{"id":"https://openalex.org/W4415367232","doi":"https://doi.org/10.1109/isit63088.2025.11195579","title":"Linear Function-Computing Secure Network Coding","display_name":"Linear Function-Computing Secure Network Coding","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4415367232","doi":"https://doi.org/10.1109/isit63088.2025.11195579"},"language":null,"primary_location":{"id":"doi:10.1109/isit63088.2025.11195579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195579","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039309279","display_name":"Yang Bai","orcid":"https://orcid.org/0000-0002-1037-3973"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Bai","raw_affiliation_strings":["School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027528912","display_name":"Xuan Guang","orcid":"https://orcid.org/0000-0002-0928-421X"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Guang","raw_affiliation_strings":["School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University,Tianjin,China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038760786","display_name":"Raymond W. Yeung","orcid":"https://orcid.org/0000-0001-7386-4027"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Raymond W. Yeung","raw_affiliation_strings":["Institute of Network Coding, The Chinese University of Hong Kong,Department of Information Engineering,Hong Kong SAR,China"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, The Chinese University of Hong Kong,Department of Information Engineering,Hong Kong SAR,China","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039309279"],"corresponding_institution_ids":["https://openalex.org/I205237279"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34526551,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9498000144958496,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9294000267982483,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.5684999823570251},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5331000089645386},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5013999938964844},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4088999927043915},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.38580000400543213},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.3716000020503998},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.33550000190734863},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.32659998536109924}],"concepts":[{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.5684999823570251},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5534999966621399},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5331000089645386},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5013999938964844},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44190001487731934},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.430400013923645},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4088999927043915},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.38580000400543213},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.38530001044273376},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.3716000020503998},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.33550000190734863},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.32659998536109924},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.325300008058548},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.2881999909877777},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.28189998865127563},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.27880001068115234},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.2703999876976013},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.26030001044273376},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.259799987077713},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.259799987077713},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.25679999589920044},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.2535000145435333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit63088.2025.11195579","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195579","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3490976664","display_name":null,"funder_award_id":"2023YFA1009604","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6702043997","display_name":null,"funder_award_id":"050-63253087","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G6984540029","display_name":null,"funder_award_id":"62171238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2005007104","https://openalex.org/W2006947308","https://openalex.org/W2035908129","https://openalex.org/W2106570206","https://openalex.org/W2109394932","https://openalex.org/W2123976939","https://openalex.org/W2129119419","https://openalex.org/W2134804253","https://openalex.org/W2136395129","https://openalex.org/W2141420453","https://openalex.org/W2152303628","https://openalex.org/W2169369793","https://openalex.org/W2224360947","https://openalex.org/W2557793327","https://openalex.org/W2914714618","https://openalex.org/W2962789451","https://openalex.org/W2963928051","https://openalex.org/W2963944130","https://openalex.org/W2964259786","https://openalex.org/W2970097841","https://openalex.org/W3045242109","https://openalex.org/W4387092849","https://openalex.org/W4388018901","https://openalex.org/W4401693715"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,85,105,152],"consider":[4],"code":[5],"construction":[6,155],"for":[7,132,135,196],"the":[8,34,66,81,94,100,112,119,124,136,169,175,182,193,200,203],"model":[9],"of":[10,37,80,111,138,148,156,179,199],"secure":[11,141,159,170],"network":[12,142,160,201],"function":[13,79,96,114,184],"computation,":[14],"where":[15],"in":[16],"a":[17,21,29,46,57,77,154,165],"directed":[18],"acyclic":[19],"network,":[20],"sink":[22,194],"node":[23,195],"is":[24,69,97,122],"required":[25],"to":[26,56,64,72,99,107,118],"correctly":[27],"compute":[28],"linear":[30,139,157],"function,":[31,36,102],"regarded":[32],"as":[33,65,174],"target":[35,101,113,183],"source":[38,43,82],"messages":[39],"generated":[40],"at":[41,192],"multiple":[42],"nodes;":[44],"while":[45],"wiretapper,":[47,120],"who":[48],"can":[49,185],"access":[50],"any":[51,74,109],"one":[52,197],"edge":[53],"subset":[54],"up":[55],"certain":[58],"size":[59],"<tex":[60],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[61],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$r$</tex>,":[62],"referred":[63],"security":[67,78,95,134],"level,":[68],"not":[70],"allowed":[71],"obtain":[73,164],"information":[75,110],"about":[76],"messages.":[83],"Here,":[84],"focus":[86],"on":[87,168],"an":[88,129,145],"interesting":[89],"and":[90,162],"important":[91],"case":[92],"that":[93,104,181],"identical":[98],"namely":[103],"need":[106],"protect":[108],"from":[115,144],"being":[116],"leaked":[117],"which":[121],"called":[123],"target-function":[125],"security.":[126],"We":[127],"prove":[128],"equivalent":[130],"condition":[131],"targetfunction":[133],"existence":[137],"function-computing":[140,158],"codes":[143,161],"algebraic":[146],"point":[147],"view.":[149],"With":[150],"this,":[151],"develop":[153],"thus":[163],"lower":[166],"bound":[167],"computing":[171],"capacity,":[172],"defined":[173],"maximum":[176],"average":[177],"number":[178],"times":[180],"be":[186],"securely":[187],"computed":[188],"with":[189],"zero":[190],"error":[191],"use":[198],"under":[202],"target-function-security":[204],"constraint.":[205]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-21T00:00:00"}
