{"id":"https://openalex.org/W3215009688","doi":"https://doi.org/10.1109/itw48936.2021.9611419","title":"Secret Key Capacity of Wiretapped Polytree-PIN","display_name":"Secret Key Capacity of Wiretapped Polytree-PIN","publication_year":2021,"publication_date":"2021-10-17","ids":{"openalex":"https://openalex.org/W3215009688","doi":"https://doi.org/10.1109/itw48936.2021.9611419","mag":"3215009688"},"language":"en","primary_location":{"id":"doi:10.1109/itw48936.2021.9611419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw48936.2021.9611419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035170010","display_name":"Alireza Poostindouz","orcid":"https://orcid.org/0000-0002-3221-472X"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Alireza Poostindouz","raw_affiliation_strings":["University of Calgary,Canada","University of Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary,Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"University of Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["University of Calgary,Canada","University of Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary,Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"University of Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035170010"],"corresponding_institution_ids":["https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1418659,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6364484429359436},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6316630840301514},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6001940965652466},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5796509385108948},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.5134664177894592},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.46732014417648315},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4515204131603241},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44814300537109375},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4379059076309204},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.43500852584838867},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.42379286885261536},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4197329580783844},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.37957218289375305},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3607921004295349},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3497602343559265},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3008599281311035},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2858962118625641},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.1528666913509369}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6364484429359436},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6316630840301514},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6001940965652466},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5796509385108948},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.5134664177894592},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.46732014417648315},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4515204131603241},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44814300537109375},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4379059076309204},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.43500852584838867},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.42379286885261536},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4197329580783844},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.37957218289375305},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3607921004295349},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3497602343559265},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3008599281311035},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2858962118625641},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.1528666913509369},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw48936.2021.9611419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw48936.2021.9611419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W633277346","https://openalex.org/W2005962614","https://openalex.org/W2014912629","https://openalex.org/W2027209885","https://openalex.org/W2038457670","https://openalex.org/W2043769961","https://openalex.org/W2095653018","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2154832352","https://openalex.org/W2163497720","https://openalex.org/W2523917704","https://openalex.org/W2556021795","https://openalex.org/W4300840296","https://openalex.org/W6760340822","https://openalex.org/W6781647773","https://openalex.org/W6792330013"],"related_works":["https://openalex.org/W2583477080","https://openalex.org/W2114007974","https://openalex.org/W2022046490","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2898567960","https://openalex.org/W4386057510","https://openalex.org/W2150528942","https://openalex.org/W1875021344","https://openalex.org/W1977745683"],"abstract_inverted_index":{"In":[0,131],"secret":[1,45,121,138,146],"key":[2,46,122,139,147,159],"agreement":[3],"(SKA)":[4],"in":[5,66],"multiterminal":[6,60],"channel":[7,17,40,61,70,98],"model,":[8,165],"terminals":[9],"are":[10],"connected":[11],"by":[12],"a":[13,37,43,48,56,73,85,89,103,109,119],"noisy":[14,69,112],"discrete":[15],"memoryless":[16],"(DMC)":[18],"with":[19],"multiple":[20,23],"input":[21],"and":[22,34],"outputs.":[24],"Terminals":[25],"can":[26],"use":[27],"the":[28,68,93,136,143,150,158,162,168],"DMC":[29],"to":[30,41,102,178],"obtain":[31],"correlated":[32],"randomness,":[33],"communicate":[35],"over":[36],"noiseless":[38],"public":[39],"establish":[42],"shared":[44],"among":[47],"designated":[49],"subset":[50],"of":[51,59,72,75,95,149,161],"terminals.":[52],"We":[53,87],"focus":[54],"on":[55],"special":[57],"class":[58],"models,":[62],"called":[63],"wiretapped":[64,151],"Polytree-PIN,":[65],"which":[67,141],"consists":[71],"set":[74],"independent":[76,111],"point-to-point":[77,97,176],"channels":[78,177],"whose":[79],"underlying":[80],"undirected":[81],"connectivity":[82],"graph":[83],"forms":[84],"tree.":[86],"consider":[88],"wiretap":[90,137],"setting,":[91],"where":[92],"output":[94],"each":[96],"is":[99,142,167,172],"partially":[100],"leaked":[101],"passive":[104],"wiretapper":[105],"adversary,":[106],"Eve,":[107],"through":[108],"second":[110],"channel.":[113],"A":[114],"secure":[115],"SKA":[116],"protocol":[117],"generates":[118],"group":[120],"such":[123],"that":[124,166],"Eve":[125],"has":[126],"no":[127,173],"information":[128],"about":[129],"it.":[130],"this":[132],"paper,":[133],"we":[134],"derive":[135],"capacity,":[140],"largest":[144],"achievable":[145],"rate,":[148],"PolytreePIN":[152],"model.":[153],"Our":[154],"result":[155],"also":[156],"implies":[157],"capacity":[160],"non-wiretapped":[163],"Polytree-PIN":[164],"case":[169],"when":[170],"there":[171],"leakage":[174],"from":[175],"Eve.":[179]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
