Next Article in Journal
Text and Data Quality Mining in CRIS
Previous Article in Journal
Adopting Augmented Reality to Engage Higher Education Students in a Museum University Collection: the Experience at Roma Tre University
Previous Article in Special Issue
Breaking the MDS-PIR Capacity Barrier via Joint Storage Coding
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases

Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742, USA
*
Author to whom correspondence should be addressed.
Submission received: 5 August 2019 / Revised: 9 October 2019 / Accepted: 12 November 2019 / Published: 28 November 2019
(This article belongs to the Special Issue Private Information Retrieval: Techniques and Applications)

Abstract

:
We consider the private information retrieval (PIR) problem from decentralized uncoded caching databases. There are two phases in our problem setting, a caching phase, and a retrieval phase. In the caching phase, a data center containing all the K files, where each file is of size L bits, and several databases with storage size constraint μ K L bits exist in the system. Each database independently chooses μ K L bits out of the total K L bits from the data center to cache through the same probability distribution in a decentralized manner. In the retrieval phase, a user (retriever) accesses N databases in addition to the data center, and wishes to retrieve a desired file privately. We characterize the optimal normalized download cost to be D * = n = 1 N + 1 N n 1 μ n 1 ( 1 μ ) N + 1 n 1 + 1 n + + 1 n K 1 . We show that uniform and random caching scheme which is originally proposed for decentralized coded caching by Maddah-Ali and Niesen, along with Sun and Jafar retrieval scheme which is originally proposed for PIR from replicated databases surprisingly results in the lowest normalized download cost. This is the decentralized counterpart of the recent result of Attia, Kumar, and Tandon for the centralized case. The converse proof contains several ingredients such as interference lower bound, induction lemma, replacing queries and answering string random variables with the content of distributed databases, the nature of decentralized uncoded caching databases, and bit marginalization of joint caching distributions.

1. Introduction

Private information retrieval (PIR) refers to the problem of downloading a desired file from distributed databases while keeping the identity of the desired file private against the databases. In the classical setting of PIR (see Figure 1), there are N non-communicating databases, each storing the same set of K files. The user (retriever) wishes to download one of these K files without letting the databases know the identity of the desired file. A simple but highly inefficient way is to download all the files from a particular database, which results in the normalized download cost of D L = K , where L is the file size and D is the total number of downloaded bits from the N databases. The PIR problem has originated in the computer science community [1,2,3,4,5] and has drawn attention in the information theory society with early examples [6,7,8,9,10,11]. Recently, Sun and Jafar [12] have characterized the optimal normalized download cost for the classical PIR problem to be D L = 1 + 1 N + + 1 N K 1 . After [12], many interesting variants of the classical PIR problem have been investigated in [13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54]. Most of these previous works consider the case where the contents of the databases are fixed a priori in an uncontrollable manner; a vast majority of them consider the case of replicated databases where each database stores the same set of K files, and many of the rest consider the case of coded databases where each database stores coded versions of the original files.
Coded caching refers to the problem of placing files in users’ local storage caches ahead of time properly and designing efficient delivery schemes at the time of specific user requests in such a way to minimize the traffic during the delivery phase. In the original setup [55] (see Figure 1), a server with K files connects to N users through an error-free shared link, where each user has a local memory which can store up to M files. The system operates in two phases, a placement phase, and a delivery phase. In the placement phase, the server places the files into each user’s local memory. In the delivery phase, each user requests a file from the server, and the server aims to satisfy all the requests with the lowest traffic load. If the set of users in the two phases are identical, the server can arrange the content in each user’s local memory in an optimized manner, which is called centralized coded caching. Reference [55] proposes a symmetric batch caching scheme, which is shown to be optimal for the case of centralized uncoded placement in [56]. If the set of users in the two phases varies, the server cannot arrange the files in user caches in a centralized manner. Instead, the server treats each user identically and independently which is called decentralized coded caching [57]. Reference [57] proposes a uniform and random caching scheme, which is shown to be optimal for the case of decentralized uncoded placement in [56]. Many interesting variants of coded caching problems have been investigated in [58,59,60,61,62,63,64,65,66,67,68,69,70,71,72].
The references that are most closely related to our work here are [38,44]. References [38,44] formulate a new type of PIR problem where the content of each database is not fixed a priori, but can be optimized to minimize the download cost. These papers bring PIR and coded caching problems together in a practically relevant and theoretically interesting manner. In their problem setting (see Figure 2), there is a data center (server) containing all the K files where each file is of size L bits, and the system operates in two phases. In the caching phase, there are N databases in the system with a common storage size constraint μ , i.e., each database can at most store μ K L bits, 1 N μ 1 . In the retrieval phase, a user (retriever) accesses the N databases, and wishes to download a desired file privately. They consider the problem of optimally storing content from the data center to the databases in the caching phase in such a way that the normalized download cost during the retrieval phase is minimized. They focus on the centralized uncoded caching case, i.e., the set of users in the two phases are identical so that the data center can assign the files to each database in a centralized manner, and caching is uncoded in that each database stores a subset of the bits from the data center (no coding), i.e., each database stores μ K L bits out of the total K L bits. Surprisingly, they show that the symmetric batch caching scheme proposed in [55] results in the lowest normalized download cost in the retrieval phase.
We consider the PIR problem from decentralized uncoded caching databases. In our problem setting (see Figure 3), the system also operates in two phases as in [38,44]. However, the set of databases active in the two phases is different, and we do not know in advance which databases the user (retriever) can access in the retrieval phase. Therefore, we consider a decentralized setting for the caching phase, i.e., the data center treats each database identically and independently, or equivalently, each database chooses a subset of bits to store independently according to the same probability distribution. Here, we aim at designing the optimal probability distribution in the caching phase and PIR scheme in the retrieval phase such that the normalized download cost in the retrieval phase is minimized. Another main difference between our work and references [38,44] is that, in the caching phase, references [38,44] require that the N databases altogether can reconstruct the entire K files, i.e., when the user (retriever) connects to the N databases, their collective content is equivalent to the content in the data center, so the user (retriever) can download any desired file. While this can be guaranteed in the centralized setting, in the decentralized setting, where cache placement is probabilistic, we cannot guarantee that any given N databases contain all the bits that exist in the data center. Thus, in order to formulate a meaningful PIR problem, we allow the user (retriever) access the data center as well as the databases in the retrieval phase. Finally, we remark about another sub-branch of PIR literature that considers caching: [30,31,32,33,39,52]; there the user (retriever) itself has a cache memory where it stores a subset of the bits available in the databases. That problem is unrelated to the setting here even though it is also referred to as PIR with caching; in essence, it is PIR with side information.
In this work, for PIR from decentralized caching databases, we show that uniform and random caching scheme, originally proposed in [57] for decentralized coded caching, results in the lowest expected normalized download cost in the retrieval phase. For the achievability, we apply the PIR scheme in [12] successively for all resulting subfile parts. For the converse, we first apply the lower bound derived in [44], which replaces the random variables for queries and answering strings by the content of the distributed databases in a novel manner extending the lower bounding techniques in Lemma 5 and Lemma 6 in [12]. To compare different probability distributions in the caching phase, we focus on the marginal distributions on each separate bit. Then, by using the nature of decentralization and uncoded caching, we further lower bound the normalized download cost. Finally, we show the matching converse for the expected normalized download cost to be D L = n = 1 N + 1 N n 1 μ n 1 ( 1 μ ) N + 1 n 1 + 1 n + + 1 n K 1 , which yields an exact capacity result for the problem.

2. System Model

We consider a system consisting of one data center and several databases (at least N databases). The data center stores K independent files, labeled as W 1 , W 2 , …, W K , where each file is of size L bits. Therefore,
H ( W 1 ) = = H ( W K ) = L , H ( W 1 , , W K ) = H ( W 1 ) + + H ( W K ) .
Each database has a storage capacity of μ K L bits, where 0 μ 1 .
The system operates in two phases: In the caching phase, we consider the case of uncoded caching, i.e., each database stores a subset of bits from the data center. Due to the storage size constraint, each database at most stores μ K L bits out of the total K L bits from the data center. Here, we denote i-th database as DB i and use random variable Z i to denote the stored content in DB i . Therefore, the storage size constraint for DB i is
H ( Z i ) μ K L .
We consider the decentralized setting for the caching phase, i.e., each database chooses a subset of bits to store independently according to the same probability distribution, denoted by P H . Rigorously, let random variable H i denote the indices of the stored bits in DB i . For N databases, the decentralized caching scheme H can be specified as
P ( H = ( H 1 , , H N ) ) = i = 1 N P H ( H i ) .
In the retrieval phase, the user accesses N databases and the data center. We note that we do not know in advance which N databases are available or which N databases the user will have access to. Here, we also assume that in the retrieval phase, the data center and N databases do not communicate with each other (no collusion). To simplify the notation, we use DB 0 to denote the data center, and therefore Z 0 = ( W 1 , , W K ) since the data center stores all the K files. The user privately generates an index θ [ K ] = { 1 , , K } , and wishes to retrieve file W θ such that it is impossible for either the data center or any individual database to identify θ . For random variables θ , and W 1 , , W K , we have
H θ , W 1 , , W K = H θ + H ( W 1 ) + + H ( W K ) .
In order to retrieve file W θ , the user sends N + 1 queries Q 0 [ θ ] , , Q N [ θ ] to DB 0 , …, DB N , where Q n [ θ ] is the query sent to DB n for file W θ . Note that the queries are independent of the realization of the K files. Therefore,
I ( W 1 , , W K ; Q 0 [ θ ] , , Q N [ θ ] ) = 0 .
Upon receiving the query Q n [ θ ] , DB n replies with an answering string A n [ θ ] , which is a function of Q n [ θ ] and Z n . Therefore, θ [ K ] , n { 0 } [ N ] ,
H ( A n [ θ ] | Q n [ θ ] , Z n ) = 0 .
After receiving the answering strings A 0 [ θ ] , , A N [ θ ] from DB 0 , …, DB N , the user needs to decode the desired file W θ reliably. By using Fano’s inequality, we have the following reliability constraint
H W θ | Q 0 [ θ ] , , Q N [ θ ] , A 0 [ θ ] , , A N [ θ ] = o ( L ) ,
where o ( L ) denotes a function such that o ( L ) L 0 as L .
To ensure that individual databases do not know which file is retrieved, we have the following privacy constraint, n { 0 } [ N ] , θ [ K ] ,
( Q n [ 1 ] , A n [ 1 ] , W 1 , , W K ) ( Q n [ θ ] , A n [ θ ] , W 1 , , W K ) ,
where A B means that A and B are identically distributed.
Given that each file is of size L bits, for a fixed K, μ and decentralized caching probability distribution P H , let H denote the indices of the cached bits in the N databases available in the retrieval phase. The probability distribution of H is specified in (3). Let D H [ θ ] represent the number of downloaded bits via the answering strings A 0 : N [ θ ] , where A 0 : N [ θ ] = ( A 0 [ θ ] , , A N [ θ ] ) . Then,
D H [ θ ] = n = 0 N H A n [ θ ] .
We further denote D H as the expected number of downloaded bits with respect to different file requests, i.e., D H = E θ D H [ θ ] . Finally, we denote D as the expected number of downloaded bits with respect to different realization of the cached bit indices, i.e., D = E H D H . A pair D , L is achievable if there exists a PIR scheme satisfying the reliability constraint (7) and the privacy constraint (8). The optimal normalized download cost D * is defined ass
D * = inf D L : D , L is achievable ,
as L . In this work, we aim at characterizing the optimal normalized download cost and finding the optimal decentralized caching probability distribution.
Next, we illustrate the system model and the problem considered with a simple example of K = 3 files and N = 2 databases in the retrieval phase; see Figure 4. Consider a data center storing K = 3 files where each file is of size 4 bits. In the caching phase, there are 4 databases in the system, and each database can at most store 4 bits. Each database can always store the first file, which is of size 4 bits, as caching option 1 in Figure 4. Or, each database can uniformly and randomly choose 4 bits out of a total of 12 bits from the data center to store. One of the realization is shown as caching option 2 in Figure 4. Each database can also choose two bits from the first file and one bit each from the remaining two files to store, where one of the realization is shown as caching option 3 in Figure 4. We require each database to use the same probability distribution to choose the bits to store in order to satisfy the decentralized requirement. In this example, we assume that the user can access the data center and N = 2 databases in the retrieval phase, say the first and the third database, and the user wishes to download a file privately. Our questions are as follows: What is the optimal probability distribution to use in the caching phase? What is the optimal PIR scheme to use in the retrieval phase? How can we jointly design the schemes in the two phases such that the expected normalized download cost is the lowest in the second phase?

3. Main Results and Discussion

We characterize the optimal normalized download cost for PIR from decentralized uncoded caching databases in the following theorem.
Theorem 1.
For PIR from decentralized uncoded caching databases with K files, where each file is of size L bits, N databases in addition to a data center available in the retrieval phase, and a storage size constraint μ K L , 0 < μ < 1 , bits for each database, the optimal normalized download cost is
D * = n = 1 N + 1 N n 1 μ n 1 ( 1 μ ) N + 1 n 1 + 1 n + + 1 n K 1 .
The achievability scheme is provided in Section 4, and the converse proof is shown in Section 5. We first use the following example to show the main ingredients of Theorem 1.

3.1. Motivating Example: K = 3 and N = 2

In this example, we consider the case where the data center stores K = 3 independent files labeled as A, B, and C, where each file is of size L bits. In the caching phase, several databases with storage capacity of 3 μ L bits are present in the system. We will show that the optimal normalized download cost is D L = 17 18 μ 2 5 2 μ + 3 when N = 2 databases in addition to the data center are available in the retrieval phase.

3.1.1. Achievability Scheme

In the caching phase, to satisfy the storage size constraint, each database randomly and uniformly stores 3 μ L bits out of a total of 3 L bits from the data center. Each database operates independently through the same probability distribution resulting in decentralized caching.
In the retrieval phase, suppose N = 2 databases, labeled as DB 1 and DB 2 , in addition to the data center, labeled as DB 0 , are available to the user, and the user wishes to retrieve file A privately. Let us first focus on one file, say A. We can partition file A into four subfiles
A = ( A 0 , A 0 , 1 , A 0 , 2 , A 0 , 1 , 2 ) ,
where, for S { 0 , 1 , 2 } , A S denotes the bits of file A which are stored in databases in S. For example, A 0 denotes the bits of file A only stored in DB 0 and A 0 , 2 denotes the bits of file A stored in DB 0 and DB 2 and so on. Since each bit is stored in the data center, 0 exists in the label of every partition. By the law of large numbers,
| A S |   =   L μ | S | 1 ( 1 μ ) 3 | S | + o ( L ) ,
when the file size is large enough. We can do the same partitions for files B and C.
To retrieve file A privately, we first retrieve the subfile A 0 , 1 , 2 privately. We apply the PIR scheme proposed in [12] to retrieve the subfile A 0 , 1 , 2 . Subfile A 0 , 1 , 2 is replicated in 3 databases and the total number of files is three since we also have B 0 , 1 , 2 and C 0 , 1 , 2 . Therefore, we download
L μ 2 1 + 1 3 + 1 9 + o ( L )
bits. We also need to retrieve the subfile A 0 , 1 privately. Subfile A 0 , 1 is replicated in 2 databases and the total number of files is 3 since we also have B 0 , 1 and C 0 , 1 . By applying the PIR scheme in [12], we download
L μ ( 1 μ ) 1 + 1 2 + 1 4 + o ( L )
bits. Next, we need to retrieve the subfile A 0 , 2 privately. Using [12], we download
L μ ( 1 μ ) 1 + 1 2 + 1 4 + o ( L )
bits. Finally, we need to retrieve A 0 privately. Using [12], we download
L ( 1 μ ) 2 ( 1 + 1 + 1 ) + o ( L )
bits. By adding (14)–(17), we show that the normalized download cost
17 18 μ 2 5 2 μ + 3
is achievable.

3.1.2. Converse Proof

Here, we show that among all the decentralized caching probability distributions P H , the lowest normalized download cost for N = 2 databases is as shown in (18). Given a decentralized caching probability distribution P H , we have a resulting H in the retrieval phase.
We lower bound D H first. In the retrieval phase, the stored content of DB 0 , DB 1 , and DB 2 are fixed and uncoded, i.e., Z 0 , Z 1 and Z 2 are fixed and uncoded. We can apply the lower bound in Equation (31) in [44] as the lower bound for D H . Therefore,
D H L + 4 27 k = 1 3 H ( W k ) + 11 108 i = 0 2 k = 1 3 H ( W k | Z i ) + 17 54 i = 0 2 k = 1 3 H ( W k | Z [ 0 : 2 ] \ i ) + o ( L )
= 13 9 L + 11 108 i = 1 2 k = 1 3 H ( W k | Z i ) + 17 54 k = 1 3 H ( W k | Z 1 , Z 2 ) + o ( L )
13 9 L + 11 108 3 L 3 μ L + 3 L 3 μ L + 17 54 k = 1 3 H ( W k | Z 1 , Z 2 ) + o ( L )
= 37 18 L 11 18 μ L + 17 54 H ( W 1 : 3 | Z 1 , Z 2 ) + o ( L ) ,
where (20) holds due to Z 0 = ( W 1 , W 2 , W 3 ) , and (21) holds due to (2). We note that different H results in different Z 1 and Z 2 .
We lower bound D now. From (22), we have
D = E H D H 37 18 L 11 18 μ L + 17 54 E H H ( W 1 : 3 | Z 1 , Z 2 ) + o ( L ) .
Let random variables X i , j ( n ) , i = 1 , , L , j = 1 , , K , be the indicator functions showing that the i-th bit of file W j is cached in DB n or not, i.e., X i , j ( n ) = 1 means that the i-th bit of file W j is stored in DB n and X i , j ( n ) = 0 means that it is not stored in DB n . For DB 1 we have
X 1 , 1 ( 1 ) + + X L , 1 ( 1 ) + X 1 , 2 ( 1 ) + + X L , 2 ( 1 ) + X 1 , 3 ( 1 ) + + X L , 3 ( 1 ) 3 μ L ,
due to the storage size constraint in (2). We note that P H induces probability measures on random variables X i , j ( n ) , and let X i , j ( n ) = 1 with probability p i , j , where we remove the superscript n since each database adopts the same probability distribution P H to choose the cached bits due to the decentralized property. By taking expectation on (24) and applying the linearity of expectation, we have
E [ X 1 , 1 ( 1 ) ] + + E [ X L , 3 ( 1 ) ] 3 μ L ,
which yields
p 1 , 1 + + p L , 3 3 μ L .
Let random variables V i , j , i = 1 , , L , j = 1 , , K , be the indicator functions showing that the i-th bit of file W j is not cached in DB 1 and DB 2 , i.e., V i , j = 1 means that the i-th bit of file W j is not stored in either DB 1 or DB 2 . Therefore, we have
V i , j = ( 1 X i , j ( 1 ) ) ( 1 X i , j ( 2 ) ) .
Now, we can evaluate E H H ( W 1 : 3 | Z 1 , Z 2 ) in (23) as follows
E H H ( W 1 : 3 | Z 1 , Z 2 ) = E [ V 1 , 1 + + V L , 3 ]
= E [ V 1 , 1 ] + + E [ V L , 3 ]
= ( 1 p 1 , 1 ) 2 + + ( 1 p L , 3 ) 2 .
Therefore, continuing from (23), we have
D 37 18 L 11 18 μ L + 17 54 ( 1 p 1 , 1 ) 2 + + ( 1 p L , 3 ) 2 + o ( L ) ,
where p 1 , 1 , …, p L , 3 are subject to (26). To further lower bound the right hand side of (31), we minimize the right hand side with respect to p i , j subject to (26). Hence, we consider the following Lagrangian
L ( p 1 , 1 , , p L , 3 , λ ) = ( 1 p 1 , 1 ) 2 + + ( 1 p L , 3 ) 2 + λ p 1 , 1 + + p L , 3 3 μ L .
From the KKT conditions, we have
λ = 2 ( 1 p i , j ) , i = 1 , , L , j = 1 , 2 , 3 .
Thus, we can further lower bound (31) by letting p 1 , 1 = = p L , 3 = μ , and we have
D L 37 18 11 18 μ + 17 54 3 ( 1 μ ) 2 + o ( L ) L
= 17 18 μ 2 5 2 μ + 3 + o ( L ) L .
Therefore, we show that the optimal normalized download cost is 17 18 μ 2 5 2 μ + 3 when N = 2 databases in addition to the data center are available in the retrieval phase. To achieve the optimal normalized download cost, each database should randomly and uniformly store the bits in the caching phase.

3.2. Further Examples and Numerical Results

Now, we use different scenarios to illustrate the optimal normalized download cost in (11). We first consider the scenario where the data center contains K = 10 files, each database with storage size constraint μ = 1 2 , and in the retrieval phase, the user can access N = 0 , , 30 databases in addition to the data center. We plot the expected normalized download cost versus the different number of available databases in Figure 5. When N = 0 , in order to download the desired file privately, the user should download all the files in the data center, and this results in a download cost of D L = K = 10 . As the number of accessible databases increases, the normalized download cost decreases. We next consider the scenario where the data center contains K = 10 files, and the user can access N = 5 databases in addition to the data center in the retrieval phase. We plot the expected normalized download cost versus different storage size constraint μ in Figure 6. When μ = 0 , in order to download the desired file privately, the user should download all the files in the data center resulting in D L = K = 10 . As μ increases, the normalized download cost decreases. Finally, we conclude this section with the following general remarks about our main result.

3.3. Remarks

Remark 1.
The achievability scheme consists of two parts, the design of the probability distribution in the caching phase and the PIR scheme in the retrieval phase. We find that the uniform and random caching scheme, originally proposed in [57] for decentralized coded caching, results in the optimal normalized download cost in the retrieval phase. We remark here that the symmetric batch caching scheme, originally proposed in [55] for centralized coded caching, also results in the optimal normalized download cost for PIR from centralized uncoded caching databases [44]. In the retrieval phase, according to the distribution of the subfiles, we apply the PIR scheme proposed in [12] for all subfiles to retrieve the desired file.
Remark 2.
For the converse, we first apply the lower bound derived in [44] which introduces new ingredients in addition to the interference lower bound lemma and induction lemma in Lemmas 5 and 6 in [12]. We note that in [44] the authors replace random variables for queries and answering strings by the contents of the distributed databases in a novel way which is crucial for the converse. With this replacement, we can account for different cached content in the caching phase resulting in different lower bound in the normalized download cost in the retrieval phase. Due to the nature of uncoded caching, this replacement facilitates further lower bound. For the decentralized problem here, to compare different probability distributions in the caching phase, we focus on the marginal distributions on each bit. This transformation allows us to use linearity of expectation, and the nature of decentralization and uncoded caching to further lower bound the expected normalized download cost.
Remark 3.
A more directly related PIR problem from centralized uncoded caching databases for our setting is the one where, in the caching phase, the data center arranges the files in N databases in a centralized manner, and in the retrieval phase, the user has access also to the data center in addition to the N databases. This is different from the problem setting in [38,44], since there the user can only access the N databases in the retrieval phase. As a side note, we can show that the symmetric batch caching scheme is still optimal for this extended problem setting where the data center also participates in the PIR stage. Rigorously, the optimal trade-off between storage and download cost, in this case, is given by the lower convex envelope of the following ( μ , D ( μ ) ) pairs, for t = 0 , 1 , , N ,
μ = t N , D ( μ ) = k = 0 K 1 1 ( t + 1 ) k .
To achieve this trade-off, the data center arranges the files into the N databases as in [38,44]. In the retrieval phase, the user accesses also the data center; therefore, the subfiles are stored in one more database. For the converse, we no longer require all the N databases to reconstruct the entire K files as in [38,44]. Thus, while in [38,44] the smallest allowable μ is μ = 1 N , since the N databases need to reconstruct the entire K files, here since the user can access the data center, the parameter μ starts from 0. Now, we can compare PIR from centralized caching databases and PIR from decentralized caching databases fairly, since, in the retrieval phase, the user can access the data center in both cases. We consider the case where K = 10 and N = 5 , and plot the result in Figure 7.

4. Achievability Scheme

The achievability scheme consists of two parts: the design of the probability distribution used in the caching phase and the PIR scheme used in the retrieval phase. In the caching phase, each database uniformly and randomly stores μ K L bits from the data center. The storage size constraint in (2) is satisfied directly. Each database operates independently through the same probability distribution resulting in decentralized caching.
In the retrieval phase, suppose there are N databases in addition to the data center available to the user. Each file W j can be expressed as
W j = { 0 } S { 0 , 1 , , N } W j , S ,
where W j , S represents the bits of file W j which are stored in databases in S. Since each bit must be stored in the data center, i.e., DB 0 , we have { 0 } S . By the law of large numbers,
| W j , S |   =   L μ | S | 1 ( 1 μ ) N + 1 | S | + o ( L ) ,
when the file size is large enough.
To retrieve the desired file, say W j , privately, we retrieve each subfile, W j , S , privately. Subfile W j , S is replicated in | S | databases, and for each of these | S | databases, there are K subfiles, i.e., W k , S , k = 1 , , K . We apply the PIR scheme in [12] to retrieve W j , S privately by downloading
L μ | S | 1 ( 1 μ ) N + 1 | S | 1 + 1 | S | + + 1 | S | K 1 + o ( L )
bits. We also note that there are N | S | 1 types of W j , S . Therefore, the following normalized download cost
D L = n = 1 N + 1 N n 1 μ n 1 ( 1 μ ) N + 1 n 1 + 1 n + + 1 n K 1
is achievable.

5. Converse Proof

We first derive a lower bound for D H . Since in the retrieval phase the content of DB 0 , …, DB N , are fixed to be Z 0 , …, Z N , we can use the lower bound derived in Equation (71) in [44] to serve as the lower bound for D H . A key step to obtain Equation (71) in [44] is to replace the query and answering string random variables with the content of each database, i.e., replacement of Q N [ k ] and A N [ k ] with Z N . With this replacement, one can account for different cached content in the caching phase resulting in different lower bound in the normalized download cost in the retrieval phase. In addition, due to the nature of uncoded caching, this replacement facilitates a further lower bound. Moreover, to obtain Equation (71) in [44], the authors find interesting recursive relationships to compactly deal with the nested harmonic sums. Therefore, from Equation (71) in [44] we have
D H L + l = 1 N + 1 N + 1 l 1 l + 1 l 2 + + 1 l K 1 x l ,
where
x l δ 1 K N + 1 l { 0 } S [ 0 : N ] , | S | = l H ( W 1 : K , S ) , l [ 1 : N + 1 ] ,
and W 1 : K , S represents the bits of files W 1 : K which are stored in databases in S.
In the following lemma, we develop a lower bound for E [ x l ] .
Lemma 1.
For l [ 1 : N + 1 ] , and x l given in (42), we have
E [ x l ] L μ l 1 ( 1 μ ) N + 1 l N l 1 N + 1 l .
Proof 1.
By taking expectation on (42) and using the linearity of expectation, we have
E [ x l ] = 1 K N + 1 l { 0 } S [ 0 : N ] , | S | = l E [ H ( W 1 : K , S ) ] .
Let random variables X i , j ( n ) , i = 1 , , L , j = 1 , , K , be the indicator functions showing that the i-th bit of file W j is cached in DB n , n = 0 , , N , or not, i.e., X i , j ( n ) = 1 means that the i-th bit of file W j is stored in DB n and X i , j ( n ) = 0 means that it is not stored in DB n . For DB n we have
X 1 , 1 ( n ) + + X L , 1 ( n ) + + X 1 , K ( n ) + + X L , K ( n ) μ K L ,
due to the storage size constraint in (2). We note that P H induces probability measures on random variables X i , j ( n ) , and let X i , j ( n ) = 1 with probability p i , j , where we remove the superscript n since each database adopts the same probability distribution P H to choose the cached bits due to the decentralized caching property. By taking expectation on (45) and applying the linearity of expectation, we have
E [ X 1 , 1 ( n ) ] + + E [ X L , K ( n ) ] μ K L ,
which yields
p 1 , 1 + + p L , K μ K L . .
Let random variables Y i , j S , i = 1 , , L , j = 1 , , K , be the indicator functions showing that the i-th bit of file W j is cached in DB n , n S , i.e., Y i , j = 1 means that the i-th bit of the file W j is stored in DB n , n S . Therefore, we have
Y i , j S = n S X i , j ( n ) n [ 0 : N ] \ S ( 1 X i , j ( n ) ) .
Now, we can evaluate E H ( W 1 : K , S ) in (44) as follows
E H ( W 1 : K , S ) = E [ Y 1 , 1 S + + Y L , K S ]
= E [ Y 1 , 1 S ] + + E [ Y L , K S ]
= p 1 , 1 | S | 1 ( 1 p 1 , 1 ) N + 1 | S | + + p L , K | S | 1 ( 1 p L , K ) N + 1 | S | ,
where p 1 , 1 , …, p L , K are subject to (47). Now, continuing from (44), we have
E [ x l ] = 1 K N + 1 l { 0 } S [ 0 : N ] , | S | = l p 1 , 1 l 1 ( 1 p 1 , 1 ) N + 1 l + + p L , K l 1 ( 1 p L , K ) N + 1 l .
To further lower bound (52), we consider the following Lagrangian
L ( p 1 , 1 , , p L , K , λ ) = p 1 , 1 l 1 ( 1 p 1 , 1 ) N + 1 l + + p L , K l 1 ( 1 p L , K ) N + 1 l + λ p 1 , 1 + + p L , K μ K L .
From the KKT conditions, we have
λ = p i , j l 1 ( N + 1 l ) ( 1 p i , j ) N l ( l 1 ) p i , j l 2 ( 1 p i , j ) N + 1 l ,
where i = 1 , , L , j = 1 , , K . Therefore, we can further lower bound (52) by letting p 1 , 1 = = p L , K = μ , then we have
E [ x l ] 1 K N + 1 l { 0 } S [ 0 : N ] , | S | = l K L μ l 1 ( 1 μ ) N + 1 l
= L μ l 1 ( 1 μ ) N + 1 l N l 1 N + 1 l ,
which completes the proof. □
Finally, by taking expectation and applying Lemma 1 to (41), we obtain
D L 1 + l = 1 N + 1 N l 1 1 l + 1 l 2 + + 1 l K 1 μ l 1 ( 1 μ ) N + 1 l
= μ + ( 1 μ ) N + l = 1 N + 1 N l 1 1 l + 1 l 2 + + 1 l K 1 μ l 1 ( 1 μ ) N + 1 l
= l = 1 N + 1 N l 1 1 + 1 l + 1 l 2 + + 1 l K 1 μ l 1 ( 1 μ ) N + 1 l
which matches (40).

6. Conclusions

We considered the PIR problem from decentralized uncoded caching databases. Due to the nature of decentralization and the storage size constraint, we allow the user to access the data center in the retrieval phase to guarantee that the user can reconstruct the entire desired file. We showed that uniform and random decentralized caching scheme, originally proposed in [57] for the problem of decentralized coded caching, results in the lowest expected normalized download cost in the PIR phase. We characterized the expected normalized download cost to be D L = n = 1 N + 1 N n 1 μ n 1 ( 1 μ ) N + 1 n 1 + 1 n + + 1 n K 1 . For the achievability, we applied the PIR scheme in [12] for all subfiles. For the converse, we first applied the lower bound derived in [44], and to compare different probability distributions in the caching phase, we focused on the marginal distributions on individual bits. By using the nature of decentralization and uncoded caching, we further lower bounded the normalized download cost. Finally, we showed the matching converse for the expected normalized download cost, obtaining the exact capacity of the resulting PIR problem.

Author Contributions

All authors contributed equally in all aspects.

Funding

This work was supported by NSF Grants CNS 15-26608, CCF 17-13977 and ECCS 18-07348.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chor, B.; Kushilevitz, E.; Goldreich, O.; Sudan, M. Private information retrieval. J. ACM 1998, 45, 965–981. [Google Scholar] [CrossRef]
  2. Gasarch, W. A survey on private information retrieval. Bull. EATCS 2004, 82, 72–107. [Google Scholar]
  3. Cachin, C.; Micali, S.; Stadler, M. Computationally private information retrieval with polylogarithmic communication. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999. [Google Scholar]
  4. Ostrovsky, R., III; Skeith, W.E. A survey of single-database private information retrieval: Techniques and applications. In Proceedings of the International Workshop on Public Key Cryptography, Beijing, China, 16–20 April 2007; pp. 393–411. [Google Scholar]
  5. Yekhanin, S. Private information retrieval. Commun. ACM 2010, 53, 68–73. [Google Scholar] [CrossRef]
  6. Shah, N.B.; Rashmi, K.V.; Ramchandran, K. One extra bit of download ensures perfectly private information retrieval. In Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014. [Google Scholar]
  7. Fanti, G.; Ramchandran, K. Efficient Private Information Retrieval Over Unsynchronized Databases. IEEE J. Sel. Top. Signal Process. 2015, 9, 1229–1239. [Google Scholar] [CrossRef]
  8. Chan, T.; Ho, S.; Yamamoto, H. Private information retrieval for coded storage. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015. [Google Scholar]
  9. Fazeli, A.; Vardy, A.; Yaakobi, E. Codes for distributed PIR with low storage overhead. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015. [Google Scholar]
  10. Tajeddine, R.; Rouayheb, S.E. Private information retrieval from MDS coded data in distributed storage systems. IEEE Trans. Inf. Theory 2016, 64, 7081–7093. [Google Scholar] [CrossRef]
  11. Sun, H.; Jafar, S.A. The Capacity of Private Information Retrieval. In Proceedings of the IEEE Globecom, Washington, DC, USA, 4–8 December 2016. [Google Scholar]
  12. Sun, H.; Jafar, S.A. The Capacity of Private Information Retrieval. IEEE Trans. Inf. Theory 2017, 63, 4075–4088. [Google Scholar] [CrossRef]
  13. Sun, H.; Jafar, S.A. The Capacity of Robust Private Information Retrieval with Colluding Databases. IEEE Trans. Inf. Theory 2018, 64, 2361–2370. [Google Scholar] [CrossRef]
  14. Sun, H.; Jafar, S.A. The Capacity of Symmetric Private Information Retrieval. IEEE Trans. Inf. Theory 2019, 65, 322–329. [Google Scholar] [CrossRef]
  15. Banawan, K.; Ulukus, S. The Capacity of Private Information Retrieval from Coded Databases. IEEE Trans. Inf. Theory 2018, 64, 1945–1956. [Google Scholar] [CrossRef]
  16. Sun, H.; Jafar, S.A. Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2920–2932. [Google Scholar] [CrossRef]
  17. Wang, Q.; Skoglund, M. Symmetric Private Information Retrieval For MDS Coded Distributed Storage. arXiv 2016, arXiv:1610.04530. [Google Scholar]
  18. Sun, H.; Jafar, S.A. Multiround Private Information Retrieval: Capacity and Storage Overhead. IEEE Trans. Inf. Theory 2018, 64, 5743–5754. [Google Scholar] [CrossRef]
  19. Freij-Hollanti, R.; Gnilke, O.; Hollanti, C.; Karpuk, D. Private Information Retrieval from Coded Databases with Colluding Servers. SIAM J. Appl. Algebra Geom. 2017, 1, 647–664. [Google Scholar] [CrossRef]
  20. Sun, H.; Jafar, S.A. Private Information Retrieval from MDS Coded Data with Colluding Servers: Settling a Conjecture by Freij-Hollanti et al. IEEE Trans. Inf. Theory 2018, 64, 1000–1022. [Google Scholar] [CrossRef]
  21. Tajeddine, R.; Gnilke, O.W.; Karpuk, D.; Freij-Hollanti, R.; Hollanti, C.; Rouayheb, S.E. Private Information Retrieval Schemes for Coded Data with Arbitrary Collusion Patterns. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017. [Google Scholar]
  22. Banawan, K.; Ulukus, S. Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes. IEEE Trans. Inf. Theory 2018, 64, 6842–6862. [Google Scholar] [CrossRef]
  23. Zhang, Y.; Ge, G. A general private information retrieval scheme for MDS coded databases with colluding servers. arXiv 2017, arXiv:1704.06785. [Google Scholar] [CrossRef]
  24. Zhang, Y.; Ge, G. Multi-file Private Information Retrieval from MDS Coded Databases with Colluding Servers. arXiv 2017, arXiv:1705.03186. [Google Scholar]
  25. Banawan, K.; Ulukus, S. The Capacity of Private Information retrieval from Byzantine and Colluding Databases. IEEE Trans. Inf. Theory 2018, 65, 1206–1219. [Google Scholar] [CrossRef]
  26. Tandon, R. The Capacity of Cache Aided Private Information Retrieval. In Proceedings of the 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 3–6 October 2017. [Google Scholar]
  27. Wang, Q.; Skoglund, M. Secure Symmetric Private Information Retrieval from Colluding Databases with Adversaries. arXiv 2017, arXiv:1707.02152. [Google Scholar]
  28. Tajeddine, R.; Rouayheb, S.E. Robust private information retrieval on coded data. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017. [Google Scholar]
  29. Wang, Q.; Skoglund, M. Linear Symmetric Private Information Retrieval for MDS Coded Distributed Storage with Colluding Servers. arXiv 2017, arXiv:1708.05673. [Google Scholar]
  30. Kadhe, S.; Garcia, B.; Heidarzadeh, A.; Rouayheb, S.E.; Sprintson, A. Private Information Retrieval with Side Information. arXiv 2017, arXiv:1709.00112. [Google Scholar] [CrossRef]
  31. Wei, Y.P.; Banawan, K.; Ulukus, S. Fundamental Limits of Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching. IEEE Trans. Inf. Theory 2019, 65, 3215–3232. [Google Scholar] [CrossRef]
  32. Chen, Z.; Wang, Z.; Jafar, S.A. The Capacity of Private Information Retrieval with Private Side Information. arXiv 2017, arXiv:1709.03022. [Google Scholar]
  33. Wei, Y.P.; Banawan, K.; Ulukus, S. The capacity of private information retrieval with partially known private side information. IEEE Trans. Inf. Theory 2019. [Google Scholar] [CrossRef]
  34. Wang, Q.; Skoglund, M. Secure Private Information Retrieval from Colluding Databases with Eavesdroppers. arXiv 2017, arXiv:1710.01190. [Google Scholar]
  35. Sun, H.; Jafar, S.A. The capacity of private computation. IEEE Trans. Inf. Theory 2018, 65, 3880–3897. [Google Scholar] [CrossRef]
  36. Kim, M.; Yang, H.; Lee, J. Cache-aided private information retrieval. In Proceedings of the 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 3–6 October 2017. [Google Scholar]
  37. Mirmohseni, M.; Maddah-Ali, M.A. Private Function Retrieval. arXiv 2017, arXiv:1711.04677. [Google Scholar]
  38. Abdul-Wahid, M.; Almoualem, F.; Kumar, D.; Tandon, R. Private Information Retrieval from Storage Constrained Databases—Coded Caching meets PIR. arXiv 2017, arXiv:1711.05244. [Google Scholar]
  39. Wei, Y.P.; Banawan, K.; Ulukus, S. Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching: Fundamental Limits. IEEE J. Sel. Areas Commun. 2018, 36, 1126–1139. [Google Scholar] [CrossRef]
  40. Banawan, K.; Ulukus, S. Asymmetry hurts: Private information retrieval under asymmetric traffic constraints. IEEE Trans. Inf. Theory 2019, 65, 7628–7645. [Google Scholar] [CrossRef]
  41. Chen, Z.; Wang, Z.; Jafar, S.A. The Asymptotic Capacity of Private Search. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018. [Google Scholar]
  42. Banawan, K.; Ulukus, S. Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security. arXiv 2018, arXiv:1801.06171. [Google Scholar]
  43. Wang, Q.; Sun, H.; Skoglund, M. The capacity of private information retrieval with eavesdroppers. IEEE Trans. Inf. Theory 2018, 65, 3198–3214. [Google Scholar] [CrossRef]
  44. Attia, M.A.; Kumar, D.; Tandon, R. The Capacity of Private Information Retrieval from Uncoded Storage Constrained Databases. arXiv 2018, arXiv:1805.04104. [Google Scholar]
  45. Wei, Y.P.; Ulukus, S. The Capacity of Private Information Retrieval with Private Side Information Under Storage Constraints. arXiv 2018, arXiv:1806.01253. [Google Scholar] [CrossRef]
  46. Tajeddine, R.; Gnilke, O.W.; Karpuk, D.; Freij-Hollanti, R.; Hollanti, C. Private Information Retrieval from Coded Storage Systems with Colluding, Byzantine, and Unresponsive Servers. IEEE Trans. Inf. Theory 2019, 65, 3898–3906. [Google Scholar] [CrossRef]
  47. Banawan, K.; Ulukus, S. Noisy private information retrieval: On separability of channel coding and information retrieval. IEEE Trans. Inf. Theory 2019. [Google Scholar] [CrossRef]
  48. Jia, Z.; Sun, H.; Jafar, S.A. Cross Subspace Alignment and the Asymptotic Capacity of X-Secure T-Private Information Retrieval. IEEE Trans. Inf. Theory 2019, 65, 5783–5798. [Google Scholar] [CrossRef]
  49. Tian, C.; Sun, H.; Chen, J. Capacity-Achieving Private Information Retrieval Codes with Optimal Message Size and Upload Cost. IEEE Trans. Inf. Theory 2019, 65, 7613–7627. [Google Scholar] [CrossRef]
  50. Kumar, S.; i Amat, A.G.; Rosnes, E.; Senigagliesi, L. Private Information Retrieval From a Cellular Network With Caching at the Edge. IEEE Trans. Commun. 2019, 67, 4900–4912. [Google Scholar] [CrossRef]
  51. Bitar, R.; Rouayheb, S.E. Staircase-PIR: Universally Robust Private Information Retrieval. In Proceedings of the 2018 IEEE Information Theory Workshop (ITW), Guangzhou, China, 25–29 November 2018. [Google Scholar]
  52. Li, S.; Gastpar, M. Converse for Multi-Server Single-Message PIR with Side Information. arXiv 2018, arXiv:1809.09861. [Google Scholar]
  53. D’Oliveira, R.G.; Rouayheb, S.E. One-Shot PIR: Refinement and Lifting. arXiv 2018, arXiv:1810.05719. [Google Scholar]
  54. Tajeddine, R.; Wachter-Zeh, A.; Hollanti, C. Private Information Retrieval over Networks. arXiv 2018, arXiv:1810.08941. [Google Scholar]
  55. Maddah-Ali, M.A.; Niesen, U. Fundamental limits of caching. IEEE Trans. Inf. Theory 2014, 60, 2856–2867. [Google Scholar] [CrossRef]
  56. Yu, Q.; Maddah-Ali, M.A.; Avestimehr, A.S. The exact rate-memory tradeoff for caching with uncoded prefetching. IEEE Trans. Inf. Theory 2018, 64, 1281–1296. [Google Scholar] [CrossRef]
  57. Maddah-Ali, M.A.; Niesen, U. Decentralized coded caching attains order-optimal memory-rate tradeoff. IEEE/ACM Trans. Netw. 2015, 23, 1029–1040. [Google Scholar] [CrossRef]
  58. Ji, M.; Caire, G.; Molisch, A.F. Fundamental limits of caching in wireless D2D networks. IEEE Trans. Inf. Theory 2016, 62, 849–869. [Google Scholar] [CrossRef] [Green Version]
  59. Pedarsani, R.; Maddah-Ali, M.A.; Niesen, U. Online coded caching. IEEE/ACM Trans. Netw. 2016, 24, 836–845. [Google Scholar] [CrossRef]
  60. Ghasemi, H.; Ramamoorthy, A. Improved lower bounds for coded caching. IEEE Trans. Inf. Theory 2017, 63, 4388–4413. [Google Scholar] [CrossRef]
  61. Shanmugam, K.; Ji, M.; Tulino, A.M.; Llorca, J.; Dimakis, A.G. Finite-length analysis of caching-aided coded multicasting. IEEE Trans. Inf. Theory 2016, 62, 5524–5537. [Google Scholar] [CrossRef] [Green Version]
  62. Sengupta, A.; Tandon, R.; Clancy, T.C. Fundamental limits of caching with secure delivery. IEEE Trans. Inf. Forensics Secur. 2015, 10, 355–370. [Google Scholar] [CrossRef] [Green Version]
  63. Zhang, J.; Elia, P. Fundamental limits of cache-aided wireless BC: Interplay of coded-caching and CSIT feedback. IEEE Trans. Inf. Theory 2017, 63, 3142–3160. [Google Scholar] [CrossRef]
  64. Xu, F.; Tao, M.; Liu, K. Fundamental tradeoff between storage and latency in cache-aided wireless interference networks. IEEE Trans. Inf. Theory 2017, 63, 7464–7491. [Google Scholar] [CrossRef]
  65. Tian, C.; Chen, J. Caching and delivery via interference elimination. IEEE Trans. Inf. Theory 2018, 64, 1548–1560. [Google Scholar] [CrossRef]
  66. Bidokhti, S.S.; Wigger, M.; Timo, R. Noisy broadcast networks with receiver caching. IEEE Trans. Inf. Theory 2018, 64, 6996–7016. [Google Scholar] [CrossRef] [Green Version]
  67. Yu, Q.; Maddah-Ali, M.A.; Avestimehr, A.S. Characterizing the rate-memory tradeoff in cache networks within a factor of 2. IEEE Trans. Inf. Theory 2018, 65, 647–663. [Google Scholar] [CrossRef]
  68. Ibrahim, A.M.; Zewail, A.A.; Yener, A. Coded Caching for Heterogeneous Systems: An Optimization Perspective. IEEE Trans. Commun. 2019, 67, 5321–5335. [Google Scholar] [CrossRef] [Green Version]
  69. Hassanzadeh, P.; Tulino, A.M.; Llorca, J.; Erkip, E. Rate-memory trade-off for caching and delivery of correlated sources. arXiv 2018, arXiv:1806.07333. [Google Scholar]
  70. Wan, K.; Tuninetti, D.; Piantanida, P. On the optimality of uncoded cache placement. In Proceedings of the 2016 IEEE Information Theory Workshop (ITW), Cambridge, UK, 11–14 September 2016. [Google Scholar]
  71. Yang, Q.; Gündüz, D. Coded caching and content delivery with heterogeneous distortion requirements. IEEE Trans. Inf. Theory 2018, 64, 4347–4364. [Google Scholar] [CrossRef]
  72. Zewail, A.A.; Yener, A. Combination networks with or without secrecy constraints: The impact of caching relays. IEEE J. Sel. Areas Commun. 2018, 36, 1140–1152. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Joint centralized caching and the private information retrieval (PIR) problem.
Figure 1. Joint centralized caching and the private information retrieval (PIR) problem.
Information 10 00372 g001
Figure 2. PIR from centralized caching databases.
Figure 2. PIR from centralized caching databases.
Information 10 00372 g002
Figure 3. PIR from decentralized caching databases.
Figure 3. PIR from decentralized caching databases.
Information 10 00372 g003
Figure 4. PIR from decentralized caching databases with K = 3 , N = 2 , and μ = 1 3 .
Figure 4. PIR from decentralized caching databases with K = 3 , N = 2 , and μ = 1 3 .
Information 10 00372 g004
Figure 5. PIR from different number of available databases in the retrieval phase with K = 10 and μ = 1 2 .
Figure 5. PIR from different number of available databases in the retrieval phase with K = 10 and μ = 1 2 .
Information 10 00372 g005
Figure 6. PIR from N = 5 databases with different storage constraint μ with K = 10 .
Figure 6. PIR from N = 5 databases with different storage constraint μ with K = 10 .
Information 10 00372 g006
Figure 7. PIR from centralized caching databases and decentralized caching databases.
Figure 7. PIR from centralized caching databases and decentralized caching databases.
Information 10 00372 g007

Share and Cite

MDPI and ACS Style

Wei, Y.-P.; Arasli, B.; Banawan, K.; Ulukus, S. The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases. Information 2019, 10, 372. https://0-doi-org.brum.beds.ac.uk/10.3390/info10120372

AMA Style

Wei Y-P, Arasli B, Banawan K, Ulukus S. The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases. Information. 2019; 10(12):372. https://0-doi-org.brum.beds.ac.uk/10.3390/info10120372

Chicago/Turabian Style

Wei, Yi-Peng, Batuhan Arasli, Karim Banawan, and Sennur Ulukus. 2019. "The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases" Information 10, no. 12: 372. https://0-doi-org.brum.beds.ac.uk/10.3390/info10120372

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop