“…Since the appearance of [29], a series of works is interested in exploring the fundamental limits of PIR under various variants of the classical model. This includes PIR with Tprivate queries and replicated storage [31], PIR with MDS coded storage [3], [36], RIR with optimal file length [32], [40], [55], [58], [57], PIR with T -private queries and MDS coded storage [16], [33], PIR with secure storage [18], [19], [20], [48], PIR with unresponsive and/or Byzantine servers [4], [19], [37], PIR with arbitrary collusion patterns [38], [50], multiround PIR [34], multi-message PIR [5], storage constrained PIR [2], [39], [60], PIR with side information [8], [22], [47], symmetric PIR [30], [42], [44], [45], as well as extending PIR to private computation [25], [26], [35], private search [9], federated submodel learning [21], etc.…”