
The paper studies the wiretap erasure broadcast channel (BC) with an external eavesdropper when the legitimate receivers have cache memories. Various secure coding schemes are proposed for a scenario where K w weak receivers have same erasure probabilities and K s strong receivers have same erasure probabilities. The coding schemes achieve the cache-aided secrecy capacity when only weak receivers have cache memories and this cache memory is either small or large. They also allow to conclude the following: 1) Under a total cache budget it is often beneficial to assign the cache memories unequally between strong and weak receivers. 2.) Joint cache-channel coding is necessary to attain the optimal performance. 3.) The secrecy capacity can be positive even when the eavesdropper is stronger than the legitimate receivers.
[INFO] Computer Science [cs]
[INFO] Computer Science [cs]
| citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 5 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
