论文标题
带有私人需求和缓存的编码缓存
Coded Caching with Private Demands and Caches
论文作者
论文摘要
最近显示,开创性的Maddah-Ali和Niesen(MAN)编码的缓存方案将每个用户的需求信息泄漏给其他用户。许多作品都考虑了带有需求隐私的编码缓存,而每个具有私人需求的现有非平凡的编码缓存方案都是基于以下事实:每个用户的缓存信息属于其他用户。但是,这些方案中的大多数泄漏了用户的缓存信息。因此,在大多数现实的设置(例如,视频流)中,随着时间的推移,系统将使用多个顺序传输回合使用,这些方案在第一轮之后泄漏了需求隐私。该观察结果激发了我们同时使用私人需求和缓存的编码缓存的新表述。本文的主要贡献是一种新的结构,该结构通过利用两服务私人信息检索(PIR)方案来生成私人编码的缓存方案。我们表明,如果在PIR方案中,所有文件的需求均统一并且查询是独立的,则最终的缓存方案在需求和缓存上都是私人的。有趣的是,我们通过利用编码的缓存方案提出了本班级两级PIR计划的新结构。通过将开创性编码的缓存方案应用于我们的构造中,结果证明,由此产生的两级PIR方案被证明是最佳的订单。这是第二个新的结构结果,以某种方式结束了编码缓存和PIR之间关系的循环。最后,为了探索缓存隐私和传输负载之间的更广泛的权衡,我们放宽了缓存的隐私约束,并在缓存信息中介绍了泄漏的定义。然后,作为我们新建筑的副产品,我们提出了具有完美需求隐私和不完美的缓存隐私的新计划,这些计划在对计划方面的订单获得了订单,并在需求和缓存方面具有完美的隐私。
Recently it was shown that the seminal Maddah-Ali and Niesen (MAN) coded caching scheme leaks the demand information of each user to the others. Many works have considered coded caching with demand privacy, while each non-trivial existing coded caching scheme with private demands was built on the fact that the cache information of each user is private to the others. However, most of these schemes leak the users' cache information. Consequently, in most realistic settings (e.g., video streaming), where the system is used over time with multiple sequential transmission rounds, these schemes leak demand privacy beyond the first round. This observation motivates our new formulation of coded caching with simultaneously private demands and caches. The main contribution of this paper is a new construction that generates private coded caching schemes by leveraging two-server private information retrieval (PIR) schemes. We show that if in the PIR scheme the demand is uniform over all files and the queries are independent, the resulting caching scheme is private on both the demands and on the caches. Interestingly, we propose a new construction of two-server PIR schemes in this class by leveraging coded caching schemes. By applying the seminal MAN coded caching scheme into our construction, the resulting two-server PIR scheme is proved to be order optimal. This is a second new structural result, somehow closing the loop in the relation between coded caching and PIR. Finally, to explore a broader tradeoff between cache privacy and transmission load, we relax the cache privacy constraint and introduce the definition of leakage on cache information. Then, again as a by-product of our new construction, we propose new schemes with perfect demand privacy and imperfect cache privacy that achieve an order-gain in load with respect to the scheme with perfect privacy on both demands and caches.