TY - GEN
T1 - The Wiretap Channel with a Cache
AU - Zewail, Ahmed A.
AU - Yener, Aylin
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/8/15
Y1 - 2018/8/15
N2 - We consider the wiretap channel when a (secure) cache memory is added to the legitimate receiver. With the goal of utilizing coded caching for improving secrecy, during the cache placement phase, the receiver caches a function of the files, and the secret key shared with the transmitter subject to the memory constraint. The signals transmitted to serve the receiver's request during the delivery phase are observed by an eavesdropper over a wiretap channel. We characterize the secrecy capacity of the wiretap channel with a cache, i.e., the maximum achievable file size while keeping the overall database secure, for both the discrete memoryless and the Gaussian channels. The optimal caching scheme maximizes the utilization from the transmission over the delivery phase by sharing sufficient amount of keys between the legitimate communication nodes during the placement phase. Interestingly, we demonstrate that the existence of cache memory is an enabler of secure communication, i.e., the secrecy capacity remains positive, even when the main channel is degraded with respect to the eavesdropper channel.
AB - We consider the wiretap channel when a (secure) cache memory is added to the legitimate receiver. With the goal of utilizing coded caching for improving secrecy, during the cache placement phase, the receiver caches a function of the files, and the secret key shared with the transmitter subject to the memory constraint. The signals transmitted to serve the receiver's request during the delivery phase are observed by an eavesdropper over a wiretap channel. We characterize the secrecy capacity of the wiretap channel with a cache, i.e., the maximum achievable file size while keeping the overall database secure, for both the discrete memoryless and the Gaussian channels. The optimal caching scheme maximizes the utilization from the transmission over the delivery phase by sharing sufficient amount of keys between the legitimate communication nodes during the placement phase. Interestingly, we demonstrate that the existence of cache memory is an enabler of secure communication, i.e., the secrecy capacity remains positive, even when the main channel is degraded with respect to the eavesdropper channel.
UR - http://www.scopus.com/inward/record.url?scp=85052486001&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85052486001&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2018.8437516
DO - 10.1109/ISIT.2018.8437516
M3 - Conference contribution
AN - SCOPUS:85052486001
SN - 9781538647806
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 1720
EP - 1724
BT - 2018 IEEE International Symposium on Information Theory, ISIT 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2018 IEEE International Symposium on Information Theory, ISIT 2018
Y2 - 17 June 2018 through 22 June 2018
ER -