Prerequisites & Notation

Before You Begin

This chapter introduces secrecy β€” defending against an external eavesdropper during delivery β€” as distinct from the demand-privacy model of Chapter 12. Prerequisites: MAN basics, information- theoretic secrecy, and Shamir secret sharing.

  • MAN coded caching (Ch 2)(Review ch02)

    Self-check: Can you state the MAN rate and cache placement?

  • Demand privacy (Ch 12)(Review ch12)

    Self-check: What is the Wan-Caire demand-privacy model?

  • Information-theoretic secrecy / wiretap channels(Review ch20)

    Self-check: What is the secrecy capacity of the Wyner wiretap channel?

  • Shamir secret sharing

    Self-check: How does a (t,n)(t, n)-threshold secret sharing work?

  • One-time pad cryptography

    Self-check: What is the key-size requirement for perfect secrecy via OTP?

Notation for This Chapter

Symbols for secure delivery and secrecy in coded caching.

SymbolMeaningIntroduced
E\mathcal{E}External eavesdropper observing the broadcasts01
YEY_\mathcal{E}Eavesdropper's observation of the delivery message XXs01
RsecR_\text{sec}Secure delivery rate (files per channel use)s02
MsecM_\text{sec}Minimum cache size for secure delivery (typically β‰₯1\geq 1)s02
Kk\mathcal{K}_kSecret key material at user kk (shared randomness)s03
(t,n)(t, n)Shamir threshold scheme parameterss03
I(β‹…;β‹…)I(\cdot; \cdot)Mutual information (measuring leakage)s01