Prerequisites & Notation
Before You Begin
This chapter introduces secrecy β defending against an external eavesdropper during delivery β as distinct from the demand-privacy model of Chapter 12. Prerequisites: MAN basics, information- theoretic secrecy, and Shamir secret sharing.
- Information-theoretic secrecy / wiretap channels(Review ch20)
Self-check: What is the secrecy capacity of the Wyner wiretap channel?
- Shamir secret sharing
Self-check: How does a -threshold secret sharing work?
- One-time pad cryptography
Self-check: What is the key-size requirement for perfect secrecy via OTP?
Notation for This Chapter
Symbols for secure delivery and secrecy in coded caching.
| Symbol | Meaning | Introduced |
|---|---|---|
| External eavesdropper observing the broadcast | s01 | |
| Eavesdropper's observation of the delivery message | s01 | |
| Secure delivery rate (files per channel use) | s02 | |
| Minimum cache size for secure delivery (typically ) | s02 | |
| Secret key material at user (shared randomness) | s03 | |
| Shamir threshold scheme parameters | s03 | |
| Mutual information (measuring leakage) | s01 |