Joint Extensions and Open Problems

Composing PIR Extensions

Sections Β§14.1–§14.3 each modified one classical assumption: storage (Β§14.1: MDS-coded), privacy threat (Β§14.2: TT-colluding), or symmetry (Β§14.3: SPIR). Real systems often impose combinations of these constraints β€” for example, MDS-coded storage with TT-colluding privacy.

Composition is not free. The joint capacity is typically strictly lower than what the individual capacities would suggest. Many joint cases remain open in the information-theoretic sense β€” only achievable rates and outer bounds are known, not capacity.

Theorem: Coded-Storage TT-Colluding PIR (Freij-Hollanti et al.)

For PIR with KK files stored across NN databases via an (N,r)(N, r)-MDS code, with privacy required against any TT colluding databases (with r+Tβˆ’1<Nr + T - 1 < N), an achievable PIR rate is RPIR-MDS-T(N,K,r,T)β€…β€Š=β€…β€ŠNβˆ’rβˆ’T+1Nβ‹…(1βˆ’(r+Tβˆ’1N)K)βˆ’1.R_{\text{PIR-MDS-T}}(N, K, r, T) \;=\; \frac{N - r - T + 1}{N} \cdot \left(1 - \left(\frac{r + T - 1}{N}\right)^K\right)^{-1}. For the special cases:

  • T=1T = 1: recovers Tajeddine–El Rouayheb (Β§14.1)
  • r=1r = 1: recovers Sun-Jafar TT-colluding (Β§14.2)
  • r=T=1r = T = 1: recovers classical Sun-Jafar. The general capacity CPIR-MDS-TC_{\text{PIR-MDS-T}} is open (only the achievable rate and an outer bound are known).

Example: Joint Capacity at N=8,K=5,r=2,T=2N = 8, K = 5, r = 2, T = 2

Compute the achievable rate and compare with the individual capacities (coded-storage alone, TT-colluding alone).

Theorem: SPIR with MDS-Coded Storage (Wang–Skoglund)

For symmetric PIR with KK files stored across NN databases via an (N,r)(N, r)-MDS code, with shared randomness: CSPIR-MDS(N,K,r)β€…β€Š=β€…β€Š1βˆ’rN.C_{\text{SPIR-MDS}}(N, K, r) \;=\; 1 - \frac{r}{N}. Independent of KK (as classical SPIR is) and independent of the file structure beyond the rr parameter.

Joint PIR Extensions β€” Capacity Status

PIR VariantCapacity FormulaStatusReference
Classical (Sun-Jafar)(1+1/N+β‹―+1/NKβˆ’1)βˆ’1(1 + 1/N + \cdots + 1/N^{K-1})^{-1}SettledSun-Jafar 2017
Coded-storage(1+r/N+β‹―+rKβˆ’1/NKβˆ’1)βˆ’1(1 + r/N + \cdots + r^{K-1}/N^{K-1})^{-1}SettledTajeddine 2018
TT-colluding(1+T/N+β‹―+TKβˆ’1/NKβˆ’1)βˆ’1(1 + T/N + \cdots + T^{K-1}/N^{K-1})^{-1}SettledSun-Jafar 2018
SPIR1βˆ’1/N1 - 1/NSettledSun-Jafar 2018c
SPIR + Coded-storage1βˆ’r/N1 - r/NSettledWang-Skoglund 2019
Coded-storage + TT-colludingAchievable: see Β§14.4OPEN for general KKFreij-Hollanti 2018
SPIR + TT-colludingAchievable rate knownOPENWang-Banawan-Ulukus 2018
Cache-aided + TT-colludingAchievable rate knownOPENWei et al. 2019

Open Problems in Multi-Constraint PIR

The composition of constraints in PIR remains a rich frontier. Notable open problems:

  • Capacity of coded-storage TT-colluding PIR: the Freij-Hollanti scheme is achievable, but the matching converse remains open for general KK. Reduces to known cases for K=2K = 2 or T=1T = 1 or r=1r = 1.

  • Capacity of SPIR + TT-colluding: an outer bound exists but the precise capacity is unknown. Heuristically, capacity should approach 1βˆ’(r+Tβˆ’1)/N1 - (r + T - 1)/N, but tight bounds are missing.

  • Capacity of cache-aided PIR: the WB-Ulukus bound is not tight in general. The cache-aided + TT-colluding case is even less well-understood. Chapter 15 returns to this.

  • Latency-rate trade-off: classical PIR analyzes only the one-shot rate. The latency-amortized rate (over multiple sequential queries) has different characteristics that are not yet fully understood.

  • Adaptive PIR: when the user can adapt queries based on previous answers, can the rate be improved? The open question is whether sequential PIR has the same capacity as non-adaptive PIR.

The CommIT group's contribution to this area (Wan-Tuninetti-Caire 2021, Chapter 15) addresses cache-aided PIR with demand privacy β€” pushing one of these frontiers forward.

,

Joint PIR Trade-offs: Storage, Privacy, Rate

Visualize the joint trade-off between MDS dimension rr (storage), collusion threshold TT (privacy), and PIR rate RR. The plot uses the Freij-Hollanti achievable rate formula. Each point in the (r,T)(r, T) plane corresponds to a feasible PIR configuration; the height shows the PIR rate. The infeasibility region r+Tβ‰₯Nr + T \geq N is shaded.

Parameters
10
5
⚠️Engineering Note

Engineering Perspective on Joint Extensions

Production guidance when combining PIR extensions:

  • Pick one constraint as primary: cross-cloud deployments typically pick coded-storage (cost reduction) and add T=2T = 2 as a safety margin. Medical deployments pick SPIR (compliance) and add coded-storage as a cost reduction.

  • Avoid stacking aggressively: each additional constraint costs rate. Three simultaneous constraints (coded-storage + TT-colluding + SPIR) is often operationally untenable β€” the rate would be too low.

  • Asymptotic rates as design targets: for large KK, the rate approaches 1βˆ’(r+Tβˆ’1)/N1 - (r + T - 1)/N. Use this as a design target for the rate vs. the privacy/storage budget.

  • Verifiability is orthogonal: Byzantine tolerance (Chapter 11) must be added independently. Don't conflate it with TT-colluding.

  • Latency planning: O(K)O(K) rounds for most variants. For latency-sensitive applications, batch multiple PIR queries.

The bottom line: pick the minimum set of constraints needed for the actual threat model, and pay the rate cost for them. Avoid over-engineering.

Practical Constraints
  • β€’

    Coded + TT-colluding: r+Tβˆ’1<Nr + T - 1 < N feasibility

  • β€’

    SPIR adds shared randomness requirement

  • β€’

    Three+ constraints typically infeasible at useful rates

  • β€’

    Byzantine tolerance: separate layer

πŸ“‹ Ref: Freij-Hollanti 2018; cloud security best practices

Common Mistake: Rate Losses Don't Add

Mistake:

Compute the rate of a multi-extension PIR scheme by additively combining the rate losses from each individual extension.

Correction:

PIR rate losses combine multiplicatively in the geometric-series base, not additively. For coded-storage + TT-colluding, the base becomes (r+Tβˆ’1)/N(r + T - 1)/N (not r/N+T/Nr/N + T/N). For SPIR + coded-storage, the rate is 1βˆ’r/N1 - r/N (not (1βˆ’1/N)(1βˆ’1/N)(1 - 1/N)(1 - 1/N)). Use the explicit joint capacity formula (Theorem 14.4.1, etc.) for the correct rate; never interpolate by hand from the individual capacities.

Key Takeaway

Composition of PIR extensions is non-trivial and many cases remain open. Coded-storage + TT-colluding has an achievable rate (Freij-Hollanti) but the capacity is unknown for general KK. SPIR + coded-storage is settled (Wang-Skoglund: 1βˆ’r/N1 - r/N). Production deployments should pick the minimum constraint set and verify feasibility (r+Tβˆ’1<Nr + T - 1 < N for joint coded-storage / TT-colluding).

Why This Matters: Looking Ahead: Side-Information PIR (Chapter 15)

Chapter 15 explores PIR with side information at the user β€” specifically, cache-aided PIR. When the user has cached partial library content, the active download from databases can be reduced. The cache content can be public (known to databases) or private (hidden). The CommIT group's contribution (Wan-Tuninetti-Caire 2021) addresses cache-aided PIR with demand privacy against colluding users β€” a setting at the intersection of coded caching (Book CC) and PIR. Section 15 is the final chapter of Part IV.

Quick Check

For PIR with N=6N = 6 databases, K=4K = 4 files, coded storage with r=2r = 2, and T=2T = 2 collusion, the feasibility condition r+Tβˆ’1<Nr + T - 1 < N becomes 2+2βˆ’1=3<62 + 2 - 1 = 3 < 6. The Freij-Hollanti achievable rate is approximately:

β‰ˆ0.50\approx 0.50

β‰ˆ0.83\approx 0.83 (same as classical Sun-Jafar)

Zero (infeasible due to r+Tβ‰₯Nr + T \geq N)

β‰ˆ0.10\approx 0.10