{"id":"https://openalex.org/W2099103027","doi":"https://doi.org/10.1109/tifs.2013.2264675","title":"One-Receiver Two-Eavesdropper Broadcast Channel With Degraded Message Sets","display_name":"One-Receiver Two-Eavesdropper Broadcast Channel With Degraded Message Sets","publication_year":2013,"publication_date":"2013-05-22","ids":{"openalex":"https://openalex.org/W2099103027","doi":"https://doi.org/10.1109/tifs.2013.2264675","mag":"2099103027"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2013.2264675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2264675","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010648032","display_name":"Sadaf Salehkalaibar","orcid":"https://orcid.org/0000-0003-1227-3797"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"S. Salehkalaibar","raw_affiliation_strings":["Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","Dept. of Electr. Eng., SHARIF Univ. of Technol., Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"Dept. of Electr. Eng., SHARIF Univ. of Technol., Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035804797","display_name":"Mahtab Mirmohseni","orcid":"https://orcid.org/0000-0002-5247-5820"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"M. Mirmohseni","raw_affiliation_strings":["Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","Dept. of Electr. Eng., SHARIF Univ. of Technol., Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"Dept. of Electr. Eng., SHARIF Univ. of Technol., Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028840314","display_name":"Mohammad Reza Aref","orcid":"https://orcid.org/0000-0002-4321-0345"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"M. R. Aref","raw_affiliation_strings":["Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","Dept. of Electr. Eng., SHARIF Univ. of Technol., Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Information Systems and Security Laboratory (ISSL), Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"Dept. of Electr. Eng., SHARIF Univ. of Technol., Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010648032"],"corresponding_institution_ids":["https://openalex.org/I133529467"],"apc_list":null,"apc_paid":null,"fwci":1.8916,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.87449816,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"8","issue":"7","first_page":"1162","last_page":"1172"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7960098385810852},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.769556999206543},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5665600895881653},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5433602333068848},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.52546226978302},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5204986929893494},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.5018727779388428},{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.48656001687049866},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.48513612151145935},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24175414443016052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23776254057884216},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12444132566452026},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.05730077624320984}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7960098385810852},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.769556999206543},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5665600895881653},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5433602333068848},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.52546226978302},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5204986929893494},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.5018727779388428},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.48656001687049866},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.48513612151145935},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24175414443016052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23776254057884216},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12444132566452026},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.05730077624320984},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2013.2264675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2264675","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1848341083","https://openalex.org/W1968236717","https://openalex.org/W2016768701","https://openalex.org/W2039499262","https://openalex.org/W2043769961","https://openalex.org/W2044951885","https://openalex.org/W2101741374","https://openalex.org/W2130334496","https://openalex.org/W2135536003","https://openalex.org/W2144007657","https://openalex.org/W2145668821","https://openalex.org/W2536833123","https://openalex.org/W2595897327"],"related_works":["https://openalex.org/W2949679674","https://openalex.org/W4235702756","https://openalex.org/W2131491518","https://openalex.org/W2951762147","https://openalex.org/W2145668821","https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2147348113","https://openalex.org/W3102325276","https://openalex.org/W886176270"],"abstract_inverted_index":{"In":[0,88],"this":[1],"paper,":[2],"we":[3,72,81,92,140,168],"study":[4],"the":[5,29,41,52,62,78,89,98,110,117,123,133,147,158,170,174,183,191,200],"one-receiver":[6,124],"two-eavesdropper":[7,125],"Broadcast":[8],"Channel":[9],"(BC)":[10],"with":[11,127,162],"three":[12,22,128,163],"degraded":[13,129,164,188],"message":[14,18,25,48,130,165],"sets.":[15],"A":[16],"common":[17],"is":[19,26,49,180,186,196],"sent":[20,27,50],"to":[21,28,36,51,57,108],"receivers.":[23],"Another":[24],"first":[30,53,192],"and":[31,34,55,64,68,151,194],"second":[32,63,69,175,184],"receivers":[33,66,134],"needs":[35,56],"be":[37,58],"kept":[38,59],"secret":[39,60],"from":[40,61],"third":[42,47,65,201],"receiver":[43,54,185,193],"(second":[44],"eavesdropper).":[45],"The":[46,112],"(first":[67],"eavesdroppers).":[70],"First,":[71],"consider":[73],"perfect":[74,85,118],"secrecy":[75,86,119,171],"conditions":[76],"at":[77,173],"eavesdroppers,":[79],"where":[80,167],"find":[82,141],"an":[83,142],"achievable":[84,143],"region.":[87],"achievability":[90],"scheme,":[91],"use":[93],"superposition":[94],"coding":[95,114,178],"which":[96],"divides":[97],"available":[99],"randomness":[100],"into":[101],"different":[102],"levels.":[103],"These":[104],"levels":[105],"are":[106],"used":[107],"mislead":[109],"eavesdroppers.":[111],"proposed":[113],"scheme":[115,179],"determines":[116],"capacity":[120],"region":[121,145],"of":[122,190],"BC":[126,161],"sets,":[131],"when":[132,182],"exhibit":[135],"a":[136,187],"degradedness":[137],"order.":[138],"Next,":[139],"rate-equivocation":[144],"using":[146],"rate":[148],"splitting":[149],"technique":[150],"indirect":[152],"decoding.":[153],"We":[154],"show":[155],"that":[156],"for":[157],"two-receiver":[159],"one-eavesdropper":[160],"sets":[166],"relax":[169],"condition":[172],"receiver,":[176],"our":[177],"optimal":[181],"version":[189],"it":[195],"less":[197],"noisy":[198],"than":[199],"receiver.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
