{"id":"https://openalex.org/W4416922665","doi":"https://doi.org/10.1109/tit.2025.3639289","title":"Secure Coded Caching: Exact End-Points and Tighter Bounds","display_name":"Secure Coded Caching: Exact End-Points and Tighter Bounds","publication_year":2025,"publication_date":"2025-12-02","ids":{"openalex":"https://openalex.org/W4416922665","doi":"https://doi.org/10.1109/tit.2025.3639289"},"language":null,"primary_location":{"id":"doi:10.1109/tit.2025.3639289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2025.3639289","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Han Fang","orcid":"https://orcid.org/0009-0009-3666-5876"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Han Fang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100622088","display_name":"Nan Liu","orcid":"https://orcid.org/0000-0003-4155-0685"},"institutions":[{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Nan Liu","raw_affiliation_strings":["National Mobile Communications Research Laboratory and the School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory and the School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I4210090971"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I4210090971"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024845943","display_name":"Wei Kang","orcid":"https://orcid.org/0000-0003-4408-6419"},"institutions":[{"id":"https://openalex.org/I4210090971","display_name":"Southeast University","ror":"https://ror.org/00cf0ab87","country_code":"BD","type":"education","lineage":["https://openalex.org/I4210090971"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["BD","CN"],"is_corresponding":false,"raw_author_name":"Wei Kang","raw_affiliation_strings":["School of Information Science and Engineering and the School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering and the School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I4210090971","https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41960784,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"636","last_page":"663"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.412200003862381,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.412200003862381,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.1339000016450882,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.09799999743700027,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.7896999716758728},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6990000009536743},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.4578000009059906},{"id":"https://openalex.org/keywords/file-size","display_name":"File size","score":0.41280001401901245},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.3303999900817871},{"id":"https://openalex.org/keywords/cache-oblivious-algorithm","display_name":"Cache-oblivious algorithm","score":0.2777000069618225}],"concepts":[{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.7896999716758728},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7113000154495239},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6990000009536743},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.4578000009059906},{"id":"https://openalex.org/C2776029614","wikidata":"https://www.wikidata.org/wiki/Q1146367","display_name":"File size","level":2,"score":0.41280001401901245},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3822999894618988},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3346000015735626},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.3303999900817871},{"id":"https://openalex.org/C59687516","wikidata":"https://www.wikidata.org/wiki/Q5015938","display_name":"Cache-oblivious algorithm","level":5,"score":0.2777000069618225},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C38556500","wikidata":"https://www.wikidata.org/wiki/Q13404475","display_name":"Cache algorithms","level":4,"score":0.26669999957084656},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.2655999958515167},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.26510000228881836},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2529999911785126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2025.3639289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2025.3639289","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5500063818","display_name":null,"funder_award_id":"62371129","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6350617648","display_name":null,"funder_award_id":"2025A05","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7959541075","display_name":null,"funder_award_id":"62361146853","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2106248279","https://openalex.org/W2141420453","https://openalex.org/W2527594325","https://openalex.org/W2547052808","https://openalex.org/W2591378445","https://openalex.org/W2889585362","https://openalex.org/W2962828604","https://openalex.org/W2963178642","https://openalex.org/W2964251464","https://openalex.org/W2973146870","https://openalex.org/W3006180973","https://openalex.org/W3182129615","https://openalex.org/W3210260585","https://openalex.org/W4205788110","https://openalex.org/W4285294039","https://openalex.org/W4289655408","https://openalex.org/W4380032256","https://openalex.org/W4401692572","https://openalex.org/W4402915539"],"related_works":[],"abstract_inverted_index":{"We":[0,27],"consider":[1],"the":[2,24,35,99,185,190,206,223,246,259],"secure":[3],"coded":[4],"caching":[5],"problem":[6],"proposed":[7,247],"by":[8],"Ravindrakumar":[9],"<italic":[10,40,45,52,57,65,74,80,85,104,109,116,123,128,136,143,148,156,161,167,175,212,217,226],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[11,41,46,53,58,66,75,81,86,105,110,117,124,129,137,144,149,157,162,164,168,176,213,218,220,227],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">et.":[12],"al</i>":[13],"where":[14,211],"no":[15],"user":[16],"can":[17],"obtain":[18,183],"information":[19],"about":[20],"files":[21,43,62,83,107,126,146,172,231],"other":[22],"than":[23,254],"one":[25],"requested.":[26],"first":[28],"propose":[29],"three":[30],"new":[31,94],"schemes":[32,249],"for":[33,97,189,195,222],"1)":[34,98,184],"general":[36,100],"case":[37,101,224],"with":[38,102,121,141,166,256],"arbitrary":[39,64,79,103,122,142,174,196,233],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">N</i>":[42,59,82,106,125,145,169,228],"and":[44,63,69,84,108,127,147,152,173,200,232,237],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">K</i>":[47,67,87,111,130,150,177],"users;":[48,68,112,131,151,236],"2)":[49,113,202],"cache":[50,114,154],"size":[51,115,155],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">M</i>":[54,118,158,214],"=":[55,60,77,119,139,170,229],"1,":[56,78],"2":[61,171,230],"3)":[70,132,238],"worst-case":[71,133],"delivery":[72,134],"rate":[73,135],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">R</i>":[76,138],"users,":[88],"respectively.":[89],"Then":[90],"we":[91,182,243],"derive":[92],"some":[93],"converse":[95],"results":[96],"1":[120,140],"4)":[153],"\u2208":[159,215],"[1,":[160,216],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">K</i>/<italic":[163,219],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">K</i>-1]":[165],"users.":[178],"As":[179],"a":[180,203,239,251],"result,":[181,241],"two":[186],"exact":[187],"end-points":[188],"optimal":[191,207],"memory-rate":[192,208],"tradeoff":[193,209],"curve":[194],"number":[197,234],"of":[198,205,225,235],"users":[199],"files;":[201],"segment":[204],"curve,":[210],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">K</i>-1],":[221],"multiplicative-gap-10":[240],"i.e.,":[242],"show":[244],"that":[245],"achievable":[248],"achieve":[250],"ratio":[252],"less":[253],"10":[255],"respect":[257],"to":[258],"cut-set":[260],"bound.":[261]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-02T00:00:00"}
