Prerequisites & Notation
Before You Begin
Chapter 15 closes Part IV with PIR variants where the user has side information — typically a cache populated in a placement phase before the user knows which file they want. The chapter builds on Chapters 13-14 (classical and extended PIR) and connects to the coded-caching framework (Book CC). The CommIT group's contribution on demand-private cached delivery (Wan-Tuninetti-Caire 2021) appears in §15.3.
- Sun-Jafar PIR capacity (Chapter 13)(Review ch13)
Self-check: State and the role of vs. in the formula.
- -colluding PIR (Chapter 14 §14.2)(Review ch14)
Self-check: How does the privacy threat model change from classical PIR to -colluding?
- Coded caching: placement vs. delivery(Review ch01)
Self-check: Distinguish the placement (offline) and delivery (online) phases of a coded-caching protocol.
- Cut-set converse recipe(Review ch02)
Self-check: Apply the four-step cut-set recipe to a retrieval problem with auxiliary state.
Notation for This Chapter
Chapter 15 inherits PIR notation from Chapters 13-14 and adds notation for side information and caches.
| Symbol | Meaning | Introduced |
|---|---|---|
| Number of side-information (prefetched) files at the user | s01 | |
| Set of indices of side-information files at the user, , | s01 | |
| User's cache content (in §15.2-§15.3) | s02 | |
| Cache size, normalized: | s02 | |
| Number of users in cached delivery (§15.3) | s03 | |
| Demand of user , (§15.3) | s03 | |
| Capacity of PIR with side-info files | s01 | |
| Demand-private cached-delivery rate (§15.3) | s03 |