Exercises
ex-cc-ch12-01
EasyState the Wan-Caire zero-leakage theorem for demand-private coded caching.
Rate = non-private MAN. Leakage = 0.
Statement
For the shared-link coded caching problem with users, files, per-user cache , demand privacy () is achievable at the non-private MAN rate . Shared randomness bits per round suffices.
ex-cc-ch12-02
EasyCompute the non-private MAN leakage for users, files, uniform demand.
bits.
Compute
bits/round. User learns ~60 bits about the 9 other users' demands. With Wan-Caire private scheme: 0 bits.
ex-cc-ch12-03
EasyExplain why information-theoretic privacy is stronger than cryptographic privacy.
Adversary computational power.
Answer
Information-theoretic privacy: adversary has unbounded computation; security provably impossible to break. Cryptographic privacy: adversary limited to polynomial time; security assumes hardness of some math problem (factoring, etc.). Quantum computers can break current cryptographic schemes; IT privacy is unaffected. Post-quantum applications prefer IT privacy.
ex-cc-ch12-04
EasyFor users and colluding, compute the rate penalty under Wan-Sun-Ji-Tuninetti-Caire.
.
Compute
Let : . . Penalty: 10%. Modest for practical values.
ex-cc-ch12-05
EasyWhy is shared randomness "free" in the placement phase?
Placement is offline; no delivery bandwidth.
Answer
Placement happens during off-peak when delivery bandwidth is underutilized. Distributing shared-randomness keys (via PKI, SIM, etc.) can piggyback on placement bandwidth. Delivery-phase rate is unaffected by this one-time setup cost.
ex-cc-ch12-06
MediumPrivacy and correctness. In the Wan-Caire scheme, user must decode its file correctly despite not knowing other users' permutations. Prove that correctness is preserved.
MAN decoding uses the XOR structure, not file labels.
Setup
User receives XOR message where .
Decoding
User knows and , so knows . Its target subfile is . The other summands involve for β which user does not know. BUT: user has all cached subfiles indexed by sets containing , across all possible values. MAN's cache structure ensures that user can XOR out any summand whose index set contains . Since user caches for all (every file's subfile with index containing ), it can perform the cancellation without knowing specific values.
Result
Correctness preserved. Privacy preserved (doesn't learn values).
ex-cc-ch12-07
MediumCollusion penalty curve. Plot the rate penalty as a function of coalition fraction for .
.
Formula
.
Numerical trends
For : : 1.00 (baseline). (20%): 0.95. (50%): 0.80. (80%): 0.46. : very small.
Interpretation
Graceful degradation: privacy vs. moderate coalitions has small cost; vs. majority-colluding, cost grows significantly. Threat model matters for deployment.
ex-cc-ch12-08
MediumKey-distribution overhead. For users and files, compute the shared-randomness requirement and overhead vs a 1 GB file.
bits per user permutation.
Compute
bits per permutation. Total (per round): bits = ~1.5 MB.
Overhead vs file
For a 1 GB file ( bits): overhead is . Negligible.
Operational
For small messages (1 KB), overhead would be 150% β not practical. Privacy scheme is economical only for large-file delivery (media, software updates).
ex-cc-ch12-09
MediumPractical vs theoretical keys. Explain why actual deployed systems use much less shared randomness than the theoretical per permutation.
PRFs and pseudorandom permutations.
PRF-based keys
A master key of bits (e.g., 256-bit AES key) can generate an arbitrarily long pseudorandom permutation via PRF. Computational security; IT privacy guarantee lost but practical security excellent.
Hybrid approach
Most deployments use hybrid: IT privacy of permutation structure + computational security of actual key bits. Effective privacy is IT-strong as long as PRF is secure.
Conclusion
Theoretical bits is an upper bound. Practical deployments reduce to a few hundred bits of shared state per user, with security equivalent to underlying PRF.
ex-cc-ch12-10
MediumComputational vs IT privacy comparison. List scenarios where each type is preferred.
Quantum-safe vs operational cost.
IT privacy preferred
- Post-quantum threat models.
- Medical / legal / national security content.
- Long-term archival privacy (future quantum computers).
- Any application where "forever secret" matters.
Cryptographic privacy preferred
- Routine consumer CDN (email, entertainment).
- Small file sizes (where IT overhead is high).
- Systems with no pre-shared-key infrastructure.
Hybrid
Most practical systems use hybrid: IT-structure + cryptographic key derivation. Get "best of both" with minor operational cost.
ex-cc-ch12-11
HardD2D private scheme achievability. Sketch how the Wan-Caire scheme extends to D2D with user collusion.
Treat coalition as a single entity; apply scheme to users.
Setup
Among users, collude (coalition ); are honest. Privacy must hold against .
Adapt Wan-Caire
Honest users' demands masked with shared randomness not known to the coalition. Coalition sees masked indices; cannot invert without keys.
Rate analysis
MAN delivery on the honest users: rate . Coalition members' own demands are also served (they know their own keys), but their information contribution to coded multicast effectively vanishes vs the honest users (since the coalition's messages leak).
Privacy
Coalition's collective view reveals nothing about β because the honest users' demands are masked by keys the coalition doesn't have.
ex-cc-ch12-12
HardConverse for -privacy. Prove that under -collusion, the rate cannot exceed .
Cut-set on honest users.
Cut-set
Honest users form a sub-system; MAN converse applies within. Cache + delivery must decode files.
Bound
Standard MAN converse (Yu-Maddah-Ali-Avestimehr) applied to : for uncoded placement.
Achievability
Wan-Caire extended (Exercise 11) matches.
ex-cc-ch12-13
ChallengePrivacy in multi-antenna coded caching. Extend the Wan-Caire scheme to the cache-aided MIMO BC (Chapter 5). Is privacy still free, or does it cost spatial DoF?
Lampiris-Caire uses demand-dependent precoding.
Challenge
Lampiris-Caire beamforming uses knowledge of user channels AND demands. If demands are private, server must precode using masked demands β may lose spatial-multiplexing gain.
Recent work
Wan-Caire 2023+ results show: spatial DoF is retained under privacy constraints if the server is trusted. DoF = unchanged. If server is adversarial, spatial gain reduces.
Open
Exact characterization for multi-antenna + privacy + untrusted server is an open question. Chapter 12 focuses on trusted- server case.
ex-cc-ch12-14
ChallengeCache content privacy. Is there a notion of "cache privacy" β where users don't learn what other users have cached? How would one define and achieve it?
Distinct from demand privacy.
Definition
Cache privacy: (user learns nothing about others' cache contents).
Trivial observation
Under random uniform placement, each user already has little information about others' caches β but not zero, since they all share the library.
Constructive
With random placement + shared randomness for subfile labels, one could achieve . But this would require masking cache contents β potentially at delivery-rate cost.
Open
Cache privacy has not been systematically studied. A research direction for CommIT or similar groups.
ex-cc-ch12-15
ChallengeDifferential privacy connection. The Wan-Caire scheme provides exact information-theoretic privacy. An alternative framework is differential privacy. How do the two compare?
DP: noise injection; IT: zero leakage.
DP
Differential privacy: add noise to query responses so output distribution is close (within ) across neighboring inputs. Relaxed notion of privacy.
IT privacy
Exact zero leakage. Stronger than DP.
In coded caching
DP-based coded caching would add noise to demand vector; achieve -privacy. Cost: additional rate/complexity. IT privacy (Wan-Caire) achieves zero leakage at zero rate cost β strictly better.
Design choice
IT privacy is the "right" framework for coded caching because it can be achieved without rate cost (shared randomness is cheap). DP-based approaches might be useful in alternative architectures where shared keys are expensive.