2021
DOI: 10.48550/arxiv.2105.06282
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Multiaccess Coded Caching with Private Demands

Abstract: Recently Hachem et al. formulated a multiaccess coded caching model which consists of a central server connected to K users via an error-free shared link, and K cache-nodes. Each cache-node is equipped with a local cache and each user can access L neighbouring cache-nodes with a cyclic wrap-around fashion. In this paper, we take the privacy of the users' demands into consideration, i.e., each user can only get its required file and can not get any information about the demands of other users. By storing some p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…By using such transformation approach, the load K(1−LM/N ) KM/N +1 can be achieved for any system parameters K and L. For certain special cases of the 1D MACC parameters, some improved schemes with lower loads were proposed in [23]- [26]. Furthermore, some extended model of the 1D MACC problem has been studied, such as the privacy and secrecy constrains [27]- [29], the mobility-aware scenarios [30], and generalized 1D MACC topologies with the number of users is larger than that of cache-nodes [31]- [34].…”
Section: A Backgroundmentioning
confidence: 99%
“…By using such transformation approach, the load K(1−LM/N ) KM/N +1 can be achieved for any system parameters K and L. For certain special cases of the 1D MACC parameters, some improved schemes with lower loads were proposed in [23]- [26]. Furthermore, some extended model of the 1D MACC problem has been studied, such as the privacy and secrecy constrains [27]- [29], the mobility-aware scenarios [30], and generalized 1D MACC topologies with the number of users is larger than that of cache-nodes [31]- [34].…”
Section: A Backgroundmentioning
confidence: 99%
“…The idea of key superposition to guarantee both content security and demand privacy simultaneously was used in [20]. Demand privacy using privacy keys for the multi-access networks where each user has access to r caches in a cyclic wrap-around way [8] is considered in [21], [22]. But, the multi-access network we consider has number of users much larger than the number of caches.…”
Section: Introductionmentioning
confidence: 99%
“…It consists of a server having N files which is connected to K users, where each user has access to a unique set of r caches out of C caches. Demand privacy for single file retrieval is considered in [21], [22] whereas we consider security and demand privacy for linear function retrieval.…”
Section: Introductionmentioning
confidence: 99%