{"id":"https://openalex.org/W3198039321","doi":"https://doi.org/10.1109/isit45174.2021.9518256","title":"Secure Network Function Computation","display_name":"Secure Network Function Computation","publication_year":2021,"publication_date":"2021-07-12","ids":{"openalex":"https://openalex.org/W3198039321","doi":"https://doi.org/10.1109/isit45174.2021.9518256","mag":"3198039321"},"language":"en","primary_location":{"id":"doi:10.1109/isit45174.2021.9518256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9518256","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027528912","display_name":"Xuan Guang","orcid":"https://orcid.org/0000-0002-0928-421X"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I4401200345","display_name":"Laboratoire de physique de la mati\u00e8re condens\u00e9e","ror":"https://ror.org/05brss208","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I4401200345","https://openalex.org/I4647051"]}],"countries":["CN","FR"],"is_corresponding":true,"raw_author_name":"Xuan Guang","raw_affiliation_strings":["School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China","School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279","https://openalex.org/I4401200345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039309279","display_name":"Yang Bai","orcid":"https://orcid.org/0000-0002-1037-3973"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I4401200345","display_name":"Laboratoire de physique de la mati\u00e8re condens\u00e9e","ror":"https://ror.org/05brss208","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I4401200345","https://openalex.org/I4647051"]}],"countries":["CN","FR"],"is_corresponding":false,"raw_author_name":"Yang Bai","raw_affiliation_strings":["School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China","School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279","https://openalex.org/I4401200345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038760786","display_name":"Raymond W. Yeung","orcid":"https://orcid.org/0000-0001-7386-4027"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Raymond W. Yeung","raw_affiliation_strings":["Institute of Network Coding, The Chinese University of Hong Kong,Department of Information Engineering,Hong Kong SAR,China","Department of Information Engineering, Institute of Network Coding, The Chinese University of Hong Kong, Hong Kong SAR, China","Centre for Perceptual and Interactive Intelligence (CPII) Ltd"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, The Chinese University of Hong Kong,Department of Information Engineering,Hong Kong SAR,China","institution_ids":["https://openalex.org/I177725633"]},{"raw_affiliation_string":"Department of Information Engineering, Institute of Network Coding, The Chinese University of Hong Kong, Hong Kong SAR, China","institution_ids":["https://openalex.org/I177725633"]},{"raw_affiliation_string":"Centre for Perceptual and Interactive Intelligence (CPII) Ltd","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027528912"],"corresponding_institution_ids":["https://openalex.org/I205237279","https://openalex.org/I4401200345"],"apc_list":null,"apc_paid":null,"fwci":0.4773,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67062576,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"66","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6478121280670166},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.6143226027488708},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.5571178197860718},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5333260297775269},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.5252981781959534},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.48827433586120605},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.48642802238464355},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4421481192111969},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.41815757751464844},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.40933725237846375},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3528887927532196},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33037814497947693},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2793607711791992},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19720777869224548},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.079914391040802}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6478121280670166},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.6143226027488708},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.5571178197860718},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5333260297775269},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.5252981781959534},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.48827433586120605},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.48642802238464355},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4421481192111969},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.41815757751464844},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.40933725237846375},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3528887927532196},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33037814497947693},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2793607711791992},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19720777869224548},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.079914391040802},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit45174.2021.9518256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9518256","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1655926111","display_name":null,"funder_award_id":"20JCYBJC01390","funder_id":"https://openalex.org/F4320323993","funder_display_name":"Natural Science Foundation of Tianjin City"},{"id":"https://openalex.org/G3179852935","display_name":null,"funder_award_id":"61771259","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323993","display_name":"Natural Science Foundation of Tianjin City","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2006947308","https://openalex.org/W2035908129","https://openalex.org/W2109394932","https://openalex.org/W2129119419","https://openalex.org/W2134804253","https://openalex.org/W2141420453","https://openalex.org/W2169369793","https://openalex.org/W2914714618","https://openalex.org/W2962789451","https://openalex.org/W2963928051","https://openalex.org/W2964259786","https://openalex.org/W2970097841","https://openalex.org/W3098321199"],"related_works":["https://openalex.org/W2083701517","https://openalex.org/W2082804893","https://openalex.org/W2539281752","https://openalex.org/W2382527959","https://openalex.org/W87038205","https://openalex.org/W2550686250","https://openalex.org/W2166322483","https://openalex.org/W2069340834","https://openalex.org/W3152465837","https://openalex.org/W2125679084"],"abstract_inverted_index":{"In":[0,13,112],"this":[1,14,102,106,118],"paper,":[2,114],"we":[3,115,161,226],"put":[4],"forward":[5],"the":[6,21,79,84,98,113,125,136,146,156,163,175,181,201,219,230],"model":[7,120],"of":[8,19,66,73,82,97,133],"secure":[9,70,75,103,119,157,176,196,231],"network":[10,43,76,137,197,235],"function":[11,86],"computation.":[12],"model,":[15],"a":[16,38,42,48,63,74,140,151,190,195,238],"target":[17,85],"function,":[18],"which":[20],"inputs":[22],"are":[23,206],"generated":[24],"at":[25,37],"multiple":[26],"source":[27],"nodes,":[28],"is":[29,78,109,171],"required":[30],"to":[31,129,139,144],"be":[32,88],"computed":[33,90],"with":[34,91,105,124,180],"zero":[35,92],"error":[36,93],"sink":[39],"node":[40],"over":[41],"while":[44],"being":[45,127],"protected":[46],"from":[47],"wiretapper":[49,126],"who":[50],"can":[51,87,227],"access":[52],"any":[53,131],"one":[54,59,95],"but":[55,211],"not":[56,212],"more":[57],"than":[58],"wiretap":[60,67],"set":[61],"in":[62,135,214],"given":[64],"collection":[65],"sets.":[68],"The":[69],"computing":[71,158,177,182,232],"rate":[72],"code":[77],"average":[80],"number":[81],"times":[83],"securely":[89],"for":[94,121,167,208],"use":[96],"network.":[99],"However,":[100],"characterizing":[101],"capacity":[104,178,183,233],"general":[107],"setup":[108],"overwhelmingly":[110],"difficult.":[111],"only":[116],"consider":[117],"linear":[122],"functions":[123],"able":[128],"eavesdrop":[130],"subset":[132],"edges":[134],"up":[138],"certain":[141,239],"size,":[142],"referred":[143],"as":[145],"security":[147,185],"level.":[148],"We":[149,187],"prove":[150],"non-trivial":[152],"upper":[153,202,220],"bound":[154,192],"on":[155,174],"capacity.":[159],"Also,":[160],"discover":[162],"surprising":[164],"fact":[165],"that":[166],"some":[168,209],"models,":[169],"there":[170],"no":[172],"penalty":[173],"compared":[179],"without":[184],"consideration.":[186],"further":[188],"present":[189],"lower":[191,204,222],"by":[193,217],"designing":[194],"coding":[198],"scheme.":[199],"Both":[200],"and":[203,221],"bounds":[205,223],"tight":[207,213],"cases":[210],"general.":[215],"Finally,":[216],"comparing":[218],"thus":[224],"obtained,":[225],"exactly":[228],"characterize":[229],"when":[234],"topology":[236],"satisfies":[237],"condition.":[240]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
