Achieving information theoretic security requires the assumption that there are multiple non-cooperating servers, each having a copy of the database. Without this assumption, any information-theoretically secure PIR protocol requires an amount of communication that is at least the size of the database
n. Multi-server PIR protocols tolerant of non-responsive or malicious/colluding servers are called
robust or
Byzantine robust respectively. These issues were first considered by Beimel and Stahl (2002). An ℓ-server system that can operate where only
k of the servers respond, ν of the servers respond incorrectly, and which can withstand up to
t colluding servers without revealing the client's query is called "
t-private ν-Byzantine robust
k-out-of-ℓ PIR" [DGH 2012]. In 2012, C. Devet, I. Goldberg, and
N. Heninger (DGH 2012) proposed an optimally robust scheme that is Byzantine-robust to \nu which is the theoretical maximum value. It is based on an earlier protocol of Goldberg that uses
Shamir's Secret Sharing to hide the query. Goldberg has released a
C++ implementation on
SourceForge. ==Relation to other cryptographic primitives==