{"id":"https://openalex.org/W2529517202","doi":"https://doi.org/10.1109/tit.2016.2615322","title":"Compressing Encrypted Data: Achieving Optimality and Strong Secrecy via Permutations","display_name":"Compressing Encrypted Data: Achieving Optimality and Strong Secrecy via Permutations","publication_year":2016,"publication_date":"2016-10-05","ids":{"openalex":"https://openalex.org/W2529517202","doi":"https://doi.org/10.1109/tit.2016.2615322","mag":"2529517202"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2016.2615322","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2016.2615322","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024845943","display_name":"Wei Kang","orcid":"https://orcid.org/0000-0003-4408-6419"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Kang","raw_affiliation_strings":["School of Information Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100622088","display_name":"Nan Liu","orcid":"https://orcid.org/0000-0003-4155-0685"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Liu","raw_affiliation_strings":["National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024845943"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.3675,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.66347188,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"62","issue":"12","first_page":"7153","last_page":"7163"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.726830244064331},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7043631076812744},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6467175483703613},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5669798851013184},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.46708083152770996},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4566243886947632},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35415753722190857},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19439786672592163},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17346683144569397}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.726830244064331},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7043631076812744},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6467175483703613},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5669798851013184},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.46708083152770996},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4566243886947632},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35415753722190857},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19439786672592163},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17346683144569397}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2016.2615322","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2016.2615322","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G264724915","display_name":null,"funder_award_id":"61521061","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6518568274","display_name":null,"funder_award_id":"61271208","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7962525481","display_name":null,"funder_award_id":"61571123","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8743378378","display_name":null,"funder_award_id":"61571122","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327794","display_name":"Qinglan Project of Jiangsu Province of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1549664537","https://openalex.org/W1594152671","https://openalex.org/W1610638643","https://openalex.org/W1641696523","https://openalex.org/W1967864682","https://openalex.org/W1977784607","https://openalex.org/W2007591979","https://openalex.org/W2015053044","https://openalex.org/W2043769961","https://openalex.org/W2052454383","https://openalex.org/W2075396245","https://openalex.org/W2094541403","https://openalex.org/W2101647944","https://openalex.org/W2101677434","https://openalex.org/W2103098233","https://openalex.org/W2106892689","https://openalex.org/W2109394932","https://openalex.org/W2123542136","https://openalex.org/W2127140374","https://openalex.org/W2129344187","https://openalex.org/W2133397787","https://openalex.org/W2143387732","https://openalex.org/W2148254922","https://openalex.org/W2150412388","https://openalex.org/W2154832352","https://openalex.org/W2156853872","https://openalex.org/W2167273972","https://openalex.org/W2171721326","https://openalex.org/W2254512934","https://openalex.org/W2532200735","https://openalex.org/W2597388719","https://openalex.org/W2915411157","https://openalex.org/W4302366875","https://openalex.org/W6635653562","https://openalex.org/W6636682369","https://openalex.org/W6678478703","https://openalex.org/W6684938606"],"related_works":["https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2340481533","https://openalex.org/W2898567960","https://openalex.org/W2036210457","https://openalex.org/W2369043755","https://openalex.org/W2039752281","https://openalex.org/W1608200561"],"abstract_inverted_index":{"In":[0,32,122],"a":[1,80,86,127,141,170],"system":[2,102,108,198],"that":[3,112,174,195],"performs":[4,103],"both":[5],"encryption":[6,51,82,137,180],"and":[7,17,53,118,144,165,181,202],"lossy":[8],"compression,":[9],"the":[10,20,50,56,62,65,76,89,106,110,132,136,146,152,161,176,179,187,196,203],"conventional":[11,107],"way":[12],"is":[13,46,83,138,149],"to":[14,29,48,61],"compress":[15,55],"first":[16,52],"then":[18,54],"encrypt":[19],"compressed":[21,150],"data.":[22],"This":[23],"separation":[24],"approach":[25],"has":[26],"been":[27],"proved":[28],"be":[30,39],"optimal.":[31],"certain":[33],"applications":[34],"where":[35,79,135],"sensitive":[36],"information":[37,204],"should":[38],"protected":[40],"as":[41,43],"early":[42],"possible,":[44],"it":[45,113],"preferable":[47],"perform":[49],"encrypted":[57,147],"data,":[58],"which":[59],"leads":[60],"concept":[63],"of":[64,178,189],"reversed":[66,77,101,133],"system.":[67,192],"Johnson":[68],"et":[69],"al.":[70],"proposed":[71,157,197],"an":[72,190],"achievable":[73,129],"scheme":[74,130,158],"for":[75,131],"system,":[78,134],"modulo-sum":[81],"followed":[84],"by":[85,140],"compression":[87,116,163,182],"using":[88,151],"Wyner-Ziv":[90],"distributed":[91],"source":[92],"coding":[93],"with":[94],"side":[95],"information.":[96],"However,":[97],"in":[98,109],"general,":[99],"this":[100,123],"worse":[104],"than":[105],"sense":[111],"requires":[114],"more":[115],"rate":[117,164],"secrecy":[119],"key":[120,167],"rate.":[121,168],"paper,":[124],"we":[125,172],"propose":[126],"new":[128],"conducted":[139],"permutation":[142],"cipher,":[143],"then,":[145],"data":[148],"optimal":[153,162],"rate-distortion":[154],"code.":[155],"The":[156],"can":[159],"achieve":[160],"secret":[166],"As":[169],"result,":[171],"show":[173,194],"reversing":[175],"order":[177],"does":[183],"not":[184],"necessarily":[185],"compromise":[186],"performance":[188],"encryption-compression":[191],"We":[193],"attains":[199],"strong":[200],"secrecy,":[201],"leakage":[205],"vanishes":[206],"exponentially.":[207]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
