References & Further Reading

References

  1. K. Wan and G. Caire, On Coded Caching with Private Demands, 2021

    Foundational CommIT paper: demand privacy is free in coded caching. The MAN rate is achievable with zero mutual- information leakage. Core result of §12.2.

  2. K. Wan, L. Sun, M. Ji, D. Tuninetti, and G. Caire, Fundamental Limits of Demand-Private Coded Caching, 2022

    CommIT paper extending Wan-Caire to D2D with user collusion. Theorem 1: $z$-colluding rate is $(K-z)(1-\mu)/(1 + (K-z)\mu)$. Core result of §12.3.

  3. M. A. Maddah-Ali and U. Niesen, Fundamental Limits of Caching, 2014

    MAN scheme; baseline that leaks demands. Privacy is added on top of the MAN structure.

  4. S. Kamel and M. Wigger, Secure Coded Caching, 2017

    Earlier privacy-aware coded caching with rate penalty. Predecessor to the zero-cost Wan-Caire result.

  5. M. Wigger and S. Engelmann, Coded Caching under Secrecy, 2019

    Secrecy-constrained coded caching with eavesdropper. Related but distinct privacy notion (secrecy vs demand privacy).

  6. R. Tandon and O. Simeone, Cloud-Aided Wireless Networks with Edge Caching, 2017

    NDT framework with privacy extensions discussed in later CommIT work (Wan-Caire-Tandon 2024).

  7. M. Ji, G. Caire, and A. F. Molisch, Fundamental Limits of Caching in Wireless D2D Networks, 2016

    D2D scaling-law result. Chapter 12's D2D privacy section builds on this D2D model.

  8. C. E. Shannon, Communication Theory of Secrecy Systems, 1949

    Classical information-theoretic secrecy. Establishes the one-time-pad requirement. Philosophical precursor to the coded-caching privacy framework.

  9. A. El Gamal and Y.-H. Kim, Network Information Theory, Cambridge University Press, 2011

    Background: secrecy capacity in BC, wiretap channel. Conceptual base for IT privacy in coded caching.

  10. C. Dwork, Differential Privacy, 2006

    Introduces differential privacy. Alternative framework to IT privacy; compared in Exercise 15.

  11. K. Wan, G. Caire, and R. Tandon, Privacy in Cache-Aided Cloud-RAN, 2024

    CommIT extension: privacy in the NDT framework (Ch 8). Recent work joining Chapter 8 and Chapter 12 themes.

  12. K. Wan, M. Ji, D. Tuninetti, and G. Caire, Demand Privacy in Coded Caching with Heterogeneous Cache Sizes, 2023

    Privacy extension to heterogeneous caches. Relevant for Chapter 13's non-uniform analysis.

Further Reading

Resources for deeper study of privacy in coded caching.

  • The Wan-Caire zero-leakage paper

    K. Wan, G. Caire, 'On Coded Caching with Private Demands,' IEEE TIT 2021

    Foundational CommIT result. Required reading.

  • D2D collusion extension

    K. Wan, L. Sun, M. Ji, D. Tuninetti, G. Caire, 'Fundamental Limits of Demand-Private Coded Caching,' IEEE TIT 2022

    Characterizes privacy-rate tradeoff under collusion. Direct basis for §12.3.

  • Secrecy in coded caching

    S. Kamel, M. Wigger, 'Secure Coded Caching,' IEEE TIT 2017

    Alternative privacy notion (secrecy vs demand privacy). Useful for contrast.

  • Shannon secrecy foundation

    C. E. Shannon, 'Communication Theory of Secrecy Systems,' BSTJ 1949

    Classical paper establishing IT secrecy; cornerstone of the privacy framework.

  • Differential privacy

    C. Dwork, 'Differential Privacy,' ICALP 2006

    Relaxed privacy framework; compared to IT privacy in Exercise 15.