{"id":"https://openalex.org/W4289655408","doi":"https://doi.org/10.1109/isit50566.2022.9834824","title":"A Secretive Coded Caching for Shared Cache Systems using Placement Delivery Arrays","display_name":"A Secretive Coded Caching for Shared Cache Systems using Placement Delivery Arrays","publication_year":2022,"publication_date":"2022-06-26","ids":{"openalex":"https://openalex.org/W4289655408","doi":"https://doi.org/10.1109/isit50566.2022.9834824"},"language":"en","primary_location":{"id":"doi:10.1109/isit50566.2022.9834824","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834824","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014894300","display_name":"Elizabath Peter","orcid":"https://orcid.org/0000-0002-6292-3156"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Elizabath Peter","raw_affiliation_strings":["IISc,Department of Electrical Communication Engineering,Bangalore,India","Department of Electrical Communication Engineering, IISc, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"IISc,Department of Electrical Communication Engineering,Bangalore,India","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical Communication Engineering, IISc, Bangalore, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030167148","display_name":"K. K. Krishnan Namboodiri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"K. K. Krishnan Namboodiri","raw_affiliation_strings":["IISc,Department of Electrical Communication Engineering,Bangalore,India","Department of Electrical Communication Engineering, IISc, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"IISc,Department of Electrical Communication Engineering,Bangalore,India","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical Communication Engineering, IISc, Bangalore, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015398340","display_name":"B. Sundar Rajan","orcid":"https://orcid.org/0000-0002-7847-0200"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. Sundar Rajan","raw_affiliation_strings":["IISc,Department of Electrical Communication Engineering,Bangalore,India","Department of Electrical Communication Engineering, IISc, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"IISc,Department of Electrical Communication Engineering,Bangalore,India","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical Communication Engineering, IISc, Bangalore, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014894300"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.5133,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.81382091,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1402","last_page":"1407"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9643999934196472,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8569191098213196},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.8555321097373962},{"id":"https://openalex.org/keywords/smart-cache","display_name":"Smart Cache","score":0.6027698516845703},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5560269355773926},{"id":"https://openalex.org/keywords/bus-sniffing","display_name":"Bus sniffing","score":0.5498145818710327},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5191751718521118},{"id":"https://openalex.org/keywords/cache-invalidation","display_name":"Cache invalidation","score":0.5101497769355774},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49840664863586426},{"id":"https://openalex.org/keywords/false-sharing","display_name":"False sharing","score":0.48528239130973816},{"id":"https://openalex.org/keywords/cache-algorithms","display_name":"Cache algorithms","score":0.46090468764305115},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.44716936349868774},{"id":"https://openalex.org/keywords/shared-memory","display_name":"Shared memory","score":0.4457119107246399},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.4365469813346863},{"id":"https://openalex.org/keywords/cache-coherence","display_name":"Cache coherence","score":0.4263320863246918},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3765470087528229},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3599640130996704},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11660918593406677}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8569191098213196},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.8555321097373962},{"id":"https://openalex.org/C167713795","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"Smart Cache","level":5,"score":0.6027698516845703},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5560269355773926},{"id":"https://openalex.org/C51185590","wikidata":"https://www.wikidata.org/wiki/Q1017228","display_name":"Bus sniffing","level":5,"score":0.5498145818710327},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5191751718521118},{"id":"https://openalex.org/C25536678","wikidata":"https://www.wikidata.org/wiki/Q5015977","display_name":"Cache invalidation","level":5,"score":0.5101497769355774},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49840664863586426},{"id":"https://openalex.org/C5165142","wikidata":"https://www.wikidata.org/wiki/Q5432732","display_name":"False sharing","level":5,"score":0.48528239130973816},{"id":"https://openalex.org/C38556500","wikidata":"https://www.wikidata.org/wiki/Q13404475","display_name":"Cache algorithms","level":4,"score":0.46090468764305115},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.44716936349868774},{"id":"https://openalex.org/C133875982","wikidata":"https://www.wikidata.org/wiki/Q764810","display_name":"Shared memory","level":2,"score":0.4457119107246399},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.4365469813346863},{"id":"https://openalex.org/C141917322","wikidata":"https://www.wikidata.org/wiki/Q1025017","display_name":"Cache coherence","level":5,"score":0.4263320863246918},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3765470087528229},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3599640130996704},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11660918593406677},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit50566.2022.9834824","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834824","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1990395546","https://openalex.org/W2106248279","https://openalex.org/W2141420453","https://openalex.org/W2169897889","https://openalex.org/W2397857137","https://openalex.org/W2962781040","https://openalex.org/W2963358620","https://openalex.org/W2964251464","https://openalex.org/W2989806941","https://openalex.org/W3098870865","https://openalex.org/W3182129615","https://openalex.org/W3200081493","https://openalex.org/W3208247633","https://openalex.org/W3210260585","https://openalex.org/W4286897961","https://openalex.org/W6803203252"],"related_works":["https://openalex.org/W6828443","https://openalex.org/W11339335","https://openalex.org/W1963564","https://openalex.org/W12454700","https://openalex.org/W13351917","https://openalex.org/W12518186","https://openalex.org/W13472807","https://openalex.org/W800331","https://openalex.org/W7350702","https://openalex.org/W12197193"],"abstract_inverted_index":{"This":[0],"paper":[1],"considers":[2],"the":[3,19,31,54,93,121,130,158,167,170],"secretive":[4,78,108,132],"coded":[5,79,109,133],"caching":[6,80,110,134],"problem":[7],"with":[8,115],"shared":[9,28,58,83,113,137,159],"caches":[10,84,114,138],"in":[11,57,92],"which":[12,89],"no":[13],"user":[14,44,62],"must":[15],"have":[16,66],"access":[17],"to":[18,47,65,105],"files":[20],"that":[21,129],"it":[22],"did":[23],"not":[24],"demand.":[25],"In":[26,98,145],"a":[27,36,86,103,147],"cache":[29,59,69,160],"network,":[30],"users":[32],"are":[33],"served":[34],"by":[35,119],"smaller":[37],"number":[38,94],"of":[39,70,95,169],"helper":[40,50,96],"caches,":[41],"and":[42,165],"each":[43,61],"is":[45,63,90,155],"connected":[46],"exactly":[48],"one":[49],"cache.":[51],"To":[52],"ensure":[53],"secrecy":[55,163],"constraint":[56,164],"networks,":[60],"required":[64],"an":[67],"individual":[68],"at":[71],"least":[72],"unit":[73],"file":[74],"size.":[75],"The":[76],"existing":[77,131],"scheme":[81,135],"for":[82,112,136,157],"requires":[85],"subpacketization":[87,117],"level,":[88],"exponential":[91],"caches.":[97],"this":[99],"work,":[100],"we":[101],"propose":[102],"procedure":[104],"obtain":[106],"new":[107],"schemes":[111],"reduced":[116],"levels":[118],"utilizing":[120],"placement":[122],"delivery":[123],"array":[124],"constructions.":[125],"We":[126],"also":[127],"show":[128],"can":[139],"be":[140],"recovered":[141],"using":[142],"our":[143],"procedure.":[144],"addition,":[146],"lower":[148],"bound":[149],"based":[150,153],"on":[151],"cut-set":[152],"arguments":[154],"derived":[156],"networks":[161],"under":[162],"characterized":[166],"performance":[168],"obtained":[171],"scheme.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-03T23:09:05.601824","created_date":"2025-10-10T00:00:00"}
