{"id":"https://openalex.org/W2557793327","doi":"https://doi.org/10.1109/tit.2018.2824244","title":"Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach","display_name":"Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach","publication_year":2018,"publication_date":"2018-04-06","ids":{"openalex":"https://openalex.org/W2557793327","doi":"https://doi.org/10.1109/tit.2018.2824244","mag":"2557793327"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2018.2824244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2018.2824244","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027528912","display_name":"Xuan Guang","orcid":"https://orcid.org/0000-0002-0928-421X"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I4401200345","display_name":"Laboratoire de physique de la mati\u00e8re condens\u00e9e","ror":"https://ror.org/05brss208","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I4401200345","https://openalex.org/I4647051"]}],"countries":["CN","FR"],"is_corresponding":true,"raw_author_name":"Xuan Guang","raw_affiliation_strings":["School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences and LPMC, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279","https://openalex.org/I4401200345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038760786","display_name":"Raymond W. Yeung","orcid":"https://orcid.org/0000-0001-7386-4027"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Raymond W. Yeung","raw_affiliation_strings":["Institute of Network Coding, The Chinese University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, The Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027528912"],"corresponding_institution_ids":["https://openalex.org/I205237279","https://openalex.org/I4401200345"],"apc_list":null,"apc_paid":null,"fwci":1.3657,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.826119,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"64","issue":"6","first_page":"4513","last_page":"4529"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9539999961853027,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9463000297546387,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.7869338393211365},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.71033775806427},{"id":"https://openalex.org/keywords/alphabet","display_name":"Alphabet","score":0.6475063562393188},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6053311228752136},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5919579863548279},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5805940628051758},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.47728458046913147},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4622957110404968},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4587019681930542},{"id":"https://openalex.org/keywords/graph-theory","display_name":"Graph theory","score":0.4351974427700043},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4181958734989166},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.39117130637168884},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3648200035095215},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3390146493911743},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.2216605246067047},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19112062454223633},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08112218976020813}],"concepts":[{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.7869338393211365},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.71033775806427},{"id":"https://openalex.org/C112876837","wikidata":"https://www.wikidata.org/wiki/Q837518","display_name":"Alphabet","level":2,"score":0.6475063562393188},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6053311228752136},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5919579863548279},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5805940628051758},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.47728458046913147},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4622957110404968},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4587019681930542},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.4351974427700043},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4181958734989166},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.39117130637168884},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3648200035095215},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3390146493911743},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.2216605246067047},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19112062454223633},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08112218976020813},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2018.2824244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2018.2824244","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3179852935","display_name":null,"funder_award_id":"61771259","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W18139138","https://openalex.org/W108696806","https://openalex.org/W1939076699","https://openalex.org/W2006947308","https://openalex.org/W2058149044","https://openalex.org/W2097386704","https://openalex.org/W2105831729","https://openalex.org/W2106403318","https://openalex.org/W2106570206","https://openalex.org/W2109394932","https://openalex.org/W2115602633","https://openalex.org/W2123562143","https://openalex.org/W2136438512","https://openalex.org/W2138928022","https://openalex.org/W2141420453","https://openalex.org/W2152303628","https://openalex.org/W2154501376","https://openalex.org/W2156053652","https://openalex.org/W2170184107","https://openalex.org/W2172117832","https://openalex.org/W2224360947","https://openalex.org/W2914714618","https://openalex.org/W2970097841","https://openalex.org/W3101064986","https://openalex.org/W4205523767","https://openalex.org/W4205946516","https://openalex.org/W4212896000","https://openalex.org/W4213060235","https://openalex.org/W4213060883","https://openalex.org/W4232896595","https://openalex.org/W6600739974","https://openalex.org/W6680315945","https://openalex.org/W6683110870","https://openalex.org/W6698135423"],"related_works":["https://openalex.org/W2212571888","https://openalex.org/W2139379087","https://openalex.org/W2074481494","https://openalex.org/W2086397253","https://openalex.org/W4250156143","https://openalex.org/W2285288187","https://openalex.org/W2133122801","https://openalex.org/W2411336269","https://openalex.org/W2020805386","https://openalex.org/W3014803371"],"abstract_inverted_index":{"We":[0],"consider":[1],"a":[2,12,17,24,101],"communication":[3],"network":[4,39,56,122,135],"where":[5],"there":[6],"exist":[7],"wiretappers":[8],"who":[9],"can":[10,35,143],"access":[11],"subset":[13],"of":[14,27,32,68,73,84,90,120,140,161],"channels,":[15],"called":[16],"wiretap":[18,28,33,141],"set,":[19],"which":[20,130],"is":[21,41,62,78,156],"chosen":[22],"from":[23,48],"given":[25],"collection":[26,31,139],"sets.":[29],"The":[30,124],"sets":[34],"be":[36,144],"arbitrary.":[37],"Secure":[38],"coding":[40,86],"applied":[42],"to":[43,51,81],"prevent":[44],"the":[45,52,58,82,113,118,134,138,162],"source":[46],"information":[47],"being":[49],"leaked":[50],"wiretappers.":[53],"In":[54,96],"secure":[55,121],"coding,":[57],"required":[59,114],"alphabet":[60,115],"size":[61,116],"an":[63],"open":[64],"problem":[65],"not":[66],"only":[67,132],"theoretical":[69],"interest":[70],"but":[71],"also":[72],"practical":[74],"importance,":[75],"because":[76],"it":[77],"closely":[79],"related":[80],"implementation":[83],"such":[85],"schemes":[87],"in":[88],"terms":[89],"computational":[91],"complexity":[92],"and":[93,108,137,149],"storage":[94],"requirement.":[95],"this":[97],"paper,":[98],"we":[99],"develop":[100],"systematic":[102],"graph-theoretic":[103],"approach":[104],"for":[105,117,158],"improving":[106],"Cai":[107,148],"Yeung's":[109,150],"lower":[110,126,151,164],"bound":[111,127],"on":[112,133],"existence":[119],"codes.":[123],"new":[125,163],"thus":[128],"obtained,":[129],"depends":[131],"topology":[136],"sets,":[142],"significantly":[145],"smaller":[146],"than":[147],"bound.":[152,165],"A":[153],"polynomial-time":[154],"algorithm":[155],"devised":[157],"efficient":[159],"computation":[160]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
