{"id":"https://openalex.org/W2790840433","doi":"https://doi.org/10.1109/tit.2018.2816066","title":"Maximal Correlation Secrecy","display_name":"Maximal Correlation Secrecy","publication_year":2018,"publication_date":"2018-03-15","ids":{"openalex":"https://openalex.org/W2790840433","doi":"https://doi.org/10.1109/tit.2018.2816066","mag":"2790840433"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2018.2816066","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1412.5374","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084702636","display_name":"Cheuk Ting Li","orcid":"https://orcid.org/0000-0002-4803-212X"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]},{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cheuk Ting Li","raw_affiliation_strings":["Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, Berkeley, CA, USA","Department of Electrical Engineering, Stanford University, Stanford, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"Department of Electrical Engineering, Stanford University, Stanford, CA, USA","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078716556","display_name":"Abbas El Gamal","orcid":"https://orcid.org/0000-0002-0853-0415"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abbas El Gamal","raw_affiliation_strings":["Department of Electrical Engineering, Stanford University, Stanford, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Stanford University, Stanford, CA, USA","institution_ids":["https://openalex.org/I97018004"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.072,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":13,"citation_normalized_percentile":{"value":0.81843,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":"64","issue":"5","first_page":"3916","last_page":"3926"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy-capacity","display_name":"Secrecy Capacity","score":0.566975},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.55202353},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.5239508},{"id":"https://openalex.org/keywords/lightweight-ciphers","display_name":"Lightweight Ciphers","score":0.522869},{"id":"https://openalex.org/keywords/image-encryption","display_name":"Image Encryption","score":0.500558},{"id":"https://openalex.org/keywords/correlation-attack","display_name":"Correlation attack","score":0.49876142}],"concepts":[{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.62741476},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.6118892},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.573108},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.57117456},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.55202353},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.5239508},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5232736},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.49876142},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.48123074},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.47498053},{"id":"https://openalex.org/C117220453","wikidata":"https://www.wikidata.org/wiki/Q5172842","display_name":"Correlation","level":2,"score":0.46143648},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4464073},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.42067605},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.41800678},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38958782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.32800096},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.32252556},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27441406},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.108127624},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10604775},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2018.2816066","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/1412.5374","pdf_url":"https://arxiv.org/pdf/1412.5374","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/1412.5374","pdf_url":"https://arxiv.org/pdf/1412.5374","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":36,"referenced_works":["https://openalex.org/W1492657530","https://openalex.org/W1514518704","https://openalex.org/W1530248577","https://openalex.org/W1548880861","https://openalex.org/W1590505944","https://openalex.org/W1622686296","https://openalex.org/W182801106","https://openalex.org/W1875021344","https://openalex.org/W1883968710","https://openalex.org/W1917015688","https://openalex.org/W1968372742","https://openalex.org/W1968766334","https://openalex.org/W1971485486","https://openalex.org/W1995228946","https://openalex.org/W2018582985","https://openalex.org/W2028766304","https://openalex.org/W2031648200","https://openalex.org/W2032916024","https://openalex.org/W2043769961","https://openalex.org/W2045620446","https://openalex.org/W2087392909","https://openalex.org/W2107327484","https://openalex.org/W2109394932","https://openalex.org/W2115109072","https://openalex.org/W2144007657","https://openalex.org/W2163833991","https://openalex.org/W2170862660","https://openalex.org/W2182170992","https://openalex.org/W2554304194","https://openalex.org/W2962731617","https://openalex.org/W2963966695","https://openalex.org/W3099349323","https://openalex.org/W3102754027","https://openalex.org/W4210300416","https://openalex.org/W4235946010","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3174959224","https://openalex.org/W3044322697","https://openalex.org/W2613508444","https://openalex.org/W2545039056","https://openalex.org/W2533921573","https://openalex.org/W2463179629","https://openalex.org/W2186540766","https://openalex.org/W2149094354","https://openalex.org/W2055862451","https://openalex.org/W1979198062"],"abstract_inverted_index":{"This":[0,52,132],"paper":[1],"shows":[2],"that":[3,21,55,75,125,155],"the":[4,10,13,31,38,46,50,56,62,97,137,147,190],"Hirschfeld-Gebelein-":[5],"R\u00e9nyi":[6,47],"maximal":[7,43,57,78,158,177],"correlation":[8,44,58,79,159,178],"between":[9,146],"message":[11,39,98,116],"and":[12,45,70,100,149,182],"ciphertext":[14],"provides":[15],"good":[16],"secrecy":[17,161,188],"guarantees":[18],"for":[19,114,140],"cryptosystems":[20],"use":[22],"short":[23],"keys.":[24],"We":[25,72,120],"first":[26],"establish":[27,121],"a":[28,76,85,102,115,122,144,156,180],"bound":[29],"on":[30],"eavesdropper's":[32],"advantage":[33],"in":[34,40,134],"guessing":[35],"functions":[36],"of":[37,42,49,64,96,117,187],"terms":[41],"entropy":[48],"message.":[51],"result":[53],"implies":[54,160],"is":[59,133,143,170,179],"stronger":[60,181],"than":[61,189],"notion":[63],"entropic":[65,138],"security":[66,139],"introduced":[67],"by":[68,101,174],"Russell":[69],"Wang.":[71],"then":[73],"show":[74,154],"small":[77,157],"\u03c1":[80],"can":[81],"be":[82],"achieved":[83],"via":[84],"randomly":[86],"generated":[87],"cipher":[88,104],"with":[89,105,136,162],"key":[90,106],"length":[91,107,118],"\u2248":[92],"2":[93,108,113],"log(1/\u03c1),":[94],"independent":[95],"length,":[99],"stream":[103],"log(1/\u03c1)":[109],"+":[110,112],"logn":[111],"n.":[119],"converse":[123],"showing":[124],"these":[126],"ciphers":[127],"are":[128],"close":[129],"to":[130,164],"optimal.":[131],"contrast":[135],"which":[141],"there":[142],"gap":[145],"lower":[148],"upper":[150],"bounds.":[151],"Finally,":[152],"we":[153],"respect":[163],"several":[165],"mutual":[166,191],"information-based":[167],"criteria":[168],"but":[169],"not":[171],"necessarily":[172],"implied":[173],"them.":[175],"Hence,":[176],"more":[183],"practically":[184],"relevant":[185],"measure":[186],"information.":[192]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2790840433","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2024-12-05T12:31:15.077287","created_date":"2018-03-29"}