{"id":"https://openalex.org/W2937247444","doi":"https://doi.org/10.1109/vtcfall.2018.8690843","title":"Information Reconciliation Based on Systematic Secure Polar Code for Secret Key Generation","display_name":"Information Reconciliation Based on Systematic Secure Polar Code for Secret Key Generation","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2937247444","doi":"https://doi.org/10.1109/vtcfall.2018.8690843","mag":"2937247444"},"language":"en","primary_location":{"id":"doi:10.1109/vtcfall.2018.8690843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtcfall.2018.8690843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101934836","display_name":"Shengjun Zhang","orcid":"https://orcid.org/0000-0002-7108-0760"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shengjun Zhang","raw_affiliation_strings":["National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026663721","display_name":"Liang Jin","orcid":"https://orcid.org/0000-0001-6464-6263"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liang Jin","raw_affiliation_strings":["National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078519263","display_name":"Shilei Zhu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shilei Zhu","raw_affiliation_strings":["66393 Troops Postdoctoral Science Research Workstation, Baoding, China"],"affiliations":[{"raw_affiliation_string":"66393 Troops Postdoctoral Science Research Workstation, Baoding, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079614008","display_name":"Kaizhi Huang","orcid":"https://orcid.org/0000-0002-7084-3826"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kaizhi Huang","raw_affiliation_strings":["National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100350978","display_name":"Zhong Zhou","orcid":"https://orcid.org/0009-0004-0461-041X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhou Zhong","raw_affiliation_strings":["National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering & Technological Research Center, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101934836"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5536,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.72450352,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.7692979574203491},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7251797914505005},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7082474231719971},{"id":"https://openalex.org/keywords/polar-code","display_name":"Polar code","score":0.6968116760253906},{"id":"https://openalex.org/keywords/parity-bit","display_name":"Parity bit","score":0.6707931756973267},{"id":"https://openalex.org/keywords/polar","display_name":"Polar","score":0.584836483001709},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5262044072151184},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5087798237800598},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5011498928070068},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4696468710899353},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.46294888854026794},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.43721118569374084},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4261902868747711},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.41796523332595825},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.4175792336463928},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18868869543075562},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18453317880630493},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.16541001200675964},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13918569684028625}],"concepts":[{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.7692979574203491},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7251797914505005},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7082474231719971},{"id":"https://openalex.org/C2778396592","wikidata":"https://www.wikidata.org/wiki/Q7209069","display_name":"Polar code","level":3,"score":0.6968116760253906},{"id":"https://openalex.org/C131521367","wikidata":"https://www.wikidata.org/wiki/Q625502","display_name":"Parity bit","level":2,"score":0.6707931756973267},{"id":"https://openalex.org/C29705727","wikidata":"https://www.wikidata.org/wiki/Q294562","display_name":"Polar","level":2,"score":0.584836483001709},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5262044072151184},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5087798237800598},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5011498928070068},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4696468710899353},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.46294888854026794},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.43721118569374084},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4261902868747711},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.41796523332595825},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.4175792336463928},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18868869543075562},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18453317880630493},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16541001200675964},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13918569684028625},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtcfall.2018.8690843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtcfall.2018.8690843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1957358593","https://openalex.org/W1996403876","https://openalex.org/W2027229067","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2130768170","https://openalex.org/W2133952863","https://openalex.org/W2144007657","https://openalex.org/W2150498905","https://openalex.org/W2247867857","https://openalex.org/W2295120647","https://openalex.org/W2563986199","https://openalex.org/W2568978207","https://openalex.org/W2588023729","https://openalex.org/W2963114059","https://openalex.org/W3105108969"],"related_works":["https://openalex.org/W2977145926","https://openalex.org/W4285785488","https://openalex.org/W3006670285","https://openalex.org/W1995335316","https://openalex.org/W2800096282","https://openalex.org/W2790387741","https://openalex.org/W2076999648","https://openalex.org/W4384074457","https://openalex.org/W2083917443","https://openalex.org/W2124455219"],"abstract_inverted_index":{"Focusing":[0],"on":[1,18,62],"the":[2,27,34,50,63,78,86,96,102],"problem":[3],"of":[4,29,39,88,104],"information":[5,8],"leakage":[6],"in":[7],"reconciliation":[9],"(IR),":[10],"this":[11],"paper":[12],"proposes":[13],"an":[14],"IR":[15,60,72,80,90,114,126],"method":[16,98],"based":[17,61,125],"systematic":[19],"secure":[20],"polar":[21],"code":[22,124],"(SSPC),":[23],"which":[24],"can":[25],"ensure":[26],"security":[28],"transmitted":[30],"check":[31,122],"bits.":[32],"First,":[33],"upper":[35],"and":[36,71,107],"lower":[37],"bounds":[38],"decoded":[40],"bit":[41,66],"error":[42,67],"ratio":[43],"are":[44,82],"derived":[45],"through":[46],"Gaussian":[47],"approximation.":[48],"Then,":[49],"generic":[51],"algorithm":[52],"is":[53],"utilized":[54],"to":[55,84],"design":[56],"suitable":[57],"SSPC":[58],"for":[59],"initial":[64],"quantified":[65],"ratios,":[68],"key":[69,105],"strength":[70,106],"outage":[73],"probability":[74],"(IROP).":[75],"At":[76],"last,":[77],"completely":[79],"procedures":[81],"simulated":[83],"evaluate":[85],"performances":[87],"proposed":[89,97],"method.":[91,127],"Simulation":[92],"results":[93],"show":[94],"that":[95],"not":[99],"only":[100],"satisfies":[101],"requirements":[103],"IROP":[108],"threshold,":[109],"but":[110],"also":[111],"achieves":[112],"higher":[113],"efficiency,":[115],"compared":[116],"with":[117],"traditional":[118],"low":[119],"density":[120],"parity":[121],"(LDPC)":[123]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
