2015
DOI: 10.1109/tifs.2014.2375553
|View full text |Cite
|
Sign up to set email alerts
|

Fundamental Limits of Caching With Secure Delivery

Abstract: Caching is emerging as a vital tool for alleviating the severe capacity crunch in modern content-centric wireless networks. The main idea behind caching is to store parts of popular content in end-users' memory and leverage the locally stored content to reduce peak data rates. By jointly designing content placement and delivery mechanisms, recent works have shown order-wise reduction in transmission rates in contrast to traditional methods. In this work, we consider the secure caching problem with the addition… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
157
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 145 publications
(162 citation statements)
references
References 32 publications
4
157
0
1
Order By: Relevance
“…Clearly, for D 1 ⊂ D 2 , a D 2 -non-private scheme is also a D 1 -non-private scheme. In particular, achievable rates for satisfying various demand type-classes were studied in [14], and their results are useful in our schemes for the type (K, K, · · · , K) due to the relation (12).…”
Section: (U)mentioning
confidence: 99%
See 1 more Smart Citation
“…Clearly, for D 1 ⊂ D 2 , a D 2 -non-private scheme is also a D 1 -non-private scheme. In particular, achievable rates for satisfying various demand type-classes were studied in [14], and their results are useful in our schemes for the type (K, K, · · · , K) due to the relation (12).…”
Section: (U)mentioning
confidence: 99%
“…The coded caching schemes in the noiseless broadcast network is inherently prone to security and privacy issues since the broadcasted message is revealed to everyone. Information theoretic secrecy from an external adversary who can observe the broadcasted message was first studied by Sengupta et al [12]. They proposed a scheme which prevents the adversary from getting any information about any file from the broadcasted message.…”
Section: Introductionmentioning
confidence: 99%
“…. , L. (22) Once user k joins the system, it caches the contentZ l k where l k = k mod L. Such allocation results in dividing the set of active users into ⌈ K L ⌉ virtual groups. In particular, we group the first L users to join the system in group 1, and the users from L + 1 to 2L in group 2 and so on.…”
Section: A Cache Placement Phasementioning
confidence: 99%
“…This indicates that Ψ is a quasi-concave function of β s [40]. Hence, β * s is the unique zero-crossing of dΨ dβs , i.e., it is the solution to problem (28).…”
Section: B Optimal β S For the Fot Schemementioning
confidence: 99%
“…The secrecy throughput Ψ for the FOT scheme in(28) is quasi-concave on β s , and the optimal β * s maximizing Ψ is the unique zero-crossing of the following derivative dΨ dβs , It can be proved that the two boundaries are dΨ dβs | βs=0 = A 2 > 0 and dΨ dβs | βs→∞ < 0. Due to the continuity of Ψ, there is at least one zero-crossing of dΨ dβs…”
mentioning
confidence: 99%