{"id":"https://openalex.org/W4416513895","doi":"https://doi.org/10.1109/itw62417.2025.11240508","title":"Perfectly-Private Analog Secure Aggregation in Federated Learning","display_name":"Perfectly-Private Analog Secure Aggregation in Federated Learning","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4416513895","doi":"https://doi.org/10.1109/itw62417.2025.11240508"},"language":null,"primary_location":{"id":"doi:10.1109/itw62417.2025.11240508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw62417.2025.11240508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120641712","display_name":"Delio Jaramillo-Velez","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Delio Jaramillo-Velez","raw_affiliation_strings":["Chalmers University of Technology,Department of Electrical Engineering,Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology,Department of Electrical Engineering,Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005134614","display_name":"Charul Rajput","orcid":"https://orcid.org/0000-0002-9271-7222"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Charul Rajput","raw_affiliation_strings":["Aalto University,Department of Mathematics and Systems Analysis,Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University,Department of Mathematics and Systems Analysis,Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079294052","display_name":"Ragnar Freij-Hollanti","orcid":"https://orcid.org/0000-0001-8156-2053"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Ragnar Freij-Hollanti","raw_affiliation_strings":["Aalto University,Department of Mathematics and Systems Analysis,Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University,Department of Mathematics and Systems Analysis,Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035260653","display_name":"Camilla Hollanti","orcid":"https://orcid.org/0000-0001-5356-8669"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Camilla Hollanti","raw_affiliation_strings":["Aalto University,Department of Mathematics and Systems Analysis,Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University,Department of Mathematics and Systems Analysis,Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014522913","display_name":"Alexandre Graell i Amat","orcid":"https://orcid.org/0000-0002-5725-869X"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Alexandre Graell i Amat","raw_affiliation_strings":["Chalmers University of Technology,Department of Electrical Engineering,Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University of Technology,Department of Electrical Engineering,Sweden","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5120641712"],"corresponding_institution_ids":["https://openalex.org/I66862912"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20061959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9211000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9211000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.0640999972820282,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.006399999838322401,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5271999835968018},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.5230000019073486},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.48030000925064087},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4781999886035919},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.44749999046325684},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.3912000060081482},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.38839998841285706},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.3691999912261963}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73089998960495},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5271999835968018},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.5230000019073486},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.48030000925064087},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47859999537467957},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4781999886035919},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.44749999046325684},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40689998865127563},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3912000060081482},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.38839998841285706},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.3691999912261963},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.35089999437332153},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.35030001401901245},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.3490000069141388},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.3398999869823456},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.328900009393692},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.31450000405311584},{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.3124000132083893},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30640000104904175},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.28119999170303345},{"id":"https://openalex.org/C162392398","wikidata":"https://www.wikidata.org/wiki/Q272404","display_name":"Finite set","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2791000008583069}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw62417.2025.11240508","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw62417.2025.11240508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W51265332","https://openalex.org/W1976420017","https://openalex.org/W2397857137","https://openalex.org/W2591882872","https://openalex.org/W2767079719","https://openalex.org/W2963456518","https://openalex.org/W3033511014","https://openalex.org/W3045674654","https://openalex.org/W3127518390","https://openalex.org/W3150684546","https://openalex.org/W3180608480","https://openalex.org/W3186669480","https://openalex.org/W4206320562","https://openalex.org/W4220736323","https://openalex.org/W4293211839","https://openalex.org/W4312722905","https://openalex.org/W4321020874","https://openalex.org/W4390748622"],"related_works":[],"abstract_inverted_index":{"In":[0,140],"federated":[1],"learning,":[2],"multiple":[3],"parties":[4],"train":[5],"models":[6,65],"locally":[7],"and":[8,93,222],"share":[9],"their":[10],"parameters":[11],"with":[12,75],"a":[13,21,58,71,105,113,143,157,228],"central":[14],"server,":[15],"which":[16],"aggregates":[17],"them":[18],"to":[19,44,66,99,104,123,129,190,201],"update":[20],"global":[22],"model.":[23],"To":[24],"address":[25],"the":[26,48,62,84,90,102,153,171,175,185,191,202,207],"risk":[27],"of":[28,61,137,219],"exposing":[29],"sensitive":[30],"data":[31,103,168],"through":[32],"local":[33,64],"models,":[34],"secure":[35,38,145,194,205],"aggregation":[36,147,195],"via":[37],"multiparty":[39],"computation":[40],"has":[41],"been":[42],"proposed":[43,150],"enhance":[45],"privacy.":[46,199],"At":[47],"same":[49],"time,":[50],"perfect":[51,163,198],"privacy":[52,164],"can":[53,133,210],"only":[54],"be":[55,67],"achieved":[56],"by":[57,169],"uniform":[59,172],"distribution":[60,173],"\"masked\"":[63],"aggregated.":[68],"This":[69,160],"raises":[70],"problem":[72],"when":[73],"working":[74],"real-valued":[76],"data,":[77],"as":[78,112,127],"there":[79],"is":[80,87,97,149],"no":[81],"measure":[82],"on":[83,174],"reals":[85],"that":[86,132,151,184],"invariant":[88],"under":[89],"masking":[91],"operation,":[92],"hence":[94,225],"information":[95],"leakage":[96],"bound":[98],"occur.":[100],"Shifting":[101],"finite":[106,158,203],"field":[107,204],"circumvents":[108],"this":[109,141],"problem,":[110],"but":[111],"downside":[114],"runs":[115],"into":[116],"an":[117],"inherent":[118],"accuracy\u2013complexity":[119],"tradeoff":[120],"issue":[121],"due":[122],"fixed-point":[124],"modular":[125],"arithmetic":[126],"opposed":[128],"floating-point":[130],"numbers":[131,136],"simultaneously":[134],"handle":[135],"varying":[138],"magnitudes.":[139],"paper,":[142],"novel":[144],"parameter":[146],"method":[148],"employs":[152],"torus":[154],"rather":[155],"than":[156],"field.":[159],"approach":[161],"guarantees":[162],"for":[165],"each":[166],"party\u2019s":[167],"utilizing":[170],"torus,":[176],"while":[177,196],"avoiding":[178],"accuracy":[179,221],"losses.":[180],"Experimental":[181],"results":[182],"show":[183],"new":[186],"protocol":[187,209],"performs":[188],"similarly":[189],"model":[192,220],"without":[193],"maintaining":[197],"Compared":[200],"aggregation,":[206],"torus-based":[208],"in":[211,217],"some":[212],"cases":[213],"significantly":[214],"outperform":[215],"it":[216,227],"terms":[218],"cosine":[223],"similarity,":[224],"making":[226],"safer":[229],"choice.":[230]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
