Prerequisites & Notation

Before You Begin

This chapter introduces information-theoretic demand privacy in coded caching. Prerequisites: the MAN scheme, D2D caching, and basic information-theoretic security (Shannon's perfect secrecy concept).

  • MAN coded caching (Ch 2)(Review ch02)

    Self-check: Can you state the MAN rate formula and the XOR delivery pattern?

  • D2D caching and scaling law (Ch 10)(Review ch10)

    Self-check: Can you state the Θ(M/N)\Theta(M/N) per-user scaling?

  • Shannon's perfect secrecy(Review ch20)

    Self-check: What is the key-rate requirement for one-time pad encryption?

  • Mutual information and KL-divergence(Review ch01)

    Self-check: What does I(X;Y)=0I(X;Y) = 0 mean operationally?

  • Information leakage vs computational privacy

    Self-check: Why is information-theoretic privacy stronger than computational (cryptographic) privacy?

Notation for This Chapter

Symbols for demand privacy analysis.

SymbolMeaningIntroduced
d=(d1,…,dK)\mathbf{d} = (d_1, \ldots, d_K)Demand vector; each dkd_k is user kk's requested file indexs01
XdX_{\mathbf{d}}Broadcast message sent by the server under demand d\mathbf{d}s01
I(dβˆ’k;Xd∣Zk,dk)I(\mathbf{d}_{-k}; X_{\mathbf{d}} | \mathcal{Z}_k, d_k)Leakage: how much user kk learns about others' demandss01
K\mathcal{K}Shared randomness (key) distributed among userss02
zzColluding coalition size in D2D private cachings03
ttCaching gain t=KM/Nt = KM/N (unchanged from non-private MAN)s01
RprivR_{\text{priv}}Private delivery rate (same as MAN for shared-link)s02