{"id":"https://openalex.org/W3122799067","doi":"https://doi.org/10.1109/jsait.2021.3053697","title":"Secure Non-Linear Network Code Over a One-Hop Relay Network","display_name":"Secure Non-Linear Network Code Over a One-Hop Relay Network","publication_year":2021,"publication_date":"2021-01-26","ids":{"openalex":"https://openalex.org/W3122799067","doi":"https://doi.org/10.1109/jsait.2021.3053697","mag":"3122799067"},"language":"en","primary_location":{"id":"doi:10.1109/jsait.2021.3053697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsait.2021.3053697","pdf_url":null,"source":{"id":"https://openalex.org/S4210211895","display_name":"IEEE Journal on Selected Areas in Information Theory","issn_l":"2641-8770","issn":["2641-8770"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024634142","display_name":"Masahito Hayashi","orcid":"https://orcid.org/0000-0003-3104-1000"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]},{"id":"https://openalex.org/I60134161","display_name":"Nagoya University","ror":"https://ror.org/04chrp450","country_code":"JP","type":"education","lineage":["https://openalex.org/I60134161"]}],"countries":["CN","JP"],"is_corresponding":true,"raw_author_name":"Masahito Hayashi","raw_affiliation_strings":["Graduate School of Mathematics, Nagoya University, Nagoya, Japan","Guangdong Provincial Key Laboratory of Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen, China","Shenzhen Institute for Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen, China","Shenzhen Key Laboratory of Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Graduate School of Mathematics, Nagoya University, Nagoya, Japan","institution_ids":["https://openalex.org/I60134161"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I3045169105"]},{"raw_affiliation_string":"Shenzhen Institute for Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I3045169105"]},{"raw_affiliation_string":"Shenzhen Key Laboratory of Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen, China","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064714385","display_name":"Ning Cai","orcid":"https://orcid.org/0000-0003-2281-5924"},"institutions":[{"id":"https://openalex.org/I30809798","display_name":"ShanghaiTech University","ror":"https://ror.org/030bhh786","country_code":"CN","type":"education","lineage":["https://openalex.org/I30809798"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Cai","raw_affiliation_strings":["School of Information Science and Technology, ShanghaiTech University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China","institution_ids":["https://openalex.org/I30809798"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024634142"],"corresponding_institution_ids":["https://openalex.org/I3045169105","https://openalex.org/I60134161"],"apc_list":null,"apc_paid":null,"fwci":0.8004,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.73048789,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2","issue":"1","first_page":"296","last_page":"305"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/unicast","display_name":"Unicast","score":0.7096432447433472},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7004059553146362},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.6945873498916626},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6840210556983948},{"id":"https://openalex.org/keywords/hop","display_name":"Hop (telecommunications)","score":0.6719033718109131},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.6295077204704285},{"id":"https://openalex.org/keywords/linear-code","display_name":"Linear code","score":0.5462281107902527},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5265581607818604},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4953962564468384},{"id":"https://openalex.org/keywords/repetition-code","display_name":"Repetition code","score":0.4477986693382263},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4256443977355957},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3126939535140991},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.2991955876350403},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20976829528808594},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.15621572732925415},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.08919036388397217}],"concepts":[{"id":"https://openalex.org/C11704745","wikidata":"https://www.wikidata.org/wiki/Q918337","display_name":"Unicast","level":3,"score":0.7096432447433472},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7004059553146362},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.6945873498916626},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6840210556983948},{"id":"https://openalex.org/C25906391","wikidata":"https://www.wikidata.org/wiki/Q1432381","display_name":"Hop (telecommunications)","level":2,"score":0.6719033718109131},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.6295077204704285},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.5462281107902527},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5265581607818604},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4953962564468384},{"id":"https://openalex.org/C194405637","wikidata":"https://www.wikidata.org/wiki/Q369367","display_name":"Repetition code","level":5,"score":0.4477986693382263},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4256443977355957},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3126939535140991},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2991955876350403},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20976829528808594},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.15621572732925415},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.08919036388397217},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsait.2021.3053697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsait.2021.3053697","pdf_url":null,"source":{"id":"https://openalex.org/S4210211895","display_name":"IEEE Journal on Selected Areas in Information Theory","issn_l":"2641-8770","issn":["2641-8770"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8183748535","display_name":null,"funder_award_id":"16KT0017","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320315724","display_name":"Kayamori Foundation of Informational Science Advancement","ror":null},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W18139138","https://openalex.org/W68293075","https://openalex.org/W785083160","https://openalex.org/W1785358459","https://openalex.org/W1971450408","https://openalex.org/W1973427399","https://openalex.org/W1975239268","https://openalex.org/W1979760651","https://openalex.org/W2006947308","https://openalex.org/W2014554046","https://openalex.org/W2017619978","https://openalex.org/W2022654677","https://openalex.org/W2043769961","https://openalex.org/W2056327536","https://openalex.org/W2083270107","https://openalex.org/W2103320637","https://openalex.org/W2106403318","https://openalex.org/W2106570206","https://openalex.org/W2111330432","https://openalex.org/W2133936282","https://openalex.org/W2135808061","https://openalex.org/W2136395129","https://openalex.org/W2139379087","https://openalex.org/W2142583431","https://openalex.org/W2149286354","https://openalex.org/W2152303628","https://openalex.org/W2169537302","https://openalex.org/W2593823562","https://openalex.org/W2606226906","https://openalex.org/W2626348626","https://openalex.org/W2742735145","https://openalex.org/W2770580033","https://openalex.org/W2951544934","https://openalex.org/W2962945961","https://openalex.org/W2987687226","https://openalex.org/W2988683112","https://openalex.org/W2994362424","https://openalex.org/W3013635052","https://openalex.org/W3087608505","https://openalex.org/W3099386932","https://openalex.org/W3101729250","https://openalex.org/W3103554009","https://openalex.org/W3106107610","https://openalex.org/W6600739974","https://openalex.org/W6602698672","https://openalex.org/W6654347880","https://openalex.org/W6676554168","https://openalex.org/W6680315945","https://openalex.org/W6680766608"],"related_works":["https://openalex.org/W2794998165","https://openalex.org/W2962934782","https://openalex.org/W1982696243","https://openalex.org/W1997326586","https://openalex.org/W2138841883","https://openalex.org/W2303790217","https://openalex.org/W2164280516","https://openalex.org/W1984617503","https://openalex.org/W4229782249","https://openalex.org/W2053449743"],"abstract_inverted_index":{"When":[0],"there":[1],"exists":[2],"a":[3,51,57,90,95,112,134],"malicious":[4],"attacker":[5],"in":[6,85],"the":[7,13,18,26,68,73,100,103,116,142],"network,":[8,25,64],"we":[9,65,92],"need":[10],"to":[11,37],"consider":[12],"possibilities":[14],"of":[15,28,44,60,131,133,144],"eavesdropping":[16],"and":[17],"contamination":[19],"simultaneously.":[20],"Under":[21],"an":[22,61],"acyclic":[23,62],"broadcast":[24],"optimality":[27,43],"linear":[29,45,108,127],"codes":[30,46],"was":[31],"shown":[32,49],"when":[33],"Eve":[34,80],"is":[35,47],"allowed":[36],"attack":[38],"any":[39],"r":[40],"edges.":[41],"The":[42],"not":[48],"under":[50,72],"different":[52],"assumption":[53],"for":[54],"Eve.":[55],"As":[56],"typical":[58],"example":[59],"unicast":[63],"focus":[66],"on":[67,102,119,148],"one-hop":[69,104],"relay":[70,105],"network":[71,106],"single":[74],"transmission":[75],"scheme":[76],"by":[77,126],"assuming":[78],"that":[79,94,122],"attacks":[81],"only":[82],"one":[83],"edge":[84],"each":[86],"level.":[87],"Surprisingly,":[88],"as":[89],"result,":[91],"find":[93],"non-linear":[96,113,135],"code":[97,114,136],"significantly":[98],"improves":[99],"performance":[101],"over":[107],"codes.":[109,128],"That":[110],"is,":[111],"realizes":[115],"imperfect":[117],"security":[118],"this":[120],"model":[121],"cannot":[123],"be":[124],"realized":[125],"This":[129],"kind":[130],"superiority":[132],"still":[137],"holds":[138],"even":[139],"with":[140],"considering":[141],"effect":[143],"sequential":[145],"error":[146],"injection":[147],"information":[149],"leakage.":[150]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2021-02-01T00:00:00"}
