{"id":"https://openalex.org/W2040996859","doi":"https://doi.org/10.1109/tit.2014.2365175","title":"Rate-Distortion Theory for Secrecy Systems","display_name":"Rate-Distortion Theory for Secrecy Systems","publication_year":2014,"publication_date":"2014-10-31","ids":{"openalex":"https://openalex.org/W2040996859","doi":"https://doi.org/10.1109/tit.2014.2365175","mag":"2040996859"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2014.2365175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2365175","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046896765","display_name":"Curt Schieler","orcid":"https://orcid.org/0000-0001-8688-7500"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Curt Schieler","raw_affiliation_strings":["Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","Department of Electrical Engineering, Princeton University  Princeton NJ USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University  Princeton NJ USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026048440","display_name":"Paul Cuff","orcid":"https://orcid.org/0000-0003-2936-9939"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Cuff","raw_affiliation_strings":["Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","Department of Electrical Engineering, Princeton University  Princeton NJ USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University  Princeton NJ USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5046896765"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":8.7079,"has_fulltext":false,"cited_by_count":89,"citation_normalized_percentile":{"value":0.98156662,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"60","issue":"12","first_page":"7584","last_page":"7605"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.961899995803833,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9559999704360962,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7907689809799194},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7430931925773621},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6939345598220825},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.6846557855606079},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5443789958953857},{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.47286128997802734},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46421006321907043},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.46399185061454773},{"id":"https://openalex.org/keywords/rate\u2013distortion-theory","display_name":"Rate\u2013distortion theory","score":0.44975465536117554},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44869425892829895},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.36234915256500244},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3497428894042969},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33599886298179626},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2723013162612915},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20467516779899597},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.1654627025127411},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.09977594017982483}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7907689809799194},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7430931925773621},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6939345598220825},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.6846557855606079},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5443789958953857},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.47286128997802734},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46421006321907043},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.46399185061454773},{"id":"https://openalex.org/C64185310","wikidata":"https://www.wikidata.org/wiki/Q843483","display_name":"Rate\u2013distortion theory","level":3,"score":0.44975465536117554},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44869425892829895},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.36234915256500244},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3497428894042969},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33599886298179626},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2723013162612915},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20467516779899597},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.1654627025127411},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.09977594017982483},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2014.2365175","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2365175","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G165331849","display_name":null,"funder_award_id":"CCF-1017431","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4891556615","display_name":null,"funder_award_id":"CCF-1116013","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1964768127","https://openalex.org/W1998812578","https://openalex.org/W2031420654","https://openalex.org/W2043769961","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2109394932","https://openalex.org/W2127140374","https://openalex.org/W2141432745","https://openalex.org/W2144007657","https://openalex.org/W2161001052","https://openalex.org/W2162635854","https://openalex.org/W2166089695","https://openalex.org/W2168962805","https://openalex.org/W2225747920","https://openalex.org/W2254512934","https://openalex.org/W2293830652","https://openalex.org/W2597388719","https://openalex.org/W4302366875"],"related_works":["https://openalex.org/W2949679674","https://openalex.org/W4235702756","https://openalex.org/W2131491518","https://openalex.org/W2951762147","https://openalex.org/W2123681352","https://openalex.org/W2999599390","https://openalex.org/W4315472290","https://openalex.org/W4295124898","https://openalex.org/W2212585693","https://openalex.org/W2085319386"],"abstract_inverted_index":{"Secrecy":[0],"in":[1,37,123],"communication":[2,26,45,94],"systems":[3],"is":[4,35,72,86,110,127],"measured":[5],"herein":[6],"by":[7],"the":[8,44,47,50,60,75,79,87,90,101,106,117,143],"distortion":[9,29,99,104],"that":[10,71,112,130],"an":[11,31,39],"adversary":[12,40,61,118],"incurs.":[13],"The":[14,83],"transmitter":[15,48],"and":[16,27,103],"receiver":[17],"share":[18],"secret":[19,96],"key,":[20],"which":[21,38],"they":[22],"use":[23],"to":[24,49,68],"encrypt":[25],"ensure":[28],"at":[30,100,105,116],"adversary.":[32],"A":[33],"model":[34],"considered":[36],"not":[41],"only":[42],"intercepts":[43],"from":[46],"receiver,":[51],"but":[52],"also":[53,128],"potentially":[54],"has":[55],"side":[56,114],"information.":[57],"In":[58],"particular,":[59],"may":[62],"have":[63],"causal":[64,113],"or":[65,78],"noncausal":[66],"access":[67],"a":[69,120,139],"signal":[70],"correlated":[73],"with":[74],"source":[76],"sequence":[77],"receiver's":[80],"reconstruction":[81],"sequence.":[82],"main":[84],"contribution":[85],"characterization":[88],"of":[89,132,142],"optimal":[91],"tradeoff":[92],"among":[93],"rate,":[95,98],"key":[97],"adversary,":[102],"legitimate":[107],"receiver.":[108],"It":[109,126],"demonstrated":[111],"information":[115],"plays":[119],"pivotal":[121],"role":[122],"this":[124],"tradeoff.":[125],"shown":[129],"measures":[131],"secrecy":[133],"based":[134],"on":[135],"normalized":[136],"equivocation":[137],"are":[138],"special":[140],"case":[141],"framework.":[144]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":16},{"year":2015,"cited_by_count":13},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
