Coded Caching for Wiretap Broadcast Channels

被引:0
作者
Kamel, Sarah [1 ]
Wigger, Michele [1 ]
Sarkiss, Mireille [2 ]
机构
[1] Univ Paris Saclay, Telecom ParisTech, LTCI, F-75013 Paris, France
[2] CEA, LIST, Communicating Syst Lab, BC 173, F-91191 Gif Sur Yvette, France
来源
2017 IEEE INFORMATION THEORY WORKSHOP (ITW) | 2017年
关键词
FUNDAMENTAL LIMITS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The paper studies the wiretap erasure broadcast channel (BC) with an external eavesdropper when the legitimate receivers have cache memories. Various secure coding schemes are proposed for a scenario where K-w weak receivers have same erasure probabilities and K-s strong receivers have same erasure probabilities. The coding schemes achieve the cache-aided secrecy capacity when only weak receivers have cache memories and this cache memory is either small or large. They also allow to conclude the following: 1) Under a total cache budget it is often beneficial to assign the cache memories unequally between strong and weak receivers. 2.) Joint cache-channel coding is necessary to attain the optimal performance. 3.) The secrecy capacity can be positive even when the eavesdropper is stronger than the legitimate receivers.
引用
收藏
页码:11 / 15
页数:5
相关论文
共 12 条
[1]  
Amiri M. M., ARXIV170205454
[2]  
Bidokhti S. Saeedi, NOISY BROADCAST NETW
[3]   Multi-Receiver Wiretap Channel With Public and Confidential Messages [J].
Ekrem, Ersen ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (04) :2165-2177
[4]  
Kamel S, 2017, IEEE ICC
[5]  
Kamel S, 2017, IEEE WCNC
[6]   Fundamental Limits of Caching [J].
Maddah-Ali, Mohammad Ali ;
Niesen, Urs .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (05) :2856-2867
[7]   Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey [J].
Mukherjee, Amitav ;
Fakoorian, S. Ali A. ;
Huang, Jing ;
Swindlehurst, A. Lee .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03) :1550-1573
[8]  
Ravindrakumar V, 2016, IEEE INT SYMP INFO, P425, DOI 10.1109/ISIT.2016.7541334
[9]  
Saeedi Bidokhti S., ARXIV170208044
[10]   Fundamental Limits of Caching With Secure Delivery [J].
Sengupta, Avik ;
Tandon, Ravi ;
Clancy, T. Charles .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) :355-370