Proceedings of: National Conference on Communications (NCC), 21-23 Feb. 2020, Kharagpur, India.The distributed coded caching problem has been studied extensively in the recent past. While the known coded caching schemes achieve an improved transmission rate, they violate the privacy of the users since in these schemes the demand of one user is revealed to others in the delivery phase. In this paper, we consider the coded caching problem under the constraint that the demands of the other users remain information theoretically secret from each user. We first show that the memory-rate pair (M, min{ N, K}(1- M / N)) is achievable under information theoretic demand privacy, while using broadcast transmissions. Using this, we show that perfectly ...
We consider the problem of downloading content from a cellular network that is cached at the wireles...
We consider the problem of cache-aided multi-user private information retrieval (MuPIR). In this pro...
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives us...
We consider the demand-private coded caching problem in a noiseless broadcast network. It is known f...
Recently it was shown that the seminal Maddah-Ali and Niesen (MAN) coded caching scheme leaks the de...
Recent work by Maddah-Ali and Niesen (2014) introduced coded caching which demonstrated the benefits...
This paper has been presented at: 2018 IEEE International Symposium On Information Theory (ISIT)We s...
We consider private information retrieval (PIR) in a content delivery scenario where, to reduce the ...
International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
This dissertation studies privacy and security problems from an information-theoretic point of view....
Conference of 2017 IEEE International Conference on Communications, ICC 2017 ; Conference Date: 21 M...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
An information-theoretic lower bound is developed for the caching system studied by Maddah-Ali and N...
Centralized coded caching problem is studied for the two-user scenario, considering heterogeneous ca...
We consider the problem of downloading content from a cellular network that is cached at the wireles...
We consider the problem of cache-aided multi-user private information retrieval (MuPIR). In this pro...
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives us...
We consider the demand-private coded caching problem in a noiseless broadcast network. It is known f...
Recently it was shown that the seminal Maddah-Ali and Niesen (MAN) coded caching scheme leaks the de...
Recent work by Maddah-Ali and Niesen (2014) introduced coded caching which demonstrated the benefits...
This paper has been presented at: 2018 IEEE International Symposium On Information Theory (ISIT)We s...
We consider private information retrieval (PIR) in a content delivery scenario where, to reduce the ...
International audienceWe consider a K-receiver wiretap broadcast channel where Kw receivers are weak...
International audienceThe paper considers a coded caching setup with two libraries and where only on...
This dissertation studies privacy and security problems from an information-theoretic point of view....
Conference of 2017 IEEE International Conference on Communications, ICC 2017 ; Conference Date: 21 M...
International audienceThis paper derives upper and lower bounds on the secrecy capacity-memory trade...
An information-theoretic lower bound is developed for the caching system studied by Maddah-Ali and N...
Centralized coded caching problem is studied for the two-user scenario, considering heterogeneous ca...
We consider the problem of downloading content from a cellular network that is cached at the wireles...
We consider the problem of cache-aided multi-user private information retrieval (MuPIR). In this pro...
Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives us...