Key Superposition Simultaneously Achieves Security and Privacy in Cache-Aided Linear Function Retrieval

نویسندگان

چکیده

This work investigates the problem of cache-aided content Secure and demand Private Linear Function Retrieval (SP-LFR), where three constraints are imposed on system: (a) each user is interested in retrieving an arbitrary linear combination files server’s library; (b) library must be kept secure from a wiretapper who obtains signal sent by server; (c) no subset colluding users together can obtain information about demands remaining users. A procedure proposed to derive SP-LFR scheme given Placement Delivery Array (PDA), which known give coded caching schemes with low subpacketization for systems neither security nor privacy constraints. uses superposition keys keys, both cache placement transmitted signal, guarantee privacy, respectively. In particular, among all PDA-based schemes, memory-load pairs achieved PDA describing Maddah-Ali Niesen’s Pareto optimal have lowest subpacketization. Moreover, load-memory tradeoff within constant multiplicative gap, except small memory regime (i.e., when size between 1 2) number smaller than Remarkably, does not worsen compared best that either only regimes or mentioned above.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching

We consider the problem of private information retrieval (PIR) from N non-colluding and replicated databases, when the user is equipped with a cache that holds an uncoded fraction r from each of the K stored messages in the databases. This model operates in a two-phase scheme, namely, the prefetching phase where the user acquires side information and the retrieval phase where the user privately...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy

.................................................................................................................... 1 Background / Context ............................................................................................... 2 Growing Public Awareness and Interest .............................................................. 3 A Biometrics Primer .......................................

متن کامل

Blast vibration modeling using linear superposition method

A linear superposition method was used for modeling the time history of the production blast vibrations and optimizing the blast sequence to reduce vibration levels in Sar-Cheshmeh copper mine, Kerman, Iran. A single-hole blast for modeling and two double-hole blasts with time delays of 25 and 65 ms between two holes for modeling validation were carried out. The generated vibrations were measur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3127018