{"id":"https://openalex.org/W7126119039","doi":"https://doi.org/10.1109/bibm66473.2025.11356860","title":"VSDA: Privacy-Preserving Verifiable Secure Distributed Aggregation for Multi-Center Clinical and Genomic Data","display_name":"VSDA: Privacy-Preserving Verifiable Secure Distributed Aggregation for Multi-Center Clinical and Genomic Data","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W7126119039","doi":"https://doi.org/10.1109/bibm66473.2025.11356860"},"language":null,"primary_location":{"id":"doi:10.1109/bibm66473.2025.11356860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bibm66473.2025.11356860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111709765","display_name":"Zhe Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhe Dong","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016307931","display_name":"Zhi Lu","orcid":"https://orcid.org/0000-0002-5411-9854"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Lu","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084098394","display_name":"Renfei Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Renfei Shen","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051783170","display_name":"Hewang Nie","orcid":"https://orcid.org/0000-0001-6652-4489"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hewang Nie","raw_affiliation_strings":["School of Computer Science and Engineering/School of Software/School of Artificial Intelligence, Guangxi Normal University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering/School of Software/School of Artificial Intelligence, Guangxi Normal University","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072339552","display_name":"Jue Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155232","display_name":"Fiberhome Technology Group (China)","ror":"https://ror.org/04yv20134","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210155232"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jue Xiao","raw_affiliation_strings":["Wuhan FiberHome International Technologies Co., Ltd"],"affiliations":[{"raw_affiliation_string":"Wuhan FiberHome International Technologies Co., Ltd","institution_ids":["https://openalex.org/I4210155232"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124197692","display_name":"Junming Li","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junming Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5122117632","display_name":"Songfeng Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songfeng Lu","raw_affiliation_strings":["School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Huazhong University of Science and Technology,Wuhan,China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5111709765"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84119067,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1629","last_page":"1634"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.42399999499320984,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.42399999499320984,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.1777999997138977,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.04690000042319298,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.6948000192642212},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.673799991607666},{"id":"https://openalex.org/keywords/news-aggregator","display_name":"News aggregator","score":0.5679000020027161},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5368000268936157},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4528000056743622},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.44909998774528503},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.44510000944137573},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.42320001125335693},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3935999870300293},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.375},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.3700000047683716}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7390999794006348},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.6948000192642212},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.673799991607666},{"id":"https://openalex.org/C180505990","wikidata":"https://www.wikidata.org/wiki/Q498267","display_name":"News aggregator","level":2,"score":0.5679000020027161},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5368000268936157},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4528000056743622},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.44909998774528503},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.44510000944137573},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.42320001125335693},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3935999870300293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3815999925136566},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3808000087738037},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.375},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.3700000047683716},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.36489999294281006},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.3635999858379364},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.35030001401901245},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3449000120162964},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3440000116825104},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33809998631477356},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.33500000834465027},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.31690001487731934},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31439998745918274},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.30640000104904175},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.29589998722076416},{"id":"https://openalex.org/C137877099","wikidata":"https://www.wikidata.org/wiki/Q1332977","display_name":"Subsequence","level":3,"score":0.2955999970436096},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.29440000653266907},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.29330000281333923},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.29010000824928284},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.2870999872684479},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.2635999917984009},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.2635999917984009},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26339998841285706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bibm66473.2025.11356860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bibm66473.2025.11356860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","score":0.447268009185791,"display_name":"Gender equality"}],"awards":[{"id":"https://openalex.org/G3235810671","display_name":null,"funder_award_id":"YCJJ20252336","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8012557810","display_name":null,"funder_award_id":"2021YFB2012200","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2006453614","https://openalex.org/W2096283457","https://openalex.org/W2141420453","https://openalex.org/W2156186849","https://openalex.org/W2158485828","https://openalex.org/W2591882872","https://openalex.org/W2767079719","https://openalex.org/W2781091734","https://openalex.org/W2791827614","https://openalex.org/W2956355137","https://openalex.org/W2963456518","https://openalex.org/W2963540401","https://openalex.org/W3096328345","https://openalex.org/W3110845456","https://openalex.org/W4226461837","https://openalex.org/W4308410483","https://openalex.org/W4323034424","https://openalex.org/W4385679694","https://openalex.org/W4401879221"],"related_works":[],"abstract_inverted_index":{"In":[0],"cloud":[1],"and":[2,12,26,38,61,85,124,159,169,176,190,196],"edge":[3],"environments,":[4],"distributed":[5],"aggregation":[6,31,77],"of":[7,146,149],"multi-center":[8],"electronic":[9],"medical":[10],"records":[11],"high-dimensional":[13],"RNA":[14],"sequencing":[15],"features":[16],"must":[17],"comply":[18],"with":[19,78,112,139],"stringent":[20],"privacy":[21],"regulations":[22],"(e.g.,":[23],"HIPAA,":[24],"GDPR)":[25],"guarantee":[27],"result":[28],"integrity.":[29],"Secure":[30,67],"enables":[32],"collaborative":[33],"analyses\u2014such":[34],"as":[35],"biomarker":[36],"discovery":[37],"risk":[39],"prediction\u2014without":[40],"exposing":[41],"raw":[42],"data;":[43],"however,":[44],"undetected":[45],"computation":[46],"errors":[47],"or":[48],"malicious":[49],"tampering":[50],"by":[51],"the":[52,96,101,131,156,180],"aggregator":[53,97,132],"can":[54,89],"undermine":[55],"clinical":[56],"decision":[57],"support,":[58],"regulatory":[59,177],"compliance,":[60],"study":[62],"reproducibility.":[63],"We":[64],"propose":[65],"VSDA\u2014Verifiable":[66],"Distributed":[68],"Biomedical":[69],"Data":[70],"Aggregation\u2014a":[71],"framework":[72],"that":[73,95],"enhances":[74],"traditional":[75],"secure":[76],"discrete-logarithm-based":[79],"signatures":[80],"on":[81,179],"both":[82],"message":[83],"vectors":[84],"secret":[86],"keys.":[87],"Participants":[88],"cryptographically":[90],"verify,":[91],"via":[92],"signature-ciphertext":[93],"consistency,":[94],"has":[98],"honestly":[99],"executed":[100],"summation":[102],"without":[103],"revealing":[104],"underlying":[105],"data.":[106],"VSDA":[107,168,184],"supports":[108],"fully":[109],"parallelized":[110],"operations":[111],"minimal":[113],"overhead:":[114],"each":[115],"participant":[116],"performs":[117],"(<tex":[118,126,134],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[119,127,135],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$3":[120],"n+m-1$</tex>)":[121],"scalar":[122],"exponentiations":[123,138],"transmits":[125],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$m+1$</tex>)":[128],"scalars,":[129],"while":[130],"conducts":[133],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$m":[136],"n+m$</tex>)":[137],"no":[140],"additional":[141],"communication,":[142],"achieving":[143],"overhead":[144],"reductions":[145],"several":[147],"orders":[148],"magnitude":[150],"compared":[151],"to":[152],"state-of-the-art":[153],"methods.":[154],"Under":[155],"discrete":[157],"logarithm":[158],"one-time-pad":[160],"assumptions,":[161],"we":[162],"provide":[163],"formal":[164],"security":[165],"proofs":[166],"for":[167,193],"empirically":[170],"validate":[171],"its":[172],"efficiency,":[173],"dropout":[174],"resilience,":[175],"compliance":[178],"TCGA":[181],"RNA-Seq":[182],"dataset.":[183],"thus":[185],"offers":[186],"a":[187],"practical,":[188],"verifiable,":[189],"privacy-preserving":[191],"solution":[192],"data":[194],"integration":[195],"health":[197],"information":[198],"exchange":[199],"in":[200],"biomedical":[201],"informatics.":[202]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-30T00:00:00"}
