{"id":"https://openalex.org/W2743966698","doi":"https://doi.org/10.1109/isit.2017.8006870","title":"The Gelfand-Pinsker wiretap channel: Higher secrecy rates via a novel superposition code","display_name":"The Gelfand-Pinsker wiretap channel: Higher secrecy rates via a novel superposition code","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2743966698","doi":"https://doi.org/10.1109/isit.2017.8006870","mag":"2743966698"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2017.8006870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071112095","display_name":"Ziv Goldfeld","orcid":"https://orcid.org/0000-0003-3406-3950"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Ziv Goldfeld","raw_affiliation_strings":["Ben Gurion University"],"affiliations":[{"raw_affiliation_string":"Ben Gurion University","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026048440","display_name":"Paul Cuff","orcid":"https://orcid.org/0000-0003-2936-9939"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Cuff","raw_affiliation_strings":["Princeton University"],"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068879871","display_name":"Haim H. Permuter","orcid":"https://orcid.org/0000-0003-3170-3190"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Haim H. Permuter","raw_affiliation_strings":["Ben Gurion University"],"affiliations":[{"raw_affiliation_string":"Ben Gurion University","institution_ids":["https://openalex.org/I124227911"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071112095"],"corresponding_institution_ids":["https://openalex.org/I124227911"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0955336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":null,"first_page":"1953","last_page":"1957"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6779807806015015},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.6375495195388794},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.5985186696052551},{"id":"https://openalex.org/keywords/lemma","display_name":"Lemma (botany)","score":0.5892174243927002},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5542007088661194},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.49917149543762207},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.489657461643219},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.47161367535591125},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4644453823566437},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4615066349506378},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4467777907848358},{"id":"https://openalex.org/keywords/chen","display_name":"Chen","score":0.4402504563331604},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4396897852420807},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4370352029800415},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4246911108493805},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.27343815565109253},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.25309908390045166},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24996435642242432},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24889132380485535},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17176973819732666},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08963072299957275}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6779807806015015},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.6375495195388794},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.5985186696052551},{"id":"https://openalex.org/C2777759810","wikidata":"https://www.wikidata.org/wiki/Q149316","display_name":"Lemma (botany)","level":3,"score":0.5892174243927002},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5542007088661194},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.49917149543762207},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.489657461643219},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.47161367535591125},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4644453823566437},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4615066349506378},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4467777907848358},{"id":"https://openalex.org/C2776085556","wikidata":"https://www.wikidata.org/wiki/Q183361","display_name":"Chen","level":2,"score":0.4402504563331604},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4396897852420807},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4370352029800415},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4246911108493805},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.27343815565109253},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25309908390045166},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24996435642242432},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24889132380485535},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17176973819732666},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08963072299957275},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C46757340","wikidata":"https://www.wikidata.org/wiki/Q43238","display_name":"Poaceae","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2017.8006870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1978070031","https://openalex.org/W2125999125","https://openalex.org/W2139352051","https://openalex.org/W2139585798","https://openalex.org/W2233598973","https://openalex.org/W2544892019","https://openalex.org/W2963076092","https://openalex.org/W2963934635","https://openalex.org/W3103841412","https://openalex.org/W3169111758","https://openalex.org/W6796564892"],"related_works":["https://openalex.org/W2951637176","https://openalex.org/W2583477080","https://openalex.org/W2150528942","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2340481533","https://openalex.org/W2898567960","https://openalex.org/W2036210457","https://openalex.org/W2369043755","https://openalex.org/W2039752281"],"abstract_inverted_index":{"We":[0],"study":[1],"the":[2,15,36,49,54,76,88,92,100,111,124,127,134,145,168],"state-dependent":[3],"(SD)":[4],"wiretap":[5],"channel":[6,10],"(WTC)":[7],"with":[8],"non-causal":[9],"state":[11,37],"information":[12,152],"(CSI)":[13],"at":[14,106],"encoder.":[16],"This":[17],"model":[18],"subsumes":[19],"all":[20,155],"other":[21],"instances":[22],"of":[23,35,126,160,167],"CSI":[24,95,138],"availability":[25],"as":[26,108,110],"special":[27],"cases,":[28],"and":[29,42,61,78,116,129,136],"calls":[30],"for":[31,40,84,154,171],"an":[32],"efficient":[33],"utilization":[34],"sequence":[38],"both":[39],"reliability":[41],"security":[43],"purposes.":[44],"A":[45],"lower":[46,89],"bound":[47,90],"on":[48,67,163],"secrecy-capacity,":[50],"that":[51,103,149],"improves":[52],"upon":[53],"previously":[55],"best":[56],"known":[57,121],"result":[58,81],"by":[59,114],"Chen":[60,77,128],"Han":[62,79,130],"Vinck,":[63],"is":[64,82,96,105,119],"derived":[65,143],"based":[66],"a":[68,164],"novel":[69],"superposition":[70,172],"coding":[71],"scheme.":[72],"The":[73,140,158],"improvement":[74],"over":[75],"Vinck":[80,131],"strict":[83,146],"some":[85],"SD-WTCs.":[86],"Specializing":[87],"to":[91,99,122,133],"case":[93],"where":[94],"also":[97],"available":[98],"decoder":[101,137],"reveals":[102],"it":[104],"least":[107],"good":[109],"achievable":[112],"formula":[113],"Chia":[115],"El-Gamal,":[117],"which":[118],"already":[120],"outperform":[123],"adaptation":[125],"code":[132],"encoder":[135],"scenario.":[139],"results":[141],"are":[142],"under":[144],"semantic-security":[147],"metric":[148],"requires":[150],"negligible":[151],"leakage":[153],"message":[156],"distributions.":[157],"proof":[159],"achievability":[161],"relies":[162],"stronger":[165],"version":[166],"soft-covering":[169],"lemma":[170],"codes.":[173]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
