Prerequisites & Notation
Before You Begin
This chapter introduces information-theoretic demand privacy in coded caching. Prerequisites: the MAN scheme, D2D caching, and basic information-theoretic security (Shannon's perfect secrecy concept).
- MAN coded caching (Ch 2)(Review ch02)
Self-check: Can you state the MAN rate formula and the XOR delivery pattern?
- Shannon's perfect secrecy(Review ch20)
Self-check: What is the key-rate requirement for one-time pad encryption?
- Information leakage vs computational privacy
Self-check: Why is information-theoretic privacy stronger than computational (cryptographic) privacy?
Notation for This Chapter
Symbols for demand privacy analysis.
| Symbol | Meaning | Introduced |
|---|---|---|
| Demand vector; each is user 's requested file index | s01 | |
| Broadcast message sent by the server under demand | s01 | |
| Leakage: how much user learns about others' demands | s01 | |
| Shared randomness (key) distributed among users | s02 | |
| Colluding coalition size in D2D private caching | s03 | |
| Caching gain (unchanged from non-private MAN) | s01 | |
| Private delivery rate (same as MAN for shared-link) | s02 |