Exercises
ex15-1
EasyCompute for .
Use .
Effective .
Apply formula
.
Compare with classical
as well β the gap is tiny because is already in the asymptotic regime.
ex15-2
EasyFor , estimate the cache-aided PIR rate by approximating the binomial mixture with its mean.
Mean of is .
Approximate .
Mean of binomial
. Effective .
Approximate rate
(using interpolation; exact value slightly higher with the full mixture).
Operational
Cache fraction doubles the effective per-bit rate compared with β non-trivial improvement.
ex15-3
EasyFor , compute: (a) MAN rate, (b) demand-private rate, (c) privacy cost ratio.
.
.
(a) MAN
.
(b) Demand-private
.
(c) Privacy cost ratio
. Demand privacy costs rate.
ex15-4
MediumSketch the curve of vs. for . Identify the rate at .
is monotone in .
gives effective .
Compute end points
: . : (only one file to retrieve, trivially).
Mid points
: . Slow growth from to ; rapid growth from to .
Operational
Side info is most useful at the high- end of the spectrum. Small caches give small rate gains; nearly-full caches give dramatic gains (rate ).
ex15-5
MediumFor , compare at vs. at . Why is one higher?
side info: 5 complete files cached.
cache: half the bits of every file.
PIR-SI at $M = 5$
.
Cache-aided at $\gamma = 0.5$
Binomial mixture centered around . Effective . (slightly higher than ).
Why cache-aided is better
The cache spreads the side info across all files (half a bit per file, on average). This avoids "wasting" cache on files that won't be requested. Side info with complete files is less flexible β if , the protocol must retrieve a complete missing file.
Operational
For random caches with no popularity bias, cache-aided PIR is the right framework. For explicit knowledge of which files are wanted (e.g., personal favorites), side-info framework with complete files is appropriate.
ex15-6
MediumFor demand-private cached delivery, derive the asymptotic rate as and interpret.
as .
Derivation
. As , .
Interpretation
At , every user has the entire library in their cache. No delivery is needed. Demand privacy is automatically satisfied (the server doesn't broadcast anything, so it learns nothing about demands).
Operational
Cache-rich deployments (e.g., ) have near-zero delivery cost regardless of privacy. The privacy cost is dominated by the asymptotic .
ex15-7
MediumFor , find the cache fraction at which exceeds .
Approximate the mixture using the mean effective .
Solve .
Setup
. Need , i.e., , i.e., , i.e., .
Mean effective $K - I$
.
Sanity check
At , the cache holds of every file. Effective . Rate . Plausible.
Operational
Reaching rate requires a very large cache (essentially 99% of the library at ). Smaller caches give smaller improvements.
ex15-8
MediumFor demand-private cached delivery, plot the privacy cost ratio as a function of for fixed .
Cost ratio is .
Cost formula
.
Tabulate
: ratio . : ratio . : ratio . : ratio . Linear in .
Operational
For deployments with many users (), demand privacy becomes very expensive ( rate cost). For small user populations (), the cost is β manageable.
ex15-9
MediumConjecture: for PIR with side-info files and -colluding privacy, the capacity is . Verify the consistency at: (i) , (ii) , (iii) .
Apply the -colluding formula with effective .
(i) $M = 0$
β recovers -colluding PIR.
(ii) $T = 1$
β recovers Wei-Banawan-Ulukus.
(iii) $M = K-1, T = 1$
β only one unknown file, capacity 1. Consistent with Β§15.1.
Status
The conjecture is consistent with all known special cases. General proof is open (achievability follows easily; converse requires the joint cut-set argument, which has not been fully verified).
ex15-10
HardSketch the cut-set argument that proves for multi-user demand-private cached delivery.
Use a random demand vector .
Apply the demand-privacy condition.
Cut-set on the broadcast message.
Setup
Each user decodes from (broadcast) and (cache). Demand privacy: is independent of .
Cut-set
Apply cut-set: each user must be able to recover their requested file. (decoding). (cache size).
Demand privacy β independence
Demand privacy: is statistically independent of . The broadcast must be "demand-agnostic" β i.e., contain enough information to satisfy any demand vector simultaneously.
Counting bits
For to enable different users to recover any of possible files, given caches of size , we need bits. Because is demand-agnostic (privacy), we cannot use coded multicast (which would tailor to the specific demands).
Conclusion
. Achievability via the trivial uncoded scheme matches the bound.
ex15-11
HardCombine cache-aided PIR with coded-storage PIR (Chapter 14 Β§14.1): user has cache fraction; databases store -MDS coded files. Conjecture the rate as a function of and verify special cases.
Effective formula: binomial mixture of coded-storage capacities.
Conjecture
β same binomial structure with coded-storage capacity replacing classical PIR capacity.
Verify special cases
: β coded-storage PIR. β : β uncoded-storage cache-aided PIR. β : (everything cached). β
Status
Conjecture is consistent with all boundary cases. Open: whether the binomial-mixture formula matches the capacity (converse is non-trivial for coded storage with caches).
ex15-12
HardThe Wan-Tuninetti-Caire scheme uses shared randomness across users (and the server). Without shared randomness, can demand privacy still be achieved? At what rate?
Public-coin protocols use only individual randomness, no shared randomness.
Compare with SPIR's randomness requirement (Chapter 14 Β§14.3).
Setup
Public-coin: each user generates their own randomness independently. No shared random masks between server and users (or among users).
Achievability
Each user can mask their query with individual randomness. The server's broadcast may need to accommodate different randomness sources.
Rate cost
Open question. Heuristically, the rate may degrade by an additive factor proportional to (one extra "side channel" per user). Sharp characterization unknown.
Operational
Public-coin protocols are easier to deploy (no shared-key infrastructure) but typically incur a rate cost. Trade-off: deployment ease vs. rate efficiency.
ex15-13
HardSuppose user demands follow a Zipf distribution with parameter (popular files dominate). Estimate the demand-private rate vs. the uniform-demand case.
Zipf: .
Effective entropy is lower than uniform's .
Uniform baseline
Uniform demands: . WTC rate: .
Zipf entropy
Zipf (, files): (Zipf entropy grows slowly).
Effect on rate
With less demand entropy, the demand-privacy constraint is easier to satisfy β the optimal rate may be lower than . Open question: how much lower?
Operational
For popularity-driven workloads (e.g., video streaming), the WTC rate may be a pessimistic upper bound on the actual cost. Practical schemes can exploit the Zipf structure to recover some of the lost coded-multicast gain β but only at the cost of partial demand privacy.
ex15-14
HardConsider a sequence of PIR queries from the same user. Define the latency-amortized PIR rate as the long-run average rate over all queries. Discuss whether this can exceed the one-shot capacity .
Caching effect: previous responses become side info for later queries.
After the first query, the user has as side info.
Setup
Query 1: classical PIR rate . Query 2 (with as side info): rate . ... Query : rate (assuming all 's distinct).
Amortized rate
Average . As , this approaches (the user eventually has the entire library).
Comparison with one-shot
One-shot capacity: . Amortized rate over queries: avg , which exceeds the one-shot capacity (because later queries enjoy effective- reduction).
Operational
Latency amortization is a real practical advantage of repeat queries. The "first query is expensive, later queries cheap" pattern is intuitive. Sharp characterization is open.
ex15-15
ChallengeDiscuss the structure of quantum PIR (databases hold quantum states, queries and answers are quantum). Why might quantum PIR have higher capacity than classical PIR?
Quantum coding allows for stronger forms of interference alignment.
Holevo bound limits classical capacity from quantum sources.
Classical PIR baseline
Classical Sun-Jafar: as . This is bounded above by the download-rate constraint.
Quantum advantage
Quantum entanglement between databases (or between user and databases) can enable more efficient interference alignment. Analog: superdense coding sends bits in qubit β quantum PIR may transmit more "information per query" per qubit.
Known results
Recent work (Song-Kao-Hayashi 2019; Allaix-Cascudo-Cuevas-Bardo 2020) establishes quantum PIR capacity in some regimes β sometimes exceeding the classical capacity. The full quantum PIR capacity is open.
Open frontier
Quantum PIR is one of the most exciting frontiers β the classical-quantum gap is non-trivial and still being characterized. Analogous gaps emerge in quantum coded computing (Chapter 18 may touch on this).
Engineering feasibility
Quantum PIR requires quantum databases and quantum links β currently impractical. The results are theoretical benchmarks, not deployment targets.