{"id":"https://openalex.org/W4401693715","doi":"https://doi.org/10.1109/isit57864.2024.10619365","title":"Secure Network Function Computation: Function-Security","display_name":"Secure Network Function Computation: Function-Security","publication_year":2024,"publication_date":"2024-07-07","ids":{"openalex":"https://openalex.org/W4401693715","doi":"https://doi.org/10.1109/isit57864.2024.10619365"},"language":"en","primary_location":{"id":"doi:10.1109/isit57864.2024.10619365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit57864.2024.10619365","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039309279","display_name":"Yang Bai","orcid":"https://orcid.org/0000-0002-1037-3973"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Bai","raw_affiliation_strings":["School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027528912","display_name":"Xuan Guang","orcid":"https://orcid.org/0000-0002-0928-421X"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Guang","raw_affiliation_strings":["School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038760786","display_name":"Raymond W. Yeung","orcid":"https://orcid.org/0000-0001-7386-4027"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Raymond W. Yeung","raw_affiliation_strings":["Institute of Network Coding, The Chinese University of Hong Kong,Department of Information Engineering,Hong Kong SAR,China"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, The Chinese University of Hong Kong,Department of Information Engineering,Hong Kong SAR,China","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039309279"],"corresponding_institution_ids":["https://openalex.org/I205237279"],"apc_list":null,"apc_paid":null,"fwci":0.7326,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72096196,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1514","last_page":"1519"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9624999761581421,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9624999761581421,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6874080896377563},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.6395720839500427},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5072972178459167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3605457842350006},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13932350277900696}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6874080896377563},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.6395720839500427},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5072972178459167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3605457842350006},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13932350277900696},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit57864.2024.10619365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit57864.2024.10619365","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"In":[0,17,128],"this":[1,18,118,122,129,133],"paper,":[2,130],"we":[3,131,216,252],"put":[4],"forward":[5],"the":[6,14,25,85,99,104,114,138,142,153,171,181,200,205,213,222,228,241,265,275,285,288],"problem":[7],"of":[8,23,70,84,92,102,113,248],"secure":[9,89,94,119,134,182,242,249,276,289],"network":[10,96,190],"function":[11,83,106,140,144,229],"computation":[12],"under":[13],"function-security":[15],"constraint.":[16],"model,":[19],"a":[20,45,49,52,67,81,93,149,163,176,235,246],"target":[21,82,105,139],"function,":[22],"which":[24,137,185],"inputs":[26],"are":[27,145],"generated":[28],"at":[29,44],"multiple":[30],"source":[31,34,86],"nodes":[32],"as":[33,170],"messages,":[35],"is":[36,73,98,125,186,258,282],"required":[37],"to":[38,76,147,162,169,188,204,264],"be":[39,108,148,231],"computed":[40,110,233],"with":[41,121,234,284],"zero":[42],"error":[43],"sink":[46],"node":[47],"over":[48],"network,":[50],"while":[51],"wiretapper,":[53],"who":[54],"can":[55,107,155,230],"access":[56],"any":[57,78,157],"one":[58,63,158],"but":[59],"not":[60,74],"more":[61],"than":[62,261],"wiretap":[64,71],"set":[65],"in":[66,136],"given":[68],"collection":[69],"sets,":[72],"allowed":[75],"obtain":[77,175,217],"information":[79],"about":[80],"messages.":[87],"The":[88],"computing":[90,183,206,243,277,290],"rate":[91],"function-computing":[95],"code":[97],"average":[100],"number":[101],"times":[103],"securely":[109,232],"per":[111],"use":[112],"network.":[115],"However,":[116],"characterizing":[117],"capacity":[120,207,244,278],"general":[123],"setup":[124],"overwhelmingly":[126],"difficult.":[127],"consider":[132],"model":[135],"and":[141,152,192,238,294],"security":[143,172,194,209,224],"identical":[146],"linear":[150],"function;":[151],"wiretapper":[154],"eavesdrop":[156],"edge":[159],"subset":[160],"up":[161],"size":[164],"<tex":[165,197],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[166,198],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$r$</tex>,":[167],"referred":[168],"level.":[173],"We":[174],"non-trivial":[177],"upper":[178,201,214,219,256,266],"bound":[179,202,220,257,267],"on":[180,221,274],"capacity,":[184],"applicable":[187],"arbitrary":[189,193],"topologies":[191],"levels.":[195],"When":[196],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$r=0$</tex>,":[199],"reduces":[203],"without":[208],"consideration.":[210],"By":[211],"applying":[212],"bound,":[215],"an":[218],"maximum":[223],"level":[225],"such":[226],"that":[227,254],"positive":[236],"rate,":[237],"fully":[239],"characterize":[240],"for":[245,279,292],"class":[247],"models.":[250],"Finally,":[251],"prove":[253],"our":[255],"always":[259],"larger":[260],"or":[262],"equal":[263],"previously":[268],"obtained":[269],"by":[270],"Guang":[271],"et":[272],"al.":[273],"source-security.":[280],"This":[281],"consistent":[283],"relation":[286],"between":[287],"capacities":[291],"source-security":[293],"function-security.":[295]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
