{"id":"https://openalex.org/W7126151497","doi":"https://doi.org/10.1109/tit.2026.3659469","title":"Sliding Secure Symmetric Multilevel Diversity Coding","display_name":"Sliding Secure Symmetric Multilevel Diversity Coding","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7126151497","doi":"https://doi.org/10.1109/tit.2026.3659469"},"language":null,"primary_location":{"id":"doi:10.1109/tit.2026.3659469","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2026.3659469","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124436630","display_name":"Tao Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tao Guo","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030034956","display_name":"Laigang Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Laigang Guo","raw_affiliation_strings":["Laboratory of Mathematics and Complex Systems (Ministry of Education), School of Mathematical Sciences, Beijing Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Laboratory of Mathematics and Complex Systems (Ministry of Education), School of Mathematical Sciences, Beijing Normal University, Beijing, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014227402","display_name":"Yinfei Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinfei Xu","raw_affiliation_strings":["National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010902014","display_name":"Lihua Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Congduan Li","raw_affiliation_strings":["School of Electronics and Communication Engineering, Sun Yat-sen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Communication Engineering, Sun Yat-sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124406365","display_name":"Shi Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shi Jin","raw_affiliation_strings":["National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5124436630"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22730755,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"4","first_page":"2483","last_page":"2501"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.8314999938011169,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.8314999938011169,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.0917000025510788,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.00989999994635582,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.6119999885559082},{"id":"https://openalex.org/keywords/shannon\u2013fano-coding","display_name":"Shannon\u2013Fano coding","score":0.6031000018119812},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5658000111579895},{"id":"https://openalex.org/keywords/variable-length-code","display_name":"Variable-length code","score":0.4706999957561493},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.46810001134872437},{"id":"https://openalex.org/keywords/tunstall-coding","display_name":"Tunstall coding","score":0.4487999975681305},{"id":"https://openalex.org/keywords/superposition-principle","display_name":"Superposition principle","score":0.4320000112056732},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.37959998846054077}],"concepts":[{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.6119999885559082},{"id":"https://openalex.org/C130811719","wikidata":"https://www.wikidata.org/wiki/Q2645","display_name":"Shannon\u2013Fano coding","level":4,"score":0.6031000018119812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5870000123977661},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5658000111579895},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5228000283241272},{"id":"https://openalex.org/C60603091","wikidata":"https://www.wikidata.org/wiki/Q2981616","display_name":"Variable-length code","level":3,"score":0.4706999957561493},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.46810001134872437},{"id":"https://openalex.org/C73231260","wikidata":"https://www.wikidata.org/wiki/Q7853376","display_name":"Tunstall coding","level":4,"score":0.4487999975681305},{"id":"https://openalex.org/C27753989","wikidata":"https://www.wikidata.org/wiki/Q284885","display_name":"Superposition principle","level":2,"score":0.4320000112056732},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3896999955177307},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.37959998846054077},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3743000030517578},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.35440000891685486},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.3172000050544739},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.30799999833106995},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.3000999987125397},{"id":"https://openalex.org/C206468330","wikidata":"https://www.wikidata.org/wiki/Q834373","display_name":"Code rate","level":3,"score":0.27720001339912415},{"id":"https://openalex.org/C175732694","wikidata":"https://www.wikidata.org/wiki/Q1128713","display_name":"Context-adaptive binary arithmetic coding","level":3,"score":0.267300009727478},{"id":"https://openalex.org/C166366890","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Channel code","level":3,"score":0.2603999972343445},{"id":"https://openalex.org/C200801453","wikidata":"https://www.wikidata.org/wiki/Q5283181","display_name":"Distributed source coding","level":4,"score":0.25929999351501465},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.2565999925136566},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2026.3659469","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2026.3659469","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1534695542","https://openalex.org/W1962788253","https://openalex.org/W1977854174","https://openalex.org/W2050065433","https://openalex.org/W2101526130","https://openalex.org/W2118406177","https://openalex.org/W2120085609","https://openalex.org/W2123095296","https://openalex.org/W2135144353","https://openalex.org/W2141420453","https://openalex.org/W2158671386","https://openalex.org/W2167160216","https://openalex.org/W2287596261","https://openalex.org/W2409139038","https://openalex.org/W2586883652","https://openalex.org/W2603289843","https://openalex.org/W2796469375","https://openalex.org/W2962901739","https://openalex.org/W2963077051","https://openalex.org/W2980804118","https://openalex.org/W3006103585","https://openalex.org/W3037651403","https://openalex.org/W4230830692","https://openalex.org/W4401693862"],"related_works":[],"abstract_inverted_index":{"Symmetric":[0],"multilevel":[1,219],"diversity":[2],"coding":[3,8,133,155,205,226,246,264],"(SMDC)":[4],"is":[5,33,59,94,134,156,172,228],"a":[6,203,224],"multi-source":[7],"problem":[9,93,106],"where":[10,28,46],"the":[11,38,51,60,97,108,124,140,159,209,214,232,237,248],"independent":[12],"sources":[13,29,115,176,190,254],"are":[14,30,90,116,149],"ordered":[15],"according":[16],"to":[17,96,230],"their":[18],"importance.":[19],"Prior":[20],"work":[21],"demonstrated":[22],"that":[23,67,131,153,207],"<italic":[24,39,47,56,70,86,98,110,119,141,145,178,192,216,249,255,266],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[25,40,48,57,71,73,87,99,102,111,120,142,146,179,182,193,195,217,250,256,267],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">superposition":[26],"coding</i>,":[27],"encoded":[31],"independently,":[32],"optimal.":[34,135],"This":[35],"paper":[36],"investigates":[37],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(L,s)</i>":[41,100,143,218],"sliding":[42,239],"secure":[43,79,240],"SMDC":[44,241],"problem,":[45,242],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">L</i>":[49],"represents":[50],"number":[52],"of":[53,213,236,253],"encoders":[54,89],"and":[55,128,262],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">s</i>":[58,88,121,251],"security":[61,64],"threshold.":[62],"The":[63,92,136,162],"requirement":[65],"dictates":[66],"each":[68],"source":[69],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">X</i><sub":[72,194],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u03b1</sub>":[74],"must":[75],"be":[76],"kept":[77],"perfectly":[78],"if":[80],"no":[81],"more":[82,188],"than":[83],"\u03b1":[84],"\u2013":[85,113],"accessible.":[91],"specialized":[95],"m<italic":[101],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">ultilevel":[103],"secret":[104,185,220],"sharing</i>":[105],"when":[107],"first":[109],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">s":[112],"1</i>":[114],"constants.":[117],"For":[118],"=":[122,144],"1,":[123],"two":[125],"problems":[126,148],"coincide,":[127],"we":[129,201],"show":[130],"superposition":[132,154,245],"rate":[137,212,235],"regions":[138],"for":[139,158,165,187,247],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(3,2)</i>":[147],"characterized,":[150],"which":[151,243],"implies":[152],"suboptimal":[157],"general":[160,215,238],"case.":[161],"core":[163],"insight":[164],"achieving":[166],"lower":[167],"rates":[168],"through":[169],"joint":[170,204,263],"encoding":[171],"leveraging":[173],"less":[174],"important":[175,189],"like":[177,191],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">X</i>":[180],"<sub":[181],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u03b1\u20131</sub>":[183],"as":[184],"keys":[186],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u03b1</sub>.":[196],"Based":[197],"on":[198],"this":[199],"idea,":[200],"propose":[202],"scheme":[206,227],"achieves":[208],"minimum":[210,233],"sum":[211,234],"sharing":[221],"problem.":[222],"Moreover,":[223],"pseudo-superposition":[225],"proposed":[229],"achieve":[231],"uses":[244],"sets":[252],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[257],"X<sub>1</sub>,":[258],"X<sub>2</sub>,...,":[259],"X<sub>s\u20131</sub>,":[260],"(X<sub>s</sub>,X<sub>s+1</sub>,X<sub>L</sub>)</i>":[261],"among":[265],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">X<sub>s</sub>,X<i>s+1</i>,X<i>L</i></i>.":[268]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-02-01T00:00:00"}
