Chapter Summary
Chapter Summary
Key Points
- 1.
Information-theoretic demand privacy requires that each user learns zero information about other users' demands from its received messages and cache. Formally: . Stronger than cryptographic privacy.
- 2.
The standard MAN scheme leaks. In MAN delivery, users must know all demands to XOR-decode. Leakage is bits per round — substantial.
- 3.
Wan-Caire 2021 (CommIT): Demand privacy in shared-link coded caching is free. The MAN rate is achievable with zero leakage via shared randomness (per-user secret permutations).
- 4.
Wan-Sun-Ji-Tuninetti-Caire 2022 (CommIT): In D2D private caching with coalitions of size , the achievable rate is . Effective users reduce from to . For small , rate penalty is small.
- 5.
Shared randomness is the key tool. Pre-distributed permutations (via PKI, Diffie-Hellman, or SIM) enable the server to mask demands so users can decode their own files without inferring others'.
- 6.
Collusion tradeoff. Privacy against larger coalitions costs more rate. For (everyone colludes), no privacy is possible. For (typical threat model), cost is small.
- 7.
Engineering reality. Shared-randomness overhead is negligible for large files (~MB) but non-trivial for small messages. SIM-based pre-shared keys in 5G provide a natural infrastructure for deployment.
Looking Ahead
Chapter 13 moves to the realistic world of heterogeneous caches and non-uniform demands. Real libraries are Zipf-distributed; real users have different cache sizes. How do the coded-caching results extend? Chapter 14 addresses the subpacketization problem head-on: polynomial-subpacketization schemes that recover coded multicasting gains without the exponential blowup.