{"id":"https://openalex.org/W2744077667","doi":"https://doi.org/10.1109/isit.2017.8006670","title":"Privacy amplification of distributed encrypted sources with correlated keys","display_name":"Privacy amplification of distributed encrypted sources with correlated keys","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2744077667","doi":"https://doi.org/10.1109/isit.2017.8006670","mag":"2744077667"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2017.8006670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031357176","display_name":"Bagus Santoso","orcid":"https://orcid.org/0000-0003-4604-305X"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Bagus Santoso","raw_affiliation_strings":["University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046860268","display_name":"Yasutada Oohama","orcid":"https://orcid.org/0009-0003-3272-3860"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasutada Oohama","raw_affiliation_strings":["University of Electro-Communications, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031357176"],"corresponding_institution_ids":["https://openalex.org/I20529979"],"apc_list":null,"apc_paid":null,"fwci":0.5734,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.69538157,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"958","last_page":"962"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7695549726486206},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7379670739173889},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5808336734771729},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5365123748779297},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4838220477104187},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.456326961517334},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.4394931495189667},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4308384954929352},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.4220488667488098}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7695549726486206},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7379670739173889},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5808336734771729},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5365123748779297},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4838220477104187},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.456326961517334},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.4394931495189667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4308384954929352},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.4220488667488098},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2017.8006670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2069785605","https://openalex.org/W2088587246","https://openalex.org/W2099213070","https://openalex.org/W2593370088"],"related_works":["https://openalex.org/W2372020181","https://openalex.org/W2156531654","https://openalex.org/W1950940422","https://openalex.org/W1581723585","https://openalex.org/W4378714697","https://openalex.org/W2294330161","https://openalex.org/W4283822356","https://openalex.org/W2129146436","https://openalex.org/W2253069048","https://openalex.org/W2804553224"],"abstract_inverted_index":{"In":[0,54],"this":[1],"paper,":[2],"we":[3,56],"consider":[4],"a":[5,24,60,87,90,141],"system":[6,42],"where":[7,93],"multiple":[8],"sources":[9,156],"are":[10,29,139],"encrypted":[11,100],"in":[12],"separated":[13],"nodes":[14],"and":[15,67,75],"sent":[16],"through":[17],"their":[18],"respective":[19],"public":[20,105,127],"communication":[21,106,128],"channels":[22],"into":[23],"joint":[25],"sink":[26],"node.":[27],"We":[28,85,130],"interested":[30],"at":[31],"the":[32,36,73,76,121,134,146,154,158,162,177],"problem":[33],"on":[34,58],"protecting":[35],"security":[37,91],"of":[38,78,115,136,149],"an":[39,81,94],"already":[40,82],"existing":[41],"such":[43],"above,":[44],"which":[45],"is":[46,111,164,173],"found":[47],"out":[48],"to":[49,71,112,119,126,152,175],"have":[50],"correlated":[51],"encryption":[52],"keys.":[53],"particular,":[55],"focus":[57],"finding":[59],"solution":[61,88],"without":[62,161],"introducing":[63],"additional":[64],"secret":[65],"keys":[66,163,172],"with":[68,181],"minimal":[69],"modification":[70],"minimize":[72],"cost":[74],"risk":[77],"bringing":[79],"down":[80],"running":[83],"system.":[84],"propose":[86],"under":[89],"model":[92],"eavesdropper":[95,151],"obtains":[96],"all":[97],"ciphertexts,":[98],"i.e.,":[99],"sources,":[101],"by":[102],"accessing":[103],"available":[104],"channels.":[107,129],"Our":[108],"main":[109],"technique":[110],"use":[113],"encoders":[114],"certain":[116,142],"linear":[117,137],"codes":[118,138],"encode":[120],"ciphertexts":[122,160],"before":[123],"sending":[124],"them":[125],"show":[131],"that":[132],"if":[133],"rates":[135],"within":[140],"rate":[143],"region:":[144],"(1)":[145],"success":[147],"probability":[148],"any":[150],"extract":[153],"original":[155,178],"from":[157],"encoded":[159],"negligible,":[165],"while":[166],"(2)":[167],"one":[168],"who":[169],"has":[170],"legitimate":[171],"able":[174],"retrieve":[176],"source":[179],"data":[180],"negligible":[182],"error":[183],"probability.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
