{"id":"https://openalex.org/W3097745543","doi":"https://doi.org/10.1109/access.2020.3034602","title":"Privacy-Preserving Weighted Federated Learning Within the Secret Sharing Framework","display_name":"Privacy-Preserving Weighted Federated Learning Within the Secret Sharing Framework","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3097745543","doi":"https://doi.org/10.1109/access.2020.3034602","mag":"3097745543"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3034602","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3034602","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09244122.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09244122.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019480182","display_name":"Huafei Zhu","orcid":"https://orcid.org/0000-0001-5306-0646"},"institutions":[{"id":"https://openalex.org/I3004594783","display_name":"Institute of High Performance Computing","ror":"https://ror.org/02n0ejh50","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3004594783","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Huafei Zhu","raw_affiliation_strings":["Institute for High Performance Computing, Agency for Science and Technology, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for High Performance Computing, Agency for Science and Technology, Singapore","institution_ids":["https://openalex.org/I3004594783"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001599295","display_name":"Rick Siow Mong Goh","orcid":"https://orcid.org/0000-0001-9116-1595"},"institutions":[{"id":"https://openalex.org/I3004594783","display_name":"Institute of High Performance Computing","ror":"https://ror.org/02n0ejh50","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3004594783","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Rick Siow Mong Goh","raw_affiliation_strings":["Institute for High Performance Computing, Agency for Science and Technology, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for High Performance Computing, Agency for Science and Technology, Singapore","institution_ids":["https://openalex.org/I3004594783"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008926869","display_name":"Wee Keong Ng","orcid":"https://orcid.org/0000-0001-7106-2768"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Wee-Keong Ng","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019480182"],"corresponding_institution_ids":["https://openalex.org/I3004594783"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.314,"has_fulltext":true,"cited_by_count":58,"citation_normalized_percentile":{"value":0.93622642,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"198275","last_page":"198284"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7750883102416992},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.730721652507782},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.5247247815132141},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5223278403282166},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4983351230621338},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4871637523174286},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.48409712314605713},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.42292889952659607},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.36670178174972534},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.360889732837677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3028322458267212},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2771719694137573},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20991948246955872},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10651734471321106}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7750883102416992},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.730721652507782},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5247247815132141},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5223278403282166},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4983351230621338},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4871637523174286},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.48409712314605713},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.42292889952659607},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.36670178174972534},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.360889732837677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3028322458267212},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2771719694137573},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20991948246955872},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10651734471321106},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2020.3034602","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3034602","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09244122.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2b9e64b6c558498cb84842146c885129","is_oa":true,"landing_page_url":"https://doaj.org/article/2b9e64b6c558498cb84842146c885129","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 198275-198284 (2020)","raw_type":"article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/145818","is_oa":true,"landing_page_url":"https://hdl.handle.net/10356/145818","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3034602","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3034602","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09244122.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3097745543.pdf","grobid_xml":"https://content.openalex.org/works/W3097745543.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W134131117","https://openalex.org/W1548880861","https://openalex.org/W1635361314","https://openalex.org/W1646354800","https://openalex.org/W1694136297","https://openalex.org/W2003668524","https://openalex.org/W2016267457","https://openalex.org/W2108834246","https://openalex.org/W2141420453","https://openalex.org/W2233233025","https://openalex.org/W2284345771","https://openalex.org/W2346967072","https://openalex.org/W2400124473","https://openalex.org/W2402235285","https://openalex.org/W2536058570","https://openalex.org/W2539273492","https://openalex.org/W2541884796","https://openalex.org/W2767079719","https://openalex.org/W2773194476","https://openalex.org/W2793216106","https://openalex.org/W2811175264","https://openalex.org/W2912213068","https://openalex.org/W2913570153","https://openalex.org/W2914554654","https://openalex.org/W2926101387","https://openalex.org/W2963401954","https://openalex.org/W2972016218","https://openalex.org/W2977245723","https://openalex.org/W2982929416","https://openalex.org/W3005589384","https://openalex.org/W3013601656","https://openalex.org/W3016632787","https://openalex.org/W3038028469","https://openalex.org/W3043303805","https://openalex.org/W4294106961","https://openalex.org/W4318619660","https://openalex.org/W6605481151","https://openalex.org/W6636797535","https://openalex.org/W6728757088","https://openalex.org/W6746388805","https://openalex.org/W6749824362","https://openalex.org/W6752721813","https://openalex.org/W6759226220","https://openalex.org/W6761096779","https://openalex.org/W6766618844","https://openalex.org/W6767542292","https://openalex.org/W6770686574","https://openalex.org/W6771536673"],"related_works":["https://openalex.org/W2397857137","https://openalex.org/W2083084382","https://openalex.org/W1557783852","https://openalex.org/W2768332800","https://openalex.org/W2188298058","https://openalex.org/W3214129216","https://openalex.org/W2129756153","https://openalex.org/W2006088653","https://openalex.org/W1474916271","https://openalex.org/W2161875663"],"abstract_inverted_index":{"This":[0],"paper":[1,35],"studies":[2],"privacy-preserving":[3],"weighted":[4,125],"federated":[5,49,62,126],"learning":[6,50,63,127],"within":[7,209],"the":[8,38,43,46,82,90,96,101,105,116,146,168,174,182,187,190,205,210,216,227,236,243,260,268,278,288],"secret":[9,211],"sharing":[10],"framework,":[11,103],"where":[12,231],"individual":[13],"private":[14],"data":[15],"is":[16,70,76,109,129,140,193,202,222,240,250,281,293],"split":[17],"into":[18],"random":[19,183],"shares":[20],"which":[21,122],"are":[22,273],"distributed":[23],"among":[24],"a":[25,77,119,176,218,232,253,257],"set":[26],"of":[27,33,60,79,86,112,148,152,157,179,189,199,229,259,267],"pre-defined":[28],"computing":[29,138],"servers.":[30],"The":[31,197],"contribution":[32],"this":[34],"mainly":[36],"comprises":[37],"following":[39],"four-fold:":[40],"\u00b7":[41,114,172,214],"In":[42,115,173,215],"first":[44],"fold,":[45,118],"relationship":[47],"between":[48],"(FL)":[51],"and":[52,65,131,142,195,224,256],"multi-party":[53,67],"computation":[54,68,192,255],"(MPC)":[55],"as":[56,58,252],"well":[57],"that":[59,74,151,277,287],"secure":[61,66,282],"(SFL)":[64],"(SMPC)":[69],"investigated.":[71],"We":[72,272],"show":[73,276],"FL":[75,92,107,149,160],"subset":[78],"MPC":[80],"from":[81,150,167,242],"m-ary":[83,98],"functionality":[84,99],"point":[85],"view.":[87],"Furthermore,":[88],"if":[89],"underlying":[91,289],"instance":[93,111],"privately":[94],"computes":[95],"defined":[97],"in":[100,186,226],"simulation-based":[102,106],"then":[104],"solution":[108,234,249],"an":[110,134],"SMPC.":[113],"second":[117],"new":[120],"notion":[121],"we":[123],"call":[124],"(wFL)":[128],"introduced":[130,223],"formalized.":[132],"Then":[133],"oracle-aided":[135],"SMPC":[136],"for":[137],"wFL":[139,158,180],"presented":[141,194],"analysed":[143],"by":[144,204],"decoupling":[145,155],"security":[147,165,170,198,206],"MPC.":[153],"Our":[154,248],"formulation":[156],"benefits":[159],"developers":[161],"selecting":[162],"their":[163],"best":[164],"practices":[166],"state-of-the-art":[169],"tools.":[171],"third-fold,":[175],"concrete":[177],"implementation":[178,201,280],"leveraging":[181],"splitting":[184],"technique":[185],"framework":[188,228],"3-party":[191],"analysed.":[196],"our":[200],"guaranteed":[203],"composition":[207],"theorem":[208],"share":[212],"framework.":[213],"fourth-fold,":[217],"complement":[219],"to":[220,235,275],"MASCOT":[221],"formalized":[225,251],"SPDZ,":[230],"novel":[233],"Beaver":[237,261],"triple":[238,262],"generator":[239],"constructed":[241],"standard":[244],"El":[245,269,290],"Gamal":[246,270,291],"encryption.":[247],"three-party":[254],"generation":[258],"requires":[263],"roughly":[264],"5":[265],"invocations":[266],"encryptions.":[271],"able":[274],"proposed":[279],"against":[283],"honest-but-curious":[284],"adversary":[285],"assuming":[286],"encryption":[292],"semantically":[294],"secure.":[295]},"counts_by_year":[{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
