Part IV Summary and the Frontier

Part IV in Perspective

Part IV (Chapters 13-15) developed the information-theoretic theory of Private Information Retrieval. The arc:

  • Chapter 13: classical PIR. Sun-Jafar capacity C(N,K)=(βˆ‘i=0Kβˆ’1Nβˆ’i)βˆ’1C(N, K) = (\sum_{i=0}^{K-1} N^{-i})^{-1}.
  • Chapter 14: extensions. Coded storage (Tajeddine-El Rouayheb), TT-colluding databases (Sun-Jafar 2018), symmetric PIR (Sun-Jafar 2018c).
  • Chapter 15: side information and caches. Wei-Banawan-Ulukus 2019 for single-user side info; Wan-Tuninetti- Caire 2021 for multi-user cached delivery with demand privacy (CommIT contribution).

The unifying themes β€” capacity formulas via geometric series, cut-set converses, finite-field IA achievability β€” connect PIR to the rest of this book. Section Β§15.4 closes Part IV by summarizing the landscape and pointing to the open frontier.

Part IV β€” All PIR Variants

VariantConstraintCapacityReferenceStatus
Classical PIRNN DBs, replicated, no collusion(1+1/N+β‹―+1/NKβˆ’1)βˆ’1(1 + 1/N + \cdots + 1/N^{K-1})^{-1}Sun-Jafar 2017Settled
Coded-storage PIR(N,r)(N, r)-MDS storage(1+r/N+β‹―+rKβˆ’1/NKβˆ’1)βˆ’1(1 + r/N + \cdots + r^{K-1}/N^{K-1})^{-1}Tajeddine 2018Settled
TT-colluding PIRTT-collusion privacy(1+T/N+β‹―+TKβˆ’1/NKβˆ’1)βˆ’1(1 + T/N + \cdots + T^{K-1}/N^{K-1})^{-1}Sun-Jafar 2018Settled
SPIRTwo-sided privacy1βˆ’1/N1 - 1/NSun-Jafar 2018cSettled
SPIR + codedTwo-sided + MDS1βˆ’r/N1 - r/NWang-Skoglund 2019Settled
Coded + TT-colludingMDS + collusionAchievable knownFreij-Hollanti 2018Open in general KK
PIR with side infoMM uncoded prefetched files(1+1/N+β‹―+1/NKβˆ’Mβˆ’1)βˆ’1(1 + 1/N + \cdots + 1/N^{K-M-1})^{-1}Wei-Banawan-Ulukus 2019Settled
Cache-aided PIR (uncoded)Ξ³KL\gamma K L random uncoded cacheBinomial mixture of C(N,Kβˆ’i)C(N, K-i)Wei-Banawan-Ulukus 2019Settled
Multi-user demand-private (CommIT)UU users, cache, demand privacyU(1βˆ’Ξ³)U(1 - \gamma)Wan-Tuninetti-Caire 2021Settled (uniform demands)

The Open Frontier

The open problems in PIR fall into several categories:

  1. Joint extensions: combining coded storage, TT-colluding, SPIR, side info in pairs or triples. Most pairwise combinations are open in general KK.

  2. Non-uniform regimes: most capacity results assume uniform random demands and uniform cache contents. Skewed (e.g., Zipf) distributions yield lower-rate constraints with open characterizations.

  3. Adaptive PIR: when the user can adapt queries based on previous answers. Open whether the rate improves over the non-adaptive case.

  4. Latency-amortized rate: the capacity is defined for one-shot retrieval. Latency-amortized rate (over a sequence of queries) has different characteristics, not yet fully characterized.

  5. Wireless PIR: PIR over wireless channels β€” combining the channel capacity with the PIR capacity. Most known results assume noiseless broadcast; wireless extensions are active research.

  6. Quantum PIR: PIR with quantum databases or quantum communication. Sun-Jafar-style capacity results have been extended to the quantum regime; open questions about the quantum-classical gap remain.

The CommIT group's research program addresses several of these frontiers, notably (1), (2), and (5). Chapters 16-17 begin the wireless extensions.

,

PIR in the Larger Distributed-Computing Story

PIR is structurally a distributed computing problem: the user "computes" the desired file via a query-answer protocol. The capacity results in Part IV use the same information-theoretic toolkit as Parts I–III:

  • Cut-set converses (Chapter 2).
  • Finite-field IA (Chapter 4) β€” the achievability backbone of every Sun-Jafar-style scheme.
  • Secret-sharing primitives (Chapter 3) β€” Shamir for TT-colluding, MDS for coded storage.

In this sense, Part IV is not a separate topic but a specialization of the coded-computing framework: the "function" being computed is "select file ΞΈ\theta," and the "encoding" is the PIR query structure.

The framework will continue evolving in Part V (Chapters 16-18): wireless extensions, federated learning, and open frontiers. PIR has emerged in ∼8\sim 8 years (Sun-Jafar 2017 β†’ present) from a ∼22\sim 22- year-old open problem (Chor 1995) to a rich, well-developed theory. The current open problems (above) are the next 8 years of research.

Why This Matters: Looking Ahead: Wireless and AirComp

Part V of this book (Chapters 16-18) shifts to wireless settings. Chapter 16 introduces AirComp (over-the-air computation), Chapter 17 covers wireless federated learning, and Chapter 18 outlines open problems and frontiers.

The PIR framework can be extended to wireless channels β€” the user broadcasts queries; databases respond simultaneously over a multiple-access channel. Channel noise and interference change the capacity calculation but not the structural privacy requirement. Chapter 16 discusses AirComp variants that incorporate privacy, connecting Part IV's framework to wireless physical- layer constraints.

Chapter 17 carries the fifth CommIT contribution: information-theoretically secure federated representation learning over wireless channels. The book closes with Chapter 18's open-problems discussion.

Key Takeaway

Part IV closes with PIR variants spanning the storage-privacy-rate Pareto frontier. The CommIT contribution (Wan-Tuninetti-Caire 2021) settled the multi-user demand-private cached delivery case. Open frontiers include joint extensions, non-uniform demand distributions, adaptive protocols, and wireless variants β€” addressed in part by Part V.

Common Mistake: Capacity Is the Best Possible Rate, Not the Achievable Rate

Mistake:

Confuse the PIR capacity (Sun-Jafar's formula) with the rate of a specific scheme (which may be lower).

Correction:

The PIR capacity CPIR(N,K)C_{\text{PIR}}(N, K) is the supremum of achievable rates over all PIR schemes. A specific implementation may achieve less (e.g., a practical scheme with finite block length, non-asymptotic overhead, or sub-optimal encoding). When deploying PIR, benchmark the implemented rate, not the asymptotic capacity. The capacity is a useful target; the implementation gap can be substantial in finite-block-length regimes.

Quick Check

Which of the following statements about Part IV (PIR) is true?

Most pairwise combinations of PIR extensions are settled in capacity.

The CommIT contribution (Wan-Tuninetti- Caire 2021) addresses multi-user cached delivery with demand privacy.

PIR capacity always equals 11 (perfect recovery).

Wireless PIR is fully characterized.