{"id":"https://openalex.org/W4289655289","doi":"https://doi.org/10.1109/isit50566.2022.9834772","title":"Partial Encryption after Encoding for Security and Reliability in Data Systems","display_name":"Partial Encryption after Encoding for Security and Reliability in Data Systems","publication_year":2022,"publication_date":"2022-06-26","ids":{"openalex":"https://openalex.org/W4289655289","doi":"https://doi.org/10.1109/isit50566.2022.9834772"},"language":"en","primary_location":{"id":"doi:10.1109/isit50566.2022.9834772","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834772","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033417463","display_name":"Alejandro Cohen","orcid":"https://orcid.org/0000-0002-5664-2518"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Alejandro Cohen","raw_affiliation_strings":["Technion,Faculty of Electrical and Computer Engineering,Israel","Faculty of Electrical and Computer Engineering, Technion, Israel"],"affiliations":[{"raw_affiliation_string":"Technion,Faculty of Electrical and Computer Engineering,Israel","institution_ids":["https://openalex.org/I174306211"]},{"raw_affiliation_string":"Faculty of Electrical and Computer Engineering, Technion, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017403407","display_name":"Rafael G. L. D\u2019Oliveira","orcid":"https://orcid.org/0000-0001-5053-5909"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rafael G. L. D\u2019Oliveira","raw_affiliation_strings":["Clemson University,SMSS,USA","SMSS, Clemson University, USA"],"affiliations":[{"raw_affiliation_string":"Clemson University,SMSS,USA","institution_ids":["https://openalex.org/I8078737"]},{"raw_affiliation_string":"SMSS, Clemson University, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042235507","display_name":"Ken R. Duffy","orcid":"https://orcid.org/0000-0001-5587-9356"},"institutions":[{"id":"https://openalex.org/I157286207","display_name":"National University of Ireland, Maynooth","ror":"https://ror.org/048nfjm95","country_code":"IE","type":"education","lineage":["https://openalex.org/I157286207"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Ken R. Duffy","raw_affiliation_strings":["Maynooth University,Hamilton Institute,Ireland","Hamilton Institute, Maynooth University, Ireland"],"affiliations":[{"raw_affiliation_string":"Maynooth University,Hamilton Institute,Ireland","institution_ids":["https://openalex.org/I157286207"]},{"raw_affiliation_string":"Hamilton Institute, Maynooth University, Ireland","institution_ids":["https://openalex.org/I157286207"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075370174","display_name":"Muriel M\u00e9dard","orcid":"https://orcid.org/0000-0003-4059-407X"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Muriel M\u00e9dard","raw_affiliation_strings":["Massachusetts Institute of Technology,RLE,USA","RLE, Massachusetts Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology,RLE,USA","institution_ids":["https://openalex.org/I63966007"]},{"raw_affiliation_string":"RLE, Massachusetts Institute of Technology, USA","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033417463"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":2.3764,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.90607276,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1779","last_page":"1784"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8011685609817505},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.668404221534729},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6584477424621582},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5899800658226013},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5709061622619629},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5324921011924744},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5247650146484375},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.46079355478286743},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.459440141916275},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.45302504301071167},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4195594787597656},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4180670976638794},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3471105694770813},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1994418203830719},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.1610054075717926},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1314077079296112},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07487058639526367}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8011685609817505},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.668404221534729},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6584477424621582},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5899800658226013},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5709061622619629},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5324921011924744},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5247650146484375},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.46079355478286743},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.459440141916275},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.45302504301071167},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4195594787597656},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4180670976638794},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3471105694770813},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1994418203830719},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.1610054075717926},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1314077079296112},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07487058639526367},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit50566.2022.9834772","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834772","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W68293075","https://openalex.org/W949353694","https://openalex.org/W1520041135","https://openalex.org/W1556911442","https://openalex.org/W1572409872","https://openalex.org/W1626922264","https://openalex.org/W1934382092","https://openalex.org/W1963898916","https://openalex.org/W2003932474","https://openalex.org/W2033803521","https://openalex.org/W2125093890","https://openalex.org/W2167638421","https://openalex.org/W2369127983","https://openalex.org/W2608944105","https://openalex.org/W2954103209","https://openalex.org/W2962852249","https://openalex.org/W2997799346","https://openalex.org/W3045960439","https://openalex.org/W3098377107","https://openalex.org/W3122535031","https://openalex.org/W3199186005","https://openalex.org/W3207323274","https://openalex.org/W4200100773","https://openalex.org/W4225244143","https://openalex.org/W4289655289","https://openalex.org/W6602698672","https://openalex.org/W6805190165"],"related_works":["https://openalex.org/W4386242069","https://openalex.org/W3029058925","https://openalex.org/W2015940479","https://openalex.org/W2096211577","https://openalex.org/W4224241849","https://openalex.org/W2363701519","https://openalex.org/W2991416436","https://openalex.org/W2949316140","https://openalex.org/W1565128838","https://openalex.org/W2951404390"],"abstract_inverted_index":{"We":[0],"consider":[1],"the":[2,50,132,135],"problem":[3,22],"of":[4,20,52,63,101,134],"secure":[5,35,86],"and":[6,87,115,147],"reliable":[7],"communication":[8],"over":[9],"a":[10,17,24,61,78,92,98,124],"noisy":[11,66],"multipath":[12],"network.":[13],"Previous":[14],"work":[15],"considering":[16],"noiseless":[18],"version":[19,62],"our":[21],"proposed":[23],"hybrid":[25],"universal":[26],"network":[27,79],"coding":[28,80],"cryptosystem":[29],"(HUNCC).":[30],"By":[31],"combining":[32],"an":[33,53],"information-theoretically":[34],"encoder":[36],"together":[37],"with":[38],"partial":[39],"encryption,":[40],"HUNCC":[41,64],"is":[42,83,97],"able":[43],"to":[44,142],"obtain":[45],"security":[46,94],"guarantees,":[47],"even":[48],"in":[49],"presence":[51],"all-observing":[54],"eavesdropper.":[55],"In":[56],"this":[57],"paper,":[58],"we":[59,76,90,105,122,139],"propose":[60],"for":[65,128,145],"channels":[67],"(N-HUNCC).":[68],"This":[69],"modification":[70],"requires":[71],"four":[72],"main":[73],"novelties.":[74],"First,":[75],"present":[77,123],"construction":[81],"which":[82,96,104,130],"jointly,":[84],"individually":[85],"error-correcting.":[88],"Second,":[89],"introduce":[91],"new":[93],"definition":[95],"computational":[99],"analogue":[100],"individual":[102,107],"security,":[103],"call":[106],"indistinguishability":[108],"under":[109],"chosen":[110],"ciphertext":[111],"attack":[112],"(individual":[113],"IND-CCA1),":[114],"show":[116],"that":[117],"N-HUNCC":[118,146],"satisfies":[119],"it.":[120],"Third,":[121],"noise":[125],"based":[126],"decoder":[127],"N-HUNCC,":[129],"permits":[131],"decoding":[133],"encoded-then-encrypted":[136],"data.":[137],"Finally,":[138],"discuss":[140],"how":[141],"select":[143],"parameters":[144],"its":[148],"error-correcting":[149],"capabilities.":[150]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
