{"id":"https://openalex.org/W2184578140","doi":"https://doi.org/10.1109/tit.2017.2694552","title":"Individual Secrecy for the Broadcast Channel","display_name":"Individual Secrecy for the Broadcast Channel","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2184578140","doi":"https://doi.org/10.1109/tit.2017.2694552","mag":"2184578140"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2017.2694552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2017.2694552","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1511.09070","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100629230","display_name":"Yanling Chen","orcid":"https://orcid.org/0000-0003-1603-9121"},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Yanling Chen","raw_affiliation_strings":["Institute of Digital Signal Processing, University of Duisburg-Essen, Duisburg, Germany","Institute of Digital Signal Processing, University of Duisburg\u2013Essen, Duisburg, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Digital Signal Processing, University of Duisburg-Essen, Duisburg, Germany","institution_ids":["https://openalex.org/I62318514"]},{"raw_affiliation_string":"Institute of Digital Signal Processing, University of Duisburg\u2013Essen, Duisburg, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001012632","display_name":"O. Ozan Koyluoglu","orcid":"https://orcid.org/0000-0001-8512-4755"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]},{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"O. Ozan Koyluoglu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ, USA","University of California at Berkeley, Berkeley, CA, USA","Dept. of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"University of California at Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]},{"raw_affiliation_string":"Dept. of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034269994","display_name":"Aydin Sezgin","orcid":"https://orcid.org/0000-0003-3511-2662"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Aydin Sezgin","raw_affiliation_strings":["Institute of Digital Communication Systems, Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Digital Communication Systems, Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100629230"],"corresponding_institution_ids":["https://openalex.org/I62318514"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.00082135,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.9503846168518066},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6899791955947876},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5966277718544006},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5730590224266052},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.544799268245697},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.4778401851654053},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.47149035334587097},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4555254876613617},{"id":"https://openalex.org/keywords/superposition-principle","display_name":"Superposition principle","score":0.43396109342575073},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.42681312561035156},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4153096079826355},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.4100337624549866},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34589308500289917},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2587448060512543},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22043845057487488},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17811891436576843},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.06103888154029846}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.9503846168518066},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6899791955947876},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5966277718544006},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5730590224266052},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.544799268245697},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.4778401851654053},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.47149035334587097},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4555254876613617},{"id":"https://openalex.org/C27753989","wikidata":"https://www.wikidata.org/wiki/Q284885","display_name":"Superposition principle","level":2,"score":0.43396109342575073},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.42681312561035156},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4153096079826355},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.4100337624549866},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34589308500289917},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2587448060512543},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22043845057487488},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17811891436576843},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.06103888154029846},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tit.2017.2694552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2017.2694552","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1511.09070","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1511.09070","pdf_url":"https://arxiv.org/pdf/1511.09070","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},{"id":"doi:10.48550/arxiv.1511.09070","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1511.09070","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1511.09070","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1511.09070","pdf_url":"https://arxiv.org/pdf/1511.09070","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1079970339","display_name":null,"funder_award_id":"CNS-1617335","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4653563635","display_name":null,"funder_award_id":"SE 1697/11","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G997555784","display_name":null,"funder_award_id":"CH 601/2-1","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1542516891","https://openalex.org/W1553863861","https://openalex.org/W1608200561","https://openalex.org/W1626922264","https://openalex.org/W1978188352","https://openalex.org/W1995875735","https://openalex.org/W2002867407","https://openalex.org/W2012425097","https://openalex.org/W2016768701","https://openalex.org/W2039499262","https://openalex.org/W2043769961","https://openalex.org/W2044951885","https://openalex.org/W2055601566","https://openalex.org/W2068887604","https://openalex.org/W2082063730","https://openalex.org/W2094458162","https://openalex.org/W2103674915","https://openalex.org/W2109394932","https://openalex.org/W2109962983","https://openalex.org/W2122627558","https://openalex.org/W2127768309","https://openalex.org/W2128153585","https://openalex.org/W2130334496","https://openalex.org/W2135536003","https://openalex.org/W2137604856","https://openalex.org/W2143504028","https://openalex.org/W2144007657","https://openalex.org/W2148672861","https://openalex.org/W2157032401","https://openalex.org/W2157639858","https://openalex.org/W2296441616","https://openalex.org/W2542322279","https://openalex.org/W2763740675","https://openalex.org/W2963645489","https://openalex.org/W2963806987","https://openalex.org/W3102432658","https://openalex.org/W6636409642","https://openalex.org/W6638116394","https://openalex.org/W6639227257","https://openalex.org/W6660166686","https://openalex.org/W6686358763","https://openalex.org/W6689167493","https://openalex.org/W6785638602"],"related_works":["https://openalex.org/W2046812839","https://openalex.org/W2087477701","https://openalex.org/W2095071086","https://openalex.org/W2808200085","https://openalex.org/W2783793119","https://openalex.org/W2952374608","https://openalex.org/W2092629290","https://openalex.org/W1561168146","https://openalex.org/W3006504316","https://openalex.org/W2963003842"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,12,20,33,40,49,59,73,97,108,114,123,133,143,150,170,174,185],"problem":[4],"of":[5,35,43,75,99,145],"secure":[6],"communications":[7],"over":[8],"broadcast":[9],"channels":[10],"under":[11],"<italic":[13,44,54],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[14,45,55],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">individual</i>":[15],"secrecy":[16,67,70,91,110,135,147,161,164,172,180],"constraints.":[17,165],"That":[18],"is,":[19],"transmitter":[21],"wants":[22],"to":[23,28,58],"send":[24],"two":[25,29],"independent":[26],"messages":[27],"legitimate":[30],"receivers":[31],"in":[32,184],"presence":[34],"an":[36,88],"eavesdropper,":[37],"while":[38],"keeping":[39],"eavesdropper":[41,60],"ignorant":[42],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">each</i>":[46,56],"message":[47,57],"(i.e.,":[48,129],"information":[50],"leakage":[51],"rate":[52,83,92],"from":[53],"is":[61,94,118,139],"made":[62,156],"vanishing).":[63],"Building":[64],"upon":[65],"Carleial\u2013Hellman\u2019s":[66],"coding,":[68,71],"Wyner\u2019s":[69],"and":[72,85,121,162,182],"framework":[74],"Marton\u2019s":[76],"coding":[77],"together":[78],"with":[79,96,157,169],"techniques,":[80],"such":[81],"as":[82],"splitting":[84],"indirect":[86],"decoding,":[87],"achievable":[89],"individual":[90,109,134],"region":[93,112],"established":[95],"characterization":[98],"capacity":[100,111,136,152],"regions":[101],"for":[102,113,122,177],"some":[103],"special":[104],"cases.":[105],"In":[106],"particular,":[107],"linear":[115],"deterministic":[116],"model":[117],"fully":[119],"characterized,":[120],"Gaussian":[124],"model,":[125],"a":[126],"constant":[127],"gap":[128],"0.5":[130],"b":[131],"within":[132],"region)":[137],"result":[138],"obtained.":[140],"To":[141],"illustrate":[142],"impact":[144],"different":[146],"constraints":[148],"on":[149],"corresponding":[151],"regions,":[153],"comparisons":[154],"are":[155],"those":[158],"satisfying":[159],"joint":[160,171],"without":[163],"Overall,":[166],"when":[167],"compared":[168],"constraint,":[173],"results":[175],"allow":[176],"trading":[178],"off":[179],"level":[181],"throughput":[183],"system.":[186]},"counts_by_year":[{"year":2016,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
