{"id":"https://openalex.org/W4207034359","doi":"https://doi.org/10.1109/gcwkshps52748.2021.9681980","title":"Evolution of the Polar Code-Based Encryption Schemes","display_name":"Evolution of the Polar Code-Based Encryption Schemes","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4207034359","doi":"https://doi.org/10.1109/gcwkshps52748.2021.9681980"},"language":"en","primary_location":{"id":"doi:10.1109/gcwkshps52748.2021.9681980","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps52748.2021.9681980","pdf_url":null,"source":{"id":"https://openalex.org/S4363605397","display_name":"2021 IEEE Globecom Workshops (GC Wkshps)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102786035","display_name":"Chen An","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chen An","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100414193","display_name":"Ying Liu","orcid":"https://orcid.org/0000-0002-3117-9926"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Liu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007991015","display_name":"Xianhui Lu","orcid":"https://orcid.org/0000-0001-7091-5810"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianhui Lu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102786035"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.924,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.69295845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.733212947845459},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7135664820671082},{"id":"https://openalex.org/keywords/polar-code","display_name":"Polar code","score":0.574164867401123},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5380185842514038},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4485286474227905},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.43835195899009705},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.43302851915359497},{"id":"https://openalex.org/keywords/polar","display_name":"Polar","score":0.4312613606452942},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4229375123977661},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4131760597229004},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39241597056388855},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.38739651441574097},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3699328303337097},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.21092718839645386},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13909393548965454},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.08629673719406128}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.733212947845459},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7135664820671082},{"id":"https://openalex.org/C2778396592","wikidata":"https://www.wikidata.org/wiki/Q7209069","display_name":"Polar code","level":3,"score":0.574164867401123},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5380185842514038},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4485286474227905},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.43835195899009705},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.43302851915359497},{"id":"https://openalex.org/C29705727","wikidata":"https://www.wikidata.org/wiki/Q294562","display_name":"Polar","level":2,"score":0.4312613606452942},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4229375123977661},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4131760597229004},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39241597056388855},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38739651441574097},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3699328303337097},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.21092718839645386},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13909393548965454},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.08629673719406128},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcwkshps52748.2021.9681980","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps52748.2021.9681980","pdf_url":null,"source":{"id":"https://openalex.org/S4363605397","display_name":"2021 IEEE Globecom Workshops (GC Wkshps)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W93126096","https://openalex.org/W107758785","https://openalex.org/W658016334","https://openalex.org/W1489769708","https://openalex.org/W1506395273","https://openalex.org/W1512824947","https://openalex.org/W1550367722","https://openalex.org/W1965275036","https://openalex.org/W1979510651","https://openalex.org/W1988027901","https://openalex.org/W1990361074","https://openalex.org/W1999064382","https://openalex.org/W2000206062","https://openalex.org/W2007842835","https://openalex.org/W2017835905","https://openalex.org/W2048863650","https://openalex.org/W2126474167","https://openalex.org/W2133928192","https://openalex.org/W2133964643","https://openalex.org/W2148321903","https://openalex.org/W2149636648","https://openalex.org/W2150498905","https://openalex.org/W2156837852","https://openalex.org/W2278805587","https://openalex.org/W2280569118","https://openalex.org/W2290653397","https://openalex.org/W2293242706","https://openalex.org/W2342275229","https://openalex.org/W2392237044","https://openalex.org/W2408211519","https://openalex.org/W2566390621","https://openalex.org/W2586042870","https://openalex.org/W2604514895","https://openalex.org/W2744882793","https://openalex.org/W2767158391","https://openalex.org/W2913061117","https://openalex.org/W2963473550","https://openalex.org/W2964294208","https://openalex.org/W2986959318","https://openalex.org/W2995381399","https://openalex.org/W2997961964","https://openalex.org/W3016153740","https://openalex.org/W3172550433","https://openalex.org/W6603829349","https://openalex.org/W6604393252","https://openalex.org/W6680174489","https://openalex.org/W6694889516","https://openalex.org/W6713753530","https://openalex.org/W6736049412","https://openalex.org/W6764145572","https://openalex.org/W6770380337","https://openalex.org/W6797158879"],"related_works":["https://openalex.org/W2389178160","https://openalex.org/W2564633714","https://openalex.org/W1993945719","https://openalex.org/W4387191618","https://openalex.org/W3149394126","https://openalex.org/W4387429380","https://openalex.org/W3209573882","https://openalex.org/W2522607959","https://openalex.org/W2394741334","https://openalex.org/W1976536045"],"abstract_inverted_index":{"Code-based":[0],"encryption":[1,20,71,92,111],"schemes":[2],"make":[3],"use":[4],"of":[5,14,63,89,95,99,108],"the":[6,15,23,29,55,64,87,96,100,105],"difficulties":[7],"in":[8,22,51,54,76],"coding":[9,50,75],"theory":[10],"and":[11,46,72],"are":[12,28,47,61],"one":[13,62],"main":[16],"technologies":[17],"to":[18,38,68,103],"realize":[19,69],"primitives":[21],"post-quantum":[24],"scenario.":[25],"Polar":[26],"codes":[27,32,60],"first":[30],"error-correcting":[31],"that":[33],"have":[34],"been":[35],"theoretically":[36],"proved":[37],"achieve":[39],"capacity":[40],"for":[41,49,86],"any":[42],"discrete":[43],"memoryless":[44],"channel,":[45],"used":[48],"wireless":[52],"communications":[53],"5G":[56],"era.":[57],"Thus":[58],"polar":[59,90,109],"most":[65],"attractive":[66],"candidates":[67],"joint":[70],"error":[73],"correction":[74],"mobile":[77],"communication.":[78],"In":[79],"this":[80],"paper,":[81],"we":[82],"provide":[83],"a":[84],"survey":[85],"development":[88],"code-based":[91,110],"schemes.":[93,112],"One":[94],"key":[97,106],"contents":[98],"research":[101],"is":[102],"reduce":[104],"size":[107]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
