{"id":"https://openalex.org/W3197891342","doi":"https://doi.org/10.1109/isit45174.2021.9517742","title":"The Rate-Equivocation Region of the Degraded Discrete-Time Poisson Wiretap Channel","display_name":"The Rate-Equivocation Region of the Degraded Discrete-Time Poisson Wiretap Channel","publication_year":2021,"publication_date":"2021-07-12","ids":{"openalex":"https://openalex.org/W3197891342","doi":"https://doi.org/10.1109/isit45174.2021.9517742","mag":"3197891342"},"language":"en","primary_location":{"id":"doi:10.1109/isit45174.2021.9517742","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101597334","display_name":"Morteza Soltani","orcid":"https://orcid.org/0000-0002-8470-1482"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Morteza Soltani","raw_affiliation_strings":["University of Idaho,Department of Electrical and Computer Engineering,Moscow,Idaho,USA","Department of Electrical and Computer Engineering, University of Idaho, Moscow, Idaho, USA"],"affiliations":[{"raw_affiliation_string":"University of Idaho,Department of Electrical and Computer Engineering,Moscow,Idaho,USA","institution_ids":["https://openalex.org/I155093810"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Idaho, Moscow, Idaho, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008189935","display_name":"Zouheir Rezki","orcid":"https://orcid.org/0000-0002-6491-3648"},"institutions":[{"id":"https://openalex.org/I185103710","display_name":"University of California, Santa Cruz","ror":"https://ror.org/03s65by71","country_code":"US","type":"education","lineage":["https://openalex.org/I185103710"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zouheir Rezki","raw_affiliation_strings":["University of California,Department of Electrical and Computer Engineering,Santa Cruz,CA,USA","Department of Electrical and Computer Engineering, University of California, Santa Cruz, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California,Department of Electrical and Computer Engineering,Santa Cruz,CA,USA","institution_ids":["https://openalex.org/I185103710"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of California, Santa Cruz, CA, USA","institution_ids":["https://openalex.org/I185103710"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101597334"],"corresponding_institution_ids":["https://openalex.org/I155093810"],"apc_list":null,"apc_paid":null,"fwci":0.1011,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.43538036,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"831","last_page":"836"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13187","display_name":"Diffusion and Search Dynamics","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intensity","display_name":"Intensity (physics)","score":0.6342515349388123},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.5784872174263},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5360327959060669},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5189635157585144},{"id":"https://openalex.org/keywords/poisson-distribution","display_name":"Poisson distribution","score":0.48261651396751404},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.46935683488845825},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.41365015506744385},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3512326180934906},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33462297916412354},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.33294954895973206},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.32959675788879395},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.2523811459541321},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.21516737341880798},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.21108520030975342},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1960545778274536},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.1576797366142273},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.1163095235824585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07931315898895264}],"concepts":[{"id":"https://openalex.org/C93038891","wikidata":"https://www.wikidata.org/wiki/Q1061524","display_name":"Intensity (physics)","level":2,"score":0.6342515349388123},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.5784872174263},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5360327959060669},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5189635157585144},{"id":"https://openalex.org/C100906024","wikidata":"https://www.wikidata.org/wiki/Q205692","display_name":"Poisson distribution","level":2,"score":0.48261651396751404},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.46935683488845825},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.41365015506744385},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3512326180934906},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33462297916412354},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.33294954895973206},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.32959675788879395},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.2523811459541321},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.21516737341880798},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.21108520030975342},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1960545778274536},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.1576797366142273},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.1163095235824585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07931315898895264}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit45174.2021.9517742","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517742","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7984678118","display_name":null,"funder_award_id":"2114779","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W252932944","https://openalex.org/W571270299","https://openalex.org/W949353694","https://openalex.org/W1526898963","https://openalex.org/W1534416612","https://openalex.org/W1968257603","https://openalex.org/W1995468345","https://openalex.org/W2043769961","https://openalex.org/W2044404558","https://openalex.org/W2071061952","https://openalex.org/W2090209167","https://openalex.org/W2097573660","https://openalex.org/W2102759440","https://openalex.org/W2139259377","https://openalex.org/W2144664023","https://openalex.org/W2150970357","https://openalex.org/W2167949116","https://openalex.org/W2263466419","https://openalex.org/W2810970432","https://openalex.org/W2911660332","https://openalex.org/W3095432739","https://openalex.org/W3118322661","https://openalex.org/W3205581959","https://openalex.org/W4231270807","https://openalex.org/W6788615442"],"related_works":["https://openalex.org/W3080875783","https://openalex.org/W1978042415","https://openalex.org/W3086542228","https://openalex.org/W2017331178","https://openalex.org/W2144865661","https://openalex.org/W2322023032","https://openalex.org/W4324324100","https://openalex.org/W1871156538","https://openalex.org/W2980075598","https://openalex.org/W1981508782"],"abstract_inverted_index":{"This":[0],"paper":[1],"addresses":[2],"the":[3,34,38,42,73,77,81,84,99,106,110,114,118,124,129,134,158,162,168,174,181],"degraded":[4],"discrete-time":[5],"Poisson":[6],"wiretap":[7],"channel":[8,107,130,164],"(DT-PWC)":[9],"in":[10,64,80,123],"an":[11],"optical":[12],"wireless":[13],"communication":[14],"system":[15],"based":[16],"on":[17,72],"intensity":[18,86,183],"modulation":[19],"and":[20,28,37,113,152,161],"direct":[21],"detection":[22],"(IM-DD).":[23],"Subject":[24],"to":[25,90,95,138],"nonnegativity,":[26],"average-intensity,":[27],"bandwidth":[29],"constraints,":[30],"we":[31,69,102,171],"find":[32],"that":[33,173],"secrecy":[35,78,119,135,175],"capacity":[36,79,120,136,176],"entire":[39],"boundary":[40],"of":[41,55,76,109],"rate-equivocation":[43],"region":[44],"are":[45,116,132,157],"attained":[46],"by":[47],"discrete":[48],"distributions":[49],"with":[50,59,180],"a":[51,140],"countably":[52],"infinite":[53],"number":[54],"mass":[56,62],"points,":[57],"but":[58],"finitely":[60],"many":[61],"points":[63],"any":[65],"bounded":[66],"interval.":[67],"Additionally,":[68],"shed":[70],"light":[71],"asymptotic":[74],"behavior":[75],"regimes":[82],"where":[83,147],"average":[85,182],"constraint":[87],"either":[88],"tends":[89,94],"zero":[91],"(low-intensity)":[92],"or":[93],"infinity":[96],"(high-intensity).":[97],"In":[98,167],"low-intensity":[100],"regime,":[101,170],"observe":[103],"that:":[104],"when":[105,128],"gains":[108,131],"legitimate":[111,159],"receiver":[112],"eavesdropper":[115],"identical,":[117],"scales":[121],"linearly":[122],"average-intensity":[125],"\u03b5;":[126],"whereas":[127],"different,":[133],"scales,":[137],"within":[139],"constant,":[141],"like":[142],"<tex":[143],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[144,150,155],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$(\\alpha_{B}-\\alpha_{E})\\mathcal{E}\\log\\log\\frac{1}{\\mathcal{E}}$</tex>":[145],",":[146],"\u03b1":[148,153],"<inf":[149,154],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">B</inf>":[151],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">E</inf>":[156],"receiver's":[160],"eavesdropper's":[163],"gains,":[165],"respectively.":[166],"high-intensity":[169],"establish":[172],"does":[177],"not":[178],"scale":[179],"constraint.":[184]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
