The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II: Multiple Library Files

Mohamed Nafea, Aylin Yener

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

A wiretap model with two receivers equipped with fixed-size cache memories, and a type II adversary is considered. The adversary in this model chooses a subset of symbols to tap into either from cache placement, delivery transmission, or both phases. The legitimate parties do not know the fractions or the positions of the tapped symbols in either phase. For a library of size three files or more, lower and upper bounds on the strong secrecy capacity, i.e., the maximum achievable file rate while keeping the overall library strongly secure, are derived. The strong secrecy capacity is identified for the instance of large tapped subsets. Achievability is established by wiretap coding, security embedding codes, one-time pad keys, and coded caching techniques. The upper bound is constructed by three successive channel transformations.

Original languageEnglish (US)
Title of host publication2018 56th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages989-996
Number of pages8
ISBN (Electronic)9781538665961
DOIs
StatePublished - Jul 2 2018
Event56th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2018 - Monticello, United States
Duration: Oct 2 2018Oct 5 2018

Publication series

Name2018 56th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2018

Conference

Conference56th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2018
Country/TerritoryUnited States
CityMonticello
Period10/2/1810/5/18

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing
  • Energy Engineering and Power Technology
  • Control and Optimization

Fingerprint

Dive into the research topics of 'The Caching Broadcast Channel with a Wire and Cache Tapping Adversary of Type II: Multiple Library Files'. Together they form a unique fingerprint.

Cite this