{"id":"https://openalex.org/W4385453364","doi":"https://doi.org/10.1109/lcomm.2023.3300462","title":"Secret-Key-Agreement Advantage Distillation With Quantization Correction","display_name":"Secret-Key-Agreement Advantage Distillation With Quantization Correction","publication_year":2023,"publication_date":"2023-08-01","ids":{"openalex":"https://openalex.org/W4385453364","doi":"https://doi.org/10.1109/lcomm.2023.3300462"},"language":"en","primary_location":{"id":"doi:10.1109/lcomm.2023.3300462","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcomm.2023.3300462","pdf_url":"https://ieeexplore.ieee.org/ielx7/4234/5534602/10198218.pdf","source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/4234/5534602/10198218.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074436801","display_name":"Francesco Ardizzon","orcid":"https://orcid.org/0000-0001-6066-7550"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Francesco Ardizzon","raw_affiliation_strings":["Department of Information Engineering, Universit&#x00E0; degli Studi di Padova, Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, Universit&#x00E0; degli Studi di Padova, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021179463","display_name":"Francesco Giurisato","orcid":null},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Francesco Giurisato","raw_affiliation_strings":["Department of Information Engineering, Universit&#x00E0; degli Studi di Padova, Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, Universit&#x00E0; degli Studi di Padova, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076790432","display_name":"Stefano Tomasin","orcid":"https://orcid.org/0000-0003-3253-6793"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Tomasin","raw_affiliation_strings":["Department of Information Engineering, Universit&#x00E0; degli Studi di Padova, Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, Universit&#x00E0; degli Studi di Padova, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074436801"],"corresponding_institution_ids":["https://openalex.org/I138689650"],"apc_list":null,"apc_paid":null,"fwci":0.6656,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.68482725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"27","issue":"9","first_page":"2293","last_page":"2297"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/alice-and-bob","display_name":"Alice and Bob","score":0.8063730001449585},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.7180027365684509},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6395725011825562},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.492780476808548},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4670388102531433},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4497980773448944},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42019781470298767},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.41084009408950806},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3784036934375763},{"id":"https://openalex.org/keywords/alice","display_name":"Alice (programming language)","score":0.31296947598457336},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2963636517524719},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2682691812515259},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2164033055305481},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12834301590919495}],"concepts":[{"id":"https://openalex.org/C127964579","wikidata":"https://www.wikidata.org/wiki/Q649676","display_name":"Alice and Bob","level":3,"score":0.8063730001449585},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.7180027365684509},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6395725011825562},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.492780476808548},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4670388102531433},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4497980773448944},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42019781470298767},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.41084009408950806},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3784036934375763},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.31296947598457336},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2963636517524719},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2682691812515259},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2164033055305481},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12834301590919495},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/lcomm.2023.3300462","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcomm.2023.3300462","pdf_url":"https://ieeexplore.ieee.org/ielx7/4234/5534602/10198218.pdf","source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},{"id":"pmh:oai:www.research.unipd.it:11577/3503516","is_oa":true,"landing_page_url":"https://hdl.handle.net/11577/3503516","pdf_url":"https://www.research.unipd.it/bitstream/11577/3503516/2/Secret-Key-Agreement_Advantage_Distillation_With_Quantization_Correction.pdf","source":{"id":"https://openalex.org/S4377196283","display_name":"Research Padua  Archive (University of Padua)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138689650","host_organization_name":"University of Padua","host_organization_lineage":["https://openalex.org/I138689650"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1109/lcomm.2023.3300462","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcomm.2023.3300462","pdf_url":"https://ieeexplore.ieee.org/ielx7/4234/5534602/10198218.pdf","source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385453364.pdf","grobid_xml":"https://content.openalex.org/works/W4385453364.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1528401588","https://openalex.org/W1577221346","https://openalex.org/W2029492597","https://openalex.org/W2044592986","https://openalex.org/W2067982355","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2586400646","https://openalex.org/W2754674576","https://openalex.org/W2946340226","https://openalex.org/W3127121838","https://openalex.org/W4225611672","https://openalex.org/W4315777585","https://openalex.org/W6634602028"],"related_works":["https://openalex.org/W1765977934","https://openalex.org/W2066842693","https://openalex.org/W4238337057","https://openalex.org/W2315316137","https://openalex.org/W1548585588","https://openalex.org/W2522331723","https://openalex.org/W2952591154","https://openalex.org/W3101951322","https://openalex.org/W1984925593","https://openalex.org/W1973484881"],"abstract_inverted_index":{"We":[0,37],"consider":[1],"a":[2,15,27,92],"physical":[3],"layer-based":[4],"secret-key-agreement":[5],"(SKA)":[6],"scenario":[7],"where":[8,44],"Alice":[9,46],"and":[10,50,62],"Bob":[11,64,89],"aim":[12],"at":[13],"extracting":[14],"common":[16],"bit":[17],"sequence,":[18],"which":[19],"should":[20],"remain":[21],"secret":[22,111],"to":[23,90,96,104],"Eve,":[24],"by":[25,70],"quantizing":[26],"random":[28],"number":[29],"obtained":[30],"from":[31],"measurements":[32],"of":[33,81,98,109],"their":[34],"communication":[35],"channel.":[36],"propose":[38],"an":[39,57],"asymmetric":[40],"advantage":[41],"distillation":[42],"protocol":[43],"i)":[45],"quantizes":[47,67],"her":[48],"measurement":[49,69,83],"sends":[51],"partial":[52,73,76],"information":[53,77],"on":[54,78],"it":[55],"over":[56],"authenticated":[58],"public":[59],"side":[60],"channel,":[61],"ii)":[63],"(and":[65],"Eve)":[66],"his":[68],"exploiting":[71],"the":[72,79,82,85,106,110],"information.":[74],"The":[75],"position":[80],"in":[84],"quantization":[86],"interval":[87],"allows":[88],"obtain":[91],"quantized":[93],"value":[94],"closer":[95],"that":[97],"Alice.":[99],"Such":[100],"strategies":[101],"are":[102],"shown":[103],"increase":[105],"lower":[107],"bound":[108],"key":[112],"rate.":[113]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
