{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:31:37Z","timestamp":1773513097267,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/www.ieee.org\/publications_standards\/publications\/rights\/ieeecopyrightform.pdf"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.ieee.org\/publications_standards\/publications\/rights\/ieeecopyrightform.pdf"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CCF-0939370"],"award-info":[{"award-number":["CCF-0939370"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1908308"],"award-info":[{"award-number":["CCF-1908308"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Inf. Theory"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1109\/jsait.2021.3055692","type":"journal-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T06:30:36Z","timestamp":1612333836000},"page":"163-176","source":"Crossref","is-referenced-by-count":16,"title":["A Compression Perspective on Secrecy Measures"],"prefix":"10.1109","volume":"2","author":[{"given":"Yanina Y.","family":"Shkel","sequence":"first","affiliation":[]},{"given":"H. Vincent","family":"Poor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544907"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/18.272457"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2700857"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.3041224"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849315"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437690"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437481"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/info7010015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174133"},{"key":"ref29","first-page":"429","article-title":"Local privacy and statistical minimax rates","author":"duchi","year":"2013","journal-title":"Proc Annu IEEE Symp Foundations Comput Sci"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45661-9_21"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2548470"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref21","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proc Conf Theory of Cryptography"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2685505"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978308"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00056"},{"key":"ref25","first-page":"49","article-title":"Beyond differential privacy: Composition theorems and relational logic for f-divergences between probabilistic programs","author":"barthe","year":"2013","journal-title":"Automata Languages and Programming"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9173959"},{"key":"ref10","first-page":"173","article-title":"Source coding under secrecy constraints","author":"g\u00fcnd\u00fcz","year":"2010","journal-title":"Securing Wireless Communications at the Physical Layer"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253320"},{"key":"ref40","author":"stinson","year":"2002","journal-title":"Cryptography Theory and Practice"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/18.782106"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921707"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2686882"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2962804"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2865558"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2935768"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/18.9781"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2365175"},{"key":"ref4","author":"ristic","year":"2020","journal-title":"Crime Information Leakage Attack Against ssl\/tls"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.21"},{"key":"ref6","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref5","author":"goodin","year":"0","journal-title":"Gone in 30 Seconds New Attack Plucks Secrets From HTTPS-Protected Pages"},{"key":"ref8","year":"2017","journal-title":"Information Theoretic Security and Privacy of Information Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2291007"},{"key":"ref49","author":"el gamal","year":"2012","journal-title":"Network Information Theory"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006710"},{"key":"ref45","year":"2017","journal-title":"Information Theoretic Security and Privacy of Information Systems"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437892"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2700860"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.833860"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6033797"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283543"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2466697"}],"container-title":["IEEE Journal on Selected Areas in Information Theory"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8700143\/9380089\/9344622-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8700143\/9380089\/09344622.pdf?arnumber=9344622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T19:59:00Z","timestamp":1625515140000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9344622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":50,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsait.2021.3055692","relation":{},"ISSN":["2641-8770"],"issn-type":[{"value":"2641-8770","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}