The caching broadcast channel with a wire and cache tapping adversary of type II

Mohamed Nafea, Aylin Yener

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

This paper introduces the notion of cache-tapping into information theoretic models of coded caching. In particular, the wiretap II model with two receivers equipped with fixed-size cache memories is considered. The adversary chooses a set of symbols from cache placement, delivery, or both to tap into. The legitimate parties know neither whether cache placement, delivery, or both transmissions are tapped, nor the positions of tapped symbols. Only the size of overall tapped set is known. The strong secrecy capacity, i.e., the maximum achievable file rate while keeping the overall library strongly secure, is identified for the instance of two library files. Achievability is established using a code design which combines wiretap coding, security embedding codes, one-time pad keys, and coded caching. The study overall demonstrates that information theoretic security guarantees are possible against a powerful adversary which optimizes its attack over both phases of a cache-aided communication system.

Original languageEnglish (US)
Title of host publication2018 IEEE Information Theory Workshop, ITW 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538635995
DOIs
StatePublished - Jan 15 2019
Event2018 IEEE Information Theory Workshop, ITW 2018 - Guangzhou, China
Duration: Nov 25 2018Nov 29 2018

Publication series

Name2018 IEEE Information Theory Workshop, ITW 2018

Conference

Conference2018 IEEE Information Theory Workshop, ITW 2018
CountryChina
CityGuangzhou
Period11/25/1811/29/18

All Science Journal Classification (ASJC) codes

  • Information Systems

Fingerprint Dive into the research topics of 'The caching broadcast channel with a wire and cache tapping adversary of type II'. Together they form a unique fingerprint.

Cite this