Exercises

ex-ch17-e01

Easy

Verify the STC converse: why does Mβ‰₯1M \geq 1 necessary for perfect secrecy follow from the one-time pad lower bound?

ex-ch17-e02

Easy

For K=4K = 4, N=8N = 8, M=3M = 3: compute STC secure rate and compare to non-secure MAN.

ex-ch17-e03

Medium

Show that STC's achievable rate converges to the non-secure MAN rate as Nβ†’βˆžN \to \infty at fixed M/NM/N.

ex-ch17-e04

Medium

Walk through Shamir (1,3)(1, 3) threshold sharing for a binary secret S∈{0,1}S \in \{0, 1\}.

ex-ch17-e05

Medium

A system with K=10K = 10 users, N=100N = 100 files, M=2M = 2: is secure delivery feasible? Compute secure rate if yes.

ex-ch17-e06

Hard

Prove the STC security claim: I(W;X)=0I(\mathcal{W}; X) = 0 in the STC scheme, where XX is the broadcast.

ex-ch17-e07

Hard

Suppose the eavesdropper has partial cache access (e.g., has compromised zz of KK users' caches). Derive the required memory overhead.

ex-ch17-e08

Medium

Compare STC with encrypting each MAN XOR with AES-128-CTR. Tradeoffs?

ex-ch17-e09

Hard

Design a joint privacy + secrecy scheme for K=3K = 3, N=4N = 4, M=2M = 2. Specify placement and one delivery round.

ex-ch17-e10

Medium

Explain why decentralized caching (Ch 13) does not trivially combine with STC.

ex-ch17-e11

Hard

Prove the STC converse using the cut-set argument more formally.

ex-ch17-e12

Medium

In an IoT scenario with K=200K = 200 tiny sensors, each with only M=0.5M = 0.5 files of cache, is STC feasible? If not, what are alternatives?

ex-ch17-e13

Hard

Derive the STC converse for the multi-eavesdropper case: ee eavesdroppers with independent observations Y1,…,YeY_1, \ldots, Y_e that might collude.

ex-ch17-e14

Hard

In the joint privacy + secrecy scheme, is the rate exactly STC rate, or is there an additional penalty?

ex-ch17-e15

Medium

The STC scheme assumes a passive eavesdropper. How should the scheme change for an active eavesdropper (can inject/modify messages)?