Recognition: 2 theorem links
· Lean TheoremPrivate Information Retrieval With Arbitrary Privacy Requirements for Graph-Based Storage
Pith reviewed 2026-05-12 03:43 UTC · model grok-4.3
The pith
Flexible privacy requirement sets allow exact capacity or tight bounds in graph-replicated PIR on path and cycle graphs.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
In graph-replicated private information retrieval, privacy is reformulated through per-server privacy requirement sets that are arbitrary subsets of message indices provided they contain the stored messages; for path and cyclic storage graphs under neighborhood-range privacy sets, the retrieval capacity is either bounded or found exactly, with the neighborhood size controlling the shift from local to global privacy.
What carries the argument
Per-server privacy requirement sets, each an arbitrary subset of message indices guaranteed to contain the indices of messages stored at that server.
If this is right
- Exact capacity expressions become available for path graphs when privacy sets follow a fixed neighborhood size.
- Cyclic graphs admit similar capacity results under matching neighborhood privacy.
- Increasing the neighborhood range monotonically increases the required download rate toward the standard PIR capacity.
- Local PIR emerges as the special case when the neighborhood range is restricted to a single server.
Where Pith is reading between the lines
- The same privacy-set formalism could be tested on tree or grid storage graphs to see whether capacity formulas generalize.
- Systems with heterogeneous server trust levels could assign different neighborhood sizes per server without redesigning the storage layout.
- Capacity expressions derived here might serve as outer bounds for PIR over arbitrary graphs once the neighborhood concept is relaxed.
Load-bearing premise
Privacy requirement sets for servers can be chosen independently as any subsets that contain the stored messages, with no further consistency constraints required across servers.
What would settle it
For a path graph with four servers and a neighborhood range of two, compute the actual retrieval capacity by exhaustive enumeration of all possible query strategies and check whether it matches the derived bound.
read the original abstract
We reformulate the definition of privacy in the private information retrieval (PIR) problem to accommodate flexible privacy requirements. We focus on graph-replicated PIR, with a generalized privacy requirement, instead of requiring all messages to be private from all servers, during retrieval. Towards this, we define a privacy requirement set for each server, which can be an arbitrary subset of all message indices, as long as the stored message indices are in their privacy requirement set. Since both the storage and privacy requirement sets have many possibilities, we focus on two specific storage settings, namely the path and cyclic graphs. We consider several privacy settings for each of them, which are not necessarily the same, to give different examples for privacy sets. Of particular interest are the privacy sets that comprise the indices of messages stored at servers within a neighborhood range. The neighborhood range parameter allows a transition from the recently introduced local PIR [1] to the standard graph-replicated PIR. In these cases, we derive bounds on the capacity or find the exact capacity.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript reformulates the privacy definition in private information retrieval (PIR) to accommodate arbitrary privacy requirement sets at each server (any subset containing the server's stored messages) within graph-replicated storage. It specializes to path and cyclic graphs, examines multiple privacy configurations with emphasis on neighborhood-range sets that interpolate between local PIR and standard graph-replicated PIR, and derives bounds or exact capacity expressions for these cases.
Significance. If the capacity derivations hold, the work meaningfully generalizes PIR privacy models beyond uniform all-messages-private requirements, providing a parameterized framework that bridges local and global privacy via the neighborhood-range construction. The explicit focus on path and cycle topologies yields concrete, falsifiable capacity results that extend prior graph-replicated PIR literature; the information-theoretic arguments and transition between special cases constitute a clear technical contribution.
minor comments (3)
- [Abstract] Abstract: the phrase 'several privacy settings for each of them' is vague; a short enumeration of the specific neighborhood ranges and graph instances for which exact capacities versus bounds are obtained would improve readability without lengthening the abstract.
- The transition from local PIR to standard graph-replicated PIR is described qualitatively; adding a brief sentence or small table in the introduction that maps neighborhood-range values to the corresponding privacy sets would make the interpolation explicit.
- Ensure the reference to local PIR [1] appears in the bibliography with full bibliographic details.
Simulated Author's Rebuttal
We thank the referee for their positive summary and recommendation of minor revision. The assessment correctly identifies the core contribution as a parameterized privacy model that interpolates between local PIR and standard graph-replicated PIR via neighborhood-range sets, together with concrete capacity results on path and cycle graphs.
Circularity Check
No significant circularity in the derivation chain
full rationale
The paper reformulates the PIR privacy definition to allow arbitrary privacy requirement sets per server (any subset containing the stored messages) and restricts attention to path and cyclic graph storages with explicit neighborhood-range privacy parameterizations that interpolate between local PIR and standard graph-replicated PIR. Capacity bounds or exact values are derived for these concrete families. No equations reduce a claimed prediction or capacity expression to a fitted input or self-referential definition by construction; the neighborhood-range parameterization is introduced explicitly as a modeling choice rather than smuggled via self-citation. The single reference to prior local-PIR work is invoked only as a boundary case and does not bear the load of the new derivations. The overall argument is therefore self-contained against external information-theoretic benchmarks.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Standard information-theoretic definition of PIR capacity as the supremum of achievable rates under the stated privacy constraints.
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We define a privacy requirement set for each server, which can be an arbitrary subset of all message indices, as long as the stored message indices are in their privacy requirement set... neighborhood range parameter allows a transition from the recently introduced local PIR to the standard graph-replicated PIR. In these cases, we derive bounds on the capacity or find the exact capacity.
-
IndisputableMonolith/Foundation/DimensionForcing.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
For the path graph... capacity is C = (N-1)/(2N-3). ... For the cyclic graph... C = 1/(h+2).
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
S. Meel, M. Nomeir, and S. Ulukus. Local private information retrieval: A new privacy perspective for graph-based replicated systems. 2026. Available online at arXiv
work page 2026
- [2]
- [3]
-
[4]
S. Vithana, K. Banawan, and S. Ulukus. Semantic private information retrieval.IEEE Trans. Info. Theory, 68(4):2635–2652, December 2021
work page 2021
-
[5]
K. Banawan and S. Ulukus. The capacity of private information retrieval from coded databases.IEEE Trans. Info. Theory, 64(3):1945–1956, January 2018
work page 1945
-
[6]
K. Banawan and S. Ulukus. Multi-message private information retrieval: Capacity results and near-optimal schemes.IEEE Trans. Info. Theory, 64(10):6842–6862, April 2018
work page 2018
-
[7]
K. Banawan and S. Ulukus. Private information retrieval through wiretap channel II: Privacy meets security.IEEE Trans. Info. Theory, 66(7):4129–4149, February 2020
work page 2020
- [8]
- [9]
- [10]
- [11]
-
[12]
K. Banawan and S. Ulukus. Private information retrieval from non- replicated databases. InIEEE ISIT, July 2019
work page 2019
- [13]
- [14]
-
[15]
S. Meel, X. Kong, T. Maranzatto, I. Tamo, and S. Ulukus. Private information retrieval on multigraph-based replicated storage. InIEEE ISIT, June 2025
work page 2025
-
[16]
S. Meel and S. Ulukus. Effect of full common randomness replication in symmetric PIR on graph-based replicated systems. InIEEE ICC, May 2026
work page 2026
-
[17]
X. Kong, S. Meel, T. Maranzatto, I. Tamo, and S. Ulukus. New capacity bounds for PIR on graph and multigraph-based replicated storage.IEEE Trans. Inf. Theory, 72(1):691–709, January 2026. APPENDIX A. Proof of Theorem 3 For better exposition, we explain the schemes with reference to the GPIR scheme on path graph given in [17]. First, we demonstrate the sch...
work page 2026
-
[18]
Ifk∈[h+ 1], thenN k = [1 :h+k+ 1]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN k and serverh+k+ 2, whenθ=k
-
[19]
Ifk∈[h+2 :N−h−2], thenN k = [k−h:h+k+1]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN k, serverk−h−1and serverh+k+ 2, whenθ=k
-
[20]
Ifk∈[N−h−1 :N−1], thenN k = [k−h:N]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN k and serverk−h−1, whenθ=k. LetM k =|N k|+ 1,c 1,k =h+k+ 2,c 2,k = 2h+ 4and c3,k =N−k+h+ 2, then, R= 2(N−1) Ph+1 k=1 Mk +PN−h−2 k=h+2 (Mk + 1) +PN−1 k=N−h−1 Mk (50) = 2(N−1) Ph+1 k=1 c1,k +PN−h−2 k=h+2 c2,k +PN−1 k=N−h−1 c3,k (51) = N−1 Ph...
-
[21]
Ifk∈[1 :N−h−2], thenN k = [1 :h+k+ 1]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN k and serverh+k+ 2, whenθ=k
-
[22]
Download one symbol corresponding to the PIR scheme on path graphP N , whenθ=k
Ifk∈[N−h−1 :h+ 1], thenN k = [N]. Download one symbol corresponding to the PIR scheme on path graphP N , whenθ=k
-
[23]
Ifk∈[h+2 :N−1], thenN k = [k−h:N]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN k and serverk−h−1, whenθ=k. R= 2(N−1) PN−h−2 k=1 Mk +Ph+1 k=N−h−1 N+ PN−1 k=h+2 Mk (54) = 2(N−1) PN−h−2 k=1 c1,k +Ph+1 k=N−h−1 N+ PN−1 k=h+2 c3,k (55) = 2(N−1) 2PN−h−2 k=1 (h+k+ 2) + (2h+ 3−N)N (56) = 2(N−1) (h+ 2)(2N−h−3) .(57) The rate for...
-
[24]
Ifk∈[h+ 2], thenN ′ k = [1 :h+k+ 1]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN ′ k and serverh+k+ 2, whenθ=k
-
[25]
Ifk∈[h+3 :N−h−3], thenN ′ k = [k−h:h+k+1]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN ′ k, serverk−h−1and serverh+k+ 2, whenθ=k
-
[26]
Ifk∈[N−h−2 :N−1], thenN ′ k = [k−h:N]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN ′ k and serverk−h−1, whenθ=k. This gives the same rate as shown below, since, R= 2(N−1) 2Ph+1 k=1 M ′ k +PN−h−3 k=h+3 2M ′ k + 1 +PN−1 k=N−h−1 M ′ k (59) = 2(N−1) Ph+1 k=1 Mk +PN−h−2 k=h+2 Mk + 1 +PN−1 k=N−h−1 Mk (60) = 2(N−1) (h+ 2)(2N−...
-
[27]
Ifk∈[1 :N−h−3], thenN ′ k = [1 :h+k+ 1]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN k and serverh+k+ 2, whenθ=k
-
[28]
Download one symbol corresponding to the PIR scheme on path graphP N , whenθ=k
Ifk∈[N−h−2 :h+ 2], thenN ′ k = [N]. Download one symbol corresponding to the PIR scheme on path graphP N , whenθ=k
-
[29]
Ifk∈[h+3 :N−1], thenN ′ k = [k−h:N]. Download one symbol corresponding to the PIR scheme on path graph consisting ofN k and serverk−h−1, whenθ=k. R= 2(N−1) PN−h−3 k=1 M ′ k +Ph+2 k=N−h−2 N+ PN−1 k=h+3 M ′ k (62) = 2(N−1) PN−h−3 k=1 c1,k +Ph+2 k=N−h−2 N+ PN−1 k=h+3 c3,k (63) = 2(N−1) (h+ 2)(2N−h−3) .(64) B. Proof of Theorem 5 To find the lower bound, we pr...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.