{"id":"https://openalex.org/W2093843788","doi":"https://doi.org/10.1109/tifs.2014.2320634","title":"Keyless Authentication in a Noisy Model","display_name":"Keyless Authentication in a Noisy Model","publication_year":2014,"publication_date":"2014-04-29","ids":{"openalex":"https://openalex.org/W2093843788","doi":"https://doi.org/10.1109/tifs.2014.2320634","mag":"2093843788"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2320634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2320634","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084928289","display_name":"Shaoquan Jiang","orcid":"https://orcid.org/0000-0001-8114-0782"},"institutions":[{"id":"https://openalex.org/I3130456415","display_name":"Mianyang Normal University","ror":"https://ror.org/02rka3n91","country_code":"CN","type":"education","lineage":["https://openalex.org/I3130456415"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shaoquan Jiang","raw_affiliation_strings":["Institute of Information Security, Mianyang Normal University, Mianyang, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Security, Mianyang Normal University, Mianyang, China","institution_ids":["https://openalex.org/I3130456415"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5084928289"],"corresponding_institution_ids":["https://openalex.org/I3130456415"],"apc_list":null,"apc_paid":null,"fwci":1.884,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.87708947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"9","issue":"6","first_page":"1024","last_page":"1033"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.7130301594734192},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7090682983398438},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6700727939605713},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6123273372650146},{"id":"https://openalex.org/keywords/alice","display_name":"Alice (programming language)","score":0.5698124170303345},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4909868538379669},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.490506112575531},{"id":"https://openalex.org/keywords/alice-and-bob","display_name":"Alice and Bob","score":0.48222100734710693},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.463575154542923},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40269967913627625},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3626074194908142},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3474389314651489},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.32623493671417236},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3063398003578186},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19031986594200134},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10271662473678589},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.10109499096870422}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.7130301594734192},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7090682983398438},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6700727939605713},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6123273372650146},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.5698124170303345},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4909868538379669},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.490506112575531},{"id":"https://openalex.org/C127964579","wikidata":"https://www.wikidata.org/wiki/Q649676","display_name":"Alice and Bob","level":3,"score":0.48222100734710693},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.463575154542923},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40269967913627625},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3626074194908142},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3474389314651489},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.32623493671417236},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3063398003578186},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19031986594200134},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10271662473678589},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.10109499096870422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2014.2320634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2320634","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8807153140","display_name":null,"funder_award_id":"60973161","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W77715776","https://openalex.org/W949353694","https://openalex.org/W1500163133","https://openalex.org/W1902248004","https://openalex.org/W1964990628","https://openalex.org/W1979946760","https://openalex.org/W1995875735","https://openalex.org/W1996360405","https://openalex.org/W2020316223","https://openalex.org/W2028732372","https://openalex.org/W2043769961","https://openalex.org/W2079364662","https://openalex.org/W2101776874","https://openalex.org/W2103012681","https://openalex.org/W2104883478","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2118176162","https://openalex.org/W2127007120","https://openalex.org/W2134841917","https://openalex.org/W2143745050","https://openalex.org/W2144007657","https://openalex.org/W2144387589","https://openalex.org/W2150080833","https://openalex.org/W2150264238","https://openalex.org/W2153644609","https://openalex.org/W2157164384","https://openalex.org/W2159247478","https://openalex.org/W2169128714","https://openalex.org/W2254512934","https://openalex.org/W2478708596","https://openalex.org/W2597388719","https://openalex.org/W4232836212","https://openalex.org/W4233413206","https://openalex.org/W4240636760","https://openalex.org/W4293702014","https://openalex.org/W4302366875","https://openalex.org/W6630122207","https://openalex.org/W6680062525"],"related_works":["https://openalex.org/W1765977934","https://openalex.org/W1679820158","https://openalex.org/W2066842693","https://openalex.org/W2566038759","https://openalex.org/W4238337057","https://openalex.org/W2166668397","https://openalex.org/W4293769364","https://openalex.org/W2315316137","https://openalex.org/W1548585588","https://openalex.org/W283281285"],"abstract_inverted_index":{"We":[0,70],"study":[1],"a":[2,7,14,30,73,92],"keyless":[3],"authentication":[4,63,75,80,89,94],"problem":[5],"in":[6],"new":[8],"noisy":[9],"model,":[10,55],"where":[11],"there":[12,43],"is":[13,44,68,99,103,116,125],"discrete":[15],"memoryless":[16],"channel":[17,48,111,124],"(DMC)":[18],"W":[19,32,112],"<sub":[20,33,113],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[21,34,114],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sub>":[22,115],"from":[23,36,64],"sender":[24],"Alice":[25,50,65],"to":[26,39,66],"receiver":[27],"Bob":[28,67],"and":[29,51],"DMC":[31],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sub>":[35],"adversary":[37],"Oscar":[38],"Bob.":[40,52],"In":[41],"addition,":[42],"an":[45,62,79,104],"insecure":[46],"noiseless":[47,123],"between":[49],"Under":[53],"this":[54],"we":[56,85],"characterize":[57],"the":[58,88,122],"condition":[59],"under":[60],"which":[61],"possible.":[69],"also":[71],"construct":[72],"secure":[74],"protocol":[76],"that":[77,87],"has":[78],"rate":[81],"approaching":[82],"infinity.":[83],"Finally,":[84],"prove":[86],"capacity":[90,109],"of":[91,110],"noninteractive":[93],"over":[95],"binary":[96],"symmetric":[97],"channels":[98],"exactly":[100],"1.":[101],"This":[102],"interesting":[105],"result":[106],"as":[107],"Shannon":[108],"strictly":[117],"less":[118],"than":[119],"1":[120],"while":[121],"completely":[126],"unreliable.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
