{"id":"https://openalex.org/W4206118639","doi":"https://doi.org/10.1109/ic-nidc54101.2021.9660520","title":"Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation","display_name":"Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation","publication_year":2021,"publication_date":"2021-11-17","ids":{"openalex":"https://openalex.org/W4206118639","doi":"https://doi.org/10.1109/ic-nidc54101.2021.9660520"},"language":"en","primary_location":{"id":"doi:10.1109/ic-nidc54101.2021.9660520","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic-nidc54101.2021.9660520","pdf_url":null,"source":{"id":"https://openalex.org/S4363608589","display_name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100701575","display_name":"Ming Zhou","orcid":"https://orcid.org/0000-0003-0696-767X"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ming Zhou","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115602239","display_name":"Zhen Yang","orcid":"https://orcid.org/0000-0002-6058-0217"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Yang","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102986000","display_name":"Haiyang Yu","orcid":"https://orcid.org/0000-0003-3761-9598"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyang Yu","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062711732","display_name":"Yingxu Lai","orcid":"https://orcid.org/0000-0001-9844-1717"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingxu Lai","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039812471","display_name":"Zhanyu Ma","orcid":"https://orcid.org/0000-0003-2950-2488"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhanyu Ma","raw_affiliation_strings":["School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100701575"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19470929,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"428","last_page":"433"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8853997588157654},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8511470556259155},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7827317118644714},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6545131206512451},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5597977042198181},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48030561208724976},{"id":"https://openalex.org/keywords/collaborative-learning","display_name":"Collaborative learning","score":0.47435319423675537},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.472613126039505},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42487847805023193},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4175630211830139},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11766287684440613},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.08035746216773987}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8853997588157654},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8511470556259155},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7827317118644714},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6545131206512451},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5597977042198181},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48030561208724976},{"id":"https://openalex.org/C138020889","wikidata":"https://www.wikidata.org/wiki/Q2349659","display_name":"Collaborative learning","level":2,"score":0.47435319423675537},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.472613126039505},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42487847805023193},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4175630211830139},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11766287684440613},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.08035746216773987},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic-nidc54101.2021.9660520","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic-nidc54101.2021.9660520","pdf_url":null,"source":{"id":"https://openalex.org/S4363608589","display_name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G432449605","display_name":null,"funder_award_id":"2020YFB2009501","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2767079719","https://openalex.org/W2768181417","https://openalex.org/W2801874531","https://openalex.org/W2902132614","https://openalex.org/W2963540401","https://openalex.org/W3013310637","https://openalex.org/W3017123256","https://openalex.org/W3020949888","https://openalex.org/W3021654819","https://openalex.org/W3045670331","https://openalex.org/W3084128899","https://openalex.org/W3088309363","https://openalex.org/W3089578458","https://openalex.org/W3116386889","https://openalex.org/W3138110244","https://openalex.org/W4210968720"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W2139109546","https://openalex.org/W2128900334"],"abstract_inverted_index":{"As":[0],"many":[1],"countries":[2],"have":[3],"promulgated":[4],"laws":[5],"on":[6,95,183],"the":[7,25,77,121,131,138,141,171,191,198],"protection":[8],"of":[9,27,53,130,140,173,193],"user":[10,17],"data":[11,18,54],"privacy,":[12,57],"how":[13],"to":[14,157],"legally":[15],"use":[16],"has":[19,100],"become":[20],"a":[21,39,82,90,149,164,179],"hot":[22],"topic.":[23],"With":[24],"emergence":[26],"collaborative":[28,67,91,154],"learning,":[29,34],"also":[30,125,135,203],"known":[31],"as":[32,56,71,73],"federated":[33],"multiple":[35],"participants":[36],"can":[37,169,189,202],"create":[38,178],"common,":[40],"robust,":[41],"and":[42,59,76,151],"secure":[43,72,97],"machine":[44],"learning":[45,68,92,155],"model":[46],"aimed":[47],"at":[48],"addressing":[49],"such":[50],"critical":[51],"issues":[52,109],"sharing":[55],"security,":[58],"access,":[60],"etc.":[61],"Unfortunately,":[62],"existing":[63],"research":[64],"shows":[65],"that":[66,113],"is":[69,80,215],"not":[70],"it":[74,134,201],"claims,":[75],"gradient":[78,124,165,174],"leakage":[79],"still":[81],"key":[83],"problem.":[84,160],"To":[85],"deal":[86],"with":[87,210],"this":[88,111,145,159],"problem,":[89],"solution":[93],"based":[94,182],"chained":[96],"multi-party":[98],"computing":[99],"been":[101],"proposed":[102],"recently.":[103],"However,":[104],"there":[105],"are":[106],"two":[107],"security":[108],"in":[110],"scheme":[112,156,214],"remain":[114],"unsolved.":[115],"First,":[116,161],"if":[117,128],"semi-honest":[118],"users":[119,132,205],"collude,":[120],"honest":[122],"users'":[123,194],"leaks.":[126],"Second,":[127,176],"one":[129],"fails,":[133],"cannot":[136],"guarantee":[137],"correctness":[139,192],"aggregation":[142,195],"results.":[143,196],"In":[144],"paper,":[146],"we":[147,162,177],"propose":[148],"privacy-preserving":[150],"verifiable":[152,180],"chain":[153],"solve":[158,170],"design":[163],"encryption":[166],"method,":[167],"which":[168],"problem":[172],"leakage.":[175],"method":[181,188],"homomorphic":[184],"hash":[185],"technology.":[186],"This":[187],"ensure":[190],"At":[197],"same":[199],"time,":[200],"track":[204],"who":[206],"aggregate":[207],"wrong.":[208],"Compared":[209],"other":[211],"solutions,":[212],"our":[213],"more":[216],"efficient.":[217]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
