{"id":"https://openalex.org/W2043712786","doi":"https://doi.org/10.1109/infcom.2013.6567030","title":"Exchanging pairwise secrets efficiently","display_name":"Exchanging pairwise secrets efficiently","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2043712786","doi":"https://doi.org/10.1109/infcom.2013.6567030","mag":"2043712786"},"language":"en","primary_location":{"id":"doi:10.1109/infcom.2013.6567030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2013.6567030","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://infoscience.epfl.ch/record/186790","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002021354","display_name":"Iris Safaka","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Iris Safaka","raw_affiliation_strings":["EPFL, Switzerland","EPFL. Lausanne,Switzerland"],"affiliations":[{"raw_affiliation_string":"EPFL, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"EPFL. Lausanne,Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056591688","display_name":"Christina Fragouli","orcid":"https://orcid.org/0000-0003-1002-5829"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Christina Fragouli","raw_affiliation_strings":["EPFL, Switzerland","EPFL. Lausanne,Switzerland"],"affiliations":[{"raw_affiliation_string":"EPFL, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"EPFL. Lausanne,Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011668097","display_name":"Katerina Argyraki","orcid":"https://orcid.org/0009-0004-9470-2819"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Katerina Argyraki","raw_affiliation_strings":["EPFL, Switzerland","EPFL. Lausanne,Switzerland"],"affiliations":[{"raw_affiliation_string":"EPFL, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"EPFL. Lausanne,Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083980887","display_name":"Suhas Diggavi","orcid":"https://orcid.org/0000-0001-7313-9861"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]},{"id":"https://openalex.org/I2799798094","display_name":"UCLA Health","ror":"https://ror.org/01d88se56","country_code":"US","type":"funder","lineage":["https://openalex.org/I2799798094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Suhas Diggavi","raw_affiliation_strings":["University of California, Los Angeles, USA","UCLA, Los Angeles, CA,\u00a0USA"],"affiliations":[{"raw_affiliation_string":"University of California, Los Angeles, USA","institution_ids":["https://openalex.org/I161318765"]},{"raw_affiliation_string":"UCLA, Los Angeles, CA,\u00a0USA","institution_ids":["https://openalex.org/I2799798094"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002021354"],"corresponding_institution_ids":["https://openalex.org/I5124864"],"apc_list":null,"apc_paid":null,"fwci":1.9219,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.87237417,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"6244","issue":null,"first_page":"2265","last_page":"2273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.769225001335144},{"id":"https://openalex.org/keywords/pairwise-comparison","display_name":"Pairwise comparison","score":0.6484882831573486},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6141538023948669},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5915589332580566},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.579797089099884},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.5614376664161682},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5225521922111511},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4913107454776764},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4680022597312927},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.448527455329895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37834402918815613},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3660392165184021},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3460853695869446},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1284748613834381},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08565354347229004}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.769225001335144},{"id":"https://openalex.org/C184898388","wikidata":"https://www.wikidata.org/wiki/Q1435712","display_name":"Pairwise comparison","level":2,"score":0.6484882831573486},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6141538023948669},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5915589332580566},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.579797089099884},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.5614376664161682},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5225521922111511},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4913107454776764},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4680022597312927},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.448527455329895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37834402918815613},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3660392165184021},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3460853695869446},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1284748613834381},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08565354347229004},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/infcom.2013.6567030","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2013.6567030","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.361.1384","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.361.1384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://infoscience.epfl.ch/record/186790/files/Safaka_Infocom2013.pdf","raw_type":"text"},{"id":"pmh:oai:infoscience.epfl.ch:186790","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/186790","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:infoscience.epfl.ch:186790","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/186790","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1595409123","https://openalex.org/W1606480398","https://openalex.org/W1813474893","https://openalex.org/W1996360405","https://openalex.org/W2001278010","https://openalex.org/W2022334019","https://openalex.org/W2033630799","https://openalex.org/W2042460777","https://openalex.org/W2043769961","https://openalex.org/W2061036264","https://openalex.org/W2065465262","https://openalex.org/W2097079400","https://openalex.org/W2106833918","https://openalex.org/W2117815780","https://openalex.org/W2128805726","https://openalex.org/W2131110609","https://openalex.org/W2138668183","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2022046490","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2898567960","https://openalex.org/W4387963661","https://openalex.org/W2340481533","https://openalex.org/W2036210457","https://openalex.org/W2369043755"],"abstract_inverted_index":{"We":[0,52,68,131],"consider":[1],"the":[2,12,22,54,75,118,121,151,185],"problem":[3,60],"where":[4,74],"a":[5,70,154],"group":[6],"of":[7,24,115,158,174],"wireless":[8,76,156],"nodes,":[9],"connected":[10],"to":[11,17,30,148,171],"same":[13,122],"broadcast":[14],"domain,":[15],"want":[16],"create":[18,172],"pairwise":[19,86],"secrets,":[20],"in":[21,32,49,117],"presence":[23,103],"an":[25,112],"adversary":[26],"Eve,":[27],"who":[28],"tries":[29],"listen":[31],"and":[33],"steal":[34],"these":[35],"secrets.":[36],"Existing":[37],"solutions":[38],"assume":[39],"that":[40,88,106,164],"Eve":[41,89,149],"cannot":[42,90,108],"perform":[43],"certain":[44],"computations":[45],"(e.g.,":[46],"large-integer":[47],"factorization)":[48],"useful":[50],"time.":[51],"ask":[53],"question:":[55],"can":[56],"we":[57,160],"solve":[58],"this":[59],"without":[61],"assuming":[62],"anything":[63],"about":[64,127,150],"Eve's":[65,100],"computational":[66,129],"capabilities?":[67],"propose":[69],"simple":[71],"secret-agreement":[72],"protocol,":[73],"nodes":[77,170],"keep":[78],"exchanging":[79],"bits":[80,176],"until":[81],"they":[82],"have":[83],"agreed":[84],"on":[85,99],"secrets":[87],"reconstruct":[91],"with":[92,179],"very":[93],"high":[94],"probability.":[95],"Our":[96],"protocol":[97,140],"relies":[98],"limited":[101],"network":[102,119],"(the":[104],"fact":[105],"she":[107],"be":[109],"located":[110],"at":[111,120],"arbitrary":[113],"number":[114],"points":[116],"time),":[123],"but":[124],"assumes":[125],"nothing":[126],"her":[128],"capabilities.":[130,187],"formally":[132],"show":[133],"that,":[134],"under":[135],"standard":[136],"theoretical":[137],"assumptions,":[138],"our":[139],"is":[141,166],"information-theoretically":[142],"secure":[143],"(it":[144],"leaks":[145],"zero":[146],"information":[147],"secrets).":[152],"Using":[153],"small":[155],"testbed":[157],"smart-phones,":[159],"provide":[161],"experimental":[162],"evidence":[163],"it":[165],"feasible":[167],"for":[168],"5":[169],"thousands":[173],"secret":[175],"per":[177],"second,":[178],"their":[180],"secrecy":[181],"being":[182],"independent":[183],"from":[184],"adversary's":[186]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
