Âé¶¹´«Ã½AV

Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type II

Submitted by admin on Mon, 10/28/2024 - 01:24

This paper introduces the notion of cache-tapping into the information theoretic models of coded caching. The wiretap channel II in the presence of multiple receivers equipped with fixed-size cache memories, and an adversary which selects symbols to tap into from cache placement and/or delivery is introduced. The legitimate terminals know neither whether placement, delivery, or both are tapped, nor the positions in which they are tapped. Only the size of the overall tapped set is known.

Single-Server Private Information Retrieval Schemes are Equivalent to Locally Recoverable Coding Schemes

Submitted by admin on Mon, 10/28/2024 - 01:24

The Private Information Retrieval (PIR) problem has recently attracted a significant interest in the information-theory community. In this problem, a client wants to download one or more messages belonging to a database while protecting the identity of the downloaded message(s). In this article, we focus on the scenarios in which (i) the entire database is stored on a single server and (ii) the client has prior side information, namely a subset of messages unknown to the server.

Secure Non-Linear Network Code Over a One-Hop Relay Network

Submitted by admin on Mon, 10/28/2024 - 01:24

When there exists a malicious attacker in the network, we need to consider the possibilities of eavesdropping and the contamination simultaneously. Under an acyclic broadcast network, the optimality of linear codes was shown when Eve is allowed to attack any r edges. The optimality of linear codes is not shown under a different assumption for Eve. As a typical example of an acyclic unicast network, we focus on the one-hop relay network under the single transmission scheme by assuming that Eve attacks only one edge in each level.