{"id":"https://openalex.org/W2887693954","doi":"https://doi.org/10.1109/isit.2018.8437676","title":"A Useful Analogy Between Wiretap and Gelfand - Pinsker Channels","display_name":"A Useful Analogy Between Wiretap and Gelfand - Pinsker Channels","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2887693954","doi":"https://doi.org/10.1109/isit.2018.8437676","mag":"2887693954"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2018.8437676","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2018.8437676","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071112095","display_name":"Ziv Goldfeld","orcid":"https://orcid.org/0000-0003-3406-3950"},"institutions":[{"id":"https://openalex.org/I4210109586","display_name":"Moscow Institute of Thermal Technology","ror":"https://ror.org/021es5e59","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210109586"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Ziv Goldfeld","raw_affiliation_strings":["MIT"],"affiliations":[{"raw_affiliation_string":"MIT","institution_ids":["https://openalex.org/I4210109586"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068879871","display_name":"Haim H. Permuter","orcid":"https://orcid.org/0000-0003-3170-3190"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Haim H. Permuter","raw_affiliation_strings":["Ben Gurion University"],"affiliations":[{"raw_affiliation_string":"Ben Gurion University","institution_ids":["https://openalex.org/I124227911"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071112095"],"corresponding_institution_ids":["https://openalex.org/I4210109586"],"apc_list":null,"apc_paid":null,"fwci":0.1288,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.47836598,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"121","last_page":"125"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/analogy","display_name":"Analogy","score":0.849136233329773},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.8036257028579712},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.6460413932800293},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.6180904507637024},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.617713987827301},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.6051146984100342},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5856856107711792},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5549587607383728},{"id":"https://openalex.org/keywords/broadcasting","display_name":"Broadcasting (networking)","score":0.5479843020439148},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4884873628616333},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4659714698791504},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.45139381289482117},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.41718778014183044},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4055434465408325},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.36357957124710083},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2942500114440918},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27416956424713135},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.25323939323425293},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2500174343585968},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19243070483207703},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1258660852909088},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.11146873235702515},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1033703088760376}],"concepts":[{"id":"https://openalex.org/C521332185","wikidata":"https://www.wikidata.org/wiki/Q185816","display_name":"Analogy","level":2,"score":0.849136233329773},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.8036257028579712},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.6460413932800293},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.6180904507637024},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.617713987827301},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.6051146984100342},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5856856107711792},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5549587607383728},{"id":"https://openalex.org/C110157686","wikidata":"https://www.wikidata.org/wiki/Q922122","display_name":"Broadcasting (networking)","level":2,"score":0.5479843020439148},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4884873628616333},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4659714698791504},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.45139381289482117},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.41718778014183044},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4055434465408325},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.36357957124710083},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2942500114440918},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27416956424713135},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.25323939323425293},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2500174343585968},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19243070483207703},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1258660852909088},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.11146873235702515},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1033703088760376},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2018.8437676","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2018.8437676","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1494099594","https://openalex.org/W1542516891","https://openalex.org/W1550373401","https://openalex.org/W2016768701","https://openalex.org/W2043769961","https://openalex.org/W2132381936","https://openalex.org/W2152625085","https://openalex.org/W2158427334","https://openalex.org/W2178986096","https://openalex.org/W2212231094","https://openalex.org/W2339562963","https://openalex.org/W2963095437","https://openalex.org/W2963645489","https://openalex.org/W3105531017","https://openalex.org/W3169111758","https://openalex.org/W4297979970","https://openalex.org/W4300840296","https://openalex.org/W6746653371","https://openalex.org/W6796564892"],"related_works":["https://openalex.org/W2392206215","https://openalex.org/W2365201483","https://openalex.org/W2355561779","https://openalex.org/W2387449261","https://openalex.org/W2352407775","https://openalex.org/W2186567693","https://openalex.org/W108701362","https://openalex.org/W2469799552","https://openalex.org/W2418518962","https://openalex.org/W2615704157"],"abstract_inverted_index":{"A":[0,26],"framework":[1,51],"of":[2,32,43,69,71,123,136],"analogy":[3,91,115],"between":[4,107],"wiretap":[5,33,64,74],"channels":[6,11,22,100],"(WTCs)":[7],"and":[8,29,75,109,133],"state-dependent":[9],"point-to-point":[10],"with":[12,102,111],"noncausal":[13],"encoder":[14],"channel":[15],"state":[16],"information":[17],"(referred":[18],"to":[19,37,58,94,118],"as":[20],"Gelfand-Pinker":[21],"(GPCs))":[23],"is":[24,35,116],"proposed.":[25],"good":[27,40],"(reliable":[28],"secure)":[30],"sequence":[31,42],"codes":[34,44],"shown":[36],"induce":[38],"a":[39,46,134],"(reliable)":[41],"for":[45,56,62,147],"corresponding":[47,149],"GPC.":[48],"Consequently,":[49],"the":[50,81,85,120,124,148],"enables":[52],"exploiting":[53],"existing":[54],"results":[55],"GPCs":[57],"produce":[59],"converse":[60],"proofs":[61],"their":[63],"analogs.":[65],"The":[66,90,114,140],"fundamental":[67],"limits":[68],"communication":[70],"two":[72],"analogous":[73],"GP":[76],"models":[77],"are":[78,142],"characterized":[79],"by":[80],"same":[82],"rate":[83],"bounds;":[84],"optimization":[86],"domains":[87],"may":[88],"differ.":[89],"readily":[92],"extends":[93],"multiuser":[95],"broadcasting":[96],"scenarios,":[97],"encompassing":[98],"broadcast":[99],"(BCs)":[101],"deterministic":[103],"components,":[104],"degradation":[105],"ordering":[106],"users,":[108],"BCs":[110],"cooperative":[112],"receivers.":[113],"exploited":[117],"characterize":[119],"secrecy-capacity":[121],"regions":[122],"semideterministic":[125],"WTBC":[126],"(an":[127],"open":[128],"problem":[129],"until":[130],"this":[131],"work)":[132],"class":[135],"physically":[137],"degraded":[138],"WTBC.":[139],"derivations":[141],"based":[143],"on":[144],"known":[145],"solutions":[146],"GPBCs.":[150]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
