{"id":"https://openalex.org/W4415368567","doi":"https://doi.org/10.1109/isit63088.2025.11195564","title":"Vector Linear Secure Aggregation","display_name":"Vector Linear Secure Aggregation","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4415368567","doi":"https://doi.org/10.1109/isit63088.2025.11195564"},"language":null,"primary_location":{"id":"doi:10.1109/isit63088.2025.11195564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Xihang Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xihang Yuan","raw_affiliation_strings":["University of North Texas,Department of Electrical Engineering,USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Electrical Engineering,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016951190","display_name":"Hua Sun","orcid":"https://orcid.org/0000-0001-8777-7987"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hua Sun","raw_affiliation_strings":["University of North Texas,Department of Electrical Engineering,USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Electrical Engineering,USA","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":4.1084,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.94710156,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.7459999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.7459999918937683,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linear-span","display_name":"Linear span","score":0.7010999917984009},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.6399000287055969},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5993000268936157},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5979999899864197},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5109000205993652},{"id":"https://openalex.org/keywords/linear-space","display_name":"Linear space","score":0.4733999967575073},{"id":"https://openalex.org/keywords/vector-space","display_name":"Vector space","score":0.4494999945163727},{"id":"https://openalex.org/keywords/linear-form","display_name":"Linear form","score":0.42669999599456787}],"concepts":[{"id":"https://openalex.org/C133226019","wikidata":"https://www.wikidata.org/wiki/Q209812","display_name":"Linear span","level":2,"score":0.7010999917984009},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6557000279426575},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.6399000287055969},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5993000268936157},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5979999899864197},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5109000205993652},{"id":"https://openalex.org/C176370821","wikidata":"https://www.wikidata.org/wiki/Q1826459","display_name":"Linear space","level":2,"score":0.4733999967575073},{"id":"https://openalex.org/C13336665","wikidata":"https://www.wikidata.org/wiki/Q125977","display_name":"Vector space","level":2,"score":0.4494999945163727},{"id":"https://openalex.org/C20050597","wikidata":"https://www.wikidata.org/wiki/Q261527","display_name":"Linear form","level":2,"score":0.42669999599456787},{"id":"https://openalex.org/C119322782","wikidata":"https://www.wikidata.org/wiki/Q2662236","display_name":"VC dimension","level":2,"score":0.4212000072002411},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.412200003862381},{"id":"https://openalex.org/C6802819","wikidata":"https://www.wikidata.org/wiki/Q1072174","display_name":"Linear system","level":2,"score":0.39480000734329224},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.3720000088214874},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3714999854564667},{"id":"https://openalex.org/C2456702","wikidata":"https://www.wikidata.org/wiki/Q1375954","display_name":"Vector-valued function","level":2,"score":0.36880001425743103},{"id":"https://openalex.org/C181789720","wikidata":"https://www.wikidata.org/wiki/Q4812191","display_name":"Asymptotically optimal algorithm","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C49766605","wikidata":"https://www.wikidata.org/wiki/Q207643","display_name":"Linear map","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C77346573","wikidata":"https://www.wikidata.org/wiki/Q484637","display_name":"Linear equation","level":2,"score":0.29330000281333923},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.28850001096725464},{"id":"https://openalex.org/C12362212","wikidata":"https://www.wikidata.org/wiki/Q728435","display_name":"Linear subspace","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2734000086784363},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.26190000772476196},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2506999969482422},{"id":"https://openalex.org/C142730499","wikidata":"https://www.wikidata.org/wiki/Q934367","display_name":"Function space","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit63088.2025.11195564","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195564","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4024042866","display_name":null,"funder_award_id":"CCF2045656,CCF-2312228","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2767079719","https://openalex.org/W2996154187","https://openalex.org/W3113634316","https://openalex.org/W3124562976","https://openalex.org/W3212424730","https://openalex.org/W4386057503","https://openalex.org/W4388018901","https://openalex.org/W4389665995","https://openalex.org/W4393241137","https://openalex.org/W4395448275","https://openalex.org/W4399043543","https://openalex.org/W4401687093","https://openalex.org/W4401692233","https://openalex.org/W4401692435","https://openalex.org/W4401693715","https://openalex.org/W4405908543"],"related_works":[],"abstract_inverted_index":{"The":[0],"secure":[1,98],"summation":[2,99],"problem,":[3,100],"where":[4],"<tex":[5,25,53,67,87],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[6,26,54,68,88],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$K$</tex>":[7,27,55,69,89],"users":[8,129],"wish":[9,72],"to":[10,73,108,132,155,173],"compute":[11,109],"the":[12,30,40,52,60,86,97,103,113,118,122,128,133,136,142,145,149,152,160,163,167,170],"sum":[13],"of":[14,51,58,85,96,112,121,135,144,151,162,169],"their":[15],"inputs":[16,28,56],"at":[17],"a":[18],"server":[19],"while":[20],"revealing":[21],"nothing":[22],"about":[23,80],"all":[24,66],"beyond":[29],"desired":[31,41,114],"sum,":[32],"is":[33,43,78,130,140],"generalized":[34],"in":[35,141,159],"two":[36],"aspects":[37],"-":[38],"first,":[39],"function":[42,47,84,154,172],"an":[44,81],"arbitrary":[45,82],"linear":[46,49,83,94,116,153,171],"(multiple":[48],"combinations)":[50],"instead":[57],"just":[59],"sum;":[61],"second,":[62],"rather":[63],"than":[64],"protecting":[65],"inputs,":[70],"we":[71,101],"guarantee":[74],"that":[75,139],"no":[76],"information":[77],"leaked":[79],"inputs.":[90],"For":[91],"this":[92],"vector":[93,115,137],"generalization":[95],"characterize":[102],"optimal":[104],"randomness":[105],"cost,":[106],"i.e.,":[107],"one":[110],"instance":[111],"function,":[117],"minimum":[119],"number":[120],"random":[123],"key":[124],"variables":[125],"held":[126],"by":[127,148,166],"equal":[131],"dimension":[134],"space":[138],"span":[143,161],"vectors":[146,164],"formed":[147,165],"coefficients":[150,168],"protect":[156],"but":[157],"not":[158],"compute.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-21T00:00:00"}
