{"id":"https://openalex.org/W2963658073","doi":"https://doi.org/10.1109/cns.2015.7346838","title":"Adversarial wiretap channel with public discussion","display_name":"Adversarial wiretap channel with public discussion","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2963658073","doi":"https://doi.org/10.1109/cns.2015.7346838","mag":"2963658073"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2015.7346838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100614749","display_name":"Peng\u2010Wei Wang","orcid":"https://orcid.org/0000-0002-6224-8920"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Pengwei Wang","raw_affiliation_strings":["Department of Computer Science, University of Calgary, Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calgary, Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["Department of Computer Science, University of Calgary, Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calgary, Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100614749"],"corresponding_institution_ids":["https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":0.3946,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69994396,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"740","issue":null,"first_page":"281","last_page":"289"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7561768293380737},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6217948198318481},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6165210604667664},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3940007984638214},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3931649923324585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38644954562187195},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13543739914894104}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7561768293380737},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6217948198318481},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6165210604667664},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3940007984638214},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3931649923324585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38644954562187195},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13543739914894104}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns.2015.7346838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2015.7346838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8199999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W60616127","https://openalex.org/W148541367","https://openalex.org/W1492657530","https://openalex.org/W1523745016","https://openalex.org/W1524382113","https://openalex.org/W1620650588","https://openalex.org/W1971485486","https://openalex.org/W1982581119","https://openalex.org/W2010867143","https://openalex.org/W2027174613","https://openalex.org/W2043769961","https://openalex.org/W2083796634","https://openalex.org/W2092148937","https://openalex.org/W2104172035","https://openalex.org/W2108777864","https://openalex.org/W2115321613","https://openalex.org/W2139127819","https://openalex.org/W2144007657","https://openalex.org/W2146813141","https://openalex.org/W2963230393"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534","https://openalex.org/W4310988119"],"abstract_inverted_index":{"Wyner's":[0],"elegant":[1],"model":[2,31,69,182],"of":[3,32,49,81,153,156,177,183,218,224,248,256],"wiretap":[4,33],"channel":[5,11,34,127],"exploits":[6],"noise":[7],"in":[8,35,78],"the":[9,37,50,79,151,154,164,169,181,191,228,245],"communication":[10,129,193],"to":[12,53,62,123,172,227],"provide":[13],"perfect":[14],"secrecy":[15],"against":[16],"a":[17,24,43,56,124,173,210,240,253],"computationally":[18],"unlimited":[19],"passive":[20],"eavesdropper,":[21],"without":[22,130],"requiring":[23],"shared":[25],"key.":[26],"We":[27,179,207,220],"consider":[28],"an":[29,222,257],"adversarial":[30,66],"which":[36],"adversary":[38],"is":[39,70,96],"active:":[40],"it":[41,73],"selects":[42],"fraction":[44,57],"\u03c1":[45,58,102,107,138],"<sub":[46,59,103,108,139,143],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[47,60,104,109,140,144],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">r</sub>":[48,105,141],"transmitted":[51],"codeword":[52],"eavesdrop,":[54],"and":[55,99,158,186,198,203,251],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">w</sub>":[61,110,145],"corrupt":[63],"by":[64],"\u201cadding\u201d":[65],"error.":[67],"The":[68],"interesting":[71],"as":[72,148,150],"also":[74,208],"captures":[75],"networks":[76],"adversaries":[77],"setting":[80],"Secure":[82,229],"Message":[83,230],"Transmission":[84,231],"[7].":[85],"It":[86],"has":[87],"been":[88],"proved":[89],"that":[90,118],"secure":[91,132],"transmission":[92,133,246],"(in":[93],"one":[94],"message-round)":[95],"possible":[97,135],"if":[98,101,119,137],"only":[100],"+":[106],"<;":[111],"1.":[112],"In":[113,236],"this":[114],"paper":[115],"we":[116,238],"show":[117,221,239],"communicants":[120],"have":[121],"access":[122],"public":[125],"discussion":[126],"(authentic":[128],"secrecy),":[131],"becomes":[134],"even":[136],"+\u03c1":[142],">":[146],"1,":[147],"long":[149],"union":[152],"sets":[155],"read":[157],"corrupted":[159],"components":[160],"do":[161],"not":[162],"cover":[163],"whole":[165],"codeword.":[166],"This":[167],"makes":[168],"results":[170,226],"applicable":[171],"much":[174],"wider":[175],"range":[176],"scenarios.":[178],"formalize":[180],"AWTPPD":[184],"protocol,":[185],"derive":[187],"tight":[188],"bounds":[189],"for":[190],"two":[192],"efficiency":[194],"measures,":[195],"information":[196],"rate":[197,211,247],"message-round":[199],"complexity":[200],"(upper":[201],"bound,":[202],"lower":[204,242],"bound":[205,243],"respectively).":[206],"construct":[209],"optimal":[212,258],"protocol":[213],"family":[214],"with":[215,232],"minimum":[216],"number":[217],"message-round.":[219],"application":[223],"these":[225,249],"Public":[233],"Discussion":[234],"(SMT-PD).":[235],"particular":[237],"new":[241,254],"on":[244],"protocols,":[250],"present":[252],"construction":[255],"SMT-PD":[259],"protocol.":[260]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
