The Wiretap Channel with a Cache

Ahmed A. Zewail, Aylin Yener

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

We consider the wiretap channel when a (secure) cache memory is added to the legitimate receiver. With the goal of utilizing coded caching for improving secrecy, during the cache placement phase, the receiver caches a function of the files, and the secret key shared with the transmitter subject to the memory constraint. The signals transmitted to serve the receiver's request during the delivery phase are observed by an eavesdropper over a wiretap channel. We characterize the secrecy capacity of the wiretap channel with a cache, i.e., the maximum achievable file size while keeping the overall database secure, for both the discrete memoryless and the Gaussian channels. The optimal caching scheme maximizes the utilization from the transmission over the delivery phase by sharing sufficient amount of keys between the legitimate communication nodes during the placement phase. Interestingly, we demonstrate that the existence of cache memory is an enabler of secure communication, i.e., the secrecy capacity remains positive, even when the main channel is degraded with respect to the eavesdropper channel.

Original languageEnglish (US)
Title of host publication2018 IEEE International Symposium on Information Theory, ISIT 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1720-1724
Number of pages5
ISBN (Print)9781538647806
DOIs
StatePublished - Aug 15 2018
Event2018 IEEE International Symposium on Information Theory, ISIT 2018 - Vail, United States
Duration: Jun 17 2018Jun 22 2018

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2018-June
ISSN (Print)2157-8095

Other

Other2018 IEEE International Symposium on Information Theory, ISIT 2018
CountryUnited States
CityVail
Period6/17/186/22/18

Fingerprint

Cache memory
Cache
Receiver
Caching
Placement
Transmitters
Data storage equipment
Secure Communication
Communication
Transmitter
Sharing
Maximise
Sufficient
Vertex of a graph
Demonstrate
Secure communication

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Cite this

Zewail, A. A., & Yener, A. (2018). The Wiretap Channel with a Cache. In 2018 IEEE International Symposium on Information Theory, ISIT 2018 (pp. 1720-1724). [8437516] (IEEE International Symposium on Information Theory - Proceedings; Vol. 2018-June). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISIT.2018.8437516
Zewail, Ahmed A. ; Yener, Aylin. / The Wiretap Channel with a Cache. 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 1720-1724 (IEEE International Symposium on Information Theory - Proceedings).
@inproceedings{76344a58c4184059823e446508936ee0,
title = "The Wiretap Channel with a Cache",
abstract = "We consider the wiretap channel when a (secure) cache memory is added to the legitimate receiver. With the goal of utilizing coded caching for improving secrecy, during the cache placement phase, the receiver caches a function of the files, and the secret key shared with the transmitter subject to the memory constraint. The signals transmitted to serve the receiver's request during the delivery phase are observed by an eavesdropper over a wiretap channel. We characterize the secrecy capacity of the wiretap channel with a cache, i.e., the maximum achievable file size while keeping the overall database secure, for both the discrete memoryless and the Gaussian channels. The optimal caching scheme maximizes the utilization from the transmission over the delivery phase by sharing sufficient amount of keys between the legitimate communication nodes during the placement phase. Interestingly, we demonstrate that the existence of cache memory is an enabler of secure communication, i.e., the secrecy capacity remains positive, even when the main channel is degraded with respect to the eavesdropper channel.",
author = "Zewail, {Ahmed A.} and Aylin Yener",
year = "2018",
month = "8",
day = "15",
doi = "10.1109/ISIT.2018.8437516",
language = "English (US)",
isbn = "9781538647806",
series = "IEEE International Symposium on Information Theory - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "1720--1724",
booktitle = "2018 IEEE International Symposium on Information Theory, ISIT 2018",
address = "United States",

}

Zewail, AA & Yener, A 2018, The Wiretap Channel with a Cache. in 2018 IEEE International Symposium on Information Theory, ISIT 2018., 8437516, IEEE International Symposium on Information Theory - Proceedings, vol. 2018-June, Institute of Electrical and Electronics Engineers Inc., pp. 1720-1724, 2018 IEEE International Symposium on Information Theory, ISIT 2018, Vail, United States, 6/17/18. https://doi.org/10.1109/ISIT.2018.8437516

The Wiretap Channel with a Cache. / Zewail, Ahmed A.; Yener, Aylin.

2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., 2018. p. 1720-1724 8437516 (IEEE International Symposium on Information Theory - Proceedings; Vol. 2018-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - The Wiretap Channel with a Cache

AU - Zewail, Ahmed A.

AU - Yener, Aylin

PY - 2018/8/15

Y1 - 2018/8/15

N2 - We consider the wiretap channel when a (secure) cache memory is added to the legitimate receiver. With the goal of utilizing coded caching for improving secrecy, during the cache placement phase, the receiver caches a function of the files, and the secret key shared with the transmitter subject to the memory constraint. The signals transmitted to serve the receiver's request during the delivery phase are observed by an eavesdropper over a wiretap channel. We characterize the secrecy capacity of the wiretap channel with a cache, i.e., the maximum achievable file size while keeping the overall database secure, for both the discrete memoryless and the Gaussian channels. The optimal caching scheme maximizes the utilization from the transmission over the delivery phase by sharing sufficient amount of keys between the legitimate communication nodes during the placement phase. Interestingly, we demonstrate that the existence of cache memory is an enabler of secure communication, i.e., the secrecy capacity remains positive, even when the main channel is degraded with respect to the eavesdropper channel.

AB - We consider the wiretap channel when a (secure) cache memory is added to the legitimate receiver. With the goal of utilizing coded caching for improving secrecy, during the cache placement phase, the receiver caches a function of the files, and the secret key shared with the transmitter subject to the memory constraint. The signals transmitted to serve the receiver's request during the delivery phase are observed by an eavesdropper over a wiretap channel. We characterize the secrecy capacity of the wiretap channel with a cache, i.e., the maximum achievable file size while keeping the overall database secure, for both the discrete memoryless and the Gaussian channels. The optimal caching scheme maximizes the utilization from the transmission over the delivery phase by sharing sufficient amount of keys between the legitimate communication nodes during the placement phase. Interestingly, we demonstrate that the existence of cache memory is an enabler of secure communication, i.e., the secrecy capacity remains positive, even when the main channel is degraded with respect to the eavesdropper channel.

UR - http://www.scopus.com/inward/record.url?scp=85052486001&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85052486001&partnerID=8YFLogxK

U2 - 10.1109/ISIT.2018.8437516

DO - 10.1109/ISIT.2018.8437516

M3 - Conference contribution

AN - SCOPUS:85052486001

SN - 9781538647806

T3 - IEEE International Symposium on Information Theory - Proceedings

SP - 1720

EP - 1724

BT - 2018 IEEE International Symposium on Information Theory, ISIT 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Zewail AA, Yener A. The Wiretap Channel with a Cache. In 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc. 2018. p. 1720-1724. 8437516. (IEEE International Symposium on Information Theory - Proceedings). https://doi.org/10.1109/ISIT.2018.8437516