Sengupta-Tandon-Clancy Secure Delivery Scheme
Theorem: STC Secure Delivery Rate
For the secure coded-caching problem with users, files, and cache size per user with , the achievable secure delivery rate is This is the MAN rate with effective memory . For : no secure scheme exists.
Cache splits into two parts: 1 file of random key bits for OTP masking + files of file-content subfiles (MAN structure). Delivery phase XORs each MAN transmission with a fresh key from the cache. Eavesdropper sees only XOR-with-key = uniform noise. Users decode using their cached key + MAN structure.
Placement
Reserve 1 file of cache for a random key of size bits (uniform random, independent of library). Use remaining bits for MAN-style subfile caching with effective memory .
Delivery
Run MAN delivery on demands with effective memory : output . Transmit , where is a key shared by the relevant users (from an appropriate Shamir sharing or reused XOR, see Β§17.3).
Correctness
Each user knows (constructed to be reconstructible from its cache). It undoes the mask, then decodes via MAN.
Secrecy
with uniform is uniform .
Definition: Two-Tier Placement for STC Scheme
Two-Tier Placement for STC Scheme
STC placement. For secure delivery with cache size :
- Tier 1 (key tier): Reserve bits ( file) of cache for random key material . The specific key value is user-dependent and shared-randomness-derived so that keys are correlated across users via a -secret sharing.
- Tier 2 (MAN tier): Use remaining bits for MAN subfile caching. Apply MAN placement with memory .
In delivery, tier-1 provides the OTP mask; tier-2 provides the file-content subfiles for coded multicast.
The two-tier structure is essential: without tier-1 keys, tier-2 MAN delivery leaks file content to . Without tier-2, no caching gain.
STC Secure Delivery
Complexity: Subpacketization: . Key material: bits of key per delivery round. Amortized: file of key per user.Each -XOR message carries a fresh shared key; shared randomness amortizes over messages. Total key material per user stays at β matches the floor.
STC Rate Gap vs Non-Secure MAN
Absolute rate gap vs number of users , for several memory ratios . Gap shrinks as grows β the fixed 1-file secrecy cost becomes negligible at scale.
Parameters
Example: STC Scheme Walkthrough: , ,
Concrete walkthrough for users, files, per user. Demands .
Effective memory
. MAN parameter: .
Placement
MAN tier: split each file into 3 subfiles (each bits). User stores for all . Key tier: user also holds random key shares that allow reconstruction of pairwise keys for other .
MAN delivery
Three XOR messages (one per -pair):
Secrecy masking
Broadcast: for each pair. Eavesdropper sees three masked XORs β uniformly random, zero info about .
User 1 decoding
User 1 has and . Unmasks , . Uses cached to recover . Combined with its cached : full .
Rate
file/use. MAN without secrecy (effective ) would give . Cost of secrecy: 2/3 file per use.
STC in Wireless Broadcast Systems
STC is natural for wireless broadcast where the medium is open:
- Wi-Fi and cellular. Open-air broadcast; legitimate user decodes via key, eavesdropper gets noise-like signal.
- Satellite distribution. DVB-S2 supports CW-C2 (physical layer encryption); STC-style caching could layer on top.
- 5G multicast (MBMS). Multicast delivery with per-UE keys is specified; adding coded-caching structure is active research.
- Comparison to TLS. TLS encrypts unicast with per-session key. STC is information-theoretic: immune to quantum attacks, but requires cache-resident key material.
Limits. Practical keys use pseudorandom generators (PRGs); information-theoretic secrecy requires true randomness. For large-scale deployment, PRGs typically suffice, with standard caveats about cryptographic assumptions.
- β’
Wi-Fi: WPA3 is AES-based (computational security)
- β’
5G: NAS/AS encryption is AES; info-theoretic uncommon
- β’
Quantum-safe: STC is natively resistant (no public-key assumption)
- β’
Key management: coded cache keys need fresh rotation
Key Takeaway
The STC scheme achieves the \R_\\text{sec} = K(1 - (M-1)/N)/(1 + K(M-1)/N) rate by two-tier placement. Tier 1 (1 file per user) provides OTP keys; tier 2 (remaining ) is standard MAN. Secrecy costs 1 file of memory; the multicasting gain is preserved for the rest.