{"id":"https://openalex.org/W2512564087","doi":"https://doi.org/10.1109/isit.2016.7541696","title":"Computationally efficient deniable communication","display_name":"Computationally efficient deniable communication","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2512564087","doi":"https://doi.org/10.1109/isit.2016.7541696","mag":"2512564087"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2016.7541696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Qiaosheng Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["CN","HK"],"is_corresponding":true,"raw_author_name":"Qiaosheng Zhang","raw_affiliation_strings":["Institute of Network Coding, CUHK, China"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, CUHK, China","institution_ids":["https://openalex.org/I6507939","https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mayank Bakshi","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Mayank Bakshi","raw_affiliation_strings":["Institute of Network Coding, CUHK, China"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, CUHK, China","institution_ids":["https://openalex.org/I6507939","https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":null,"display_name":"Sidharth Jaggi","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Sidharth Jaggi","raw_affiliation_strings":["Institute of Network Coding, CUHK, China"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, CUHK, China","institution_ids":["https://openalex.org/I6507939","https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I6507939","https://openalex.org/I889458895"],"apc_list":null,"apc_paid":null,"fwci":3.8557,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.94049938,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2234","last_page":"2238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/alice","display_name":"Alice (programming language)","score":0.6459000110626221},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5702000260353088},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5619000196456909},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5504000186920166},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5454000234603882},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.4830000102519989},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.41659998893737793},{"id":"https://openalex.org/keywords/alice-and-bob","display_name":"Alice and Bob","score":0.38670000433921814}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7522000074386597},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.6459000110626221},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5702000260353088},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5619000196456909},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5504000186920166},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5454000234603882},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.4830000102519989},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4212999939918518},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.41659998893737793},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40450000762939453},{"id":"https://openalex.org/C127964579","wikidata":"https://www.wikidata.org/wiki/Q649676","display_name":"Alice and Bob","level":3,"score":0.38670000433921814},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.37950000166893005},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37049999833106995},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.3677000105381012},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.35269999504089355},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.34290000796318054},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.33739998936653137},{"id":"https://openalex.org/C118437007","wikidata":"https://www.wikidata.org/wiki/Q1017139","display_name":"Hybrid automatic repeat request","level":3,"score":0.32010000944137573},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.2775999903678894},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.2754000127315521},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2583000063896179},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.257999986410141},{"id":"https://openalex.org/C173988684","wikidata":"https://www.wikidata.org/wiki/Q863510","display_name":"Binary symmetric channel","level":4,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2016.7541696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1485726418","https://openalex.org/W1533832561","https://openalex.org/W1610563972","https://openalex.org/W1897081267","https://openalex.org/W2000226542","https://openalex.org/W2022381648","https://openalex.org/W2050285621","https://openalex.org/W2057415673","https://openalex.org/W2084796966","https://openalex.org/W2088704412","https://openalex.org/W2098346479","https://openalex.org/W2128765501","https://openalex.org/W2150498905","https://openalex.org/W2512564087","https://openalex.org/W2963199173","https://openalex.org/W2963645489","https://openalex.org/W4302366875","https://openalex.org/W6639517807"],"related_works":[],"abstract_inverted_index":{"In":[0,107],"this":[1,108],"paper,":[2],"we":[3,110],"design":[4],"the":[5,44,93,97,112,128,133],"first":[6,113],"computationally":[7,114],"efficient":[8],"codes":[9,98,116],"for":[10,132],"simultaneously":[11,126],"reliable":[12],"and":[13,69,84,123],"deniable":[14,49],"communication":[15],"over":[16,58,74],"a":[17,35,38,59],"Binary":[18],"Symmetric":[19],"Channel":[20],"(BSC).":[21],"Our":[22],"setting":[23],"is":[24,48,91],"as":[25,101],"follows.":[26],"A":[27],"transmitter":[28],"Alice":[29,66,83],"wishes":[30],"to":[31,37],"potentially":[32],"reliably":[33,68],"transmit":[34,71],"message":[36],"receiver":[39],"Bob,":[40],"while":[41,125],"ensuring":[42],"that":[43,65,92],"transmission":[45,57],"taking":[46],"place":[47],"from":[50],"an":[51],"eavesdropper":[52],"Willie":[53],"(who":[54],"hears":[55],"Alice's":[56],"noisier":[60],"BSC).":[61],"Prior":[62],"works":[63,90],"show":[64],"can":[67],"deniably":[70],"O(\u221an)":[72],"bits":[73],"n":[75],"channel":[76],"uses":[77],"without":[78],"any":[79],"shared":[80],"secrets":[81],"between":[82],"Bob.":[85],"One":[86],"drawback":[87],"of":[88,96],"prior":[89],"computational":[94],"complexity":[95],"designed":[99],"scales":[100],"2":[102],"<sup":[103],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[104],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u0398(\u221an)</sup>":[105],".":[106],"work":[109],"provide":[111],"tractable":[115],"with":[117],"provable":[118],"guarantees":[119],"on":[120],"both":[121],"reliability":[122],"deniability,":[124],"achieving":[127],"best":[129],"known":[130],"throughput":[131],"problem.":[134]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-09-16T00:00:00"}
