论文标题
对勾结用户的需求隐私缓存的基本限制
Fundamental Limits of Caching for Demand Privacy against Colluding Users
论文作者
论文摘要
这项工作调查了针对共享链接编码的缓存系统勾结用户的需求隐私问题,在该系统中,没有用户可以学习有关其余用户需求的任何信息。这里使用的隐私概念比过去工作中采用的类似概念要强,并且无论文件分配如何,都需要确保隐私的实际需要。考虑了两种情况:单个文件检索(SFR)和线性函数检索(LFR),在后一种情况下,每个用户都需要服务器上文件的任意线性组合。本文的主要贡献是针对LFR的新型方案,称为隐私密钥方案,以及针对SFR的新信息理论匡威绑定。显然,作为SFR的特殊情况,LFR是SFR的LFR可以实现的方案,而SFR的匡威也是LFR的有效交谈。通过将可实现的方案的性能与本文得出的相反结合(对于小的缓存尺寸制度)和没有隐私约束的现有匡威界限(在其余的存储器制度中),隐私密钥方案的通信负载在所有参数方面都非常最佳。数值结果表明,基于虚拟用户的想法,新的隐私密钥方案在某些制度已知方案中的表现胜过,这也满足了用户隐私对此处采用的勾结用户的更强烈的概念。此外,隐私密钥方案的子包装比基于虚拟用户低得多。
This work investigates the problem of demand privacy against colluding users for shared-link coded caching systems, where no subset of users can learn any information about the demands of the remaining users. The notion of privacy used here is stronger than similar notions adopted in past work and is motivated by the practical need to insure privacy regardless of the file distribution. Two scenarios are considered: Single File Retrieval (SFR) and Linear Function Retrieval (LFR), where in the latter case each user demands an arbitrary linear combination of the files at the server. The main contributions of this paper are a novel achievable scheme for LFR, referred as privacy key scheme, and a new information theoretic converse bound for SFR. Clearly, being SFR a special case of LFR, an achievable scheme for LFR works for SFR as well, and a converse for SFR is a valid converse for LFR as well. By comparing the performance of the achievable scheme with the converse bound derived in this paper (for the small cache size regime) and existing converse bounds without privacy constraints (in the remaining memory regime), the communication load of the privacy key scheme turns out to be optimal to within a constant multiplicative gap in all parameter regimes. Numerical results show that the new privacy key scheme outperforms in some regime known schemes based on the idea of virtual users, which also satisfy the stronger notion of user privacy against colluding users adopted here. Moreover, the privacy key scheme enjoys much lower subpacketization than known schemes based on virtual users.