2020
DOI: 10.1109/tifs.2019.2940885
|View full text |Cite
|
Sign up to set email alerts
|

Device-to-Device Secure Coded Caching

Abstract: This paper studies device to device (D2D) codedcaching with information theoretic security guarantees. A broadcast network consisting of a server, which has a library of files, and end users equipped with cache memories, is considered. Information theoretic security guarantees for confidentiality are imposed upon the files. The server populates the end user caches, after which D2D communications enable the delivery of the requested files. Accordingly, we require that a user must not have access to files it did… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 40 publications
0
18
0
Order By: Relevance
“…The light weighted cryptographic system could be a proper solution for covering resource-constrained devices in D2D communication [26]. The efficiency of D2D communications in cacheaided structures, even though privacy restrictions are enforced on the engaging endpoints and on extrinsic snoopers [27]. The efficiency of D2D communications in cache-aided structures, even though privacy restrictions are enforced on the engaging endpoints and on extrinsic snoopers [28].…”
Section: Resultsmentioning
confidence: 99%
“…The light weighted cryptographic system could be a proper solution for covering resource-constrained devices in D2D communication [26]. The efficiency of D2D communications in cacheaided structures, even though privacy restrictions are enforced on the engaging endpoints and on extrinsic snoopers [27]. The efficiency of D2D communications in cache-aided structures, even though privacy restrictions are enforced on the engaging endpoints and on extrinsic snoopers [28].…”
Section: Resultsmentioning
confidence: 99%
“…The secure delivery condition was addressed separately in [9]. The secretive coded caching problem was then extended to other settings that include shared cache networks [10] device-to-device networks [11], combination networks [12] and considering collusion among users in dedicated cache network [13]. We consider the problem of secretive coded caching with shared caches introduced in [10].…”
Section: Introductionmentioning
confidence: 99%
“…Coded caching in device-to-device networks has been investigated in [6], [17]- [23]. In particular, D2D coded caching was first considered in [6], where centralized and decentralized caching schemes have been proposed for when the users have equal cache sizes.…”
Section: Introductionmentioning
confidence: 99%
“…Reference [22] has proposed a secure D2D delivery scheme that protects the D2D transmissions in the presence of an eavesdropper. Reference [23] has considered secure D2D coded caching when each user can recover its requested file and is simultaneously prevented from accessing any other file.…”
Section: Introductionmentioning
confidence: 99%