{"id":"https://openalex.org/W4416514258","doi":"https://doi.org/10.1109/itw62417.2025.11240405","title":"Optimal Rate Region for Lazy Secret Sharing","display_name":"Optimal Rate Region for Lazy Secret Sharing","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4416514258","doi":"https://doi.org/10.1109/itw62417.2025.11240405"},"language":null,"primary_location":{"id":"doi:10.1109/itw62417.2025.11240405","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw62417.2025.11240405","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120371992","display_name":"Tao Guo","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tao Guo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120371993","display_name":"Xiaoyu Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaoyu Zhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120512366","display_name":"Deheng Yuan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Deheng Yuan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120609227","display_name":"Laigang Guo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Laigang Guo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5120419630","display_name":"Yinfei Xu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yinfei Xu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5120371992"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37956053,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"777","last_page":"781"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.6166999936103821,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.6166999936103821,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2824999988079071,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.027499999850988388,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/imperfect","display_name":"Imperfect","score":0.6482999920845032},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6223000288009644},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.362199991941452},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.34850001335144043},{"id":"https://openalex.org/keywords/perfect-information","display_name":"Perfect information","score":0.3343999981880188},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.31360000371932983}],"concepts":[{"id":"https://openalex.org/C2780310539","wikidata":"https://www.wikidata.org/wiki/Q12547192","display_name":"Imperfect","level":2,"score":0.6482999920845032},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6223000288009644},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.597000002861023},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35830000042915344},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.34850001335144043},{"id":"https://openalex.org/C123676819","wikidata":"https://www.wikidata.org/wiki/Q1074338","display_name":"Perfect information","level":2,"score":0.3343999981880188},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.31360000371932983},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.3043999969959259},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.29019999504089355},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2874000072479248},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2736000120639801},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.2612000107765198},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C38725249","wikidata":"https://www.wikidata.org/wiki/Q913876","display_name":"Time-sharing","level":2,"score":0.25540000200271606}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw62417.2025.11240405","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw62417.2025.11240405","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1641218312","https://openalex.org/W1977854174","https://openalex.org/W2000521034","https://openalex.org/W2050405699","https://openalex.org/W2109394932","https://openalex.org/W2141420453","https://openalex.org/W2150707357","https://openalex.org/W2524272550","https://openalex.org/W2908643690","https://openalex.org/W2970097841","https://openalex.org/W3124251791","https://openalex.org/W4401693862","https://openalex.org/W4405181433"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,27,55,74],"lazy":[4,47],"secret":[5,29,48],"sharing":[6,49],"problem":[7],"from":[8,31],"an":[9],"information-theoretic":[10],"perspective.":[11],"The":[12,22,41,69],"participants":[13],"are":[14],"classified":[15],"into":[16],"two":[17],"categories:":[18],"Lazy-Participants":[19],"and":[20],"Share-Participants.":[21,40],"objective":[23],"is":[24,50,77],"to":[25],"guarantee":[26],"perfect":[28],"recovery":[30],"any":[32],"t":[33],"participants,":[34],"while":[35],"ensuring":[36],"security":[37,57,60],"exclusively":[38],"for":[39,46,80],"optimal":[42,70],"coding":[43],"rate":[44,71],"region":[45,72],"characterized.":[51],"We":[52],"further":[53],"consider":[54],"imperfect":[56,75],"formulation,":[58],"formulating":[59],"through":[61],"information":[62],"leakage":[63],"constraints":[64],"rather":[65],"than":[66],"strict":[67],"security.":[68],"in":[73],"formulation":[76],"also":[78],"established":[79],"a":[81],"specific":[82],"symmetric":[83],"scenario.":[84]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
