{"id":"https://openalex.org/W4396641355","doi":"https://doi.org/10.1186/s42400-024-00229-5","title":"Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy","display_name":"Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy","publication_year":2024,"publication_date":"2024-05-04","ids":{"openalex":"https://openalex.org/W4396641355","doi":"https://doi.org/10.1186/s42400-024-00229-5"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00229-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00229-5","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00229-5","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00229-5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102786035","display_name":"Chen An","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chen An","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064231927","display_name":"Mengjie Huang","orcid":"https://orcid.org/0000-0001-8163-8679"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengjie Huang","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007991015","display_name":"Xianhui Lu","orcid":"https://orcid.org/0000-0001-7091-5810"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianhui Lu","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056501000","display_name":"Lei Bi","orcid":"https://orcid.org/0000-0003-0760-3149"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Bi","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113899900","display_name":"Weijie Li","orcid":"https://orcid.org/0000-0003-0023-5398"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijie Li","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, No.19 Shucun Road, Haidian District, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, No.19 Yuquan Road, Shijingshan District, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102786035"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.4257,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.81673122,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5853347182273865},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.565008819103241},{"id":"https://openalex.org/keywords/polar-code","display_name":"Polar code","score":0.5183971524238586},{"id":"https://openalex.org/keywords/polar","display_name":"Polar","score":0.47543004155158997},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33458709716796875},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.19481366872787476},{"id":"https://openalex.org/keywords/thermodynamics","display_name":"Thermodynamics","score":0.1267765462398529},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.10559192299842834}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5853347182273865},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.565008819103241},{"id":"https://openalex.org/C2778396592","wikidata":"https://www.wikidata.org/wiki/Q7209069","display_name":"Polar code","level":3,"score":0.5183971524238586},{"id":"https://openalex.org/C29705727","wikidata":"https://www.wikidata.org/wiki/Q294562","display_name":"Polar","level":2,"score":0.47543004155158997},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33458709716796875},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.19481366872787476},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.1267765462398529},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.10559192299842834},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00229-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00229-5","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00229-5","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:21034bc38f4a4d0bafc33444b14acc18","is_oa":true,"landing_page_url":"https://doaj.org/article/21034bc38f4a4d0bafc33444b14acc18","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 7, Iss 1, Pp 1-17 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00229-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00229-5","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00229-5","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396641355.pdf"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W182801106","https://openalex.org/W1916886752","https://openalex.org/W2043769961","https://openalex.org/W2054496355","https://openalex.org/W2098929365","https://openalex.org/W2106045225","https://openalex.org/W2106833918","https://openalex.org/W2131110609","https://openalex.org/W2133952863","https://openalex.org/W2138009247","https://openalex.org/W2144007657","https://openalex.org/W2150498905","https://openalex.org/W2154300278","https://openalex.org/W2156214717","https://openalex.org/W2284321898","https://openalex.org/W2295120647","https://openalex.org/W2507273085","https://openalex.org/W2509004749","https://openalex.org/W2734791532","https://openalex.org/W2743405031","https://openalex.org/W2905683382","https://openalex.org/W2964113506","https://openalex.org/W2973714027","https://openalex.org/W3037642437","https://openalex.org/W3097616122","https://openalex.org/W4207034359","https://openalex.org/W4312507539","https://openalex.org/W4385654090"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2963228343","https://openalex.org/W1599814246","https://openalex.org/W3106389544","https://openalex.org/W3080200660","https://openalex.org/W3196757433","https://openalex.org/W1514186088","https://openalex.org/W2976369658"],"abstract_inverted_index":{"Abstract":[0],"The":[1,105],"existing":[2],"physical":[3,90,138],"layer":[4,91,139],"security":[5,21,92],"schemes,":[6],"which":[7],"are":[8],"based":[9,150],"on":[10,151],"the":[11,16,53,69,77,88,96,110,119,123,134,146,152,157,182],"key":[12,140],"generation":[13,141],"model":[14],"and":[15,27,142,156,174],"wire-tap":[17,153],"channel":[18,24,154,159],"model,":[19,155],"achieve":[20,83],"by":[22,48],"utilizing":[23],"reciprocity":[25,45,50],"entropy":[26,43,51,160],"noise":[28,42],"entropy,":[29,46],"respectively.":[30,178],"In":[31],"contrast,":[32],"we":[33,86,129],"propose":[34],"a":[35,99,166],"novel":[36],"secure":[37],"transmission":[38],"framework":[39],"that":[40,60,109],"combines":[41],"with":[44],"achieved":[47],"inserting":[49],"into":[52,95],"frozen":[54],"bits":[55],"of":[56,79,122,137,184],"polar":[57],"codes.":[58],"Note":[59],"in":[61,103],"real-world":[62],"scenarios,":[63],"when":[64,131],"eavesdroppers":[65],"employ":[66],"polynomial-time":[67],"attacks,":[68],"bit":[70],"error":[71],"rate":[72,168],"(BER)":[73],"increases":[74],"due":[75],"to":[76,133],"introduction":[78],"computational":[80],"entropy.":[81],"To":[82],"indistinguishability":[84],"security,":[85],"convert":[87],"practical":[89],"metric,":[93],"BER,":[94],"average":[97],"min-entropy,":[98],"widely":[100],"accepted":[101],"concept":[102],"cryptography.":[104],"simulation":[106],"results":[107],"demonstrate":[108],"eavesdropper\u2019s":[111],"BER":[112],"can":[113],"be":[114],"significantly":[115],"increased":[116],"without":[117],"compromising":[118],"communication":[120],"performance":[121],"legitimate":[124],"receiver.":[125],"Under":[126],"concrete":[127],"parameters":[128],"selected,":[130],"compared":[132],"joint":[135],"scheme":[136,149,164],"one":[143],"time":[144],"pad,":[145],"modular":[147],"semantically-secure":[148],"simple":[158],"combination":[161],"scheme,":[162],"our":[163,185],"achieves":[165],"message":[167],"approximately":[169],"1.2":[170],"times,":[171,173],"3.8":[172],"1.4":[175],"times":[176],"better,":[177],"Experimental":[179],"testing":[180],"validates":[181],"feasibility":[183],"scheme.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
