International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak and have cache memories and Ks receivers are strong and have no cache memories. We derive an upper bound on the secrecy rate-memory tradeoff under a joint secrecy constraint and under decentralized caching. In contrast to previous works, prefetching in our scheme is purely decentralized and receivers randomly sample from a random key stream available at the transmitter and from the files in a library. For small cache sizes, the performance of our scheme improves with increasing length of the random key stream. For moderate and large cache sizes, a small key stream suffices to perform close to the information-theoretic limit of the system
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates s...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
Conference of 2017 IEEE International Conference on Communications, ICC 2017 ; Conference Date: 21 M...
International audienceThe paper studies the wiretap erasure broadcast channel (BC) with an external ...
International audienceWe derive upper bounds on the rate-memory trade-off of cache-aided erasure bro...
Conference of 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 ; Conference Da...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
Abstract—We consider a three-receiver wiretap channel in which the transmitter aims to send a common...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—In this paper, we investigate how constraints on the randomization in the encoding process ...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
A cache-aided K-user Gaussian broadcast channel (BC) is considered. The transmitter has a library of...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates s...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...
International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
Conference of 2017 IEEE International Conference on Communications, ICC 2017 ; Conference Date: 21 M...
International audienceThe paper studies the wiretap erasure broadcast channel (BC) with an external ...
International audienceWe derive upper bounds on the rate-memory trade-off of cache-aided erasure bro...
Conference of 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 ; Conference Da...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
Abstract—We consider a three-receiver wiretap channel in which the transmitter aims to send a common...
Abstract—This paper studies the problem of secure communi-cation over a degraded wiretap channel p(y...
Abstract—In this paper, we investigate how constraints on the randomization in the encoding process ...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates, ...
A cache-aided K-user Gaussian broadcast channel (BC) is considered. The transmitter has a library of...
Abstract — We study secret-key agreement with public discussion over a flat-fading wiretap channel m...
International audienceWe study the trade-off between secret message (SM) and secret key (SK) rates s...
International audienceThis paper investigates the secrecy capacity of the wiretap broadcast channel ...