{"id":"https://openalex.org/W2744600542","doi":"https://doi.org/10.1109/isit.2017.8006784","title":"A game theoretic treatment for pair-wise secret-key generation in many-to-one networks","display_name":"A game theoretic treatment for pair-wise secret-key generation in many-to-one networks","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2744600542","doi":"https://doi.org/10.1109/isit.2017.8006784","mag":"2744600542"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2017.8006784","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047776960","display_name":"R\u00e9mi A. Chou","orcid":"https://orcid.org/0000-0003-4431-3175"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Remi A. Chou","raw_affiliation_strings":["Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, PA"],"affiliations":[{"raw_affiliation_string":"Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, PA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039328157","display_name":"Aylin Yener","orcid":"https://orcid.org/0000-0003-0820-3390"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aylin Yener","raw_affiliation_strings":["Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, PA"],"affiliations":[{"raw_affiliation_string":"Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, PA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5047776960"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.43,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65147767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"34","issue":null,"first_page":"1524","last_page":"1528"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7423722743988037},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6272647380828857},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5999810099601746},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5516812801361084},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5261943936347961},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.4876357614994049},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.47558581829071045},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4530399441719055},{"id":"https://openalex.org/keywords/independent-and-identically-distributed-random-variables","display_name":"Independent and identically distributed random variables","score":0.4290789067745209},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.38073602318763733},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3272362947463989},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28648126125335693},{"id":"https://openalex.org/keywords/random-variable","display_name":"Random variable","score":0.19830361008644104},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1468009352684021},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13218456506729126},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.07133179903030396}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7423722743988037},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6272647380828857},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5999810099601746},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5516812801361084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5261943936347961},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.4876357614994049},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.47558581829071045},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4530399441719055},{"id":"https://openalex.org/C141513077","wikidata":"https://www.wikidata.org/wiki/Q378542","display_name":"Independent and identically distributed random variables","level":3,"score":0.4290789067745209},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.38073602318763733},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3272362947463989},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28648126125335693},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.19830361008644104},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1468009352684021},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13218456506729126},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.07133179903030396},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2017.8006784","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006784","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W656369140","https://openalex.org/W1562844845","https://openalex.org/W1930441892","https://openalex.org/W1974115142","https://openalex.org/W1993274806","https://openalex.org/W2023833893","https://openalex.org/W2085648025","https://openalex.org/W2115728676","https://openalex.org/W2125363721","https://openalex.org/W2154832352","https://openalex.org/W2323053868","https://openalex.org/W2568978207","https://openalex.org/W2605295937","https://openalex.org/W2742407255","https://openalex.org/W3017767523","https://openalex.org/W3037524284","https://openalex.org/W6736092441","https://openalex.org/W6775803634"],"related_works":["https://openalex.org/W2120598334","https://openalex.org/W2350695503","https://openalex.org/W1980134735","https://openalex.org/W2554901794","https://openalex.org/W2108355720","https://openalex.org/W2245180907","https://openalex.org/W2906840093","https://openalex.org/W3203834545","https://openalex.org/W2607793613","https://openalex.org/W783558444"],"abstract_inverted_index":{"We":[0,53,137,149],"consider":[1],"secret-key":[2,68,105,166],"generation":[3,69],"between":[4,141],"several":[5],"agents":[6,77,107,160,172],"and":[7,14,143,161,182,190],"a":[8,82,114,120,134,146],"base":[9,35],"station":[10,36],"that":[11,75,151,162,169,193],"observe":[12],"independent":[13],"identically":[15],"distributed":[16],"(i.i.d.)":[17],"realizations":[18],"of":[19,39,81,89,158],"correlated":[20],"random":[21],"variables.":[22],"Each":[23],"agent":[24,97],"wishes":[25],"to":[26,58,85,111,126,173],"generate":[27],"the":[28,34,63,76,87,91,155,171,175],"longest":[29],"possible":[30],"individual":[31,129,165],"key":[32,130],"with":[33,145],"by":[37],"means":[38],"public":[40],"communication.":[41],"All":[42],"keys":[43],"must":[44],"be":[45,59,73,109],"jointly":[46],"kept":[47,60],"secret":[48,61],"from":[49],"all":[50,90,159],"external":[51],"entities.":[52],"do":[54],"not":[55],"require":[56],"them":[57],"among":[62],"agents.":[64],"In":[65],"this":[66,139],"many-to-one":[67],"setting,":[70],"it":[71],"can":[72,78],"shown":[74],"take":[79],"advantage":[80],"collective":[83,115,121],"protocol":[84,122],"increase":[86],"sum-rate":[88],"generated":[92],"keys.":[93],"However,":[94],"when":[95,118],"each":[96],"is":[98,123,153],"only":[99],"interested":[100],"in":[101,113,154],"maximizing":[102],"its":[103],"own":[104],"rate,":[106],"may":[108],"unwilling":[110],"participate":[112],"protocol.":[116,176],"Furthermore,":[117],"such":[119,195],"employed,":[124],"how":[125],"fairly":[127],"allocate":[128],"rates":[131],"arises":[132],"as":[133],"valid":[135],"issue.":[136],"study":[138],"tension":[140],"cooperation":[142,152],"self-interest":[144],"game-theoretic":[147],"treatment.":[148],"establish":[150],"best":[156],"interest":[157],"there":[163],"exists":[164],"rate":[167],"allocations":[168],"incentivize":[170],"follow":[174],"Additionally,":[177],"we":[178],"propose":[179],"an":[180],"explicit":[181],"low-complexity":[183],"coding":[184],"scheme":[185],"based":[186],"on":[187],"polar":[188],"codes":[189],"hash":[191],"functions":[192],"achieves":[194],"allocations.":[196]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
