{"id":"https://openalex.org/W2475696811","doi":"https://doi.org/10.1109/isit.2009.5205936","title":"Optimal secure message transmission by public discussion","display_name":"Optimal secure message transmission by public discussion","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2475696811","doi":"https://doi.org/10.1109/isit.2009.5205936","mag":"2475696811"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2009.5205936","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2009.5205936","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065534778","display_name":"Hongsong Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CA","CN"],"is_corresponding":true,"raw_author_name":"Hongsong Shi","raw_affiliation_strings":["Department of Computer Science, University of Calgary, Calgary, Canada","School of Computer Science & Engineering University of Electronic Science and Technology of China, ChengDu, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calgary, Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"School of Computer Science & Engineering University of Electronic Science and Technology of China, ChengDu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084928289","display_name":"Shaoquan Jiang","orcid":"https://orcid.org/0000-0001-8114-0782"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Shaoquan Jiang","raw_affiliation_strings":["Department of Computer Science, University of Calgary, Calgary, Canada","School of Computer Science & Engineering University of Electronic Science and Technology of China, ChengDu, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calgary, Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"School of Computer Science & Engineering University of Electronic Science and Technology of China, ChengDu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["Department of Computer Science, University of Calgary, Calgary, Canada","School of Computer Science & Engineering, University of Electronic Science and Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calgary, Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"School of Computer Science & Engineering, University of Electronic Science and Technology, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006130402","display_name":"Mohammed Ashraful Alam Tuhin","orcid":null},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammed Ashraful Tuhin","raw_affiliation_strings":["Department of Computer Science, University of Calgary, Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Calgary, Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5065534778"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":2.6171,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.9127571,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"2332","issue":null,"first_page":"1313","last_page":"1317"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.9308382272720337},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7847599387168884},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7541871070861816},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6685413718223572},{"id":"https://openalex.org/keywords/secure-channel","display_name":"Secure channel","score":0.6393277645111084},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.6367736458778381},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5750733017921448},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5119941830635071},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.48351243138313293},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4220549166202545},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.257063627243042},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14283496141433716},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.06541842222213745}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.9308382272720337},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7847599387168884},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7541871070861816},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6685413718223572},{"id":"https://openalex.org/C180073179","wikidata":"https://www.wikidata.org/wiki/Q3304359","display_name":"Secure channel","level":3,"score":0.6393277645111084},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.6367736458778381},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5750733017921448},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5119941830635071},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.48351243138313293},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4220549166202545},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.257063627243042},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14283496141433716},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.06541842222213745},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2009.5205936","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2009.5205936","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W50149037","https://openalex.org/W59079490","https://openalex.org/W147290027","https://openalex.org/W1524382113","https://openalex.org/W1526970571","https://openalex.org/W1549890695","https://openalex.org/W1568549486","https://openalex.org/W1589077066","https://openalex.org/W1604064347","https://openalex.org/W1964378537","https://openalex.org/W1964678106","https://openalex.org/W1971817342","https://openalex.org/W1980461136","https://openalex.org/W1985623009","https://openalex.org/W2083796634","https://openalex.org/W2092148937","https://openalex.org/W2106833918","https://openalex.org/W2123025883","https://openalex.org/W2140677968","https://openalex.org/W2180989652","https://openalex.org/W2400665299","https://openalex.org/W2475696811","https://openalex.org/W2950704336","https://openalex.org/W2950898060"],"related_works":["https://openalex.org/W2993833576","https://openalex.org/W2043760025","https://openalex.org/W2475696811","https://openalex.org/W283281285","https://openalex.org/W4380928496","https://openalex.org/W2712809602","https://openalex.org/W2114021805","https://openalex.org/W2139127819","https://openalex.org/W1808957578","https://openalex.org/W2083389002"],"abstract_inverted_index":{"Secure":[0],"message":[1,29],"transmission":[2,30,101],"assumes":[3],"n":[4,52],"channels":[5,17],"between":[6],"a":[7,10,23,41,57,77,81,94],"sender":[8,35],"and":[9,36,67,86],"receiver":[11,37],"such":[12],"that":[13,50,98],"up":[14],"to":[15,40,80],"t":[16,54],"are":[18],"under":[19],"the":[20,72,104],"control":[21],"of":[22,65,71],"computationally":[24],"unlimited":[25],"adversary.":[26],"In":[27,45],"secure":[28,58],"by":[31,84],"public":[32,42,73,105],"discussion":[33],"protocol,":[34],"have":[38],"access":[39],"authenticated":[43],"channel.":[44,74,106],"this":[46],"paper":[47],"we":[48],"show":[49],"if":[51],"\u00bf":[53],"+":[55],"1,":[56],"protocol":[59,97],"requires":[60],"at":[61],"least":[62],"3":[63],"rounds":[64,69],"communication":[66],"2":[68],"invocation":[70],"This":[75],"gives":[76],"complete":[78],"answer":[79],"question":[82],"raised":[83],"Garay":[85],"Ostrovsky":[87],"in":[88],"Eurocrypt":[89],"2008.":[90],"We":[91],"also":[92],"describe":[93],"round":[95],"optimal":[96],"has":[99],"constant":[100],"rate":[102],"over":[103]},"counts_by_year":[{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
