A PIR deployment uses N=6N = 6 databases. The operator estimates Tactual=2T_{\text{actual}} = 2 databases could be compromised in the worst case (e.g., shared hypervisor). Compute the capacity loss from using T=2T = 2 vs. T=1T = 1 for K=4K = 4 files.

ex14-6

Medium

Argue that without shared randomness across databases, SPIR cannot achieve any positive rate. Use the database-privacy condition.

ex14-7

Medium

For PIR with coded storage and TT-colluding, the Freij-Hollanti scheme requires r+Tβˆ’1<Nr + T - 1 < N. Tabulate the feasible (r,T)(r, T) pairs for N=8N = 8.

ex14-8

Medium

As Kβ†’βˆžK \to \infty (large library), compare the asymptotic rates of: (a) classical PIR with N=5N = 5, (b) T=2T = 2-colluding PIR with N=5N = 5, (c) coded-storage with r=2,N=5r = 2, N = 5, (d) SPIR with N=5N = 5.

ex14-9

Medium

Sketch how to use a Shamir-style (T,N)(T, N) polynomial to construct queries for TT-colluding PIR. Why does the polynomial degree need to be exactly TT (not less, not more)?

ex14-10

Hard

Prove that the shared randomness SS in any SPIR scheme must satisfy H(S)β‰₯L/(Nβˆ’1)H(S) \geq L / (N - 1) bits per file, where LL is the file length.

ex14-11

Hard

For N=10,K=5,r=3,T=3N = 10, K = 5, r = 3, T = 3, compute: (a) classical PIR capacity, (b) coded-storage capacity (r=3r = 3), (c) TT-colluding capacity (T=3T = 3), (d) the Freij-Hollanti achievable joint rate, (e) the product of (b) and (c) divided by (a) β€” the "naive composition" estimate. Compare (d) and (e).

ex14-12

Hard

For N=4N = 4 databases, plot CPIR(4,K)βˆ’CSPIR(4,K)C_{\text{PIR}}(4, K) - C_{\text{SPIR}}(4, K) as a function of KK for K=2,3,…,20K = 2, 3, \ldots, 20. At what KK does the gap drop below 0.0010.001?

ex14-13

Hard

A health-care provider deploys PIR with N=5N = 5 medical-record databases. Two threat scenarios: (1) one database operator is curious; (2) up to two operators may collude (e.g., shared admin team). Both require user privacy. Additionally, HIPAA requires that the user should not learn other patients' records. Specify the correct PIR variant and parameters; quantify the rate cost vs. classical Sun-Jafar at N=5,K=1000N = 5, K = 1000 (large library).

ex14-14

Hard

Consider an SPIR deployment with N=4N = 4 databases needing H(S)=L/3H(S) = L/3 bits of shared randomness per file. With files of size L=1L = 1 MB and a library of K=10000K = 10000 files, compute: (a) total shared randomness across the deployment; (b) one method to distribute it without a trusted setup.

ex14-15

Challenge

The capacity of coded-storage + TT-colluding PIR for general KK is open. Sketch the structure of the cut-set converse argument and explain why the achievable rate (Freij-Hollanti) and the outer bound do not match for finite KK.