Joint Extensions and Open Problems
Composing PIR Extensions
Sections Β§14.1βΒ§14.3 each modified one classical assumption: storage (Β§14.1: MDS-coded), privacy threat (Β§14.2: -colluding), or symmetry (Β§14.3: SPIR). Real systems often impose combinations of these constraints β for example, MDS-coded storage with -colluding privacy.
Composition is not free. The joint capacity is typically strictly lower than what the individual capacities would suggest. Many joint cases remain open in the information-theoretic sense β only achievable rates and outer bounds are known, not capacity.
Theorem: Coded-Storage -Colluding PIR (Freij-Hollanti et al.)
For PIR with files stored across databases via an -MDS code, with privacy required against any colluding databases (with ), an achievable PIR rate is For the special cases:
- : recovers TajeddineβEl Rouayheb (Β§14.1)
- : recovers Sun-Jafar -colluding (Β§14.2)
- : recovers classical Sun-Jafar. The general capacity is open (only the achievable rate and an outer bound are known).
Achievability
The Freij-Hollanti scheme combines MDS sharing (across files) with Shamir -sharing (across queries). The combined scheme requires the storage and privacy parameters to satisfy for feasibility.
Outer bound
The cut-set converse extends naturally with replacing the in the geometric series base. The outer bound matches the achievable rate in the asymptotic limit () but does not match for finite in general.
Capacity gap
For finite , the gap between the best known achievable rate and the best known outer bound is small but non-zero. The capacity has only been established in special cases (e.g., ). Open problem: close the gap for general .
Example: Joint Capacity at
Compute the achievable rate and compare with the individual capacities (coded-storage alone, -colluding alone).
Joint rate (Freij-Hollanti)
, so the base is . .
Coded-storage alone ($r = 2, T = 1$)
Base . .
$T$-colluding alone ($T = 2, r = 1$)
. (Coincides with above by symmetry.)
Joint vs. individual
The joint achievable rate is strictly less than the lower of the two individual capacities (). Composition costs rate.
Operational
Doubling either constraint (storage or collusion) costs rate. Combining both costs rate β non-additive but not dramatic.
Theorem: SPIR with MDS-Coded Storage (WangβSkoglund)
For symmetric PIR with files stored across databases via an -MDS code, with shared randomness: Independent of (as classical SPIR is) and independent of the file structure beyond the parameter.
Why $K$-independent
Same reason as classical SPIR: the database-privacy requirement decouples the rate from the number of files. The parameter modifies the achievability bound: instead of one database canceling the mask (rate ), databases canceling masks gives rate .
Comparison with classical SPIR
Classical SPIR: . SPIR with -MDS: . The modifier is the same as the classical-PIR-vs-MDS gap. SPIR with replicated storage () recovers the unmodified .
Joint PIR Extensions β Capacity Status
| PIR Variant | Capacity Formula | Status | Reference |
|---|---|---|---|
| Classical (Sun-Jafar) | Settled | Sun-Jafar 2017 | |
| Coded-storage | Settled | Tajeddine 2018 | |
| -colluding | Settled | Sun-Jafar 2018 | |
| SPIR | Settled | Sun-Jafar 2018c | |
| SPIR + Coded-storage | Settled | Wang-Skoglund 2019 | |
| Coded-storage + -colluding | Achievable: see Β§14.4 | OPEN for general | Freij-Hollanti 2018 |
| SPIR + -colluding | Achievable rate known | OPEN | Wang-Banawan-Ulukus 2018 |
| Cache-aided + -colluding | Achievable rate known | OPEN | Wei et al. 2019 |
Open Problems in Multi-Constraint PIR
The composition of constraints in PIR remains a rich frontier. Notable open problems:
-
Capacity of coded-storage -colluding PIR: the Freij-Hollanti scheme is achievable, but the matching converse remains open for general . Reduces to known cases for or or .
-
Capacity of SPIR + -colluding: an outer bound exists but the precise capacity is unknown. Heuristically, capacity should approach , but tight bounds are missing.
-
Capacity of cache-aided PIR: the WB-Ulukus bound is not tight in general. The cache-aided + -colluding case is even less well-understood. Chapter 15 returns to this.
-
Latency-rate trade-off: classical PIR analyzes only the one-shot rate. The latency-amortized rate (over multiple sequential queries) has different characteristics that are not yet fully understood.
-
Adaptive PIR: when the user can adapt queries based on previous answers, can the rate be improved? The open question is whether sequential PIR has the same capacity as non-adaptive PIR.
The CommIT group's contribution to this area (Wan-Tuninetti-Caire 2021, Chapter 15) addresses cache-aided PIR with demand privacy β pushing one of these frontiers forward.
Joint PIR Trade-offs: Storage, Privacy, Rate
Visualize the joint trade-off between MDS dimension (storage), collusion threshold (privacy), and PIR rate . The plot uses the Freij-Hollanti achievable rate formula. Each point in the plane corresponds to a feasible PIR configuration; the height shows the PIR rate. The infeasibility region is shaded.
Parameters
Engineering Perspective on Joint Extensions
Production guidance when combining PIR extensions:
-
Pick one constraint as primary: cross-cloud deployments typically pick coded-storage (cost reduction) and add as a safety margin. Medical deployments pick SPIR (compliance) and add coded-storage as a cost reduction.
-
Avoid stacking aggressively: each additional constraint costs rate. Three simultaneous constraints (coded-storage + -colluding + SPIR) is often operationally untenable β the rate would be too low.
-
Asymptotic rates as design targets: for large , the rate approaches . Use this as a design target for the rate vs. the privacy/storage budget.
-
Verifiability is orthogonal: Byzantine tolerance (Chapter 11) must be added independently. Don't conflate it with -colluding.
-
Latency planning: rounds for most variants. For latency-sensitive applications, batch multiple PIR queries.
The bottom line: pick the minimum set of constraints needed for the actual threat model, and pay the rate cost for them. Avoid over-engineering.
- β’
Coded + -colluding: feasibility
- β’
SPIR adds shared randomness requirement
- β’
Three+ constraints typically infeasible at useful rates
- β’
Byzantine tolerance: separate layer
Common Mistake: Rate Losses Don't Add
Mistake:
Compute the rate of a multi-extension PIR scheme by additively combining the rate losses from each individual extension.
Correction:
PIR rate losses combine multiplicatively in the geometric-series base, not additively. For coded-storage + -colluding, the base becomes (not ). For SPIR + coded-storage, the rate is (not ). Use the explicit joint capacity formula (Theorem 14.4.1, etc.) for the correct rate; never interpolate by hand from the individual capacities.
Key Takeaway
Composition of PIR extensions is non-trivial and many cases remain open. Coded-storage + -colluding has an achievable rate (Freij-Hollanti) but the capacity is unknown for general . SPIR + coded-storage is settled (Wang-Skoglund: ). Production deployments should pick the minimum constraint set and verify feasibility ( for joint coded-storage / -colluding).
Why This Matters: Looking Ahead: Side-Information PIR (Chapter 15)
Chapter 15 explores PIR with side information at the user β specifically, cache-aided PIR. When the user has cached partial library content, the active download from databases can be reduced. The cache content can be public (known to databases) or private (hidden). The CommIT group's contribution (Wan-Tuninetti-Caire 2021) addresses cache-aided PIR with demand privacy against colluding users β a setting at the intersection of coded caching (Book CC) and PIR. Section 15 is the final chapter of Part IV.
Quick Check
For PIR with databases, files, coded storage with , and collusion, the feasibility condition becomes . The Freij-Hollanti achievable rate is approximately:
(same as classical Sun-Jafar)
Zero (infeasible due to )
, base . .