{"id":"https://openalex.org/W4205235025","doi":"https://doi.org/10.1109/tifs.2021.3132234","title":"Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel","display_name":"Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4205235025","doi":"https://doi.org/10.1109/tifs.2021.3132234"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3132234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3132234","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041449293","display_name":"Uppalapati Somalatha","orcid":"https://orcid.org/0000-0003-1653-1298"},"institutions":[{"id":"https://openalex.org/I4210109292","display_name":"Indian Institute of Technology Tirupati","ror":"https://ror.org/01xtkxh20","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210109292"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Uppalapati Somalatha","raw_affiliation_strings":["Indian Institute of Technology Tirupati, Tirupati, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Tirupati, Tirupati, India","institution_ids":["https://openalex.org/I4210109292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088871157","display_name":"Parthajit Mohapatra","orcid":"https://orcid.org/0000-0002-7085-0030"},"institutions":[{"id":"https://openalex.org/I4210109292","display_name":"Indian Institute of Technology Tirupati","ror":"https://ror.org/01xtkxh20","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210109292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Parthajit Mohapatra","raw_affiliation_strings":["Indian Institute of Technology Tirupati, Tirupati, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Tirupati, Tirupati, India","institution_ids":["https://openalex.org/I4210109292"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041449293"],"corresponding_institution_ids":["https://openalex.org/I4210109292"],"apc_list":null,"apc_paid":null,"fwci":0.2022,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.53306628,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"85","last_page":"98"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7345771789550781},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7239201664924622},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7124572992324829},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5578733086585999},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5374768972396851},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5284110307693481},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.48727619647979736},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.47329774498939514},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4669901728630066},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.4286292493343353},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3544553518295288},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34460991621017456},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3320541977882385},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26093608140945435},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16694962978363037},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13919910788536072},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.07617706060409546}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7345771789550781},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7239201664924622},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7124572992324829},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5578733086585999},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5374768972396851},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5284110307693481},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48727619647979736},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.47329774498939514},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4669901728630066},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.4286292493343353},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3544553518295288},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34460991621017456},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3320541977882385},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26093608140945435},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16694962978363037},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13919910788536072},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.07617706060409546},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2021.3132234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3132234","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334771","display_name":"Science and Engineering Research Board","ror":"https://ror.org/03ffdsr55"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1481668612","https://openalex.org/W1964279069","https://openalex.org/W1970170950","https://openalex.org/W1979408141","https://openalex.org/W2043769961","https://openalex.org/W2049651362","https://openalex.org/W2068887604","https://openalex.org/W2087258384","https://openalex.org/W2089072084","https://openalex.org/W2093525204","https://openalex.org/W2096037147","https://openalex.org/W2099111195","https://openalex.org/W2109394932","https://openalex.org/W2124982134","https://openalex.org/W2127140374","https://openalex.org/W2130334496","https://openalex.org/W2132684888","https://openalex.org/W2138296501","https://openalex.org/W2144007657","https://openalex.org/W2145518237","https://openalex.org/W2147055067","https://openalex.org/W2151027523","https://openalex.org/W2152949905","https://openalex.org/W2156214717","https://openalex.org/W2157989362","https://openalex.org/W2158222741","https://openalex.org/W2519202340","https://openalex.org/W2583019811","https://openalex.org/W2592280048","https://openalex.org/W2699584971","https://openalex.org/W2921218376","https://openalex.org/W2963990362","https://openalex.org/W2964211807","https://openalex.org/W3007256892","https://openalex.org/W3161168108","https://openalex.org/W4300840296","https://openalex.org/W6628834758"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2368824897","https://openalex.org/W1508050556","https://openalex.org/W1910862367","https://openalex.org/W2379365082","https://openalex.org/W2370747590","https://openalex.org/W2030109976","https://openalex.org/W2369260257","https://openalex.org/W2389120450","https://openalex.org/W55249799"],"abstract_inverted_index":{"In":[0,100],"this":[1,31,101],"paper,":[2],"the":[3,15,19,42,53,62,68,106,114,118,131,140,144,152,158,163,174,181,186,195,203,212,227,234,238,257,272,298,306,310],"role":[4],"of":[5,18,78,105,117,139,151,173,221,229,256,262,274,280,285,300,309],"secret":[6],"key":[7,63,107,119,164,183,263,301],"with":[8,38],"finite":[9],"rate":[10,82,160,214,255,264,302],"is":[11,44,108,120,127,165,200,265],"studied":[12],"to":[13,184,194,233,247],"enhance":[14],"secrecy":[16,39,145,159,216,239,307],"performance":[17,308],"system":[20],"when":[21,162],"users":[22],"are":[23,245,288],"operating":[24],"in":[25,67,192,226,304],"interference":[26,134,141,199],"limited":[27],"scenarios.":[28],"To":[29],"address":[30],"problem,":[32],"a":[33,76,148],"2-user":[34],"Gaussian":[35],"Z-interference":[36],"channel":[37,252],"constraint":[40],"at":[41,202],"receiver":[43,132,235],"considered.":[45],"The":[46,71,125,177,205,218,241,259,283,294],"paper":[47,206],"proposes":[48],"novel":[49],"achievable":[50,73],"schemes,":[51],"where":[52],"schemes":[54,270,287],"differ":[55],"from":[56],"each":[57],"other":[58],"based":[59],"on":[60,211],"how":[61],"has":[64],"been":[65],"used":[66,109,121,167],"encoding":[69,126],"process.":[70],"first":[72],"scheme":[74,179],"uses":[75,180],"combination":[77],"<italic":[79,85,90,95,275],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[80,86,91,96,276],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">key":[81],"splitting</i>":[83],",":[84,89],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">one-time":[87],"pad</i>":[88],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">stochastic":[92],"encoding</i>":[93],"and":[94,113,191,215,236,254],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">superposition":[97],"coding</i>":[98],".":[99,282],"scheme,":[102],"one":[103,155],"part":[104,116,138,172],"for":[110,122,168,250,268,290],"one-time":[111,169,189],"pad":[112,170,190],"remaining":[115],"stochastic":[123,175],"encoding.":[124,176],"performed":[128],"such":[129],"that":[130],"experiencing":[133],"can":[135,156],"decode":[136],"some":[137,291],"without":[142],"violating":[143],"constraint.":[146,240],"As":[147],"special":[149],"case":[150,197],"derived":[153,242],"result,":[154],"obtain":[157],"region":[161],"completely":[166],"or":[171],"second":[178],"shared":[182],"encrypt":[185],"message":[187],"using":[188,237,271],"contrast":[193],"previous":[196],"no":[198],"decoded":[201],"receiver.":[204],"also":[207,266],"derives":[208],"outer":[209,223,243],"bound":[210,224],"sum":[213],"rate.":[217],"main":[219],"novelty":[220],"deriving":[222],"lies":[225],"selection":[228],"side":[230],"information":[231],"provided":[232],"bounds":[244],"found":[246],"be":[248],"tight":[249],"certain":[251],"conditions":[253],"key.":[258],"scaling":[260],"behaviour":[261],"explored":[267],"different":[269,286],"notion":[273],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">secure":[277],"generalized":[278],"degrees":[279],"freedom</i>":[281],"optimality":[284],"characterized":[289],"specific":[292],"cases.":[293],"developed":[295],"results":[296],"show":[297],"importance":[299],"splitting":[303],"enhancing":[305],"system.":[311]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
