The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II - Multiple Library Files.

2018 IEEE INFORMATION THEORY WORKSHOP (ITW)(2018)

引用 4|浏览23
暂无评分
摘要
A wiretap model with two receivers equipped with fixed-size cache memories, and a type II adversary is considered. The adversary in this model chooses a subset of symbols to tap into either from cache placement, delivery transmission, or both phases. The legitimate parties do not know the fractions or the positions of the tapped symbols in either phase. For a library of size three files or more, lower and upper bounds on the strong secrecy capacity, i.e., the maximum achievable file rate while keeping the overall library strongly secure, are derived. The strong secrecy capacity is identified for the instance of large tapped subsets. Achievability is established by wiretap coding, security embedding codes, one-time pad keys, and coded caching techniques. The upper bound is constructed by three successive channel transformations.
更多
查看译文
关键词
information theoretic security guarantees,powerful adversary,cache-aided communication system,caching broadcast channel,type II,cache-tapping,information theoretic models,coded caching,wiretap II model,fixed-size cache memories,cache placement,tapped symbols,tapped set,strong secrecy capacity,maximum achievable file rate,code design,wiretap coding,security embedding codes
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要