{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:54:33Z","timestamp":1740131673873,"version":"3.37.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Defense Research and Development Organisation, India","award":["DRDO0649"],"award-info":[{"award-number":["DRDO0649"]}]},{"DOI":"10.13039\/501100001691","name":"JSPS KAKENHI","doi-asserted-by":"publisher","award":["16H06091"],"award-info":[{"award-number":["16H06091"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/tit.2017.2694850","type":"journal-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T14:12:30Z","timestamp":1492438350000},"page":"4057-4074","source":"Crossref","is-referenced-by-count":12,"title":["Universal Multiparty Data Exchange and Secret Key Agreement"],"prefix":"10.1109","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2950-706X","authenticated-orcid":false,"given":"Himanshu","family":"Tyagi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1121-8633","authenticated-orcid":false,"given":"Shun","family":"Watanabe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055934"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2040867"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056166"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056281"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838380"},{"key":"ref13","first-page":"1332","article-title":"Universal incremental Slepian&#x2013;Wolf coding","author":"draper","year":"2004","journal-title":"Proc 42nd Annu Allerton Conf"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1984.715906"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2567440"},{"journal-title":"Communication Complexity","year":"1997","author":"kushilevitz","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034157"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2523980"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2457926"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2458316"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_21"},{"journal-title":"On tightness of mutual dependence upper bound for secret-key capacity of multiple terminals","year":"2008","author":"chan","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2015.7176782"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2548468"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2010.5464805"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680380"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056524"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/18.340465"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ITWKSPS.2010.5503135"},{"article-title":"Security of quantum key distribution","year":"2005","author":"renner","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513313"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055037"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007051"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282767"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7948883\/07902138.pdf?arnumber=7902138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:39:46Z","timestamp":1641987586000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7902138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":31,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tit.2017.2694850","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2017,7]]}}}