{"id":"https://openalex.org/W2052246579","doi":"https://doi.org/10.1109/itw.2012.6404702","title":"Expurgation exponent of leaked information in privacy amplification for binary sources","display_name":"Expurgation exponent of leaked information in privacy amplification for binary sources","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W2052246579","doi":"https://doi.org/10.1109/itw.2012.6404702","mag":"2052246579"},"language":"en","primary_location":{"id":"doi:10.1109/itw.2012.6404702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2012.6404702","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Information Theory Workshop","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1208.3017","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045523488","display_name":"Shun Watanabe","orcid":"https://orcid.org/0000-0002-1121-8633"},"institutions":[{"id":"https://openalex.org/I922474255","display_name":"Tokushima University","ror":"https://ror.org/044vy1d05","country_code":"JP","type":"education","lineage":["https://openalex.org/I922474255"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Shun Watanabe","raw_affiliation_strings":["Department of Information Science and Intelligent Systems, University of Tokushima, Tokushima, Japan","Dept. of Information Science & Intelligent Systems, Univ. of Tokushima, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Intelligent Systems, University of Tokushima, Tokushima, Japan","institution_ids":["https://openalex.org/I922474255"]},{"raw_affiliation_string":"Dept. of Information Science & Intelligent Systems, Univ. of Tokushima, Japan","institution_ids":["https://openalex.org/I922474255"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5045523488"],"corresponding_institution_ids":["https://openalex.org/I922474255"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11466422,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3788","issue":null,"first_page":"401","last_page":"405"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exponent","display_name":"Exponent","score":0.8733903169631958},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.7007970213890076},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.6866979598999023},{"id":"https://openalex.org/keywords/binary-erasure-channel","display_name":"Binary erasure channel","score":0.5702747702598572},{"id":"https://openalex.org/keywords/binary-symmetric-channel","display_name":"Binary symmetric channel","score":0.5141699314117432},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.50407874584198},{"id":"https://openalex.org/keywords/binary-code","display_name":"Binary code","score":0.5015947818756104},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.49425721168518066},{"id":"https://openalex.org/keywords/statistical-physics","display_name":"Statistical physics","score":0.46346914768218994},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4452280104160309},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3449839651584625},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3346913754940033},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3342069387435913},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3273603916168213},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.31273847818374634},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.23604971170425415},{"id":"https://openalex.org/keywords/channel-code","display_name":"Channel code","score":0.17444899678230286},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14717420935630798},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.14316070079803467},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09761804342269897},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.07883211970329285}],"concepts":[{"id":"https://openalex.org/C2780388253","wikidata":"https://www.wikidata.org/wiki/Q5421508","display_name":"Exponent","level":2,"score":0.8733903169631958},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.7007970213890076},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.6866979598999023},{"id":"https://openalex.org/C149862233","wikidata":"https://www.wikidata.org/wiki/Q864142","display_name":"Binary erasure channel","level":4,"score":0.5702747702598572},{"id":"https://openalex.org/C173988684","wikidata":"https://www.wikidata.org/wiki/Q863510","display_name":"Binary symmetric channel","level":4,"score":0.5141699314117432},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.50407874584198},{"id":"https://openalex.org/C63435697","wikidata":"https://www.wikidata.org/wiki/Q864135","display_name":"Binary code","level":3,"score":0.5015947818756104},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.49425721168518066},{"id":"https://openalex.org/C121864883","wikidata":"https://www.wikidata.org/wiki/Q677916","display_name":"Statistical physics","level":1,"score":0.46346914768218994},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4452280104160309},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3449839651584625},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3346913754940033},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3342069387435913},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3273603916168213},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.31273847818374634},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.23604971170425415},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.17444899678230286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14717420935630798},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.14316070079803467},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09761804342269897},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.07883211970329285},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/itw.2012.6404702","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2012.6404702","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Information Theory Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1208.3017","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1208.3017","pdf_url":"https://arxiv.org/pdf/1208.3017","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1208.3017","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1208.3017","pdf_url":"https://arxiv.org/pdf/1208.3017","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1514518704","https://openalex.org/W1968720171","https://openalex.org/W1977495965","https://openalex.org/W1989008275","https://openalex.org/W1993944611","https://openalex.org/W2029358194","https://openalex.org/W2052207834","https://openalex.org/W2057756383","https://openalex.org/W2088587246","https://openalex.org/W2096667287","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2118776409","https://openalex.org/W2124602541","https://openalex.org/W2127276562","https://openalex.org/W2140451802","https://openalex.org/W2142901448","https://openalex.org/W2144387589","https://openalex.org/W2148587342","https://openalex.org/W2150154572","https://openalex.org/W2154300278","https://openalex.org/W2154832352","https://openalex.org/W2163497720","https://openalex.org/W2167651408","https://openalex.org/W2296319761","https://openalex.org/W2566990659","https://openalex.org/W2914714618","https://openalex.org/W2964225968","https://openalex.org/W3103199889","https://openalex.org/W3103409729","https://openalex.org/W4233910079","https://openalex.org/W4243863998","https://openalex.org/W4246601643","https://openalex.org/W4250589301"],"related_works":["https://openalex.org/W2139769859","https://openalex.org/W2140357074","https://openalex.org/W2002203372","https://openalex.org/W2502955786","https://openalex.org/W2113562070","https://openalex.org/W2583282232","https://openalex.org/W2028268383","https://openalex.org/W2372190485","https://openalex.org/W3103136794","https://openalex.org/W2921963466"],"abstract_inverted_index":{"We":[0],"investigate":[1],"the":[2,11,32,37,48,52,56,63,69],"privacy":[3,70],"amplification":[4],"problem":[5],"in":[6,68,76],"which":[7,72],"Eve":[8],"can":[9],"observe":[10],"uniform":[12],"binary":[13,17,23],"source":[14],"through":[15],"a":[16,22],"erasure":[18],"channel":[19,25],"(BEC)":[20],"or":[21],"symmetric":[24],"(BSC).":[26],"For":[27],"this":[28],"problem,":[29],"we":[30],"derive":[31],"so-called":[33],"expurgation":[34],"exponent":[35,43,82,87],"of":[36,55],"information":[38,50],"leaked":[39,49],"to":[40,51],"Eve.":[41],"The":[42,80],"is":[44,60,73,83],"derived":[45,81,89],"by":[46,62,90],"relating":[47],"error":[53],"probability":[54],"linear":[57,64],"code":[58],"that":[59],"generated":[61],"hash":[65],"function":[66],"used":[67],"amplification,":[71],"also":[74],"interesting":[75],"its":[77],"own":[78],"right.":[79],"larger":[84],"than":[85],"state-of-the-art":[86],"recently":[88],"Hayashi":[91],"at":[92],"low":[93],"rate.":[94]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2016-06-24T00:00:00"}
