{"id":"https://openalex.org/W3201921450","doi":"https://doi.org/10.1109/tit.2021.3116962","title":"Network Information Theoretic Security With Omnipresent Eavesdropping","display_name":"Network Information Theoretic Security With Omnipresent Eavesdropping","publication_year":2021,"publication_date":"2021-10-02","ids":{"openalex":"https://openalex.org/W3201921450","doi":"https://doi.org/10.1109/tit.2021.3116962","mag":"3201921450"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2021.3116962","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015868885","display_name":"Hongchao Zhou","orcid":"https://orcid.org/0000-0002-9322-0808"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"funder","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongchao Zhou","raw_affiliation_strings":["School of Information Science and Engineering, Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078716556","display_name":"Abbas El Gamal","orcid":"https://orcid.org/0000-0002-0853-0415"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"funder","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abbas El Gamal","raw_affiliation_strings":["Department of Electrical Engineering, Stanford University, Stanford, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Stanford University, Stanford, CA, USA","institution_ids":["https://openalex.org/I97018004"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.562,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.5546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":82,"max":84},"biblio":{"volume":"67","issue":"12","first_page":"8280","last_page":"8299"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7849144},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.73309094},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure Communication","score":0.5386773}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7849144},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.73309094},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71797377},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.68979764},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.65998816},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.62887895},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.58705145},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5386773},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.45180172},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.42002985},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.37756062},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3217944},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2021.3116962","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.45,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1875021344","https://openalex.org/W1971450408","https://openalex.org/W1987065448","https://openalex.org/W1993274806","https://openalex.org/W2006947308","https://openalex.org/W2007661134","https://openalex.org/W2035929826","https://openalex.org/W2052207834","https://openalex.org/W2056327536","https://openalex.org/W2106833918","https://openalex.org/W2109394932","https://openalex.org/W2116269350","https://openalex.org/W2117984332","https://openalex.org/W2119012490","https://openalex.org/W2128765501","https://openalex.org/W2136237463","https://openalex.org/W2141420453","https://openalex.org/W2154300278","https://openalex.org/W2156214717","https://openalex.org/W2171006634","https://openalex.org/W2563871604","https://openalex.org/W2566155463","https://openalex.org/W2568978207","https://openalex.org/W3105487184","https://openalex.org/W3211513184","https://openalex.org/W4293702014","https://openalex.org/W4300349690"],"related_works":["https://openalex.org/W3022352698","https://openalex.org/W2962978927","https://openalex.org/W2898567960","https://openalex.org/W2376754011","https://openalex.org/W2340481533","https://openalex.org/W2157628738","https://openalex.org/W2154832352","https://openalex.org/W2150528942","https://openalex.org/W1616202922","https://openalex.org/W1483037127"],"abstract_inverted_index":{"Shannon":[0],"showed":[1],"that":[2,53,135,171],"to":[3,22,38,76,89],"achieve":[4],"perfect":[5],"secrecy":[6,137,183,197],"in":[7],"point-to-point":[8,37],"communication,":[9],"the":[10,15,23,49,85,90,93,97,114,123,146,158],"message":[11],"rate":[12,19,117,126,148,161],"cannot":[13],"exceed":[14,157],"shared":[16,159],"secret":[17,63],"key":[18],"giving":[20],"rise":[21],"simple":[24],"one-time":[25],"pad":[26],"encryption":[27,105],"scheme.":[28],"In":[29],"this":[30,34,107],"paper,":[31],"we":[32],"extend":[33],"work":[35,186],"from":[36],"networks.":[39,208],"We":[40,95,109,165],"consider":[41],"a":[42,59,82,111,119,168,173,188],"connected":[43],"network":[44,125,177],"with":[45,58,70,103,181],"pairwise":[46],"communication":[47,66,78,102],"between":[48,113],"nodes":[50,86],"and":[51,79,122,133,143,178,206],"assume":[52],"each":[54],"node":[55,120,130],"is":[56,198],"provided":[57],"certain":[60],"amount":[61],"of":[62,84,92,149,152,162,176,191],"bits":[64],"before":[65],"commences.":[67],"An":[68],"eavesdropper":[69],"unlimited":[71],"computing":[72],"power":[73],"has":[74,187],"access":[75],"all":[77,129],"can":[80,138],"hack":[81],"subset":[83,151],"not":[87,156],"known":[88],"rest":[91],"nodes.":[94],"investigate":[96],"limits":[98],"on":[99],"information-theoretic":[100,136,182],"secure":[101,115,124],"end-to-end":[104],"for":[106,194],"network.":[108],"establish":[110],"tradeoff":[112],"channel":[116,179],"(for":[118],"pair)":[121],"(sum":[127],"over":[128],"pair":[131],"rates)":[132],"show":[134],"be":[139],"achieved":[140],"asymptotically":[141],"if":[142,145],"only":[144],"sum":[147],"any":[150],"unhacked":[153],"channels":[154],"does":[155],"unhacked-secret-bit":[160],"these":[163],"channels.":[164],"also":[166],"propose":[167],"practical":[169],"scheme":[170],"achieves":[172],"good":[174],"balance":[175],"rates":[180],"guarantee.":[184],"This":[185],"wide":[189],"range":[190],"potential":[192],"applications":[193],"which":[195],"strong":[196],"desired,":[199],"such":[200],"as":[201],"cyber-physical":[202],"systems,":[203,205],"distributed-control":[204],"ad-hoc":[207]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3201921450","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2025-02-16T19:21:34.186393","created_date":"2021-10-11"}