{"id":"https://openalex.org/W4289655406","doi":"https://doi.org/10.1109/isit50566.2022.9834882","title":"An Improved Capacity Bound for Secure Network Function Computation","display_name":"An Improved Capacity Bound for Secure Network Function Computation","publication_year":2022,"publication_date":"2022-06-26","ids":{"openalex":"https://openalex.org/W4289655406","doi":"https://doi.org/10.1109/isit50566.2022.9834882"},"language":"en","primary_location":{"id":"doi:10.1109/isit50566.2022.9834882","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834882","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027528912","display_name":"Xuan Guang","orcid":"https://orcid.org/0000-0002-0928-421X"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I4401200345","display_name":"Laboratoire de physique de la mati\u00e8re condens\u00e9e","ror":"https://ror.org/05brss208","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I4401200345","https://openalex.org/I4647051"]}],"countries":["CN","FR"],"is_corresponding":true,"raw_author_name":"Xuan Guang","raw_affiliation_strings":["Nankai University,School of Mathematical Sciences and LPMC,Tianjin,China","School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Nankai University,School of Mathematical Sciences and LPMC,Tianjin,China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279","https://openalex.org/I4401200345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039309279","display_name":"Yang Bai","orcid":"https://orcid.org/0000-0002-1037-3973"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I4401200345","display_name":"Laboratoire de physique de la mati\u00e8re condens\u00e9e","ror":"https://ror.org/05brss208","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I4401200345","https://openalex.org/I4647051"]}],"countries":["CN","FR"],"is_corresponding":false,"raw_author_name":"Yang Bai","raw_affiliation_strings":["Nankai University,School of Mathematical Sciences and LPMC,Tianjin,China","School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Nankai University,School of Mathematical Sciences and LPMC,Tianjin,China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279","https://openalex.org/I4401200345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038760786","display_name":"Raymond W. Yeung","orcid":"https://orcid.org/0000-0001-7386-4027"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Raymond W. Yeung","raw_affiliation_strings":["The Chinese University of Hong Kong,Institute of Network Coding and Department of Information Engineering,Hong Kong SAR,China","Principal Investigator of the Centre for Perceptual and Interactive Intelligence (CPII) Ltd","Institute of Network Coding and Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong SAR, China"],"affiliations":[{"raw_affiliation_string":"The Chinese University of Hong Kong,Institute of Network Coding and Department of Information Engineering,Hong Kong SAR,China","institution_ids":["https://openalex.org/I177725633"]},{"raw_affiliation_string":"Principal Investigator of the Centre for Perceptual and Interactive Intelligence (CPII) Ltd","institution_ids":[]},{"raw_affiliation_string":"Institute of Network Coding and Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong SAR, China","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027528912"],"corresponding_institution_ids":["https://openalex.org/I205237279","https://openalex.org/I4401200345"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07689099,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1022","last_page":"1027"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.7918914556503296},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6105813384056091},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.575570285320282},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5685685873031616},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5624274015426636},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.4415377974510193},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4186725616455078},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36015141010284424},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3324170708656311},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30202609300613403},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1669175624847412},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.16640496253967285}],"concepts":[{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.7918914556503296},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6105813384056091},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.575570285320282},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5685685873031616},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5624274015426636},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.4415377974510193},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4186725616455078},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36015141010284424},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3324170708656311},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30202609300613403},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1669175624847412},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.16640496253967285},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit50566.2022.9834882","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834882","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2006947308","https://openalex.org/W2035908129","https://openalex.org/W2106570206","https://openalex.org/W2109394932","https://openalex.org/W2129119419","https://openalex.org/W2134804253","https://openalex.org/W2141420453","https://openalex.org/W2152303628","https://openalex.org/W2169369793","https://openalex.org/W2557793327","https://openalex.org/W2914714618","https://openalex.org/W2962789451","https://openalex.org/W2963928051","https://openalex.org/W2964259786","https://openalex.org/W2970097841","https://openalex.org/W3045242109","https://openalex.org/W3198039321"],"related_works":["https://openalex.org/W2130966263","https://openalex.org/W2092179621","https://openalex.org/W4312405462","https://openalex.org/W2025002027","https://openalex.org/W2130341600","https://openalex.org/W2347013755","https://openalex.org/W2570075532","https://openalex.org/W2071483494","https://openalex.org/W55330191","https://openalex.org/W2006786627"],"abstract_inverted_index":{"The":[0,73],"problem":[1],"of":[2,34,63,77,87,99,121,226,233,250],"secure":[3,74,79,143,216,244],"network":[4,11,81,151,228],"function":[5,32,91,199],"computation":[6],"over":[7],"a":[8,19,21,30,45,60,78,125,187,205,211,248],"directed":[9],"acyclic":[10],"is":[12,83,147,162],"investigated":[13],"in":[14,59,108,224],"this":[15],"paper.":[16],"In":[17,102],"such":[18,196],"network,":[20],"sink":[22],"node":[23],"desires":[24],"to":[25,124,130,149,164,171],"compute":[26],"with":[27,113,204,238],"zero":[28],"error":[29],"target":[31,90],"f,":[33],"which":[35,146],"the":[36,70,84,89,100,103,114,132,142,158,172,181,192,198,215,227,231,234,239,243],"inputs":[37],"are":[38,106],"generated":[39],"at":[40],"multiple":[41],"source":[42,71],"nodes,":[43],"while":[44],"wiretapper,":[46],"who":[47,116],"can":[48,92,117,200,253],"access":[49],"any":[50,119],"one":[51,56,97],"but":[52],"not":[53],"more":[54],"than":[55],"wiretap":[57,64],"set":[58],"given":[61],"collection":[62],"sets,":[65],"obtains":[66],"no":[67],"information":[68],"about":[69],"inputs.":[72],"computing":[75,110,144,173,217,245],"rate":[76],"function-computing":[80],"code":[82],"average":[85],"number":[86],"times":[88],"be":[93,201,254],"securely":[94,109,202],"computed":[95,203],"for":[96,247],"use":[98],"network.":[101],"paper,":[104],"we":[105,185],"interested":[107],"linear":[111],"functions":[112],"wiretapper":[115],"eavesdrop":[118],"subset":[120],"edges":[122],"up":[123],"certain":[126],"size":[127],"r,":[128],"referred":[129],"as":[131],"security":[133,155,159,176,194,251],"level.":[134],"We":[135,208],"obtain":[136,186],"an":[137],"improved":[138,167,182,240],"upper":[139,168,183,189,241],"bound":[140,169,190,213],"on":[141,191,214,230],"capacity,":[145],"applicable":[148],"arbitrary":[150,154],"topologies":[152],"and":[153,219],"levels.":[156],"When":[157],"level":[160,195],"r":[161],"equal":[163],"0,":[165],"our":[166],"reduces":[170],"capacity":[174,218,246],"without":[175],"consideration.":[177],"Furthermore,":[178],"by":[179],"applying":[180],"bound,":[184,242],"non-trivial":[188],"maximum":[193],"that":[197],"positive":[206],"rate.":[207],"also":[209],"present":[210],"lower":[212,235],"give":[220],"some":[221],"sufficient":[222],"conditions":[223],"terms":[225],"topology":[229],"tightness":[232],"bound.":[236],"Together":[237],"class":[249],"models":[252],"fully":[255],"characterized.":[256]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
