Next Article in Journal
The Criticality of Consciousness: Excitatory–Inhibitory Balance and Dual Memory Systems in Active Inference
Previous Article in Journal
Robust Unsupervised Feature Selection Algorithm Based on Fuzzy Anchor Graph
Previous Article in Special Issue
Variable-Length Coding with Zero and Non-Zero Privacy Leakage
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Towards Characterizing the Download Cost of Cache-Aided Private Updating †

1
Department of Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28223, USA
2
Department of Electronics and Communications Engineering, The American University in Cairo, New Cairo 11835, Egypt
3
Electrical Engineering Department, Faculty of Engineering, Alexandria University, Alexandria 21544, Egypt
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in Proceedings of the IEEE International Conference on Communications (ICC), Montreal, QC, Canada, 14–23 June 2021.
Entropy 2025, 27(8), 828; https://doi.org/10.3390/e27080828 (registering DOI)
Submission received: 19 May 2025 / Revised: 7 July 2025 / Accepted: 8 July 2025 / Published: 4 August 2025
(This article belongs to the Special Issue Information-Theoretic Security and Privacy)

Abstract

We consider the problem of privately updating a message out of K messages from N replicated and non-colluding databases where a user has an outdated version of the message W ^ θ of length L bits that differ from the current version W θ in at most f bits. The user also has a cache containing coded combinations of the K messages (with a pre-specified structure), which are unknown to the N databases (unknown prefetching). The cache Z contains linear combinations from all K messages in the databases with r = l L being the caching ratio. The user needs to retrieve W θ correctly using a private information retrieval (PIR) scheme without leaking information about the message index θ to any individual database. Our objective is to jointly design the prefetching (i.e., the structure of said linear combinations) and the PIR strategies to achieve the least download cost. We propose a novel achievable scheme based on syndrome decoding where the cached linear combinations in Z are designed to be bits pertaining to the syndrome of W θ according to a specific linear block code. We derive a general lower bound on the optimal download cost for 0 r 1 , in addition to achievable upper bounds. The upper and lower bounds match for the cases when r is exceptionally low or high, or when K = 3 messages for arbitrary r. Such bounds are derived by developing novel cache-aided arbitrary message length PIR schemes. Our results show a significant reduction in the download cost if f < L 2 when compared with downloading W θ directly using typical cached-aided PIR approaches.

1. Introduction

The problem of private information retrieval (PIR), introduced by Chor et al. in [1], seeks to find the most efficient way for a user to privately retrieve a single message from a set of K messages from N fully replicated and non-communicating databases. PIR schemes are designed to download a mixture of all K messages, with the least number of overhead downloaded bits, such that no single database can infer the identity of the desired message. The user accomplishes this task by sending a query to each database. The databases respond truthfully to the submitted query with an answer string. The user can then reconstruct the desired message from jointly decoding the returned answer strings. Recently, the problem of PIR has received growing interest from the information and coding theory communities. The classical PIR problem is reformulated using information-theoretic measures in the seminal work of Sun–Jafar [2]. In there, the performance metric of the PIR scheme is the retrieval rate, which is the ratio of the number of the desired message symbols to the total number of downloaded bits. The supremum of this ratio is denoted by the PIR capacity, C. Sun and Jafar characterize the PIR capacity of the classical PIR model to be
C = 1 + 1 N + 1 N 2 + + 1 N K 1 1 .
Following [2], the capacity (or its reciprocal, the normalized download cost) of many variations of the problem have been investigated; see [3,4,5,6,7,8,9,10,11,12,13,14,15,16,17], and the surveys in [18,19].
In all these works, the user is assumed to have no information about the desired message prior to retrieval. Thus, the queries are designed independently of the message contents. This is not always the case in practice. To see that, consider the following classical motivational example of PIR: in the stock market, investors need to privately retrieve some of the stock records since showing interest in a specific record may undesirably affect its value. PIR is a natural solution to this problem. Now, consider the case when an investor has already retrieved a specific stock record some time ago but this record has been changed. The investor needs to update the record at his/her side. A trivial solution to this problem is to reapply the original PIR scheme again. Nevertheless, this solution overlooks the fact that stock records are correlated in time. Another example arises in the context of private federated submodel learning [20], in which a user needs to retrieve the up-to-date desired submodel without leaking any information about its identity. The weights of each submodel are usually correlated in time as in the stock market example. In both examples, it is interesting to investigate whether or not the investor (user) can exploit the correlation between the outdated record (submodel) and its up-to-date counterpart to drive down the download cost. In this work, we focus our attention on a specific type of correlation, in which the up-to-date message is a distorted version of the outdated message according to a Hamming distortion measure.
The most closely related works to this problem are the PIR problems with side information, e.g., [21,22,23,24,25,26,27]. We also assume that the user has access to a private local cache containing equal portions of each message. Caching systems of this variety have been explored before in the PIR setting, e.g., [28,29], but not in conjunction with other forms of side information (outdated or updated). In the works regarding PIR with side information, the user has side information in the form of a subset of undesired messages, which are utilized to assist in privately retrieving the desired message. This is different from our setting, in which the user possesses side information in the form of an outdated desired message. Furthermore, these works differ from each other in whether the privacy of the side information should be maintained or not. This is different from our problem in which the identity of the desired and side information is the same, and therefore the privacy constraint in our problem is modified to reflect this fact.
In this work, we introduce the problem of cache-aided private updating with unknown prefetching for an L-bit length message out of a K-message library from N replicated and non-colluding databases. In this problem, the user has an outdated version W ^ θ of the desired message θ , and wishes to update it to its up-to-date version W θ . Furthermore, the user has information about the maximum Hamming distance f between the up-to-date message and its outdated counterpart, i.e., the user possesses W ^ θ , which differs in at most f bits from the desired up-to-date message W θ . Based on W ^ θ and f, the user needs to design a query set to reliably and privately decode the up-to-date version of the desired message W θ with the least number of downloaded bits. Equivalently, the user needs to privately retrieve an auxiliary message that corresponds to the flipped bit positions in the desired message. Similar to the works of [30,31], we assume that the databases can construct a mapping from the original library of messages into a more appropriate form that can assist the user in the retrieval process (in this work, we assume that the databases are semi-honest, in the sense that they truthfully obey the retrieval process, but the databases are curious to learn the identity of the desired file). The user also has access to a private cache Z containing linear combinations of each message, with r = l L being the caching ratio. The structure of such linear combinations is pre-specified to facilitate the retrieval procedure. By jointly designing the prefetching (i.e., the structure of the aforementioned cache contents) and the updating procedures, we aim at characterizing the optimal download cost needed to update W ^ θ to W θ given Z without disclosing the desired message index θ to any of the databases for arbitrary K, N, f, L, and r.
To that end, we propose a novel achievable scheme that is based on the syndrome decoding idea introduced in [32], and adapt it to our setting to exploit the correlation between W θ and W ^ θ . Hence, syndrome decoding is used to compress the desired message based on the user’s side information (i.e., the outdated message W ^ θ ). More specifically, the databases apply a linear transformation to the stored library of messages using the parity check matrix of a linear block code with carefully chosen parameters. The existence of such a code can be readily inferred from the Gilbert–Varshamov and the Hamming bounds [33]. This transformation, in effect, maps the messages into their corresponding syndromes. Thus, the problem is reduced to retrieving the syndrome representation of the messages (i.e., the auxiliary messages) that comprises L ¯ = log 2 i = 0 f L i L bits, where L is the original message length.
In the case of r = 0 , we directly apply the PIR scheme in [34] to the auxiliary messages of length L ¯ , which is optimal under the message length constraints. In the case where r satisfies 0 < r 1 1 + N + N 2 + + N K 1 (denoted as very low r), 1 1 + N r 1 (denoted as very high r), we extend the PIR scheme in [34] to the cache-aided setting in [29], and develop a novel cache-aided arbitrary message length PIR scheme to solve our problem. We also present an achievable scheme for the mid-range r, satisfying 1 1 + N + N 2 + + N K 1 < r < 1 1 + N , tailored for the case of K = 3 messages, and discuss possible extensions for arbitrary K afterwards. Like with the r = 0 case, we can then use this new cache-aided arbitrary message length scheme to download the auxiliary messages of length L ¯ with an effective caching ratio of r ˜ = l L ¯ . This is in effect a higher caching ratio than r, which in turns lead to a lower download cost as in [29]. For each of these cases, we confirm the validity of our proposed scheme by deriving a matching converse proof. Our converse proof is inspired by the converse proof of the cache-aided PIR problem with unknown and uncoded prefetching in [29], with the main difference being the fact that in addition to a private cache, the user has access to the outdated message W ^ θ , the index of which they wish to keep private. Consequently, we show that the optimal download cost is perfectly characterized for very high caching ratios, and is characterized within a maximum gap of only 2 bits otherwise. Notably, such a gap is 0 if L ¯ is an integer. This justifies the efficacy of using syndromes as a message-mixing technique in our setting. Furthermore, our results show that performing direct PIR on the original library of messages is strictly sub-optimal as long as the maximum Hamming distance f < L 2 .
The rest of the paper is organized as follows. Our system model is described in Section 2. The main results are presented in Section 3, with the main converse proof following in Section 4, and the achievability proofs in Section 5 and Section 6. Section 7 includes a discussion on extending our achievability results, and the paper is concluded in Section 8.

2. System Model

We consider a classical PIR problem with K independent, uncoded, messages W 1 , , W K , with each message consisting of L independent and uniformly distributed bits. We have
H ( W i ) = L , 1 i K ,
H ( W 1 , , W K ) = H ( W 1 ) + + H ( W K ) .
The K messages are stored in N replicated and non-communicating databases. The user (retriever) has a local copy of one of the messages whose index θ [ K ] is known to the user ( [ K ] denotes the set { 1 , 2 , , K } ) but not the database (this is true if message θ , for example, has been previously obtained in a private manner). However, this message stored locally is outdated, and the user wishes to update it so that it is consistent with the copies in the databases without revealing to any of the databases what the message index is.
The user also has a local cache memory whose contents are denoted by a random variable Z. The cache is populated through a prefetching phase in which the user caches pre-specified linear combinations from each message W i , i [ K ] , with l < L bits (specifically, we consider the case when the prefetching and retrieval strategies can be jointly designed, i.e., we assume that the information source performing the prefetching may provide a linear combination of its content with any desired structure to assist the user in minimizing the download cost in the retrieval phase). Such linear combinations are represented by a matrix multiplication W i R i , where R i is of dimension L × l . Thus, we have
Z = [ W 1 R 1 , W 2 R 2 , , W K R K ] .
The explicit design of R i , i [ K ] is specified along the lines of the achievability proof. We assume that the contents of the cache are unknown to the databases, as in, e.g., [21,27,29]. We define the caching ratio as
r = l L .
Observe that the number of cached bits pertaining to each message is equal to L r . It now follows that
H ( Z ) = i = 1 K H ( W i R i ) K L r ,
I ( W i ; Z ) = H ( W i R i ) L r , 1 i K .
The setting described above defines the cache-aided private updating problem with unknown prefetching.
Since each message is a string of L bits, the problem can be formulated as privately determining which subset of the message bits need to be flipped in order to fully update it. To model this, we use W ^ θ to represent the locally stored outdated message, W ¯ θ to represent the subset of bit indices that need to be flipped, and f to represent the maximum Hamming distance between W θ and W ^ θ (clearly, f 1 must hold; otherwise, there is no need to update W ^ θ ). Therefore, in order to update message θ , the user needs to flip at most f bits, i.e., W ¯ θ takes a value out of i = 0 f L i choices. We assume that such choices are uniformly distributed and independently realized from W ^ θ . Based on this model, the following holds:
H ( W θ ) = H ( W ^ θ ) = L ,
H ( W ¯ θ ) = log 2 i = 0 f L i L ¯ ,
H ( W θ | W ^ θ ) = H ( W ¯ θ | W ^ θ ) = L ¯ ,
H ( W ¯ θ | W ^ θ , W θ ) = 0 ,
| W ¯ θ | f L ,
where | · | denotes cardinality. We assume that the maximum Hamming distance f between the outdated and updated message is known to the user. By (9), one can see that L ¯ bits should be sufficient to update W ^ θ . Hence, one can set a maximum value on the number of cached bits from each message as follows (in case the number of cached bits is greater than this bound in (13), the extra bits can be ignored by the user):
l L ¯ .
In order to retrieve W θ , the user sends a set of queries Q 1 [ θ ] , , Q N [ θ ] to the N databases to efficiently obtain W ¯ θ . The queries are generated according to W ^ θ , f, and Z, and are jointly independent of the realizations of the [ K ] { θ } messages and W ¯ θ given W ^ θ . Therefore we have (we use the notation x S to denote the collection of { x i , i S } )
I W [ K ] { θ } , W ¯ θ ; Q 1 : N [ θ ] | W ^ θ , Z = 0 .
Upon receiving the query Q n [ θ ] , the nth database replies with an answering string A n [ θ ] , which is a function of Q n [ θ ] and all the K messages stored. Therefore, θ [ K ] , n [ N ] , we have
H A n [ θ ] | Q n [ θ ] , W 1 : K = 0 .
To ensure that individual databases do not know which message is being updated, we need to satisfy the following privacy constraint, n [ N ] , k [ K ] :
Q n [ 1 ] , A n [ 1 ] , W ^ 1 , W 1 : K Q n [ k ] , A n [ k ] , W ^ k , W 1 : K ,
where ∼ denotes statistical equivalence. After receiving the answering strings A 1 : N [ θ ] from all the N databases, the user needs to decode the desired information W θ with no uncertainty, satisfying the following correctness constraint:
H W θ | A 1 : N [ θ ] , Q 1 : N [ θ ] , W ^ θ , Z = 0 .
The overall system model is depicted in Figure 1. We also include a list of notation with their definitions in Table 1 for ease of presentation.
For fixed N, K, f, and r, a pair ( D ¯ , L ) is achievable if there exists a cache-aided private updating with unknown prefetching scheme for messages of length L bits long satisfying the privacy constraint (16) and the correctness constraint (17). In this pair, D ¯ represents the expected number of downloaded bits received from the N databases independently via the answering strings A 1 : N [ k ] , i.e.,
D ¯ = n = 1 N H A n [ θ ] .
Our goal is to characterize the optimal download cost D ¯ L for the cache-aided private updating problem with unknown prefetching for fixed arbitrary L, N, K, f, and r. That is, we solve for
D ¯ L = min D ¯ : ( D ¯ , L ) is   achievable .
Clearly, the user can ignore its outdated message W ^ θ and re-download the whole new message W θ using standard cache-aided PIR schemes [2,29]. Our main result, however, shows that we can use W ^ θ to do strictly better.

3. Main Results

Our first result characterizes a converse bound for the optimal download cost D ¯ L for general N, K, f, and r.
Theorem 1 
(Converse). In the cache-aided private updating problem with unknown prefetching, the optimal download cost is lower bounded by
D ¯ L max i { 2 , , K + 1 } ( L ¯ L r ) j = 0 K + 1 i 1 N j L r j = 0 K i K + 1 i j N j ,
with L ¯ defined in (9).
The proof of Theorem 1 is provided in Section 4.
For our next result, we characterize an achievability bound for specific values of the caching ratios, and otherwise general L, N, K, and f. Before we present our result, we need to introduce some notation. Specifically, as in [29], for s { 1 , 2 , , K 1 } , we define a caching ratio r s as
r s = K 2 s 1 K 2 s 1 + i = 0 K 1 s K 1 s + i ( N 1 ) i N .
Now, we say that a caching ratio r is very low if 0 r r 1 = 1 1 + N + N 2 + + N K 1 , very high if r K 1 = 1 1 + N r 1 , and mid-range otherwise. We are now ready to present our first achievability result.
Theorem 2 
(Very Low and Very High Achievability). In the cache-aided private updating problem with unknown prefetching, for very low caching ratios, the optimal download cost is upper bounded by
D ¯ L L ¯ L r · i = 0 K 1 1 N i L r · i = 0 K 2 K 1 i N i ,
and for very high caching ratios, the optimal download cost is upper bounded by
D ¯ L L ¯ L r ,
with L ¯ defined in (9).
The proof of Theorem 2 is provided in Section 5.
Combining the achievability bounds in Theorem 2 with the converse bound in Theorem 1, we obtain a fairly tight, up to a ceiling difference of L ¯ , characterization of the optimal download cost D ¯ L for very low and very high caching ratios. This is stated in the following corollary.
Corollary 1. 
In the cache-aided private updating problem with unknown prefetching, for very low caching ratios, we have
( L ¯ L r ) j = 0 K 1 1 N j L r j = 0 K 2 K 1 j N j D ¯ L L ¯ L r j = 0 K 1 1 N j L r j = 0 K 2 K 1 j N j ,
and for very high caching ratios, we have
D ¯ L = L ¯ L r
Proof. 
The right-hand side inequality of (24) is given directly by Theorem 2. By choosing i = 2 in (20), we obtain the left-hand side inequality in (24). Similarly, by choosing i = K 1 in (20), we obtain the result in (25) (note that L r is an integer, and so in this case, the converse and achievability bounds match). This concludes the proof. □
We now have the following remarks.
Remark 1. 
The result in Corollary 1 generalizes our preliminary work on the private updating problem with no caching involved [35]. Specifically, plugging in r = 0 in Corollary 1 directly gives ([35], Theorem 1).
Remark 2. 
Consider the result in (24). From (9) and (12), it follows that L ¯ = L for all values of f L 2 , and that L ¯ < L for all values of f < L 2 (this can be readily shown using the binomial theorem; details are in Appendix A). Combining this with the results in ([29], Corollary 2) (which is the analog of our result in case the user does not have an outdated message), this means that there is a Hamming distance threshold of L 2 beyond which there is no advantage to using a private updating strategy, and below which there will always be some savings in download cost. This can be seen in Figure 2, where we also note that the non-linearity of the upper and lower bounds are a result of the ceiling functions that appear in these bounds.
Remark 3. 
If L and f are such that L ¯ = L ¯ , then the upper and lower bounds in (24) match. We will see that this holds if a perfect code (a code that attains the Hamming bound with equality [33]) by which the queries are sent exists (cf. Section 5). Otherwise, if L ¯ < L ¯ , one can show using similar arguments as in ([34], Section 7.2) that the two bounds are within 2 bits for N 2 databases.
Next, we have the following achievability result regarding mid-range caching ratios.
Theorem 3 
(Mid-Range Achievability). In the cache-aided private updating problem with unknown prefetching with K = 3 messages, for mid-range effective caching ratios, the optimal download cost is upper bounded by
D ¯ L L ¯ L r 1 + 1 N L r
with L ¯ defined in (9).
The proof of Theorem 3 is provided in Section 6. In Section 7, we include a discussion on extending the above achievability result for arbitrary K.
Combining the mid-range achievability bound in Theorem 3 and the converse bound in Theorem 1 for i = K , we characterize the optimal download cost for D ¯ L for mid-range caching ratios when K = 3 . Furthermore, combining this characterization with the result of Corollary 1 gives a complete characterization of D ¯ L when K = 3 for any caching ratio. To this end, we define the K = 3 converse bound D ¯ K = 3 ( r ) and the K = 3 achievability bound D ¯ K = 3 ( r ) to express this characterization:
D ¯ K = 3 ( r ) = L ¯ L r · i = 0 2 1 N i L r · i = 0 1 2 i N i ,   if   0 r r 1 ; L ¯ L r 1 + 1 N L r ,   if   r 1 r r 2 ; L ¯ L r ,   if   r 2 r 1 .
D ¯ K = 3 ( r ) = L ¯ L r · i = 0 2 1 N i L r · i = 0 1 2 i N i ,   if   0 r r 1 ; L ¯ L r 1 + 1 N L r ,   if   r 1 r r 2 ; L ¯ L r ,   if   r 2 r 1 .
We have now proved the following corollary.
Corollary 2 
( K = 3 Characterization). In the cache-aided private updating problem with unknown prefetching where K = 3 , for any caching ratio, we have
D ¯ K = 3 ( r ) D ¯ L D ¯ K = 3 ( r )

4. Proof of Theorem 1: Converse

In this section, we derive the general (converse) lower bound for the download cost in Theorem 1. To do so, we prove two useful lemmas, analogues to their counterparts in the cache-aided PIR setting of [29], for the case of our cache-aided private updating problem. The two lemmas are then combined to prove the general lower bound. The key difference between our lemmas and those in [29] is that in addition to some uniform portion of each message being cached, the user is given an outdated message W ^ θ , requiring careful handling of the correlation between W θ and W ^ θ .
Lemma 1 
(Interference Lower Bound). In the cache-aided private updating problem with unknown prefetching, the interference from undesired messages within the answering strings, D ¯ ( L ¯ L r ) , satisfies
D ¯ ( L ¯ L r ) I W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 1 , W ^ k 1 , Z
for all k { 2 , , K } .
Proof. 
We start with the right-hand side of (30),
I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 1 , W ^ k 1 , Z )
= I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] , W k 1 | W 1 : k 2 , W ^ k 1 , Z ) I ( W k : K ; W k 1 | W 1 : k 2 , W ^ k 1 , Z )
= I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 2 , W ^ k 1 , Z ) + I ( W k : K ; W k 1 | Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] , W 1 : k 2 , W ^ k 1 , Z )
= ( 17 ) I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 2 , W ^ k 1 , Z )
= ( 14 ) I ( W k : K ; A 1 : N [ k 1 ] | Q 1 : N [ k 1 ] , W 1 : k 2 , W ^ k 1 , Z )
= H ( A 1 : N [ k 1 ] | Q 1 : N [ k 1 ] , W 1 : k 2 , W ^ k 1 , Z ) H ( A 1 : N [ k 1 ] | Q 1 : N [ k 1 ] , W 1 : k 2 , W k : K , W ^ k 1 , Z )
= ( 17 ) H ( A 1 : N [ k 1 ] | Q 1 : N [ k 1 ] , W 1 : k 2 , W ^ k 1 , Z ) H ( A 1 : N [ k 1 ] , W k 1 | Q 1 : N [ k 1 ] , W 1 : k 2 , W k : K , W ^ k 1 , Z )
H ( A 1 : N [ k 1 ] | Q 1 : N [ k 1 ] , W 1 : k 2 , W ^ k 1 , Z ) H ( W k 1 | Q 1 : N [ k 1 ] , W 1 : k 2 , W k : K , W ^ k 1 , Z )
= ( 14 ) H ( A 1 : N [ k 1 ] | Q 1 : N [ k 1 ] , W 1 : k 2 , W ^ k 1 , Z ) H ( W k 1 | W ^ k 1 , Z )
( 18 ) , ( 3 ) D ¯ H ( W k 1 | W ^ k 1 , W k 1 R k 1 )
= D ¯ H ( W k 1 , W k 1 R k 1 | W ^ k 1 ) H ( W k 1 R k 1 | W ^ k 1 )
= D ¯ H ( W k 1 | W ^ k 1 ) + H ( W k 1 R k 1 | W ^ k 1 , W k 1 ) H ( W k 1 R k 1 | W ^ k 1 )
( 10 ) , ( 7 ) D ¯ ( L ¯ L r ) .
This concludes the proof. □
Note that if privacy was not a constraint, then D ¯ = L ¯ L r and the interference from undesired messages would be non-existent. However, when the privacy constraint is present, D ¯ ( L ¯ L r ) characterizes the number of bits that will be downloaded and used as side information to preserve privacy from the databases in a given scheme.
Lemma 2 
(Induction Lemma). For all k { 2 , , K } , the mutual information term in Lemma 1 can be inductively lower bounded as
I W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 1 , W ^ k 1 , Z
1 N I W k + 1 : K ; Q 1 : N [ k ] , A 1 : N [ k ] | W 1 : k , W ^ k , Z + L ¯ L r N ( K k + 1 ) L r .
Proof. 
We start with the left-hand side of (42),
I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 1 , W ^ k 1 , Z )
= I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] , Z , W ^ k 1 | W 1 : k 1 ) I ( W k : K ; Z , W ^ k 1 | W 1 : k 1 )
= I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 1 ) + I ( W k : K ; Z , W ^ k 1 | W 1 : k 1 , Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] )
I ( W k : K ; Z , W ^ k 1 | W 1 : k 1 )
I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 1 ) I ( W k : K ; Z , W ^ k 1 | W 1 : k 1 ) .
Now, for the first term in (45), we have
I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 1 )
1 N n = 1 N I ( W k : K ; Q n [ k 1 ] , A n [ k 1 ] | W 1 : k 1 )
= ( 16 ) 1 N n = 1 N I ( W k : K ; Q n [ k ] , A n [ k ] | W 1 : k 1 )
= 1 N n = 1 N I ( W k : K ; A n [ k ] | W 1 : k 1 , Q n [ k ] )
= ( 15 ) 1 N n = 1 N H ( A n [ k ] | W 1 : k 1 , Q n [ k ] )
1 N n = 1 N H ( A n [ k ] | W 1 : k 1 , W ^ k , Z , Q 1 : N [ k ] , A 1 : n 1 [ k ] )
= ( 15 ) 1 N n = 1 N I ( W k : K ; A n [ k ] | W 1 : k 1 , W ^ k , Z , Q 1 : N [ k ] , A 1 : n 1 [ k ] )
= 1 N I ( W k : K ; A 1 : N [ k ] | W 1 : k 1 , W ^ k , Z , Q 1 : N [ k ] )
= ( 14 ) 1 N I ( W k : K ; Q 1 : N [ k ] , A 1 : N [ k ] | W 1 : k 1 , W ^ k , Z )
= ( 17 ) 1 N I ( W k : K ; W k , Q 1 : N [ k ] , A 1 : N [ k ] | W 1 : k 1 , W ^ k , Z )
= 1 N I ( W k : K ; Q 1 : N [ k ] , A 1 : N [ k ] | W 1 : k , W ^ k , Z ) + 1 N I ( W k : K ; W k | W 1 : k 1 , W ^ k , Z )
= 1 N I ( W k : K ; Q 1 : N [ k ] , A 1 : N [ k ] | W 1 : k , W ^ k , Z ) + 1 N H ( W k | W ^ k , Z )
( 10 ) , ( 7 ) 1 N I ( W k + 1 : K ; Q 1 : N [ k ] , A 1 : N [ k ] | W 1 : k , W ^ k , Z ) + L ¯ L r N .
Note that (58) follows from a similar argument in Lemma 1 starting at (37). Next, for the second term in (45), we have
I ( W k : K ; Z , W ^ k 1 | W 1 : k 1 )
= H ( W k : K | W 1 : k 1 ) H ( W k : K | W k 1 , Z , W ^ k 1 )
= ( K k + 1 ) L ( K k + 1 ) L ( 1 r )
= ( K k + 1 ) L r
Combining the above results concludes the proof. □
We now apply the result of Lemma 2 recursively on that of Lemma 1 to get the general lower bound through the following series of inequalities:
D ¯ ( 30 ) ( L ¯ L r ) + I ( W k : K ; Q 1 : N [ k 1 ] , A 1 : N [ k 1 ] | W 1 : k 1 , W ^ 1 , Z )
( 42 ) ( L ¯ L r ) + L ¯ L r N + 1 N I ( W k + 1 : K ; Q 1 : N [ k ] , A 1 : N [ k ] | W 1 : k , W ^ k , Z )
( K k + 1 ) L r
( 42 ) ( L ¯ L r ) + L ¯ L r N + L ¯ L r N 2 + 1 N 2 I ( W k + 2 : K ; Q 1 : N [ k + 1 ] , A 1 : N [ k + 1 ] | W 1 : k + 1 , W ^ k + 1 , Z )
( K k + 1 ) L r + ( K k + 2 ) L r N
( 42 )
= ( L ¯ L r ) j = 0 K + 1 k 1 N j L r j = 0 K k K + 1 k j N j
Next, since the bound in (66) is valid for arbitrary k, it is still valid for k corresponding to the maximum possible lower bound, i.e., (66) gives K intersecting line segments, therefore, the download cost D ¯ is lower bounded by their maximum value
D ¯ max i { 2 , , K + 1 } ( L ¯ L r ) j = 0 K + 1 i 1 N j L r j = 0 K i K + 1 i j N j .
Since (67) lower bounds the download cost D ¯ for any cache-aided private updating with unknown prefetching scheme, it also lower bounds the download cost of the optimal private updating scheme D ¯ L . Finally, since D ¯ L is an integer, we take the ceiling of (67) to get (20).
This concludes the converse proof.

5. Proof of Theorem 2: Achievability for Very Low and Very High Caching Ratios

Our achievability scheme makes use of the correlation between W θ and W ^ θ through the knowledge of their maximum Hamming distance f in order to reduce the download cost. This approach is related to the problem tackled in [32] (without privacy constraints), in which a source is compressed given that it is correlated with some side information that is available only at the decoder. The retrieving user represents the decoder in our case, with side information W ^ θ . By the Slepian–Wolf coding theorem [36], one can noiselessly compress the source W θ at the rate of H ( W θ | W ^ θ ) = L ¯ . The compressed source is treated as a new message to be downloaded using a PIR scheme, as opposed to downloading the whole message W θ . Such a scheme, however, has a message length constraint (unlike most of the PIR works in the literature). For that reason, we leverage tools from the PIR scheme with an arbitrary message length in [34], and extend them to work in the caching setting at hand, to accomplish our task.
While our achievability schemes make use of the local cache Z, we will first give some motivating examples without the user having knowledge of Z, which represents the case r = 0 tackled in our preliminary work [35].

5.1. Motivating Examples Without Caching

5.1.1. L = 3 , N = 2 , K = 2 , f = 1 , and r = 0

In this example, we have L ¯ = log 2 ( 1 + 3 ) = 2 , and C = 2 / 3 (from (1)). Setting r = 0 in (22), we need to show that D ¯ = L ¯ / C = 3 bits is achievable. We first start by constructing a [ 3 , 1 , 3 ] linear block code, which is in this case a repetition code with generator matrix G and parity check matrix H given by
G = 1 1 1 , H = 1 1 0 1 0 1 .
Note that such code is capable of correcting at most f = 1 error. The syndromes associated with this code are s { 00 , 01 , 10 , 11 } . Observe that the length of s is exactly L ¯ .
Instead of requesting W θ , the user retrieves the index of the coset in which W θ resides in the code’s standard array. That is, its corresponding syndrome
s θ = W θ H T .
The user then compares W ^ θ to all the words in that coset, and decodes W θ as the one closest in Hamming distance. This is guaranteed to yield the unique correct message [32]. Therefore, the syndrome s θ efficiently represents the flipped bits’ indices W ¯ θ , and one is able to reduce the effective message length from L = 3 to L ¯ = 2 by dealing with the syndrome s θ instead of W θ .
Let W 1 = [ a 1 , a 2 , a 3 ] , and W 2 = [ b 1 , b 2 , b 3 ] . The syndromes (the new messages) are given by
s 1 = W 1 H T = a 1 + a 2 a 1 + a 3
a ¯ 1 a ¯ 2 ,
s 2 = W 2 H T = b 1 + b 2 b 1 + b 3
b ¯ 1 b ¯ 2 .
Assume θ = 1 . Since L ¯ = N K 1 , we can apply a non-symmetric PIR scheme [34] to decode s 1 . This scheme is shown in Table 2, and has a download cost of D ¯ = 3 bits, which is optimal in this case since it meets the converse bound.
The repetition code used in this example is a perfect code. While this makes L ¯ an integer, and meets the converse bound, perfect codes are scarce. In the next example, we show how the proposed scheme performs with non-perfect codes.

5.1.2. L = 5 , N = 2 , K = 2 , f = 1 , and r = 0

In this example, we have L ¯ = log 2 ( 1 + 5 ) = 2.58 , and C = 2 / 3 . We show that D ¯ = L ¯ / C = 5 bits is achievable. As in the previous example, we start by constructing a [ 5 , 2 , 3 ] linear block code. Differently though, this is not a repetition code, and is characterized by
G = 1 0 1 1 1 0 1 1 1 0 , H = 1 1 1 0 0 1 1 0 1 0 1 0 0 0 1 .
The syndromes s have length L ¯ . Specifically,
s 1 = W 1 H T = a 1 + a 2 + a 3 a 1 + a 2 + a 4 a 1 + a 5
a ¯ 1 a ¯ 2 a ¯ 3 ,
s 2 = W 2 H T = b 1 + b 2 + b 3 b 1 + b 2 + b 4 b 1 + b 5
b ¯ 1 b ¯ 2 b ¯ 3 .
Since L ¯ = N K 1 + 1 , we follow the methodology in [34]; we privately download N K 1 = 2 bits ( a ¯ 1 and a ¯ 2 ) using the non-symmetric PIR scheme in the previous example, and then privately download the remaining 1 bit ( a ¯ 3 ) using the scheme in [37]. The technique in [37] in this case is such that the user requests random linear combinations of [ a ¯ 3 b ¯ 3 ] from database 1 using a random binary vector h, and the same from database 2 yet with h = h + e θ , where e i is the ith standard basis vector. The full PIR scheme is shown in Table 3, and it has a download cost of D ¯ = 5 bits, which is 1 bit away from the converse bound since the code used is non-perfect.

5.2. The General Scheme with Caching

For general L, N, K, and f, we construct an [ L , L L ¯ , 2 f + 1 ] linear block code. From the Gilbert–Varshamov bound [33], we know that such a code exists if
2 L ¯ j = 0 2 f L j .
In addition, such a code must satisfy the Hamming bound [33]:
j = 0 f L j 2 L ¯ .
By the definition of L ¯ in (9), both (75) and (76) are satisfied, and so the code exists and is able to correct f bit flips.
Next, we map each message to its corresponding syndrome of the constructed code, which is of length L ( L L ¯ ) = L ¯ . The user then retrieves the syndrome s θ according to a PIR scheme with N databases, K messages, and L ¯ message length. For the case r = 0 , by ([34], Theorem 1), a download cost of L ¯ / C is achievable in this case. Finally, correctness is guaranteed since querying for the syndrome s θ allows the user to decode W θ as the unique word in the syndrome’s coset with the least Hamming distance from W ^ θ [32]. This shows that (22) holds specifically when r = 0 .
For the case when r 0 , the user will have access to cached linear combinations of W i for all i [ K ] . These cached linear combinations are given by W i R i , where R i is a matrix of dimension ( L × L ¯ ) . For the purposes of our cache-aided achievability, we let
R i = H T , i [ K ] ,
where H is the parity check matrix of the code. This means that during the prefetching phase, bits from our desired syndrome are being cached, and what is left to download is the remaining L ¯ L r bits.
To this end, we develop some novel schemes for cache-aided PIR with an arbitrary message length that utilize the results from [29]. In particular, for all s { 1 , 2 , , K 1 } , we define the message length of a cache-aided PIR scheme from [29] with caching ratio r s as
L r ( s ) = K 2 s 1 + i = 0 K 1 s K 1 s + i ( N 1 ) i N ,
and the normalized download cost of such a scheme as
D r ( s ) = i = 0 K 1 s K s + 1 + i ( N 1 ) i N K 2 s 1 + i = 0 K 1 s K 1 s + i ( N 1 ) i N .
For very low caching ratio r, we recall from [29] that the optimal normalized download cost of a cache-aided PIR scheme is
D ( r ) = ( 1 r ) · i = 0 K 1 1 N i r · i = 0 K 2 K 1 i N i ,
and that for very high caching ratio r (in the context of this work), the optimal normalized download cost of a cache-aided PIR scheme is
D ( r ) = ( 1 r ) .
With these tools in hand, in the remainder of this section, we describe our achievable schemes for very low and very high caching ratios for cache-aided PIR with arbitrary message length, and show that they achieve the download costs in Theorem 2.

5.3. Very Low Caching Ratio: Proof of (22)

What follows is a cache-aided achievable scheme for retrieving an arbitrary L bits for very low caching ratios ( 0 < r r 1 = 1 1 + N + N 2 + + N K 1 ). We first use an optimal cache-aided PIR scheme with message size L r ( 1 ) . Within the desired L bits (including the cached bits), we view each L r ( 1 ) bits as a group, and proceed until the number of desired bits remaining is strictly less than L r ( 1 ) . To this end, we have
L = G 0 L r ( 1 ) + L 0 ,
where G 0 = L L r ( 1 ) and 0 L 0 L r ( 1 ) 1 . If L 0 = 0 , then the retrieval is completed. If not, then for the L 0 bits that remain, we use an optimal asymmetric PIR scheme with message size N K 1 (without caching). Within the remaining L 0 desired bits, we view each N K 1 bits as a group, and proceed until the number of desired bits remaining is strictly less than N K 1 . To this end, we have
L 0 = G 1 N K 1 + L 1 ,
where G 1 = L 0 N k 1 and 0 L 1 N K 1 1 . If L 1 = 0 , then the retrieval is completed. If not, then for the L 1 bits that remain, we use the scheme in [37] with N databases and message size N 1 . Within the remaining L 1 bits, we view each N 1 bits as a group, and proceed until the number of desired bits remaining is strictly less than N 1 . To this end, we have
L 1 = G 2 ( N 1 ) + L 2 ,
where G 2 = L 1 N 1 and 0 L 2 N 2 . If L 2 = 0 , then the retrieval is completed. If L 2 bits still remain, we use the scheme in [37] with L 2 + 1 databases and message size L 2 . Therefore, the message size and the achievable download cost are
L = G 0 L r ( 1 ) + G 1 N K 1 + G 2 ( N 1 ) + L 2 ,
D = G 0 L r ( 1 ) D ( r 1 ) + G 1 N K 1 C + G 2 N , if   L 2 = 0 , G 0 L r ( 1 ) D ( r 1 ) + G 1 N K 1 C + G 2 N + L 2 + 1 , otherwise .
We next show that the achievable download cost in (86) satisfies D D ( r ) · L . To this end, we have the following lemma.
Lemma 3. 
For two very low caching ratios r a and r b with 0 r a r b r 1 , we have
D ( r a ) D ( r b ) = ( r b r a ) · D c ,
where D c = i = 0 K 1 K i N i .
Proof. 
We begin from the left-hand side of (87) and use (80) to write
D ( r a ) D ( r b )
= ( 1 r a ) · i = 0 K 1 1 N i r a · i = 0 K 2 K 1 i N i ( 1 r b ) · i = 0 K 1 1 N i r b · i = 0 K 2 K 1 i N i
= ( r b r a ) · i = 0 K 1 1 N i + ( r b r a ) · i = 0 K 2 K 1 i N i
= ( r b r a ) · i = 0 K 1 1 + ( K 1 i ) N i
= ( r b r a ) · i = 0 K 1 K i N i .
Defining D c = i = 0 K 1 K i N i concludes the proof. □
Now towards proving D D ( r ) · L , it suffices to show that D < D ( r ) · L + 1 for two cases. For the first case, let L 2 = 0 . We wish to show that
G 0 L r ( 1 ) D ( r 1 ) + G 1 N K 1 C + G 2 N + L 2
< D ( r ) · G 0 L r ( 1 ) + G 1 N K 1 + G 2 ( N 1 ) + L 2 + 1 .
First, we group the terms in (92); we need to show that
G 0 L r ( 1 ) · D ( r ) D ( r 1 ) + G 1 N K 1 · 1 C D ( r ) ( G 2 ( N 1 ) + L 2 ) D ( r )
< 1 G 2 N L 2 .
Focusing on the left-hand side of (93), we use Lemma 3 to simplify the expression, while noting that D ( 0 ) = 1 C , as follows:
G 0 L r ( 1 ) · D ( r ) D ( r 1 ) + G 1 N K 1 · 1 C D ( r ) ( G 2 ( N 1 ) + L 2 ) D ( r )
= G 0 L r ( 1 ) D c ( r 1 r ) + G 1 N K 1 D c r ( G 2 ( N 1 ) + L 2 ) 1 C D c r
= D c · G 0 L r ( 1 ) r 1 + G 0 L r ( 1 ) r + G 1 N K 1 r + G 2 ( N 1 ) r + L 2 r G 2 ( N 1 ) + L 2 C
= D c · G 0 L r ( 1 ) r 1 + L r G 2 ( N 1 ) + L 2 C
= D c · G 0 + L r G 2 ( N 1 ) + L 2 C .
Note that L r is the number of cached bits, and that G 0 is the number of times a cache-aided PIR scheme is used. For very low caching ratios, these quantities are equal, and so we have
D c · L r G 0 G 2 ( N 1 ) + L 2 C = G 2 ( N 1 ) + L 2 C .
Now, substituting (98) back into (93), we now need to show
0 < 1 G 2 N L 2 + G 2 ( N 1 ) + L 2 C .
If N = 1 , then G 2 = 0 , and so (99) clearly follows. For the case when N 2 , plugging in C = N K 1 ( N 1 ) N K 1 to the right-hand side of (99) gives
1 G 2 N L 2 + G 2 ( N 1 ) + L 2 C
= 1 G 2 N + G 2 N K 1 N K 1 + L 2 N K 1 N K 1 ( N 1 ) 1
= 1 G 2 1 N K 1 + L 2 N K 1 1 N K 1 ( N 1 ) .
We wish to find a lower bound for (101). To this end, we want to maximize G 2 and minimize L 2 . We know that L 2 1 , but this also means that G 2 ( N 1 ) < L 1 N K 1 1 from (84). Plugging these values into (101) gives
1 G 2 1 N K 1 + L 2 N K 1 1 N K 1 ( N 1 )
1 G 2 ( N 1 ) N K 1 ( N 1 ) + N K 1 1 N K 1 ( N 1 )
> 1 N K 1 1 N K 1 ( N 1 ) + N K 1 1 N K 1 ( N 1 ) = 1 .
and so (99) holds for N 2 .
For the second case, let L 2 1 . We wish to show that
G 0 L r ( 1 ) D ( r 1 ) + G 1 N K 1 C + G 2 N + L 2 + 1
< D ( r ) · G 0 L r ( 1 ) + G 1 N K 1 + G 2 ( N 1 ) + L 2 + 1 .
First, we group the terms in (104); we need to show that
G 1 N K 1 · 1 C D ( r ) G 0 L r ( 1 ) · D ( r ) D ( r 1 ) ( G 2 ( N 1 ) + L 2 ) D ( r )
< 1 G 2 N L 2 1 .
By (98), we substitute the left-hand side of (105) so that we have
0 < 1 G 2 N L 2 + G 2 ( N 1 ) + L 2 C 1 .
Since L 2 1 , we have N 2 , and so (106) holds by (103). This completes the proof that D D ( r ) · L for very low caching ratios.
Since the above PIR scheme is constructed as a concatenation of several PIR schemes that are both correct and private, by ([34], Theorem 4), the above scheme is both correct and private. To conclude our proof, we define a normalized version of r:
r ˜ = L r L ¯ ,
as the effective caching ratio. Clearly, by (13), 0 r ˜ 1 . Now, since the above PIR scheme retrieves L bits (including cached bits) at a download cost of D D ( r ) · L , this scheme can be used to retrieve L ¯ bits (including some L r cached bits) at a download cost of D ¯ D ( r ˜ ) · L ¯ . Expanding this statement gives
D ¯ D ( r ˜ ) · L ¯
= L ¯ ( 1 r ˜ ) · i = 0 K 1 1 N i L ¯ r ˜ · i = 0 K 2 K 1 i N i
= L ¯ L r · i = 0 K 1 1 N i L r · i = 0 K 2 K 1 i N i ,
which is precisely (22).

5.4. Very High Caching Ratio: Proof of (23)

What follows is a cache-aided achievable scheme for retrieving an arbitrary L bits, for very high caching ratios ( r K 1 = 1 1 + N r 1 ). In this scheme, we only use an optimal cache-aided PIR scheme with message size L r ( K 1 ) = 1 + N . We note that in this scheme, for each bit we have cached, we can download 1 bit from each of the N databases to get a total of N unknown bits at a download cost of N bits.
Within the desired L bits (including cached bits), we view each L r ( K 1 ) bits as a group, and proceed until the number of desired and unknown  L L r bits remaining is strictly less than N. To this end, we have
L = G 0 L r ( K 1 ) + L 0 ,
where G 0 = L L r N , and L 0 = L G 0 L r ( K 1 ) . We define C 0 = L r G 0 as the number of unused cached bits thus far in our scheme. If we have L 0 = C 0 , then we have all of our desired information, and we are done. Otherwise, we still have L 0 C 0 < N bits left to download. Since the caching ratio r is very high, we have C 0 1 , and so we can use this bit, as noted above, to download 1 bit from L 0 C 0 < N databases each to obtain the remaining L 0 C 0 unknown bits at a download cost of L 0 C 0 bits. Therefore, the message size and the achievable download cost are
L = G 0 L r ( K 1 ) + L 0 ,
D = G 0 L r ( K 1 ) D ( r K 1 ) + L 0 C 0 .
We next show that the achievable download cost in (113) satisfies D D ( r ) · L . To this end, it it suffices to show that D < D ( r ) · L + 1 , or more specifically, that
G 0 L r ( K 1 ) D ( r K 1 ) + L 0 C 0 < D ( r ) · L + 1 .
First, we rearrange the terms in (114) as
G 0 L r ( K 1 ) D ( r K 1 ) + L 0 C 0 D ( r ) · L < 1 ,
and then we reduce the left-hand side of (115) as follows
G 0 L r ( K 1 ) D ( r K 1 ) + L 0 C 0 D ( r ) · L
= G 0 ( 1 + N ) ( 1 1 1 + N ) + L 0 C 0 ( 1 r ) · L
= G 0 N + L 0 C 0 L + L r
= C 0 G 0 + L r = 0 .
Thus, (114) holds, and so this completes the proof that D D ( r ) · L for very high caching ratios.
Again, since the above PIR scheme is constructed as a concatenation of several PIR schemes that are both correct and private, by ([34], Theorem 4), the above scheme is both correct and private. Furthermore, since the above PIR scheme retrieves L bits (including cached bits) at a download cost of D D ( r ) · L , this scheme can be used to retrieve L ¯ bits (including some L r cached bits) at a download cost of D ¯ D ( r ˜ ) · L ¯ . Expanding this statement gives
D ¯ D ( r ˜ ) · L ¯
= ( 1 r ˜ ) · L ¯
= L ¯ L r = L ¯ L r ,
which is precisely (23).

6. Proof of Theorem 3: Achievability for K = 3 with Mid-Range Caching Ratios

What follows is a cache-aided achievable scheme for retrieving an arbitrary L bits, for mid-range caching ratios given fixed K = 3 setting 1 1 + N + N 2 = r 1 < r < r 2 = 1 1 + N . This scheme leverages cache-aided PIR schemes for very high and very low caching ratios but within an asymmetric PIR setting instead.
First, consider the asymmetric cache-aided PIR scheme with N = 3 and L = 3 in Table 4. This scheme does not utilize all of the databases, nor does it utilize the cache in full. This scheme downloads one useful bit privately at a cost of 1 bit, and it is an asymmetric version of the cache-aided PIR scheme for very high caching ratios. This scheme can be repeated up to five more times to get up to five more useful bits, and each additional bit is obtained privately.
Next, consider the asymmetric cache-aided PIR scheme with N = 3 and L = 6 in Table 5. While this scheme does utilize all of the databases, it has asymmetric traffic between the databases, and it also does not utilize the cache in full. This scheme downloads 1 + N useful bits at a cost of 2 + N , and it is an asymmetric version of the cache-aided PIR scheme for very low caching ratios. Once again, this scheme can be repeated up to five more times to get up to 5 · ( 1 + N ) more useful bits, and each additional set of 1 + N bits is obtained privately.
In these examples, we see that each scheme can be used a total of N · L r = 6 times. Now, note that these two schemes can be used in conjunction with one another, and that rather than repeating the same scheme over and over again, we can just use them interchangeably to suit our needs.
Consider a cache-aided PIR example where N = 3 , L = 14 , and r = 2 14 . Note that r is now mid-range. We can use a combination of the asymmetric very high caching ratio scheme and very low caching ratio scheme to download the remaining 12 useful bits as shown in Table 6. First, we use the asymmetric very high caching ratio scheme four times to obtain four useful bits at a cost of 4 bits total. Then, we use the the asymmetric very low caching ratio scheme two times to download the remaining 2 · ( 1 + N ) = 8 useful bits at a cost of 2 · ( 2 + N ) = 10 , and so the total download cost is 14.
It is also worth noting that in the same scenario, but with L = 13 and r = 2 13 , we can use almost the almost the same query structure as in Table 6. The only difference is that we truncate the given scheme by not making the query for a 14 . In this particular case, this truncation strategy can be performed again to obtain an L = 12 , r = 2 12 query structure.
In general, one can use a combination of N · L r 1 very high and very low caching ratio schemes, and then if the remaining number of useful bits left to download is some with 1 < l < N + 1 , use a truncated very low caching ratio scheme. Otherwise, just a normal very high or very low caching ratio scheme can be used.
In order to determine the number of times these very high and very low schemes are used, along with the number of bits that are downloaded via the truncation strategy, we define three terms as follows:
G 1 = L r ( 1 ) · L r L N ,
G 2 = L L r ( 2 ) · L r N ,
L 3 = L ( G 1 + G 2 ( 1 + N ) ) L r .
The G 1 term is the number of times a very high caching ratio scheme is used, while G 2 is the number of times a very low caching ratio scheme is used. The L 3 term is the number of bits obtained from the truncation strategy when it is used. According to these terms, it follows that the message size and the achievable download cost are
L = G 1 + G 2 ( 1 + N ) + L 3 + L r ,
D = G 1 + G 2 ( 2 + N ) , if   L 3 = 0 , G 1 + G 2 ( 2 + N ) + L 3 + 1 , otherwise .
Lastly, for mid-range caching ratios with K = 3 , we recall from [29] that the optimal normalized download cost of a cache-aided PIR scheme is
D ( r ) = ( 1 r ) 1 + 1 N r .
We next show that the achievable download cost in (126) satisfies D D ( r ) · L . To this end, it suffices to show that D < D ( r ) · L + 1 for two cases. For the first case, let L 3 = 0 . We wish to show that
G 1 + G 2 ( 2 + N ) + L 3 D ( r ) · L < 1 .
Reducing the left-hand side of (128), we have
G 1 + G 2 ( 2 + N ) + L 3 D ( r ) · L
= G 1 + G 2 ( 2 + N ) + L 3 ( ( 1 r ) · ( 1 + 1 N ) r ) · L
= G 1 + G 2 ( 2 + N ) + L 3 ( 1 2 r + 1 r N ) · ( G 1 + G 2 ( 1 + N ) + L 3 + L r )
= G 2 L r + ( 2 r 1 r N ) · L
= G 2 + L r L L r N
= G 2 L ( 1 + N ) · L r N
= G 2 L L r ( 2 ) · L r N .
Substituting (134) into (128), we need to show that
G 2 L L r ( 2 ) · L r N < 1 ,
which clearly holds by (123). It follows that (128) holds when L 3 = 0 . To show that this is also the case when L 3 1 , we use a lemma.
Lemma 4. 
In the K = 3 setting, for any caching ratio r with 1 1 + N + N 2 = r 1 < r < r 2 = 1 1 + N , we have
L 3 = 0 L L r ( 2 ) · L r N Z
The proof of Lemma 4 can be found in Appendix B.
Now, for the second case, let L 3 1 . We wish to show that
G 1 + G 2 ( 2 + N ) + L 3 D ( r ) · L < 0 .
By (134), we substitute the left-hand side of (137) so that we have
G 2 L L r ( 2 ) · L r N < 0 ,
which holds by Lemma 4. Thus, this completes the proof that D D ( r ) · L for mid-range caching ratios in the K = 3 setting.
Since the above PIR scheme is constructed as a concatenation of several PIR schemes that are both correct and private (by [34], Theorem 4), the above scheme is both correct and private. Furthermore, since the above PIR scheme retrieves L bits (including cached bits) at a download cost of D D ( r ) · L , this scheme can be used to retrieve L ¯ bits (including some L r cached bits) at a download cost of D ¯ D ( r ˜ ) · L ¯ . Expanding this statement gives
D ¯ D ( r ˜ ) · L ¯
= L ¯ ( 1 r ˜ ) 1 + 1 N L ¯ r ˜
= L ¯ L r 1 + 1 N L r
which is precisely (26).

7. Discussion

As seen in Corollary 1, for very low and very high effective caching ratios, we obtain full characterizations of the optimal download cost D ¯ L for fixed L , N , K , and f. What remains is to perform the same for an effective caching ratio r ˜ , defined in (107), with 1 1 + N + N 2 + + N K 1 = r 1 r ˜ r K 1 = 1 1 + N , i.e., such caching ratios that are mid-range. With Theorem 3 and Corollary 2, this has been performed for the K = 3 case. However, this is still an open question for when K is arbitrary.
Our approach for our achievability when r ˜ 0 has been to describe an arbitrary message length PIR scheme for a setting with unknown prefetching, and then show that the download cost D of such a scheme satisfies D D ( r ˜ ) · L ¯ . This approach mirrors what was performed in [34] for the classical PIR setting.
From [29], for r s < r < r s + 1 and α [ 0 , 1 ] with r = α r s + ( 1 α ) r s + 1 , we define
D ¯ ( r ) = α D r ( s ) + ( 1 α ) D r ( s + 1 ) .
We know that D ¯ ( r ) = D ( r ) for very low and very high caching ratio r, and this is used in our approach for Theorem 2. This is likewise the case for mid-range caching ratios r when K = 3 in Theorem 3. For when D ¯ ( r ) D ( r ) , as is the case for most mid-range caching ratios, we can still attempt to describe a scheme, and show that the download cost D D ¯ ( r ˜ ) · L ¯ to obtain some useful result.
Our goal in this section is to present a motivating example that shows what these results may look like. Consider the following example setting: N = 3 , K = 4 , and r K 2 r r K 1 . We have r 1 = 1 40 and r K 1 = 1 4 , and so a caching ratio is mid-range in this setting if 1 40 r 1 4 . However, for our purposes, we will focus on the subset of mid-range caching ratios r satisfying r K 2 = 2 17 r 1 4 . With this in mind, let us consider some scenarios with a caching ratio r = 1 7 starting with the case when the number of cached bits is 3, and so the total message length is 21. Using the methods found in this work, we have a scheme satisfying D D ¯ ( r ˜ ) · L ¯ given in Table 7.
Using these same methods, if there are two cached bits with a total message length of 14, then we also have a scheme satisfying D D ¯ ( r ˜ ) · L ¯ using a subset of the queries in Table 7. However, for the case when there is only one cached bit with a total message length of seven, we have no scheme satisfying D D ¯ ( r ˜ ) · L ¯ , not with using the methods in this work at least. It is worth noting that for some other mid-range caching ratios with this setting, the scheme from [37] can be used to produce some satisfactory results ( r = 1 6 for example) but not for the case when r = 1 7 in this setting. This is discussed in more detail in [38].
The question remains: why does this pattern break, and why it is difficult to find an alternative query structure? The answer we have come to is that it has not to do with with the value of the r, but with the number number of cached bits L r . More specifically, there may be some additional limitation on how low of a download cost can be achieved with a cache-aided arbitrary message length PIR scheme when L r is relatively low (or in this case, when L r = 1 ). Investigating such limitations is left to future works.

8. Conclusions

In this work, we introduce the cache-aided private updating problem with unknown prefetching, in which a user’s outdated message is to be privately updated by utilizing a private cache and querying a set of replicated and non-colluding databases that have the up-to-date version. To solve this problem, we develop novel arbitrary message length cache-aided PIR schemes for different caching ratios. These schemes are then combined with syndrome decoding techniques to guarantee privacy and efficiency. Such schemes are optimal when the system parameters enable the construction of a perfect code according to which the syndrome decoding technique is worked out. In other cases, the achievable download cost has been shown to be within at most 2 bits from a derived converse bound.
Outside of the issues discussed in Section 7, another item that could be resolved in this problem is the inflexible nature of the cache in our achievability. Specifically, the fact that for each i [ K ] , we fix R i = H T during the prefetching phase. Imposing less control over the prefetching phase is one direction to be pursued in the research line of cache-aided private updating.

Author Contributions

Conceptualization, A.A. and K.B.; formal analysis, B.S.; writing—original draft preparation, B.S.; writing—review and editing, A.A. and K.B.; supervision, A.A.; funding acquisition, A.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the U.S. National Science Foundation under Grant CNS 21-14537 and Grant ECCS 21-46099.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

This work was done when B. Stark was a Master’s student at UNC Charlotte.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Bound on Effective Value of f

For completeness, we show that
f < L 2 L ¯ < L ,
and hence if the maximum number of bit flips is more than half the message length, it is optimal to ignore the outdated message (as per Corollary 1’s result).
First, suppose that f = L 1 2 < L 2 . If L is odd, then f = L 1 2 and it follows that
i = 0 L L i = 2 · i = 0 L 1 2 L i = 2 L i = 0 f L i = 2 L 1 .
So for odd L, we have L ¯ = log 2 i = 0 f L i = L 1 , and so L 1 2 is the maximum value of f satisfying L ¯ < L when L is odd.
Next, suppose that L is even. It follows that
i = 0 L L i = 2 · i = 0 L 1 2 L i + L L 2 = 2 L i = 0 f L i < 2 L 1 .
So for even L, we have L ¯ = log 2 i = 0 f L i < L 1 . Also, note that for even L,
i = 0 L 2 L i = i = 0 L 1 2 L i + L L 2 > 2 L 1 .
This means that L 1 2 is the maximum value of f satisfying L ¯ < L when L is even.
Therefore, for any message length L, we have the result in Remark 2. This completes the proof.

Appendix B. Proof of Lemma 4

First, we note that
L r ( 1 ) · L r L N + L L r ( 2 ) · L r N = N · L r ,
and so it follows that G 1 + G 2 { N · L r , N · L r 1 } .
Consider the case when G 1 + G 2 = N · L r . Plugging this into (124), it can be shown that
G 2 = L L r ( 2 ) · L r N L 3 N .
Substituting (A6) back into (124), it can be shown that
G 1 = L r ( 1 ) · L r L N + L 3 N .
If L 3 > 0 , then substituting such a value into (A7) would contradict (122). Likewise, if L 3 < 0 , then substituting such a value into (A6) would contradict (123). Therefore,
G 1 + G 2 = N · L r L 3 = 0 L L r ( 2 ) · L r N Z .
Now consider the case when G 1 + G 2 = N · L r 1 . Plugging this into (124), it can be shown that
G 2 = L L r ( 2 ) · L r N L 3 1 N .
If L 3 0 , then substituting such a value into (A9) would contradict (123). Likewise, if L 3 N + 1 , then substituting such a value into (A9) would also contradict (123). Therefore, we have
G 1 + G 2 = N · L r 1 L 3 0 L L r ( 2 ) · L r N Z .
Finally, by combining (A8) and (A10), we can obtain the result in the lemma. This completes the proof.

References

  1. Chor, B.; Kushilevitz, E.; Goldreich, O.; Sudan, M. Private Information Retrieval. J. ACM 1998, 45, 965–981. [Google Scholar] [CrossRef]
  2. Sun, H.; Jafar, S.A. The Capacity of Private Information Retrieval. IEEE Trans. Inf. Theory 2017, 63, 4075–4088. [Google Scholar] [CrossRef]
  3. Banawan, K.; Ulukus, S. The Capacity of Private Information Retrieval from Coded Databases. IEEE Trans. Inf. Theory 2018, 64, 1945–1956. [Google Scholar] [CrossRef]
  4. Sun, H.; Jafar, S.A. The Capacity of Symmetric Private Information Retrieval. IEEE Trans. Inf. Theory 2019, 65, 322–329. [Google Scholar] [CrossRef]
  5. Banawan, K.; Ulukus, S. Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes. IEEE Trans. Inf. Theory 2018, 64, 6842–6862. [Google Scholar] [CrossRef]
  6. Tajeddine, R.; Gnilke, O.W.; Karpuk, D.; Freij-Hollanti, R.; Hollanti, C.; Rouayheb, S.E. Private Information Retrieval Schemes for Coded Data with Arbitrary Collusion Patterns. In Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 25–30 June 2017. [Google Scholar]
  7. Wang, Q.; Skoglund, M. On PIR and Symmetric PIR from Colluding Databases with Adversaries and Eavesdroppers. IEEE Trans. Inf. Theory 2019, 65, 3183–3197. [Google Scholar] [CrossRef]
  8. Tian, C.; Sun, H.; Chen, J. Capacity-Achieving Private Information Retrieval Codes with Optimal Message Size and Upload Cost. IEEE Trans. Inf. Theory 2019, 65, 7613–7627. [Google Scholar] [CrossRef]
  9. Guo, T.; Zhou, R.; Tian, C. On the Information Leakage in Private Information Retrieval Systems. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2999–3012. [Google Scholar] [CrossRef]
  10. Banawan, K.; Ulukus, S. The Capacity of Private Information Retrieval from Byzantine and Colluding Databases. IEEE Trans. Inf. Theory 2019, 65, 1206–1219. [Google Scholar] [CrossRef]
  11. Attia, M.A.; Kumar, D.; Tandon, R. The Capacity of Private Information Retrieval from Uncoded Storage Constrained Databases. IEEE Trans. Inf. Theory 2020, 66, 6617–6634. [Google Scholar] [CrossRef]
  12. Sun, H.; Jafar, S.A. The Capacity of Private Computation. IEEE Trans. Inf. Theory 2019, 65, 3880–3897. [Google Scholar] [CrossRef]
  13. Kumar, S.; i Amat, A.G.; Rosnes, E.; Senigagliesi, L. Private Information Retrieval from a Cellular Network with Caching at the Edge. IEEE Trans. Commun. 2019, 67, 4900–4912. [Google Scholar] [CrossRef]
  14. Raviv, N.; Tamo, I.; Yaakobi, E. Private Information Retrieval in Graph-Based Replication Systems. IEEE Trans. Inf. Theory 2020, 66, 3590–3602. [Google Scholar] [CrossRef]
  15. Yao, X.; Liu, N.; Kang, W. The Capacity of Multi-round Private Information Retrieval from Byzantine Databases. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019. [Google Scholar]
  16. Samy, I.; Tandon, R.; Lazos, L. On the Capacity of Leaky Private Information Retrieval. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT), Paris, France, 7–12 July 2019. [Google Scholar]
  17. D’Oliveira, R.G.L.; El Rouayheb, S. One-Shot PIR: Refinement and Lifting. IEEE Trans. Inf. Theory 2020, 66, 2443–2455. [Google Scholar] [CrossRef]
  18. Ulukus, S.; Avestimehr, S.; Gastpar, M.; Jafar, S.A.; Tandon, R.; Tian, C. Private retrieval, computing, and learning: Recent progress and future challenges. IEEE J. Sel. Areas Commun. 2022, 40, 729–748. [Google Scholar] [CrossRef]
  19. Vithana, S.; Wang, Z.; Ulukus, S. Private information retrieval and its extensions: An introduction, open problems, future directions. IEEE BITS Inf. Theory Mag. 2023, 3, 67–85. [Google Scholar] [CrossRef]
  20. Jia, Z.; Jafar, S. X-Secure T-Private Federated Submodel Learning. In Proceedings of the 2021 IEEE International Conference on Communications (ICC 2021), Montreal, QC, Canada, 14–23 June 2021. [Google Scholar]
  21. Chen, Z.; Wang, Z.; Jafar, S.A. The Capacity of T-Private Information Retrieval with Private Side Information. IEEE Trans. Inf. Theory 2020, 66, 4761–4773. [Google Scholar] [CrossRef]
  22. Wei, Y.P.; Banawan, K.; Ulukus, S. The Capacity of Private Information Retrieval with Partially Known Private Side Information. IEEE Trans. Inf. Theory 2019, 65, 8222–8231. [Google Scholar] [CrossRef]
  23. Wei, Y.P.; Ulukus, S. The Capacity of Private Information Retrieval with Private Side Information Under Storage Constraints. IEEE Trans. Inf. Theory 2019, 66, 2023–2031. [Google Scholar] [CrossRef]
  24. Shariatpanahi, S.P.; Siavoshani, M.J.; Maddah-Ali, M.A. Multi-Message Private Information Retrieval with Private Side Information. In Proceedings of the 2018 IEEE Information Theory Workshop (ITW), Guangzhou, China, 25–29 November 2018. [Google Scholar]
  25. Heidarzadeh, A.; Garcia, B.; Kadhe, S.; Rouayheb, S.E.; Sprintson, A. On the Capacity of Single-Server Multi-Message Private Information Retrieval with Side Information. In Proceedings of the 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 2–5 October 2018. [Google Scholar]
  26. Li, S.; Gastpar, M. Single-server Multi-message Private Information Retrieval with Side Information. In Proceedings of the 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 2–5 October 2018. [Google Scholar]
  27. Kadhe, S.; Garcia, B.; Heidarzadeh, A.; El Rouayheb, S.; Sprintson, A. Private Information Retrieval with Side Information. IEEE Trans. Inf. Theory 2020, 66, 2032–2043. [Google Scholar] [CrossRef]
  28. Tandon, R. The capacity of cache aided private information retrieval. In Proceedings of the 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 3–6 October 2017; pp. 1078–1082. [Google Scholar] [CrossRef]
  29. Wei, Y.P.; Banawan, K.; Ulukus, S. Fundamental Limits of Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching. IEEE Trans. Inf. Theory 2019, 65, 3215–3232. [Google Scholar] [CrossRef]
  30. Chen, Z.; Wang, Z.; Jafar, S.A. The Asymptotic Capacity of Private Search. IEEE Trans. Inf. Theory 2020, 66, 4709–4721. [Google Scholar] [CrossRef]
  31. Wang, Z.; Banawan, K.; Ulukus, S. Private Set Intersection: A Multi-Message Symmetric Private Information Retrieval Perspective. arXiv 2020, arXiv:1912.13501. [Google Scholar] [CrossRef]
  32. Pradhan, S.S.; Ramchandran, K. Distributed source coding using syndromes (DISCUS): Design and construction. IEEE Trans. Inf. Theory 2003, 49, 626–643. [Google Scholar] [CrossRef]
  33. Blahut, R.E. Algebraic Codes for Data Transmission; Cambridge University Press: Cambridge, UK, 2003. [Google Scholar]
  34. Sun, H.; Jafar, S.A. Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2920–2932. [Google Scholar] [CrossRef]
  35. Herren, B.; Arafa, A.; Banawan, K. Download Cost of Private Updating. In Proceedings of the ICC 2021—IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
  36. Slepian, D.; Wolf, J.K. Noiseless coding of correlated information sources. IEEE Trans. Inf. Theory 1973, IT-19, 471–480. [Google Scholar] [CrossRef]
  37. Shah, N.B.; Rashmi, K.V.; Ramchandran, K. One extra bit of download ensures perfectly private information retrieval. In Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014. [Google Scholar] [CrossRef]
  38. Herren, B. Download Cost of Cache-Aided Private Updating with Unknown Prefetching. Master’s Thesis, University of North Carolina at Charlotte, Charlotte, NC, USA, 2022. [Google Scholar]
Figure 1. Cache-aided private updating with unknown prefetching system model.
Figure 1. Cache-aided private updating with unknown prefetching system model.
Entropy 27 00828 g001
Figure 2. Download cost of cache-aided private updating with unknown prefetching with L = 32 bits, N = 2 databases, K = 3 messages, and r = 1 10 caching ratio (Corollary 1’s results for the very low caching ratio).
Figure 2. Download cost of cache-aided private updating with unknown prefetching with L = 32 bits, N = 2 databases, K = 3 messages, and r = 1 10 caching ratio (Corollary 1’s results for the very low caching ratio).
Entropy 27 00828 g002
Table 1. Key notations and system parameters.
Table 1. Key notations and system parameters.
SymbolDefinition
Knumber of messages
Nnumber of databases
Lmessage length
θ index of the required message
W ^ θ outdated message
W θ current message
fupper bound on differences between outdated and current messages
Zcache content
number of linearly-combined bits cached from each message
rcaching ratio: l / L
L ¯ number of bits sufficient to update the message: log 2 ( i = 0 f L i )
Table 2. Query table for N = K = 2 , L = 3 , f = 1 , and r = 0 .
Table 2. Query table for N = K = 2 , L = 3 , f = 1 , and r = 0 .
Database 1Database 2
a ¯ 1 , b ¯ 1 a ¯ 2 + b ¯ 1
Table 3. Query table for N = K = 2 , L = 5 , f = 1 , and r = 0 .
Table 3. Query table for N = K = 2 , L = 5 , f = 1 , and r = 0 .
Database 1Database 2
a ¯ 1 , b ¯ 1 a ¯ 2 + b ¯ 1
h 1 a ¯ 3 + h 2 b ¯ 3 ( h 1 + 1 ) a ¯ 3 + h 2 b ¯ 3
Table 4. Asymmetric query table with N = K = L = 3 and very high r. Here, we have Z = { a 1 , a 2 , b 1 , b 2 , c 1 , c 2 } .
Table 4. Asymmetric query table with N = K = L = 3 and very high r. Here, we have Z = { a 1 , a 2 , b 1 , b 2 , c 1 , c 2 } .
Database 1Database 2Database 3
a 3 + b 1 + c 1
Table 5. Asymmetric query table with N = K = 3 , L = 6 and very low r. Here, we have Z = { a 1 , a 2 , b 1 , b 2 , c 1 , c 2 } .
Table 5. Asymmetric query table with N = K = 3 , L = 6 and very low r. Here, we have Z = { a 1 , a 2 , b 1 , b 2 , c 1 , c 2 } .
Database 1Database 2Database 3
a 3 + b 1
a 4 + c 1
b 3 + c 3
a 5 + b 3 + c 3 a 6 + b 3 + c 3
Table 6. Query table for N = K = 3 , L = 14 , and mid-range caching ratio r = 2 14 . Here, we have Z = { a 1 , a 2 , b 1 , b 2 , c 1 , c 2 } .
Table 6. Query table for N = K = 3 , L = 14 , and mid-range caching ratio r = 2 14 . Here, we have Z = { a 1 , a 2 , b 1 , b 2 , c 1 , c 2 } .
Database 1Database 2Database 3
a 3 + b 1 + c 1 a 4 + b 1 + c 1 a 5 + b 1 + c 1
a 6 + b 2 + c 2
a 7 + b 2 a 11 + b 2
a 8 + c 2 a 12 + c 2
b 3 + c 3 b 4 + c 4
a 9 + b 3 + c 3 a 10 + b 3 + c 3
a 13 + b 4 + c 4 a 14 + b 4 + c 4
Table 7. Query table for N = 3 , K = 4 , L = 21 , and r = 3 21 . Here, we have Z = { a 1 , a 2 , a 3 , b 1 , b 2 , b 3 , c 1 , c 2 , c 3 , d 1 , d 2 , d 3 } .
Table 7. Query table for N = 3 , K = 4 , L = 21 , and r = 3 21 . Here, we have Z = { a 1 , a 2 , a 3 , b 1 , b 2 , b 3 , c 1 , c 2 , c 3 , d 1 , d 2 , d 3 } .
Database 1Database 2Database 3
a 4 + b 1 + c 1 a 7 + b 1 + c 1 a 10 + b 1 + c 1
a 5 + b 2 + d 1 a 8 + b 2 + d 1 a 11 + b 2 + d 1
a 6 + c 2 + d 2 a 9 + c 2 + d 2 a 12 + b 2 + d 2
b 4 + c 4 + d 4 b 5 + c 5 + d 5 b 6 + c 6 + d 6
a 13 + b 5 + c 5 + d 5 a 15 + b 4 + c 4 + d 4 a 17 + b 4 + c 4 + d 4
a 14 + b 6 + c 6 + d 6 a 16 + b 6 + c 6 + d 6 a 18 + b 5 + c 5 + d 5
a 19 + b 3 + c 3 + d 3 a 20 + b 3 + c 3 + d 3 a 21 + b 3 + c 3 + d 3
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Stark, B.; Arafa, A.; Banawan, K. Towards Characterizing the Download Cost of Cache-Aided Private Updating. Entropy 2025, 27, 828. https://doi.org/10.3390/e27080828

AMA Style

Stark B, Arafa A, Banawan K. Towards Characterizing the Download Cost of Cache-Aided Private Updating. Entropy. 2025; 27(8):828. https://doi.org/10.3390/e27080828

Chicago/Turabian Style

Stark, Bryttany, Ahmed Arafa, and Karim Banawan. 2025. "Towards Characterizing the Download Cost of Cache-Aided Private Updating" Entropy 27, no. 8: 828. https://doi.org/10.3390/e27080828

APA Style

Stark, B., Arafa, A., & Banawan, K. (2025). Towards Characterizing the Download Cost of Cache-Aided Private Updating. Entropy, 27(8), 828. https://doi.org/10.3390/e27080828

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop