Wan-Caire: Private Coded Caching at MAN Rate

Privacy Without Rate Cost

The Wan-Caire 2021 CommIT result is striking: demand privacy can be achieved at the same rate as the non-private MAN scheme. Privacy is "free" β€” the caching gain (1+t)(1 + t) is retained. This contrasts with classical Shannon secrecy, where private communication costs extra capacity.

The key insight: shared randomness, which is free in the placement phase, is the secret weapon. By pre-distributing key bits, the server can mask delivery messages so users cannot distinguish demands from noise.

This section presents the scheme and the main theorem.

Theorem: Wan-Caire: Private Coded Caching Achieves MAN Rate

For the shared-link coded caching problem with KK users, NN files, and per-user cache MM, demand privacy (as defined in Β§12.1) is achievable at delivery rate Rprivβ€…β€Š=β€…β€ŠKβ‹…1βˆ’ΞΌ1+KΞΌ,R_{\text{priv}} \;=\; K \cdot \frac{1 - \mu}{1 + K \mu}, matching the non-private MAN rate, provided the users share randomness of O(log⁑N)O(\log N) bits per delivery round.

The scheme extends MAN: users cache the same combinatorial pattern. In delivery, the server permutes the file indices using shared randomness, so users cannot identify which summand corresponds to which file. Each user decodes its own demand using knowledge of the permutation, but learns nothing about other users' demands. Rate unchanged; privacy gained.

πŸŽ“CommIT Contribution(2021)

Demand-Private Coded Caching at MAN Rate

K. Wan, G. Caire β€” IEEE Transactions on Information Theory

Wan and Caire established that demand privacy in coded caching is free in the information-theoretic sense: the non-private MAN rate R=K(1βˆ’M/N)/(1+KM/N)R = K(1 - M/N)/(1 + KM/N) is achievable under strict information-theoretic privacy (zero mutual information between a user's observations and other users' demands).

Key ideas.

  1. Shared randomness masks demands. Each user holds a secret permutation Ο€k\pi_k over the library. Demands are reported in masked form; only user kk can invert Ο€k\pi_k.
  2. MAN delivery on masked demands. The server runs standard MAN with the masked demand vector; the XOR structure is unchanged.
  3. Perfect privacy. Users decode their own files using their own key; cannot decode others' files nor infer their demands.

The scheme shows privacy and rate are not in tension for coded caching β€” a remarkably positive result for a security-conscious design. CommIT follow-up work extends this to the D2D setting (Β§12.3) and mixed-traffic cases.

coded-cachingprivacycommitView Paper β†’

Wan-Caire Demand-Privacy Scheme

The server holds the library W\mathcal{W}. Each user has its own cache Zk\mathcal{Z}_k and a secret permutation Ο€k\pi_k (shared key). Users send masked demands d~k=Ο€k(dk)\tilde{d}_k = \pi_k(d_k); the server runs MAN delivery on masked demands. Each user decodes its own file; learns zero information about others'. The rate equals the non-private MAN rate: R=K(1βˆ’M/N)/(1+KM/N)R = K(1-M/N)/(1+KM/N).

Private vs Non-Private Rate Curves

The Wan-Caire private rate matches MAN exactly: two curves overlap across all memory ratios. Uncoded private (no MAN gain) baseline shown for contrast β€” loses the coded-caching gain.

Parameters
10
10

Demand Leakage: Private vs Non-Private

Mutual-information leakage of user kk about dβˆ’k\mathbf{d}_{-k}. Non-private MAN: O(Klog⁑N)O(K \log N) bits β€” linear in users. Wan-Caire private: exactly 0 by construction. Gap is enormous even for modest KK.

Parameters
50

Example: Wan-Caire Scheme Walkthrough

For K=3K = 3, N=4N = 4, M=4/3M = 4/3 (integer t=KM/N=1t = KM/N = 1), walk through the Wan-Caire private scheme for demands d1=1,d2=2,d3=3d_1 = 1, d_2 = 2, d_3 = 3.

Common Mistake: Wan-Caire Assumes Uniform Demand Prior

Mistake:

Applying Wan-Caire's zero-leakage result when user demands are not uniformly distributed.

Correction:

The scheme achieves I(dβˆ’k;X∣Zk,dk)=0I(\mathbf{d}_{-k}; X | \mathcal{Z}_k, d_k) = 0 under the assumption that demands are i.i.d. uniform over [N][N]. For non-uniform (e.g., Zipf) demands, the leakage is reduced but not zero: the scheme reveals some bias through the permutation's statistics.

Practical deployments may need stronger randomness (larger key space) for non-uniform demands, or additional noise (differential privacy techniques). The scaling-law rate is still preserved; only the exact zero-leakage guarantee degrades.

Why Privacy Is Free

At first glance it seems surprising that privacy costs nothing. The reason, in information-theoretic terms:

  1. MAN uses symmetric delivery structure. Every XOR message has the same combinatorial form, indexed by (t+1)(t+1)-subsets. The structural "shape" of delivery doesn't depend on demands.
  2. Only labels leak. The file indices dkd_k within the summands carry demand information, not the XOR structure itself. Masking the labels via permutation (one per user) hides this while preserving the XOR's combinatorial utility.
  3. No rate penalty. The permutation is applied at the label layer, not the XOR payload. The payload's bit-count is unchanged.

The result: full MAN rate + full privacy. A rare win-win.