{"id":"https://openalex.org/W2006333615","doi":"https://doi.org/10.1109/tit.2014.2369496","title":"The Sender-Excited Secret Key Agreement Model: Capacity, Reliability, and Secrecy Exponents","display_name":"The Sender-Excited Secret Key Agreement Model: Capacity, Reliability, and Secrecy Exponents","publication_year":2014,"publication_date":"2014-11-11","ids":{"openalex":"https://openalex.org/W2006333615","doi":"https://doi.org/10.1109/tit.2014.2369496","mag":"2006333615"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2014.2369496","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2369496","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1107.4148","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Tzu-Han Chou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087596","display_name":"Qualcomm (United States)","ror":"https://ror.org/002zrf773","country_code":"US","type":"company","lineage":["https://openalex.org/I4210087596"]},{"id":"https://openalex.org/I4210111675","display_name":"Market Matters","ror":"https://ror.org/021yan307","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210111675"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tzu-Han Chou","raw_affiliation_strings":["Qualcomm Inc., San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"Qualcomm Inc., San Diego, CA, USA","institution_ids":["https://openalex.org/I4210087596","https://openalex.org/I4210111675"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Vincent Y. F. Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vincent Y. F. Tan","raw_affiliation_strings":["Department of Electrical and Computer Engineering and the Department of Mathematics, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering and the Department of Mathematics, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":null,"display_name":"Stark C. Draper","orcid":null},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Stark C. Draper","raw_affiliation_strings":["Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON, Canada","institution_ids":["https://openalex.org/I185261750"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210087596","https://openalex.org/I4210111675"],"apc_list":null,"apc_paid":null,"fwci":1.4898,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.84362138,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"61","issue":"1","first_page":"609","last_page":"627"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.002199999988079071,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.0006000000284984708,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7324000000953674},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.6710000038146973},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6664999723434448},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5896999835968018},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5479999780654907},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.49729999899864197},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.44589999318122864},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.44359999895095825},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.38440001010894775},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.3783000111579895}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7324000000953674},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.6710000038146973},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6664999723434448},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5896999835968018},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5479999780654907},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.49729999899864197},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4885999858379364},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4884999990463257},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.44589999318122864},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.44359999895095825},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.43209999799728394},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.38440001010894775},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.3783000111579895},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.3677000105381012},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.36340001225471497},{"id":"https://openalex.org/C206468330","wikidata":"https://www.wikidata.org/wiki/Q834373","display_name":"Code rate","level":3,"score":0.34619998931884766},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.33880001306533813},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.3310999870300293},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.329800009727478},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2962999939918518},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.29269999265670776},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.2921999990940094},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.28940001130104065},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.2777000069618225},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2732999920845032},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.2700999975204468},{"id":"https://openalex.org/C50230483","wikidata":"https://www.wikidata.org/wiki/Q2108226","display_name":"Pre-shared key","level":5,"score":0.2669000029563904},{"id":"https://openalex.org/C2780388253","wikidata":"https://www.wikidata.org/wiki/Q5421508","display_name":"Exponent","level":2,"score":0.2603999972343445},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25870001316070557},{"id":"https://openalex.org/C149441793","wikidata":"https://www.wikidata.org/wiki/Q200726","display_name":"Probability distribution","level":2,"score":0.25519999861717224},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.25369998812675476}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tit.2014.2369496","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2369496","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1107.4148","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1107.4148","pdf_url":"https://arxiv.org/pdf/1107.4148","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1107.4148","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1107.4148","pdf_url":"https://arxiv.org/pdf/1107.4148","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G201076361","display_name":null,"funder_award_id":"FA9550-09-1-0140","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"}],"funders":[{"id":"https://openalex.org/F4320306555","display_name":"Wisconsin Alumni Research Foundation","ror":"https://ror.org/00hwxbz16"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1514518704","https://openalex.org/W1973484881","https://openalex.org/W1978070031","https://openalex.org/W1993074620","https://openalex.org/W1995323028","https://openalex.org/W2017379196","https://openalex.org/W2027209885","https://openalex.org/W2038457670","https://openalex.org/W2043769961","https://openalex.org/W2052787375","https://openalex.org/W2068887604","https://openalex.org/W2096052284","https://openalex.org/W2099213070","https://openalex.org/W2103674915","https://openalex.org/W2104315657","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2125999125","https://openalex.org/W2129137934","https://openalex.org/W2140451802","https://openalex.org/W2143745050","https://openalex.org/W2144007657","https://openalex.org/W2144387589","https://openalex.org/W2148587342","https://openalex.org/W2149808502","https://openalex.org/W2154300278","https://openalex.org/W2154832352","https://openalex.org/W2163497720","https://openalex.org/W2167651408","https://openalex.org/W2169943861","https://openalex.org/W2294707751","https://openalex.org/W2553454217","https://openalex.org/W2556021795","https://openalex.org/W6639227257","https://openalex.org/W6728941243"],"related_works":[],"abstract_inverted_index":{"We":[0,49,65,197,221],"consider":[1],"the":[2,13,37,46,54,71,78,84,91,111,117,148,184,187,203,218],"secret":[3,55,105,118,160,188],"key":[4,56,106,119,151,161,189],"generation":[5],"problem":[6],"when":[7],"sources":[8],"are":[9,228],"randomly":[10],"excited":[11],"by":[12,43],"sender":[14],"and":[15,74,89,150,173,206],"there":[16],"is":[17,25,163],"a":[18,59,100,139,168,180,241],"noiseless":[19],"public":[20,219],"discussion":[21],"channel.":[22],"Our":[23,209],"setting":[24],"thus":[26],"similar":[27],"to":[28,98,127,166,192,230],"recent":[29],"works":[30],"on":[31,70,217],"channels":[32],"with":[33],"action-dependent":[34],"states,":[35],"where":[36],"channel":[38],"state":[39],"may":[40],"be":[41,125,167,238],"influenced":[42],"some":[44],"of":[45,61,81,83,86,90,102,170,186,195],"parties":[47],"involved.":[48],"derive":[50,67],"single-letter":[51],"expressions":[52],"for":[53],"capacity":[57,162],"through":[58,240],"type":[60,194],"source":[62,243],"emulation":[63,244],"analysis.":[64],"also":[66,124,198,212],"lower":[68],"bounds":[69],"achievable":[72,104,114,204],"reliability":[73,205],"secrecy":[75,207],"exponents,":[76],"i.e.,":[77],"exponential":[79],"rates":[80,233],"decay":[82],"probability":[85],"decoding":[87],"error":[88],"information":[92],"leakage.":[93],"These":[94],"exponents":[95,122],"allow":[96],"us":[97],"determine":[99],"set":[101],"strongly":[103,113],"rates.":[107],"For":[108],"degraded":[109],"eavesdroppers,":[110],"maximum":[112],"rate":[115,190,215,225],"equals":[116],"capacity;":[120],"our":[121,133],"can":[123,237],"specialized":[126],"previously":[128],"known":[129],"results.":[130],"In":[131],"deriving":[132],"strong":[134],"achievability":[135],"results,":[136],"we":[137,178,227],"introduce":[138],"coding":[140,145],"scheme":[141,211],"that":[142,223,236],"combines":[143],"wiretap":[144],"(to":[146,153],"excite":[147],"channel)":[149],"extraction":[152],"distill":[154],"keys":[155],"from":[156],"residual":[157],"randomness).":[158],"The":[159],"naturally":[164,213],"seen":[165],"combination":[169],"both":[171],"source-":[172],"channel-type":[174],"randomness.":[175,196],"Through":[176],"examples,":[177],"illustrate":[179,199],"fundamental":[181],"interplay":[182],"between":[183,202],"portion":[185],"due":[191],"each":[193],"inherent":[200],"tradeoffs":[201],"exponents.":[208],"new":[210],"accommodates":[214],"limits":[216],"discussion.":[220],"show":[222],"under":[224],"constraints,":[226],"able":[229],"achieve":[231],"larger":[232],"than":[234],"those":[235],"attained":[239],"pure":[242],"strategy.":[245]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":4}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2016-06-24T00:00:00"}
