Abstract
We consider the problem of multi-message private information retrieval (MPIR) from N non-colluding and replicated servers when the user is equipped with a cache that holds an uncoded fraction r from each of the K stored messages in the servers. We assume that the servers are unaware of the cache content. We investigate \(D_{P}^*(r)\), which is the optimal download cost normalized by the message size, as a function of K, N, r, P. For a fixed K, N, we develop an inner bound (converse bound) for the \(D_{P}^*(r)\) curve. The inner bound is a piece-wise linear function in r. For the achievability, we propose specific schemes that exploit the cached as private side information to achieve some corner points. We obtain an outer bound (achievability) for any caching ratio by memory-sharing between these corner points. Thus, the outer bound is also a piece-wise linear function in r. The inner and the outer bounds match for the cases where the number of desired messages P is at least half of the number of the overall stored messages K. Furthermore, the bounds match in two specific regimes for the case \(\frac{K}{P} > 2\) and \(\frac{K}{P} \in \mathbb {N}\): the very high ratio regime, i.e., \(r \ge \frac{1}{N+1}\) and the very low ratio regime, i.e., \(r \le \frac{(N-1)P \alpha _1}{ N\left( \sum _{k=2}^K \left( {\begin{array}{c}K\\ k\end{array}}\right) \alpha _k -\sum _{k=2}^{K-P} \left( {\begin{array}{c}K-P\\ k\end{array}}\right) \alpha _k \right) + (N-1)P \alpha _1}\). Finally, the bounds meet in one specific regime for arbitrarily fixed K, P, N: the very high ratio regime, i.e., \(r \ge \frac{1}{N+1}\).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Banawan, K., Ulukus, S.: Multi-message private information retrieval: capacity results and near-optimal schemes. IEEE Trans. Inform. Theory 64(10), 6842–6862 (2018). https://doi.org/10.1109/TIT.2018.2828310
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of IEEE 36th Annual Foundations of Computer Science, pp. 41–50, October 1995. https://doi.org/10.1109/SFCS.1995.492461
Shah, N.B., Rashmi, K.V., Ramchandran, K.: One extra bit of download ensures perfectly private information retrieval. In: 2014 IEEE International Symposium on Information Theory, pp. 856–860, June 2014. https://doi.org/10.1109/ISIT.2014.6874954
Sun, H., Jafar, S.A.: The capacity of private information retrieval. IEEE Trans. Inform. Theory 63(7), 4075–4088 (2017). https://doi.org/10.1109/TIT.2017.2689028
Wei, Y., Banawan, K.A., Ulukus, S.: Fundamental limits of cache-aided private information retrieval with unknown and uncoded prefetching. CoRR abs/1709.01056 (2017). http://arxiv.org/abs/1709.01056
Acknowledgment
This work is partially supported by the National Natural Science Foundation of China under Grants 62071115, 61971135, National Key Research and Development Project under Grant 2019YFE0123600, the Research Fund of National Mobile Communications Research Laboratory, Southeast University (No. 2020A03), and the Six talent peaks project in Jiangsu Province.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Proof of Corollary 1
A Proof of Corollary 1
Since both \(\overline{D}_{P}(r)\) and \(\underline{D}_{P}(r)\) are piecewise linear function of r, all we have to do to prove that they are equal at some interval is to prove that the vertices are the same. First, let us note that
Then, we note that
where \(U = N\left( \sum _{k=2}^K \left( {\begin{array}{c}K\\ k\end{array}}\right) \alpha _k -\sum _{k=2}^{K-P} \left( {\begin{array}{c}K-P\\ k\end{array}}\right) \alpha _k \right) + (N-1)P \alpha _1\), \(\alpha _k=\sum _{i=1}^{P} \gamma _i r_i^{K-P-k}\).
Further, we note from (20), by choosing \(r = r_2\), we have
Thus, since \( \underline{D}_{P}(r_2) \le \overline{D}_{P}(r_2)\) by definition, (75) implies \( \underline{D}_{P}(r_2) = \overline{D}_{P}(r_2)\). We also note that \( \underline{D}_{P}(r_1) = \overline{D}_{P}(r_1)\). Since both \(\overline{D}_{P}(r)\) and \(\underline{D}_{P}(r)\) are piecewise linear function of r, and since \( \underline{D}_{P}(r_2) = \overline{D}_{P}(r_2) \) and \( \underline{D}_{P}(r_1) = \overline{D}_{P}(r_1)\), we have \( \underline{D}_{P}(r) = \overline{D}_{P}(r) = D^{*}_{P}(r)\) for \(r_1 \le r \le r_{2}\). Thus we complete the proof of corollary 1.
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, Y., Liu, N., Kang, W. (2021). Cache-Aided Multi-message Private Information Retrieval. In: Gao, H., Fan, P., Wun, J., Xiaoping, X., Yu, J., Wang, Y. (eds) Communications and Networking. ChinaCom 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 352. Springer, Cham. https://doi.org/10.1007/978-3-030-67720-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-67720-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67719-0
Online ISBN: 978-3-030-67720-6
eBook Packages: Computer ScienceComputer Science (R0)