{"id":"https://openalex.org/W2964025124","doi":"https://doi.org/10.1109/isit.2017.8006603","title":"On the tradeoff region of secure exact-repair regenerating codes","display_name":"On the tradeoff region of secure exact-repair regenerating codes","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2964025124","doi":"https://doi.org/10.1109/isit.2017.8006603","mag":"2964025124"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2017.8006603","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006603","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025609529","display_name":"Shuo Shao","orcid":"https://orcid.org/0000-0003-2872-795X"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shuo Shao","raw_affiliation_strings":["Dept. of ECE, Texas A&M University"],"affiliations":[{"raw_affiliation_string":"Dept. of ECE, Texas A&M University","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006265534","display_name":"Tie Liu","orcid":"https://orcid.org/0000-0002-6412-2432"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tie Liu","raw_affiliation_strings":["Dept. of ECE, Texas A&M University"],"affiliations":[{"raw_affiliation_string":"Dept. of ECE, Texas A&M University","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100675045","display_name":"Chao Tian","orcid":"https://orcid.org/0000-0001-8752-6141"},"institutions":[{"id":"https://openalex.org/I75027704","display_name":"University of Tennessee at Knoxville","ror":"https://ror.org/020f3ap87","country_code":"US","type":"education","lineage":["https://openalex.org/I75027704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chao Tian","raw_affiliation_strings":["Dept. of EECS, University of Tennessee"],"affiliations":[{"raw_affiliation_string":"Dept. of EECS, University of Tennessee","institution_ids":["https://openalex.org/I75027704"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016749653","display_name":"Cong Shen","orcid":"https://orcid.org/0000-0002-3148-4453"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Shen","raw_affiliation_strings":["Dept. of EEIS, University of Science & Technology of China"],"affiliations":[{"raw_affiliation_string":"Dept. of EEIS, University of Science & Technology of China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025609529"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.69531067,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"624","last_page":"628"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7711272239685059},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.6570980548858643},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5267994999885559},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.49509182572364807},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.47103291749954224},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4518180191516876},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.4275974631309509},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3027265667915344},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19005531072616577},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.082633376121521},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06603363156318665}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7711272239685059},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.6570980548858643},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5267994999885559},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.49509182572364807},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.47103291749954224},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4518180191516876},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.4275974631309509},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3027265667915344},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19005531072616577},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.082633376121521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06603363156318665},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2017.8006603","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006603","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W581264992","https://openalex.org/W1926572700","https://openalex.org/W1970080388","https://openalex.org/W1999730868","https://openalex.org/W2035732803","https://openalex.org/W2037413426","https://openalex.org/W2050687505","https://openalex.org/W2096296858","https://openalex.org/W2101526130","https://openalex.org/W2105185344","https://openalex.org/W2118406177","https://openalex.org/W2150777202","https://openalex.org/W2514344784","https://openalex.org/W2751923270","https://openalex.org/W2963972734","https://openalex.org/W2964275527","https://openalex.org/W3098364520","https://openalex.org/W3103122537","https://openalex.org/W3105115639","https://openalex.org/W3106482607","https://openalex.org/W4230830692","https://openalex.org/W4294490771"],"related_works":["https://openalex.org/W2150528942","https://openalex.org/W2114007974","https://openalex.org/W2022046490","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2898567960","https://openalex.org/W4387963661","https://openalex.org/W2340481533","https://openalex.org/W2036210457","https://openalex.org/W2369043755"],"abstract_inverted_index":{"We":[0],"consider":[1],"the":[2,14,23,27,42,61,66,92,97,132,150,157,162,167,178,196,200,225],"{n,":[3,15],"k,":[4,16],"d,":[5],"l)":[6],"secure":[7,35],"exact-repair":[8,18,98],"regenerating":[9,19,99],"code":[10,20,100],"problem,":[11,60,204],"which":[12,205],"generalizes":[13],"d)":[17],"problem":[21,101],"with":[22,137],"additional":[24],"constraint":[25,126,227],"that":[26,148,177],"stored":[28],"file":[29],"needs":[30],"to":[31,45,108,135],"be":[32,222],"kept":[33],"information-theoretically":[34],"against":[36],"an":[37],"eavesdropper,":[38],"who":[39],"can":[40,181],"access":[41],"data":[43],"transmitted":[44],"regenerate":[46],"a":[47,74,80,119,124,138,192,212,217],"total":[48],"of":[49,96,166,195,216,219],"l":[50,153],"different":[51],"failed":[52],"nodes.":[53],"For":[54],"all":[55],"known":[56,107],"results":[57,117],"on":[58],"this":[59,143],"achievable":[62,93],"tradeoff":[63,94,133,168,179,197],"regions":[64,95],"between":[65],"normalized":[67],"storage":[68],"capacity":[69],"and":[70,86],"repair":[71],"bandwidth":[72],"have":[73,109,184],"single":[75,139],"corner":[76,111,140,164,186,209],"point,":[77],"achieved":[78],"by":[79,83],"scheme":[81],"proposed":[82],"Shah,":[84],"Rashmi":[85],"Kumar":[87],"(the":[88],"SRK":[89,158],"point).":[90],"Since":[91],"without":[102],"any":[103],"secrecy":[104,125,151,226],"constraints":[105],"are":[106],"multiple":[110,185],"points":[112],"in":[113,182],"general,":[114],"these":[115],"existing":[116],"suggest":[118],"phase-change-like":[120],"behavior,":[121],"i.e.,":[122],"enforcing":[123],"(l":[127],"\u2265":[128],"1)":[129],"immediately":[130],"reduces":[131],"region":[134,180,198],"one":[136],"point.":[141],"In":[142,188],"work,":[144],"we":[145,175,190],"first":[146],"show":[147,176],"when":[149,171],"parameter":[152],"is":[154,160,173,228],"sufficiently":[155],"large,":[156],"point":[159,165],"indeed":[161],"only":[163],"region.":[169],"However,":[170],"\u00a3":[172],"small,":[174],"fact":[183],"points.":[187,210],"particular,":[189],"establish":[191],"precise":[193],"characterization":[194],"for":[199],"(7,":[201],"6,":[202],"6,1)":[203],"has":[206],"exactly":[207],"two":[208],"Thus,":[211],"smooth":[213],"transition,":[214,220],"instead":[215],"phase-change-type":[218],"should":[221],"expected":[223],"as":[224],"gradually":[229],"strengthened.":[230]},"counts_by_year":[{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
