{"id":"https://openalex.org/W2997567708","doi":"https://doi.org/10.1109/icct46805.2019.8947039","title":"Performance Analysis of Concatenated Error Correction Code in Secret Key Generation System","display_name":"Performance Analysis of Concatenated Error Correction Code in Secret Key Generation System","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2997567708","doi":"https://doi.org/10.1109/icct46805.2019.8947039","mag":"2997567708"},"language":"en","primary_location":{"id":"doi:10.1109/icct46805.2019.8947039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct46805.2019.8947039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100679742","display_name":"Yufan Wang","orcid":"https://orcid.org/0000-0001-8651-996X"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yufan Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032500064","display_name":"Linning Peng","orcid":"https://orcid.org/0000-0001-5859-7119"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linning Peng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101906340","display_name":"Hua Fu","orcid":"https://orcid.org/0000-0001-7863-2989"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Fu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013730149","display_name":"Guyue Li","orcid":"https://orcid.org/0000-0003-1145-1168"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guyue Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075678549","display_name":"Aiqun Hu","orcid":"https://orcid.org/0000-0002-0398-4899"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aiqun Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100679742"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.1192,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.4922606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"270","last_page":"275"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7859041690826416},{"id":"https://openalex.org/keywords/concatenated-error-correction-code","display_name":"Concatenated error correction code","score":0.7774125933647156},{"id":"https://openalex.org/keywords/bch-code","display_name":"BCH code","score":0.634795606136322},{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.5260241627693176},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.5103940367698669},{"id":"https://openalex.org/keywords/turbo-code","display_name":"Turbo code","score":0.5076340436935425},{"id":"https://openalex.org/keywords/reed\u2013solomon-error-correction","display_name":"Reed\u2013Solomon error correction","score":0.4943263530731201},{"id":"https://openalex.org/keywords/constant-weight-code","display_name":"Constant-weight code","score":0.4846785366535187},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.46325287222862244},{"id":"https://openalex.org/keywords/serial-concatenated-convolutional-codes","display_name":"Serial concatenated convolutional codes","score":0.4604628086090088},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4269407391548157},{"id":"https://openalex.org/keywords/forward-error-correction","display_name":"Forward error correction","score":0.41692274808883667},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4021414816379547},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3770829439163208},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29383352398872375},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.1686934530735016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7859041690826416},{"id":"https://openalex.org/C78944582","wikidata":"https://www.wikidata.org/wiki/Q5158264","display_name":"Concatenated error correction code","level":4,"score":0.7774125933647156},{"id":"https://openalex.org/C42276685","wikidata":"https://www.wikidata.org/wiki/Q795705","display_name":"BCH code","level":3,"score":0.634795606136322},{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.5260241627693176},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.5103940367698669},{"id":"https://openalex.org/C114504821","wikidata":"https://www.wikidata.org/wiki/Q2164281","display_name":"Turbo code","level":3,"score":0.5076340436935425},{"id":"https://openalex.org/C78065487","wikidata":"https://www.wikidata.org/wiki/Q1061598","display_name":"Reed\u2013Solomon error correction","level":5,"score":0.4943263530731201},{"id":"https://openalex.org/C197242373","wikidata":"https://www.wikidata.org/wiki/Q5163613","display_name":"Constant-weight code","level":5,"score":0.4846785366535187},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.46325287222862244},{"id":"https://openalex.org/C33529081","wikidata":"https://www.wikidata.org/wiki/Q18378194","display_name":"Serial concatenated convolutional codes","level":5,"score":0.4604628086090088},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4269407391548157},{"id":"https://openalex.org/C202932441","wikidata":"https://www.wikidata.org/wiki/Q55611017","display_name":"Forward error correction","level":3,"score":0.41692274808883667},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4021414816379547},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3770829439163208},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29383352398872375},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.1686934530735016}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icct46805.2019.8947039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct46805.2019.8947039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1496108277","https://openalex.org/W1957358593","https://openalex.org/W1996534565","https://openalex.org/W2011582944","https://openalex.org/W2020458962","https://openalex.org/W2080918425","https://openalex.org/W2098694510","https://openalex.org/W2103699908","https://openalex.org/W2126477936","https://openalex.org/W2131110609","https://openalex.org/W2332412140","https://openalex.org/W2508611559","https://openalex.org/W2548211406","https://openalex.org/W2789415212","https://openalex.org/W2804692329","https://openalex.org/W3105108969","https://openalex.org/W4241639493"],"related_works":["https://openalex.org/W1497538254","https://openalex.org/W153838523","https://openalex.org/W3002761990","https://openalex.org/W4379051442","https://openalex.org/W1570954324","https://openalex.org/W1721371164","https://openalex.org/W1525837226","https://openalex.org/W2133112407","https://openalex.org/W4206595448","https://openalex.org/W3217296246"],"abstract_inverted_index":{"Secret":[0],"key":[1,20],"generation":[2,21],"from":[3],"wireless":[4],"channel":[5,40,62],"is":[6,107],"an":[7],"emerging":[8],"technique":[9],"of":[10,17,56,66,102],"physical":[11],"layer":[12],"security.":[13],"At":[14],"present,":[15],"most":[16],"the":[18,47,80,99,110],"secret":[19],"schemes":[22],"use":[23],"information":[24,35],"reconciliation":[25,36],"to":[26],"obtain":[27],"symmetric":[28],"keys.":[29],"This":[30],"paper":[31],"introduces":[32],"a":[33,53],"non-interactive":[34],"scheme":[37],"based":[38],"on":[39],"coding":[41],"and":[42,45,58,95,115],"stream":[43],"encryption,":[44],"considering":[46],"error":[48,68,85,112],"correction":[49,69,86,113],"capability,":[50],"we":[51,78],"design":[52],"concatenated":[54,67,81,105],"code":[55,70,82,87,106],"BCH":[57],"RS":[59],"codes":[60],"as":[61],"coding.":[63],"The":[64],"performance":[65,101],"has":[71],"been":[72],"analyzed":[73],"in":[74,88],"this":[75,103],"scheme.":[76],"Then,":[77],"compare":[79],"with":[83],"first-level":[84,111],"different":[89],"test":[90],"environments.":[91],"Extensive":[92],"numerical":[93],"simulations":[94],"experiments":[96],"demonstrate":[97],"that":[98],"decoding":[100],"second-level":[104],"better":[108],"than":[109],"code,":[114],"it":[116],"can":[117],"also":[118],"effectively":[119],"eliminate":[120],"third-party":[121],"eavesdropping.":[122]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
