Prerequisites & Notation

Before You Begin

Chapter 14 extends classical PIR (Chapter 13) along three orthogonal axes: coded storage instead of replication (§14.1), TT-colluding databases (§14.2), and two-sided privacy via SPIR (§14.3). Section §14.4 sketches what is known when these extensions are combined. Each section relies on the same finite-field IA core as Chapter 13 — the novelty is in how the constraints alter the achievable rate region.

  • Sun-Jafar PIR capacity (Chapter 13 §13.3)(Review ch13)

    Self-check: State the formula CPIR(N,K)C_{\text{PIR}}(N, K) and identify each term's role.

  • MDS codes and Singleton bound (background)(Review ch04)

    Self-check: For an (n,k)(n, k)-MDS code, what is the minimum distance, and how many erasures can be corrected?

  • Shamir secret sharing (Chapter 3)(Review ch03)

    Self-check: Why does the TT-private constraint force polynomial degree T\geq T in Shamir-type schemes?

  • Cut-set converse recipe (Chapter 2)(Review ch02)

    Self-check: Apply the four-step recipe (cut → entropy bound → symmetrize → normalize) to a generic retrieval problem.

  • Mutual-information chain rule(Review ch01)

    Self-check: Expand I(X;Y,Z)I(X; Y, Z) using the chain rule.

Notation for This Chapter

Chapter 14 inherits the PIR notation from Chapter 13 (NN databases, KK files, θ\theta desired index) and adds:

SymbolMeaningIntroduced
rrMDS-code dimension: any rr databases reconstruct the full librarys01
TTMaximum colluding subset size; privacy holds against any TT databasess02
T\mathcal{T}An arbitrary subset of [N][N] with TT|\mathcal{T}| \leq Ts02
CPIR-MDS(N,K,r)C_{\text{PIR-MDS}}(N, K, r)Capacity for (N,r)(N, r)-MDS coded-storage PIRs01
CPIR(N,K,T)C_{\text{PIR}}(N, K, T)Capacity for TT-colluding PIR with replicated storages02
CSPIR(N,K)C_{\text{SPIR}}(N, K)Capacity for symmetric PIR (two-sided privacy)s03
SSCommon randomness shared across databases (used in SPIR)s03
H()H(\cdot)Shannon entropys03