The Wiretap Channel with a Cache

Ahmed A. Zewail, Aylin Yener

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

We consider the wiretap channel when a (secure) cache memory is added to the legitimate receiver. With the goal of utilizing coded caching for improving secrecy, during the cache placement phase, the receiver caches a function of the files, and the secret key shared with the transmitter subject to the memory constraint. The signals transmitted to serve the receiver's request during the delivery phase are observed by an eavesdropper over a wiretap channel. We characterize the secrecy capacity of the wiretap channel with a cache, i.e., the maximum achievable file size while keeping the overall database secure, for both the discrete memoryless and the Gaussian channels. The optimal caching scheme maximizes the utilization from the transmission over the delivery phase by sharing sufficient amount of keys between the legitimate communication nodes during the placement phase. Interestingly, we demonstrate that the existence of cache memory is an enabler of secure communication, i.e., the secrecy capacity remains positive, even when the main channel is degraded with respect to the eavesdropper channel.

Original languageEnglish (US)
Title of host publication2018 IEEE International Symposium on Information Theory, ISIT 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1720-1724
Number of pages5
ISBN (Print)9781538647806
DOIs
StatePublished - Aug 15 2018
Event2018 IEEE International Symposium on Information Theory, ISIT 2018 - Vail, United States
Duration: Jun 17 2018Jun 22 2018

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2018-June
ISSN (Print)2157-8095

Other

Other2018 IEEE International Symposium on Information Theory, ISIT 2018
Country/TerritoryUnited States
CityVail
Period6/17/186/22/18

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'The Wiretap Channel with a Cache'. Together they form a unique fingerprint.

Cite this