{"id":"https://openalex.org/W4414528127","doi":"https://doi.org/10.1093/comjnl/bxaf111","title":"Privacy-preserving and verifiable aggregation for multi-task and multi-dimensional data","display_name":"Privacy-preserving and verifiable aggregation for multi-task and multi-dimensional data","publication_year":2025,"publication_date":"2025-09-02","ids":{"openalex":"https://openalex.org/W4414528127","doi":"https://doi.org/10.1093/comjnl/bxaf111"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxaf111","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxaf111","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007098627","display_name":"Hang Zhou","orcid":"https://orcid.org/0009-0008-6711-0876"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hang Zhou","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology) , Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228,","School of Cyberspace Security (School of Cryptology), Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology) , Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228,","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100425294","display_name":"Liang Zhang","orcid":"https://orcid.org/0000-0003-4331-5830"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Liang Zhang","raw_affiliation_strings":["Department of Industrial Engineering and Decision Analytics , Hong Kong University of Science and Technology, Clear Water Bay, Kowloon,","School of Cyberspace Security (School of Cryptology) , Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228,","Department of Industrial Engineering and Decision Analytics, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong","School of Cyberspace Security (School of Cryptology), Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228, China"],"affiliations":[{"raw_affiliation_string":"Department of Industrial Engineering and Decision Analytics , Hong Kong University of Science and Technology, Clear Water Bay, Kowloon,","institution_ids":["https://openalex.org/I200769079","https://openalex.org/I889458895"]},{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology) , Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228,","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"Department of Industrial Engineering and Decision Analytics, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I200769079","https://openalex.org/I889458895"]},{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102892605","display_name":"Xing-Yu Wu","orcid":"https://orcid.org/0000-0002-9891-3945"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingyu Wu","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology) , Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228,","School of Cyberspace Security (School of Cryptology), Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology) , Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228,","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004297494","display_name":"Jiheng Zhang","orcid":"https://orcid.org/0000-0003-3025-1495"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Jiheng Zhang","raw_affiliation_strings":["Department of Industrial Engineering and Decision Analytics , Hong Kong University of Science and Technology, Clear Water Bay, Kowloon,","Department of Industrial Engineering and Decision Analytics, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Industrial Engineering and Decision Analytics , Hong Kong University of Science and Technology, Clear Water Bay, Kowloon,","institution_ids":["https://openalex.org/I200769079","https://openalex.org/I889458895"]},{"raw_affiliation_string":"Department of Industrial Engineering and Decision Analytics, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I200769079","https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5007098627"],"corresponding_institution_ids":["https://openalex.org/I20942203"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13781252,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"69","issue":"2","first_page":"236","last_page":"246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.968999981880188,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.958899974822998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7430999875068665},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.729200005531311},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6891999840736389},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6294999718666077},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5824999809265137},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5120999813079834},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5095000267028809},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.4691999852657318},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.42730000615119934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8557000160217285},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7430999875068665},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.729200005531311},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6891999840736389},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6294999718666077},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5824999809265137},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5120999813079834},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5095000267028809},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.4691999852657318},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4334000051021576},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.42730000615119934},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.39329999685287476},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3813999891281128},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.37040001153945923},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3612000048160553},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3361000120639801},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.3253999948501587},{"id":"https://openalex.org/C175801342","wikidata":"https://www.wikidata.org/wiki/Q1988917","display_name":"Data analysis","level":2,"score":0.3140000104904175},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.2992999851703644},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.29750001430511475},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.29339998960494995},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C151635116","wikidata":"https://www.wikidata.org/wiki/Q193878","display_name":"Chinese remainder theorem","level":2,"score":0.2712000012397766},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C100463513","wikidata":"https://www.wikidata.org/wiki/Q5227322","display_name":"Data model (GIS)","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C2781396290","wikidata":"https://www.wikidata.org/wiki/Q17051824","display_name":"Data publishing","level":3,"score":0.25839999318122864}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/comjnl/bxaf111","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxaf111","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-170191","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-170191","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2575938897","https://openalex.org/W2733578733","https://openalex.org/W2783092754","https://openalex.org/W2792033035","https://openalex.org/W2802962942","https://openalex.org/W2898040395","https://openalex.org/W2909007847","https://openalex.org/W2948140566","https://openalex.org/W2972177310","https://openalex.org/W2993170066","https://openalex.org/W3017048894","https://openalex.org/W3108596449","https://openalex.org/W3131941815","https://openalex.org/W3134274385","https://openalex.org/W3159028135","https://openalex.org/W3171576931","https://openalex.org/W3209583012","https://openalex.org/W3211875619","https://openalex.org/W3215805924","https://openalex.org/W4205383771","https://openalex.org/W4236478587","https://openalex.org/W4240873442","https://openalex.org/W4296339010","https://openalex.org/W4317797484","https://openalex.org/W4323338399","https://openalex.org/W4365790466","https://openalex.org/W4385453656","https://openalex.org/W4385834563","https://openalex.org/W4391088302","https://openalex.org/W4391216313","https://openalex.org/W4400295864"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,61,75,86,109,127,141,159,163,166,174,186],"widespread":[3],"adoption":[4],"of":[5,10,48,53,165],"smart":[6],"devices,":[7],"vast":[8],"amounts":[9],"multidimensional":[11,39],"data":[12,23,40,82,95,100,103,115,123,131,142,152,160],"are":[13,156],"continuously":[14],"generated":[15],"across":[16],"various":[17],"sectors.":[18],"Integrating":[19],"and":[20,56,70,74,93,105,139,154,162,180],"evaluating":[21],"this":[22],"can":[24,113],"provide":[25,114],"strong":[26],"support":[27],"for":[28,116],"decision-making.":[29],"However,":[30],"existing":[31],"aggregation":[32,83,96,143,167],"schemes":[33],"face":[34],"several":[35],"challenges":[36,62],"when":[37],"handling":[38],"tasks":[41],"from":[42],"multiple":[43,135],"requesters,":[44],"including":[45],"single":[46,99],"points":[47],"failure,":[49],"privacy":[50,124],"leakage,":[51],"lack":[52],"result":[54],"validation,":[55],"inefficiency.":[57],"This":[58],"paper":[59],"mitigates":[60],"by":[63],"integrating":[64],"packed":[65],"secret":[66],"sharing,":[67],"Kate,":[68],"Zaverucha":[69],"Goldberg":[71],"(KZG)":[72],"commitments":[73],"Chinese":[76],"Remainder":[77],"Theorem":[78],"to":[79,130],"design":[80],"a":[81,98,148],"scheme.":[84],"For":[85],"first":[87],"time,":[88],"we":[89],"achieve":[90],"both":[91],"multi-task":[92],"multi-dimensional":[94],"within":[97],"transmission,":[101],"ensuring":[102,158],"integrity":[104],"privacy,":[106],"while":[107,125],"keeping":[108],"overhead":[110],"minimal.":[111],"Users":[112],"only":[117],"certain":[118],"dimensions,":[119],"thereby":[120],"safeguarding":[121],"personal":[122],"emphasizing":[126],"user-centric":[128],"approach":[129,188],"control.":[132],"By":[133],"incorporating":[134],"fog":[136],"nodes":[137],"(FN)":[138],"blockchain,":[140],"scheme":[144],"is":[145,171],"implemented":[146],"in":[147,190],"decentralized":[149],"manner.":[150],"Both":[151],"users":[153],"FNs":[155],"accountable,":[157],"authenticity":[161],"correctness":[164],"process.":[168],"Moreover,":[169],"it":[170],"fault-tolerant,":[172],"making":[173],"system":[175],"robust.":[176],"Rigorous":[177],"security":[178],"analysis":[179],"extensive":[181],"experimental":[182],"evaluations":[183],"demonstrate":[184],"that":[185],"proposed":[187],"excels":[189],"computational":[191],"efficiency.":[192]},"counts_by_year":[],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
