Chapter Summary
Chapter 14 Summary
Key Points
- 1.
Coded-storage PIR (§14.1): Sun-Jafar generalizes to -MDS coded storage with capacity (Tajeddine–El Rouayheb 2018). Storage drops by factor , rate decreases as grows. The asymptotic limit is .
- 2.
-colluding PIR (§14.2): replicated storage with privacy against any colluding databases gives capacity (Sun–Jafar 2018). Achievability uses Shamir-style -sharing of queries; recovers classical, collapses to the trivial .
- 3.
SPIR (§14.3): two-sided privacy gives capacity — independent of . Requires shared randomness across databases. The -independence reflects the database-privacy decoupling.
- 4.
Joint extensions (§14.4): combining constraints costs rate non-additively. Coded-storage + -colluding has achievable rate (Freij-Hollanti) but capacity is open for general . SPIR + coded-storage is settled at (Wang–Skoglund 2019).
- 5.
Operational guidance: pick the minimum constraint set for the actual threat model. Composition costs rate; three-plus extensions usually infeasible. Verify feasibility (e.g., ) before deployment.