{"id":"https://openalex.org/W2802999181","doi":"https://doi.org/10.1109/tit.2018.2834508","title":"Strong Secrecy for Interference Channels Based on Channel Resolvability","display_name":"Strong Secrecy for Interference Channels Based on Channel Resolvability","publication_year":2018,"publication_date":"2018-05-09","ids":{"openalex":"https://openalex.org/W2802999181","doi":"https://doi.org/10.1109/tit.2018.2834508","mag":"2802999181"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2018.2834508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2018.2834508","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087582847","display_name":"Zhao Wang","orcid":"https://orcid.org/0000-0002-6863-7695"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Zhao Wang","raw_affiliation_strings":["Department of Communication Theory, Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Communication Theory, Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038203207","display_name":"Rafael F. Schaefer","orcid":"https://orcid.org/0000-0002-1702-9075"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rafael F. Schaefer","raw_affiliation_strings":["Department of Electrical Engineering, Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041348422","display_name":"Mikael Skoglund","orcid":"https://orcid.org/0000-0002-7926-5081"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Mikael Skoglund","raw_affiliation_strings":["Department of Information Science and Engineering, Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Engineering, Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037292846","display_name":"Ming Xiao","orcid":"https://orcid.org/0000-0002-5407-0835"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Ming Xiao","raw_affiliation_strings":["Department of Information Science and Engineering, Royal Institute of Technology, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Engineering, Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042307561","display_name":"H. Vincent Poor","orcid":"https://orcid.org/0000-0002-2062-131X"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"H. Vincent Poor","raw_affiliation_strings":["Department of Electrical Engineering, Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5087582847"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":1.174,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.79773179,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"64","issue":"7","first_page":"5110","last_page":"5130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9726999998092651,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7851139307022095},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.658637285232544},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5455013513565063},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.5451587438583374},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.543614387512207},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5079639554023743},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.4935663938522339},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.41054579615592957},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.37032145261764526},{"id":"https://openalex.org/keywords/statistical-physics","display_name":"Statistical physics","score":0.3211403787136078},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.28073424100875854},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.18840652704238892},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17541956901550293},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.13889896869659424},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.07414478063583374},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.06986001133918762}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7851139307022095},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.658637285232544},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5455013513565063},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.5451587438583374},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.543614387512207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5079639554023743},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.4935663938522339},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.41054579615592957},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.37032145261764526},{"id":"https://openalex.org/C121864883","wikidata":"https://www.wikidata.org/wiki/Q677916","display_name":"Statistical physics","level":1,"score":0.3211403787136078},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.28073424100875854},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.18840652704238892},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17541956901550293},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.13889896869659424},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.07414478063583374},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.06986001133918762}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2018.2834508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2018.2834508","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.47999998927116394}],"awards":[{"id":"https://openalex.org/G3515941858","display_name":null,"funder_award_id":"CNS-1702808","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G914364814","display_name":null,"funder_award_id":"ECCS-1647198","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1549664537","https://openalex.org/W1640619410","https://openalex.org/W1657774708","https://openalex.org/W1786217489","https://openalex.org/W1875021344","https://openalex.org/W1999884614","https://openalex.org/W2009379494","https://openalex.org/W2010669591","https://openalex.org/W2022854997","https://openalex.org/W2043769961","https://openalex.org/W2058388580","https://openalex.org/W2065890488","https://openalex.org/W2068887604","https://openalex.org/W2079525500","https://openalex.org/W2091891040","https://openalex.org/W2096037147","https://openalex.org/W2103674915","https://openalex.org/W2107389715","https://openalex.org/W2112289862","https://openalex.org/W2123485355","https://openalex.org/W2128153585","https://openalex.org/W2130334496","https://openalex.org/W2134841917","https://openalex.org/W2141432745","https://openalex.org/W2144007657","https://openalex.org/W2147348113","https://openalex.org/W2154300278","https://openalex.org/W2156445794","https://openalex.org/W2159687282","https://openalex.org/W2160651961","https://openalex.org/W2162635854","https://openalex.org/W2342752031","https://openalex.org/W2566769952","https://openalex.org/W2963645489","https://openalex.org/W2963834558","https://openalex.org/W3102490990","https://openalex.org/W4251984466","https://openalex.org/W4300840296","https://openalex.org/W4302366875","https://openalex.org/W6638053103"],"related_works":["https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2340481533","https://openalex.org/W2898567960","https://openalex.org/W2036210457","https://openalex.org/W2369043755","https://openalex.org/W2039752281","https://openalex.org/W1608200561"],"abstract_inverted_index":{"Interference":[0],"channels":[1,77,104,139],"with":[2,78,105],"confidential":[3,31],"messages":[4],"are":[5,95,140],"studied":[6,141],"under":[7,89],"strong":[8,42,92,152,184],"secrecy":[9,43,93,120,153,185],"constraints,":[10],"based":[11],"on":[12],"the":[13,24,35,82,86,96,119,128,144,147,159],"framework":[14,182],"of":[15,37,114,127,131,161,165],"channel":[16,61,66,175],"resolvability":[17,67,176],"theory.":[18],"It":[19],"is":[20,33,55,100,177],"shown":[21],"that":[22,85,174],"if":[23],"random":[25],"binning":[26],"rate":[27,154],"for":[28,183],"securing":[29],"a":[30,64,70,111,125,178],"message":[32],"above":[34,123],"resolution":[36],"its":[38],"corresponding":[39],"wiretapped":[40],"channel,":[41],"can":[44],"be":[45],"guaranteed.":[46],"The":[47],"information-spectrum":[48],"method":[49],"introduced":[50],"by":[51,109,124],"Han":[52],"and":[53,75,91,151,164,167,180],"Verd\u00fa":[54],"generalized":[56,102],"to":[57,62,103,117],"an":[58,135],"arbitrary":[59],"interference":[60,138],"obtain":[63],"direct":[65],"result":[68,99],"as":[69],"first":[71],"step.":[72],"For":[73],"stationary":[74],"memoryless":[76],"discrete":[79],"output":[80,107],"alphabets,":[81],"results":[83,170],"show":[84],"achievable":[87],"rates":[88],"weak":[90,150],"constraints":[94],"same.":[97],"This":[98],"then":[101],"continuous":[106],"alphabets":[108],"deriving":[110],"reverse":[112],"direction":[113],"Pinsker's":[115],"inequality":[116],"bound":[118],"measure":[121],"from":[122],"function":[126],"variational":[129],"distance":[130],"relevant":[132],"distributions.":[133],"As":[134],"application,":[136],"Gaussian":[137],"in":[142,187],"which":[143],"agreement":[145],"between":[146],"best":[148],"known":[149],"regions":[155],"also":[156],"appear.":[157],"Following":[158],"footsteps":[160],"Csisz\u00e1r,":[162],"Hayashi":[163],"Bloch":[166],"Laneman,":[168],"these":[169],"provide":[171],"further":[172],"evidence":[173],"powerful":[179],"general":[181],"analysis":[186],"multiuser":[188],"networks.":[189]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
