{"id":"https://openalex.org/W4415366801","doi":"https://doi.org/10.1109/isit63088.2025.11195323","title":"Regular LDPC Codes on BMS Wiretap Channels","display_name":"Regular LDPC Codes on BMS Wiretap Channels","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4415366801","doi":"https://doi.org/10.1109/isit63088.2025.11195323"},"language":null,"primary_location":{"id":"doi:10.1109/isit63088.2025.11195323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045042756","display_name":"Madhura Pathegama","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Madhura Pathegama","raw_affiliation_strings":["University of Maryland,College Park,USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland,College Park,USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004622357","display_name":"Alexander Barg","orcid":"https://orcid.org/0000-0002-8972-4413"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alexander Barg","raw_affiliation_strings":["University of Maryland,College Park,USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland,College Park,USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045042756"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":1.6666,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89091717,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.6452000141143799},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6444000005722046},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.49059998989105225},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.47110000252723694},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4580000042915344},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.36230000853538513},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.3610999882221222},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.3312000036239624}],"concepts":[{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.6452000141143799},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6444000005722046},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5547999739646912},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.49059998989105225},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.47110000252723694},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4580000042915344},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3903000056743622},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3662000000476837},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.36230000853538513},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36149999499320984},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3610999882221222},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.358599990606308},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.33160001039505005},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.3312000036239624},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.32249999046325684},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.3010999858379364},{"id":"https://openalex.org/C46462455","wikidata":"https://www.wikidata.org/wiki/Q5395712","display_name":"Error floor","level":4,"score":0.27559998631477356},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.27239999175071716},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.2660999894142151},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.26420000195503235},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.25850000977516174}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit63088.2025.11195323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W182801106","https://openalex.org/W1514518704","https://openalex.org/W1536930200","https://openalex.org/W1968989388","https://openalex.org/W2030035398","https://openalex.org/W2043769961","https://openalex.org/W2124602541","https://openalex.org/W2143062570","https://openalex.org/W2144007657","https://openalex.org/W2148587342","https://openalex.org/W2155438308","https://openalex.org/W2549540337","https://openalex.org/W3215304434","https://openalex.org/W4300188436","https://openalex.org/W4302366875","https://openalex.org/W4376851350","https://openalex.org/W4388380446","https://openalex.org/W4411143337","https://openalex.org/W4415366801"],"related_works":[],"abstract_inverted_index":{"We":[0,52],"improve":[1,53],"the":[2,50,54,62,83],"secrecy":[3,28],"guarantees":[4],"for":[5],"transmission":[6],"over":[7,44],"BMS":[8],"wiretap":[9,34],"channels":[10,35],"that":[11,24],"relies":[12],"on":[13],"regular":[14],"LDPC":[15,25],"codes.":[16],"Previous":[17],"works":[18],"(Thangaraj":[19],"e.a.,":[20],"2007,":[21],"2010)":[22],"showed":[23],"codes":[26],"achieve":[27],"capacity":[29],"of":[30,33,42,49,57,76,87],"some":[31],"classes":[32],"while":[36],"leaking":[37],"<tex":[38,45,66],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[39,46,67],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$o(n)$</tex>":[40],"bits":[41],"information":[43],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$n$</tex>":[47],"uses":[48],"channel.":[51],"security":[55],"component":[56],"these":[58],"results":[59],"by":[60],"reducing":[61],"leakage":[63],"parameter":[64],"to":[65],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$O\\left(\\log":[68],"^{2}":[69],"n\\right)$</tex>.":[70],"While":[71],"this":[72],"result":[73],"stops":[74],"short":[75],"proving":[77],"strong":[78],"security,":[79],"it":[80],"goes":[81],"beyond":[82],"general":[84],"uniformity":[85],"properties":[86],"capacity-approaching":[88],"code":[89],"families.":[90]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-21T00:00:00"}
