Secure Caching and Delivery for Combination Networks with Asymmetric Connectivity

We consider information theoretic security in a two-hop combination network where there are groups of end users with distinct degrees of connectivity served by a layer of relays. The model represents a network set up with users having access to asymmetric resources, here the number of relays that they are connected to, yet demand security guarantees uniformly. We study two security constraints separately and simultaneously: secure delivery where the information must be kept confidential from an external entity that wiretaps the delivery phase; and secure caching where each cache-aided end-user can retrieve the file it requests and cannot obtain any information on files it does not. The achievable schemes we construct are multi-stage where each stage completes requests by a class of users.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Catherine A. Meadows,et al.  Security of Ramp Schemes , 1985, CRYPTO.

[3]  Urs Niesen,et al.  Fundamental limits of caching , 2012, 2013 IEEE International Symposium on Information Theory.

[4]  T. Charles Clancy,et al.  Fundamental Limits of Caching With Secure Delivery , 2013, IEEE Transactions on Information Forensics and Security.

[5]  Jaime Llorca,et al.  Caching in combination networks , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[6]  Aylin Yener,et al.  Benefits of cache assignment on degraded broadcast channels , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[7]  Aylin Yener,et al.  The Wiretap Channel with a Cache , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[8]  Vinod M. Prabhakaran,et al.  Fundamental limits of secretive coded caching , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[9]  Ivan Damgård,et al.  Secure Multiparty Computation and Secret Sharing , 2015 .

[10]  Aylin Yener,et al.  Coded Caching for Heterogeneous Systems: An Optimization Perspective , 2018, IEEE Transactions on Communications.

[11]  Aylin Yener,et al.  Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays , 2017, IEEE Journal on Selected Areas in Communications.

[12]  Aydin Sezgin,et al.  Fundamental limits of caching in D2D networks with secure delivery , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[13]  Aylin Yener,et al.  Fundamental limits of secure device-to-device coded caching , 2016, 2016 50th Asilomar Conference on Signals, Systems and Computers.

[14]  Aylin Yener,et al.  Coded caching for combination networks with cache-aided relays , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[15]  Daniela Tuninetti,et al.  Novel inner bounds with uncoded cache placement for combination networks with end-user-caches , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[16]  Aylin Yener,et al.  Cache-Aided Combination Networks with Asymmetric End Users , 2019, 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).