{"id":"https://openalex.org/W2294144195","doi":"https://doi.org/10.1109/isit.2010.5513720","title":"Secure computing","display_name":"Secure computing","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2294144195","doi":"https://doi.org/10.1109/isit.2010.5513720","mag":"2294144195"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2010.5513720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2010.5513720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077741905","display_name":"Himanshu Tyagi","orcid":"https://orcid.org/0000-0003-2950-706X"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Himanshu Tyagi","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland, College Park, 20742, USA","Department of Electrical and Computer Engineering, Institute for Systems Research, University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland, College Park, 20742, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Institute for Systems Research, University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102896474","display_name":"Prakash Narayan","orcid":"https://orcid.org/0000-0002-0710-6305"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prakash Narayan","raw_affiliation_strings":["Dept. of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland, College Park, 20742, USA","Department of Electrical and Computer Engineering, Institute for Systems Research, University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering and Institute for Systems Research, University of Maryland, College Park, 20742, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Institute for Systems Research, University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066498720","display_name":"Piyush Gupta","orcid":"https://orcid.org/0000-0002-6145-9507"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Piyush Gupta","raw_affiliation_strings":["Bell Labs, Alcatel-Lucent, Murray Hill, NJ 07974, USA","Bell Laboratories, Alcatel-Lucent, Murray Hill, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Bell Labs, Alcatel-Lucent, Murray Hill, NJ 07974, USA","institution_ids":[]},{"raw_affiliation_string":"Bell Laboratories, Alcatel-Lucent, Murray Hill, NJ, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077741905"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":1.7318,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.8657685,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"2612","last_page":"2616"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computability","display_name":"Computability","score":0.7877072095870972},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6929965615272522},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.6613389253616333},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5729199647903442},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5207721590995789},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5098952054977417},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.505943238735199},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.505929172039032},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.495324045419693},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.47953081130981445},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45956259965896606},{"id":"https://openalex.org/keywords/computable-function","display_name":"Computable function","score":0.4579327404499054},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4476357400417328},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32565268874168396},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18046250939369202},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14490976929664612}],"concepts":[{"id":"https://openalex.org/C152062344","wikidata":"https://www.wikidata.org/wiki/Q818888","display_name":"Computability","level":2,"score":0.7877072095870972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6929965615272522},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.6613389253616333},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5729199647903442},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5207721590995789},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5098952054977417},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.505943238735199},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.505929172039032},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.495324045419693},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.47953081130981445},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45956259965896606},{"id":"https://openalex.org/C54271186","wikidata":"https://www.wikidata.org/wiki/Q1148456","display_name":"Computable function","level":2,"score":0.4579327404499054},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4476357400417328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32565268874168396},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18046250939369202},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14490976929664612},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2010.5513720","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2010.5513720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1514518704","https://openalex.org/W2019307453","https://openalex.org/W2053269541","https://openalex.org/W2101776874","https://openalex.org/W2106765283","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2123976939","https://openalex.org/W2135050985","https://openalex.org/W2144387589","https://openalex.org/W2154832352","https://openalex.org/W2158565632","https://openalex.org/W2163497720","https://openalex.org/W2164651000","https://openalex.org/W2294144195","https://openalex.org/W2488704916","https://openalex.org/W6675392748","https://openalex.org/W6683177802"],"related_works":["https://openalex.org/W98540345","https://openalex.org/W2962921822","https://openalex.org/W4389946807","https://openalex.org/W4376312568","https://openalex.org/W2278478416","https://openalex.org/W4236179144","https://openalex.org/W1533694441","https://openalex.org/W2046021909","https://openalex.org/W1512259211","https://openalex.org/W134061232"],"abstract_inverted_index":{"We":[0],"study":[1],"a":[2,11,76,99],"problem":[3,61],"of":[4,10,14,26,56,62],"secure":[5,50,96],"computation":[6],"by":[7,66,105],"multiple":[8],"parties":[9,69],"given":[12],"function":[13,28,77],"their":[15],"cumulative":[16],"observations,":[17],"using":[18,70],"public":[19,71],"communication":[20],"but":[21],"without":[22],"revealing":[23],"the":[24,27,60,67,90],"value":[25],"to":[29,34,43,59],"an":[30,108],"eavesdropper":[31],"with":[32,107],"access":[33],"this":[35,57],"communication.":[36],"A":[37],"Shannon":[38],"theoretic":[39],"formulation":[40,58],"is":[41,78,87],"introduced":[42],"characterize":[44],"necessary":[45],"and":[46,82],"sufficient":[47],"conditions":[48],"for":[49,95],"computability.":[51],"Drawing":[52],"on":[53],"innate":[54],"connections":[55],"secret":[63,91,110],"key":[64,92,111],"generation":[65,112],"same":[68],"communication,":[72],"we":[73],"show":[74],"that":[75],"securely":[79],"computable":[80],"if":[81,84],"only":[83],"its":[85],"entropy":[86],"smaller":[88],"than":[89],"capacity.":[93],"Conditions":[94],"computability":[97],"at":[98],"lone":[100],"terminal":[101],"are":[102],"also":[103],"derived":[104],"association":[106],"appropriate":[109],"problem.":[113]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
