{"id":"https://openalex.org/W3081487042","doi":"https://doi.org/10.1109/isit44484.2020.9174410","title":"On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System","display_name":"On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3081487042","doi":"https://doi.org/10.1109/isit44484.2020.9174410","mag":"3081487042"},"language":"en","primary_location":{"id":"doi:10.1109/isit44484.2020.9174410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit44484.2020.9174410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049701424","display_name":"Congduan Li","orcid":"https://orcid.org/0000-0003-0495-332X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]},{"id":"https://openalex.org/I4210097354","display_name":"Sun Yat-sen Memorial Hospital","ror":"https://ror.org/01px77p81","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210097354"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Congduan Li","raw_affiliation_strings":["Sun Yat-sen Universtiy,School of Electronics and Communication Engineering","School of Electronics and Communication Engineering, Sun Yat-sen Universtiy"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen Universtiy,School of Electronics and Communication Engineering","institution_ids":["https://openalex.org/I4210097354","https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Electronics and Communication Engineering, Sun Yat-sen Universtiy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102370565","display_name":"Jingliang He","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]},{"id":"https://openalex.org/I4210097354","display_name":"Sun Yat-sen Memorial Hospital","ror":"https://ror.org/01px77p81","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210097354"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingliang He","raw_affiliation_strings":["Sun Yat-sen Universtiy,School of Electronics and Communication Engineering","School of Electronics and Communication Engineering, Sun Yat-sen Universtiy"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen Universtiy,School of Electronics and Communication Engineering","institution_ids":["https://openalex.org/I4210097354","https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Electronics and Communication Engineering, Sun Yat-sen Universtiy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101869562","display_name":"Shiqiu Liu","orcid":"https://orcid.org/0000-0001-5595-3712"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]},{"id":"https://openalex.org/I4210097354","display_name":"Sun Yat-sen Memorial Hospital","ror":"https://ror.org/01px77p81","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210097354"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiqiu Liu","raw_affiliation_strings":["Sun Yat-sen Universtiy,School of Electronics and Communication Engineering","School of Electronics and Communication Engineering, Sun Yat-sen Universtiy"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen Universtiy,School of Electronics and Communication Engineering","institution_ids":["https://openalex.org/I4210097354","https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Electronics and Communication Engineering, Sun Yat-sen Universtiy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024996852","display_name":"Dongliang Guo","orcid":"https://orcid.org/0000-0001-6940-2583"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]},{"id":"https://openalex.org/I4210097354","display_name":"Sun Yat-sen Memorial Hospital","ror":"https://ror.org/01px77p81","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210097354"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongliang Guo","raw_affiliation_strings":["Sun Yat-sen Universtiy,School of Electronics and Communication Engineering","School of Electronics and Communication Engineering, Sun Yat-sen Universtiy"],"affiliations":[{"raw_affiliation_string":"Sun Yat-sen Universtiy,School of Electronics and Communication Engineering","institution_ids":["https://openalex.org/I4210097354","https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Electronics and Communication Engineering, Sun Yat-sen Universtiy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035185924","display_name":"Linqi Song","orcid":"https://orcid.org/0000-0003-2756-4984"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Linqi Song","raw_affiliation_strings":["City University of Hong Kong,Department of Computer Science","Department of Computer Science, City University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Department of Computer Science","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5049701424"],"corresponding_institution_ids":["https://openalex.org/I157773358","https://openalex.org/I4210097354"],"apc_list":null,"apc_paid":null,"fwci":0.5185,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.65154858,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"879","last_page":"883"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7439423203468323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6975984573364258},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.5849198698997498},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5779029726982117},{"id":"https://openalex.org/keywords/counterexample","display_name":"Counterexample","score":0.5693569779396057},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5119057893753052},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.45879265666007996},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.44710618257522583},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4207722842693329},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39693307876586914},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33931711316108704},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2892675995826721},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22615230083465576},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.18980541825294495},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15305835008621216},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13283595442771912}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7439423203468323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6975984573364258},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.5849198698997498},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5779029726982117},{"id":"https://openalex.org/C162838799","wikidata":"https://www.wikidata.org/wiki/Q596077","display_name":"Counterexample","level":2,"score":0.5693569779396057},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5119057893753052},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.45879265666007996},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.44710618257522583},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4207722842693329},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39693307876586914},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33931711316108704},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2892675995826721},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22615230083465576},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.18980541825294495},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15305835008621216},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13283595442771912},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit44484.2020.9174410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit44484.2020.9174410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W581264992","https://openalex.org/W1540714528","https://openalex.org/W2006947308","https://openalex.org/W2101526130","https://openalex.org/W2102205282","https://openalex.org/W2109394932","https://openalex.org/W2118406177","https://openalex.org/W2120085609","https://openalex.org/W2152705493","https://openalex.org/W2157827214","https://openalex.org/W2566769952","https://openalex.org/W2743973278","https://openalex.org/W2796469375","https://openalex.org/W2914714618","https://openalex.org/W2962901739","https://openalex.org/W2964195131","https://openalex.org/W2973229060","https://openalex.org/W4230830692","https://openalex.org/W6616775107","https://openalex.org/W6682668540"],"related_works":["https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2022046490","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2898567960","https://openalex.org/W4387963661","https://openalex.org/W2340481533","https://openalex.org/W2036210457","https://openalex.org/W2369043755"],"abstract_inverted_index":{"With":[0],"the":[1,12,30,69,85,96,105,121,125,143,147,160,168,173,176,194,197,201,222,227,231],"explosive":[2],"development":[3],"of":[4,48,71,136,146,179,200,226],"big":[5],"data,":[6],"it":[7],"is":[8,50,117,189,211,230],"necessary":[9,217],"to":[10,15,65,191],"sort":[11],"data":[13,56,72],"according":[14],"their":[16,55],"importance":[17,24],"or":[18],"priorities.":[19],"The":[20],"sources":[21,106],"with":[22,90],"different":[23],"levels":[25],"can":[26],"be":[27],"modeled":[28],"by":[29,81,207],"multilevel":[31],"diversity":[32],"coding":[33],"systems":[34],"(MDCS).":[35],"Another":[36],"trend":[37],"in":[38],"future":[39],"communication":[40],"networks,":[41],"say":[42],"5G":[43],"wireless":[44],"networks":[45],"and":[46,124,186,218],"Internet":[47],"Things,":[49],"that":[51,113,193],"users":[52],"may":[53],"obtain":[54],"from":[57,62],"all":[58],"available":[59],"sources,":[60],"even":[61],"devices":[63],"belonging":[64],"other":[66],"users.":[67],"Then,":[68],"privacy":[70],"becomes":[73],"a":[74,78,134,140,156,187],"crucial":[75],"issue.":[76],"In":[77,138,214],"recent":[79],"work":[80],"Li":[82,208],"et":[83,209],"al.,":[84],"secure":[86,128,148,181,203],"asymmetric":[87],"MDCS":[88],"(S-AMDCS)":[89],"wiretap":[91],"channels":[92],"was":[93,111,131,151],"investigated,":[94],"where":[95],"wiretapped":[97],"messages":[98],"do":[99],"not":[100,118,212],"leak":[101],"any":[102],"information":[103],"about":[104],"(i.e.":[107],"perfect":[108],"secrecy).":[109],"It":[110],"shown":[112],"superposition":[114,180],"(source-separate":[115],"coding)":[116],"optimal":[119],"for":[120,133],"general":[122],"S-AMDCS":[123],"exact":[126,202],"full":[127],"rate":[129,149,182,204],"region":[130,150,183,205],"proved":[132,185],"class":[135],"S-AMDCS.":[137],"addition,":[139],"bound":[141,195],"on":[142,159,167,175,196,221],"key":[144,169,177,198,224],"size":[145,170,178,199,225],"provided":[152,206],"as":[153],"well.":[154],"As":[155],"further":[157],"step":[158],"SAMDCS":[161],"problem,":[162],"this":[163],"paper":[164],"mainly":[165],"focuses":[166],"characterization.":[171],"Specifically,":[172],"constraints":[174,220],"are":[184,234],"counterexample":[188],"found":[190],"show":[192],"al.":[210],"tight.":[213],"contrast,":[215],"tight":[216],"sufficient":[219],"secrecy":[223],"counterexample,":[228],"which":[229],"four-encoder":[232],"S-AMDCS,":[233],"proved.":[235]},"counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
