Chapter Summary
Chapter Summary
Key Points
- 1.
Secure delivery model (Sengupta-Tandon-Clancy 2015): external eavesdropper observes the broadcast . Goal is β perfect info-theoretic secrecy of the library.
- 2.
Minimum memory requirement: . One file's worth of random key material per user is necessary (cut-set/OTP lower bound).
- 3.
STC achievable rate β MAN rate with effective memory .
- 4.
Two-tier placement underpins STC: tier 1 stores 1-file key material (via Shamir sharing); tier 2 stores -file MAN subfiles. Delivery XORs MAN messages with fresh keys.
- 5.
Secrecy is not free. Unlike demand privacy (Wan-Caire, Ch 12), which costs nothing, secrecy costs 1 file of memory. At scale (), the rate penalty is small.
- 6.
Shamir secret sharing achieves the bound exactly by compactly storing shares such that users can reconstruct keys, users learn nothing.
- 7.
Joint privacy + secrecy schemes combine Wan-Caire masking with STC XOR keys β full protection against both insiders and outsiders, at MAN-with-effective-memory rate.
Looking Ahead
Chapter 18 covers multi-access coded caching, where each user accesses multiple caches (not just one). Cyclic wrap-around access and combinatorial design schemes extend MAN to the multi-access setting. This completes Part IV's survey of coded- caching extensions before moving to open research problems in Part V (Ch 19-22).