{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:54:55Z","timestamp":1740131695993,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/tit.2017.2769124","type":"journal-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T20:46:48Z","timestamp":1509655608000},"page":"26-37","source":"Crossref","is-referenced-by-count":5,"title":["Interactive Communication for Data Exchange"],"prefix":"10.1109","volume":"64","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2950-706X","authenticated-orcid":false,"given":"Himanshu","family":"Tyagi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3171-8667","authenticated-orcid":false,"given":"Pramod","family":"Viswanath","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1121-8633","authenticated-orcid":false,"given":"Shun","family":"Watanabe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TIT.2010.2040867"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1137\/0128010"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/2840728.2840754"},{"year":"2013","author":"tyagi","article-title":"Common randomness principles of secrecy","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TIT.2013.2291231"},{"key":"ref30","first-page":"689","article-title":"Asymptotic estimates in Shannon&#x2019;s information theory","author":"strassen","year":"1962","journal-title":"Proc 3rd Prague Conf Inf Theory"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TIT.2015.2457926"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1007\/978-3-642-55220-5_21"},{"year":"0","author":"tyagi","journal-title":"Interactive communication for data exchange","key":"ref35"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TIT.2017.2746859"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ITW.2002.1115434"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TIT.2008.2006449"},{"key":"ref11","volume":"2","author":"feller","year":"1971","journal-title":"An Introduction to Probability Theory and Its Applications"},{"key":"ref12","first-page":"149","article-title":"Common information is far less than mutual information","volume":"2","author":"gacs","year":"1973","journal-title":"Problems Control Inf Theory"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-662-12066-8"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/18.256486"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIT.2008.928985"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIT.2016.2567440"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ISIT.2014.6875010"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TIT.2009.2030478"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/73007.73009"},{"key":"ref28","first-page":"199","article-title":"Simple and tight bounds for information reconciliation and privacy amplification","author":"renner","year":"2005","journal-title":"Proc ASIACRYPT"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/FOCS.2011.86"},{"year":"2005","author":"renner","article-title":"Security of quantum key distribution","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/18.476316"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TIT.1982.1056524"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TIT.1973.1055037"},{"year":"2006","author":"cover","journal-title":"Elements of Information Theory","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIT.2004.838380"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1017\/CBO9780511921889"},{"key":"ref2","first-page":"2361","article-title":"Feedback can improve the second-order coding performance in discrete memoryless channels","author":"altu?","year":"2014","journal-title":"Proc ISIT"},{"key":"ref9","first-page":"1332","article-title":"Universal incremental slepian-wolf coding","author":"draper","year":"2004","journal-title":"Proc Conf Commun Control Comput (Allerton)"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/18.243431"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/S0065-2458(08)60342-3"},{"key":"ref22","first-page":"1063","article-title":"Coding theorems on correlated general sources","volume":"e78 a","author":"miyake","year":"1995","journal-title":"IEICE Trans Fundamentals"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/18.256484"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/18.57210"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/800057.808684"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIT.2010.2043769"},{"year":"2010","author":"polyanskiy","article-title":"Channel coding: Non-asymptotic fundamental limits","key":"ref25"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/8232491\/08094290.pdf?arnumber=8094290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:25:57Z","timestamp":1642004757000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8094290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tit.2017.2769124","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}