{"id":"https://openalex.org/W2998619105","doi":"https://doi.org/10.1109/icct46805.2019.8947156","title":"Joint Encryption and Channel Coding Scheme Based on Balancing Indices and Polar Codes","display_name":"Joint Encryption and Channel Coding Scheme Based on Balancing Indices and Polar Codes","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2998619105","doi":"https://doi.org/10.1109/icct46805.2019.8947156","mag":"2998619105"},"language":"en","primary_location":{"id":"doi:10.1109/icct46805.2019.8947156","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct46805.2019.8947156","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101982573","display_name":"Xu Han","orcid":"https://orcid.org/0000-0001-8319-8830"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xu Han","raw_affiliation_strings":["School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078266278","display_name":"Deyuan Chen","orcid":"https://orcid.org/0000-0003-4280-574X"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deyuan Chen","raw_affiliation_strings":["School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100440851","display_name":"Can Zhang","orcid":"https://orcid.org/0009-0002-2554-3151"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Can Zhang","raw_affiliation_strings":["School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086763568","display_name":"Shaoshuai Gao","orcid":"https://orcid.org/0000-0001-7958-2717"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaoshuai Gao","raw_affiliation_strings":["School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101982573"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.3537,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65261144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"276","last_page":"282"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.713799774646759},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6069740056991577},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6053812503814697},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5269794464111328},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4675779640674591},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.44747281074523926},{"id":"https://openalex.org/keywords/code-word","display_name":"Code word","score":0.440798819065094},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4329231381416321},{"id":"https://openalex.org/keywords/polar-code","display_name":"Polar code","score":0.43188437819480896},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.4159723222255707},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4129437208175659},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31194961071014404},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.3038903474807739}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.713799774646759},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6069740056991577},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6053812503814697},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5269794464111328},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4675779640674591},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.44747281074523926},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.440798819065094},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4329231381416321},{"id":"https://openalex.org/C2778396592","wikidata":"https://www.wikidata.org/wiki/Q7209069","display_name":"Polar code","level":3,"score":0.43188437819480896},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.4159723222255707},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4129437208175659},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31194961071014404},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3038903474807739}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icct46805.2019.8947156","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct46805.2019.8947156","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W107758785","https://openalex.org/W1489769708","https://openalex.org/W1770324186","https://openalex.org/W1979345442","https://openalex.org/W2048863650","https://openalex.org/W2095767396","https://openalex.org/W2125636047","https://openalex.org/W2133952863","https://openalex.org/W2150498905","https://openalex.org/W2296082067","https://openalex.org/W2535983151","https://openalex.org/W2560658479","https://openalex.org/W2604514650","https://openalex.org/W2619674633","https://openalex.org/W2864347361","https://openalex.org/W2963473550","https://openalex.org/W2963973138","https://openalex.org/W2986959318","https://openalex.org/W3101367291","https://openalex.org/W6604393252","https://openalex.org/W6629548296","https://openalex.org/W6738920706","https://openalex.org/W6770380337"],"related_works":["https://openalex.org/W2389178160","https://openalex.org/W2564633714","https://openalex.org/W2144246620","https://openalex.org/W2355986883","https://openalex.org/W2545514196","https://openalex.org/W1993945719","https://openalex.org/W2361619969","https://openalex.org/W2982559641","https://openalex.org/W2538122663","https://openalex.org/W2188276378"],"abstract_inverted_index":{"A":[0],"joint":[1,105],"encryption":[2,26,109,124],"and":[3,48,98,111,125],"channel":[4,126],"coding":[5,127],"scheme":[6,14,106],"is":[7,59,91,155],"proposed":[8,13,104],"in":[9,122,144],"this":[10],"paper.":[11],"The":[12,103],"takes":[15],"advantage":[16],"of":[17,20,33,65,161],"the":[18,25,45,50,62,72,85,108,115,119,133,145,150],"structure":[19,64],"balanced":[21],"codes":[22,35,78],"to":[23,36],"reduce":[24,114],"cost.":[27],"We":[28],"easily":[29,110],"encrypt":[30,49],"each":[31],"codeword":[32],"polar":[34,66,77,135],"a":[37,54,80,141],"stream":[38],"cipher":[39],"with":[40,53,79,132],"its":[41],"balancing":[42,51],"index":[43],"as":[44,76,88,90],"secret":[46],"key":[47,82],"indices":[52],"novel":[55],"private-key":[56,69],"cryptosystem":[57,70],"which":[58,123,154],"based":[60],"on":[61],"special":[63],"codes.":[67],"Our":[68],"has":[71],"same":[73,151],"timing":[74],"complexity":[75],"shorter":[81],"size":[83],"than":[84,118],"existing":[86],"cryptosystems,":[87],"well":[89],"quite":[92],"secure":[93],"against":[94],"brute":[95],"force":[96],"attack":[97],"some":[99],"well-known":[100],"chosen-plaintext":[101],"attacks.":[102],"makes":[107],"can":[112],"efficiently":[113],"error":[116],"diffusion":[117],"traditional":[120],"schemes":[121],"are":[128],"handled":[129],"separately.":[130],"Compared":[131],"original":[134],"codes,":[136],"it":[137],"will":[138],"only":[139],"have":[140],"negligible":[142],"loss":[143],"code":[146],"rate":[147],"while":[148],"remaining":[149],"error-correcting":[152],"ability,":[153],"suitable":[156],"for":[157],"processing":[158],"large":[159],"volumes":[160],"data.":[162]},"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
