Abstract:The distributed coded caching problem has been studied extensively in the recent past. While the known coded caching schemes achieve an improved transmission rate, they violate the privacy of the users since in these schemes the demand of one user is revealed to others in the delivery phase. In this paper, we consider the coded caching problem under the constraint that the demands of the other users remain information theoretically secret from each user. We first show that the memory-rate pair (M, min{N, K}(1−… Show more
“…To this end, we present two novel achievability schemes. Then, by generalizing the converse bound presented in [4], we demonstrate that the achievable region given by these schemes is in fact the exact memory-rate trade-off.…”
Section: W Ec O N S T R U C Tad Em a N D -P R I V A T Es C H Em E( S C H Em Eb )F O R N Fi L E Sa N Dk U S E R S F R Om T H En O N -P R Imentioning
confidence: 74%
“…As shown in prior works [2]- [4], an (N, K)-private scheme can be obtained from an (N, N K)-non-private scheme. We build on the ideas in these schemes and propose Scheme A.…”
Section: A Achievable Memory-rate Pairs Using Scheme Amentioning
confidence: 98%
“…The optimal rate for a non-private scheme is denoted by R * N,K (M ) and can be defined similarly as R * p N,K (M ). More details on the definition of a non-private coded caching scheme can be found in [4].…”
Section: Problem Formulation and Definitionsmentioning
confidence: 99%
“…,t h e d em a n d so ft h eo t h e ru s e r sr em a i ni n f o rm a t i o n -t h e o r e t i c a l l y p r i v a t e f r om e a c hu s e r . I n [ 4 ] , i tw a s s h o w n t h a to n e c a no b t a i n ad em a n d -p r i v a t e s c h em e f o rN fi l e sa n dK u s e r s f r oman o np r i v a t e s c h em e f o rN fi l e sa n dNK u s e r sw h i c h s e r v e so n l ya s u b s e to fd em a n dv e c t o r s . W efi r s tp r o p o s ea s c h em e ( S c h em e A ) t h a tb u i l d so n t h i s f a c t .…”
Section: Introductionunclassified
“…W efi r s tp r o p o s ea s c h em e ( S c h em e A ) t h a tb u i l d so n t h i s f a c t . M em o r y -r a t ep a i r sa c h i e v a b l eu s i n g S c h em eAa r eg i v e n i nT h e o r em1 .T h e m em o r y -r a t ep a i r s i n T h e o r em1a r es h o w n t ob e w i t h i na m u l t i p l i c a t i v eg a po f3 f r om t h eo p t im a l f o r K <N ( T h e o r em2 ) .T h i s im p r o v e s s t a t e o f t h ea r to no r d e ro p t im a l i t y r e s u l t f r om [ 4 ]w h e r eag a po f 8w a ss h o w n .…”
“…To this end, we present two novel achievability schemes. Then, by generalizing the converse bound presented in [4], we demonstrate that the achievable region given by these schemes is in fact the exact memory-rate trade-off.…”
Section: W Ec O N S T R U C Tad Em a N D -P R I V A T Es C H Em E( S C H Em Eb )F O R N Fi L E Sa N Dk U S E R S F R Om T H En O N -P R Imentioning
confidence: 74%
“…As shown in prior works [2]- [4], an (N, K)-private scheme can be obtained from an (N, N K)-non-private scheme. We build on the ideas in these schemes and propose Scheme A.…”
Section: A Achievable Memory-rate Pairs Using Scheme Amentioning
confidence: 98%
“…The optimal rate for a non-private scheme is denoted by R * N,K (M ) and can be defined similarly as R * p N,K (M ). More details on the definition of a non-private coded caching scheme can be found in [4].…”
Section: Problem Formulation and Definitionsmentioning
confidence: 99%
“…,t h e d em a n d so ft h eo t h e ru s e r sr em a i ni n f o rm a t i o n -t h e o r e t i c a l l y p r i v a t e f r om e a c hu s e r . I n [ 4 ] , i tw a s s h o w n t h a to n e c a no b t a i n ad em a n d -p r i v a t e s c h em e f o rN fi l e sa n dK u s e r s f r oman o np r i v a t e s c h em e f o rN fi l e sa n dNK u s e r sw h i c h s e r v e so n l ya s u b s e to fd em a n dv e c t o r s . W efi r s tp r o p o s ea s c h em e ( S c h em e A ) t h a tb u i l d so n t h i s f a c t .…”
Section: Introductionunclassified
“…W efi r s tp r o p o s ea s c h em e ( S c h em e A ) t h a tb u i l d so n t h i s f a c t . M em o r y -r a t ep a i r sa c h i e v a b l eu s i n g S c h em eAa r eg i v e n i nT h e o r em1 .T h e m em o r y -r a t ep a i r s i n T h e o r em1a r es h o w n t ob e w i t h i na m u l t i p l i c a t i v eg a po f3 f r om t h eo p t im a l f o r K <N ( T h e o r em2 ) .T h i s im p r o v e s s t a t e o f t h ea r to no r d e ro p t im a l i t y r e s u l t f r om [ 4 ]w h e r eag a po f 8w a ss h o w n .…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.