{"id":"https://openalex.org/W4289655405","doi":"https://doi.org/10.1109/isit50566.2022.9834421","title":"Encoding Individual Sequences for the Wiretap Channel","display_name":"Encoding Individual Sequences for the Wiretap Channel","publication_year":2022,"publication_date":"2022-06-26","ids":{"openalex":"https://openalex.org/W4289655405","doi":"https://doi.org/10.1109/isit50566.2022.9834421"},"language":"en","primary_location":{"id":"doi:10.1109/isit50566.2022.9834421","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834421","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028774270","display_name":"Neri Merhav","orcid":"https://orcid.org/0000-0002-9547-3243"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Neri Merhav","raw_affiliation_strings":["Technion &#x2013; Israel Institute of Technology,The Viterbi Faculty of Electrical and Computer Engineering,Haifa,Israel,3200003"],"affiliations":[{"raw_affiliation_string":"Technion &#x2013; Israel Institute of Technology,The Viterbi Faculty of Electrical and Computer Engineering,Haifa,Israel,3200003","institution_ids":["https://openalex.org/I174306211"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5028774270"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":0.3222,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.37425905,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1046","last_page":"1051"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.7597805261611938},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.7339538335800171},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6780388355255127},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6123676300048828},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.6091287136077881},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6034054160118103},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5694968104362488},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.5470954775810242},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.48483550548553467},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4798140525817871},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4671967029571533},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.45727092027664185},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4483189582824707},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4103914201259613},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.345312237739563},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3030646741390228},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23813366889953613},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16189447045326233},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.1537092626094818},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12603309750556946},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10134628415107727}],"concepts":[{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.7597805261611938},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.7339538335800171},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6780388355255127},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6123676300048828},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.6091287136077881},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6034054160118103},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5694968104362488},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.5470954775810242},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.48483550548553467},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4798140525817871},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4671967029571533},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.45727092027664185},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4483189582824707},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4103914201259613},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.345312237739563},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3030646741390228},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23813366889953613},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16189447045326233},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.1537092626094818},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12603309750556946},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10134628415107727},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit50566.2022.9834421","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834421","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1492657530","https://openalex.org/W1965765268","https://openalex.org/W1992214737","https://openalex.org/W2043769961","https://openalex.org/W2049651362","https://openalex.org/W2087075202","https://openalex.org/W2111971725","https://openalex.org/W2115591228","https://openalex.org/W2115613211","https://openalex.org/W2122962290","https://openalex.org/W2127140374","https://openalex.org/W2128153585","https://openalex.org/W2135145724","https://openalex.org/W2136864990","https://openalex.org/W2144007657","https://openalex.org/W2145518237","https://openalex.org/W2155857058","https://openalex.org/W2168585224","https://openalex.org/W2515533255","https://openalex.org/W2763740675","https://openalex.org/W3099067207","https://openalex.org/W4200050154"],"related_works":["https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2022046490","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2898567960","https://openalex.org/W4387963661","https://openalex.org/W4293878105","https://openalex.org/W2340481533","https://openalex.org/W2036210457"],"abstract_inverted_index":{"We":[0],"consider":[1],"the":[2,11,42,46,50,54,59,62,78,83,95,108,114,123,130,134,137,157,163],"problem":[3],"of":[4,41,56,58,99,156],"encoding":[5],"an":[6],"individual":[7,150],"source":[8,44],"sequence":[9,160],"for":[10,34,77,104],"degraded":[12],"wiretap":[13,79],"channel":[14,75],"using":[15],"encoders":[16],"and":[17,36,53,61,152],"decoders":[18],"that":[19,82],"can":[20],"be":[21],"implemented":[22],"as":[23],"finite\u2013state":[24],"machines.":[25],"Our":[26],"first":[27],"main":[28,131],"result":[29],"is":[30,66,86,120,148],"a":[31,91,143,153],"converse":[32],"bound":[33,65,85,93,118],"reliable":[35],"secure":[37],"transmission":[38],"in":[39,110],"terms":[40],"given":[43],"sequence,":[45,146,151],"bandwidth":[47],"expansion":[48],"factor,":[49],"secrecy":[51],"capacity,":[52],"numbers":[55],"states":[57],"encoder":[60,109],"decoder.":[63],"The":[64],"asymptotically":[67],"achievable":[68],"by":[69,73,122],"Lempel\u2013Ziv":[70],"compression":[71],"followed":[72],"good":[74],"coding":[76],"channel.":[80],"Given":[81],"lower":[84,92],"saturated,":[87],"we":[88,128],"also":[89],"derive":[90],"on":[94],"minimum":[96],"necessary":[97],"rate":[98],"purely":[100],"random":[101],"bits":[102],"needed":[103],"local":[105],"randomness":[106],"at":[107],"order":[111],"to":[112,133,142,162],"meet":[113],"security":[115],"constraint.":[116],"This":[117],"too":[119],"achieved":[121],"same":[124],"achievability":[125],"scheme.":[126],"Finally,":[127],"extend":[129],"results":[132],"case":[135],"where":[136],"legitimate":[138],"decoder":[139],"has":[140],"access":[141],"side":[144,158],"information":[145,159],"which":[147],"another":[149],"noisy":[154],"version":[155],"leaks":[161],"wiretapper.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
