{"id":"https://openalex.org/W3009109352","doi":"https://doi.org/10.1109/jiot.2020.2978286","title":"LVPDA: A Lightweight and Verifiable Privacy-Preserving Data Aggregation Scheme for Edge-Enabled IoT","display_name":"LVPDA: A Lightweight and Verifiable Privacy-Preserving Data Aggregation Scheme for Edge-Enabled IoT","publication_year":2020,"publication_date":"2020-03-04","ids":{"openalex":"https://openalex.org/W3009109352","doi":"https://doi.org/10.1109/jiot.2020.2978286","mag":"3009109352"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.2978286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2978286","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100744176","display_name":"Jiale Zhang","orcid":"https://orcid.org/0000-0002-2143-5666"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiale Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","Science and Technology on Avionics Integration Laboratory, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0002-2143-5666","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Science and Technology on Avionics Integration Laboratory, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017359136","display_name":"Yanchao Zhao","orcid":"https://orcid.org/0000-0001-6314-0332"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanchao Zhao","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","Science and Technology on Avionics Integration Laboratory, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-6314-0332","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Science and Technology on Avionics Integration Laboratory, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100600528","display_name":"Jie Wu","orcid":"https://orcid.org/0000-0002-3472-1717"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jie Wu","raw_affiliation_strings":["Center for Networked Computing, Temple University, Philadelphia, USA"],"raw_orcid":"https://orcid.org/0000-0002-3472-1717","affiliations":[{"raw_affiliation_string":"Center for Networked Computing, Temple University, Philadelphia, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100443103","display_name":"Bing Chen","orcid":"https://orcid.org/0000-0002-2863-5441"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Chen","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","Science and Technology on Avionics Integration Laboratory, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0002-2863-5441","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"Science and Technology on Avionics Integration Laboratory, Shanghai, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100744176"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":7.61,"has_fulltext":false,"cited_by_count":88,"citation_normalized_percentile":{"value":0.9780602,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"7","issue":"5","first_page":"4016","last_page":"4027"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8544543981552124},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7473466396331787},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.7189874053001404},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6560975313186646},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6458560228347778},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5708059072494507},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5642708539962769},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5590885877609253},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5179897546768188},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4999568462371826},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.43963974714279175},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.42462262511253357},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40503454208374023},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37938445806503296},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37454938888549805},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2253430187702179},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.08392778038978577}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8544543981552124},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7473466396331787},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.7189874053001404},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6560975313186646},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6458560228347778},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5708059072494507},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5642708539962769},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5590885877609253},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5179897546768188},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4999568462371826},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.43963974714279175},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.42462262511253357},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40503454208374023},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37938445806503296},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37454938888549805},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2253430187702179},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.08392778038978577},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2020.2978286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2978286","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G25058274","display_name":null,"funder_award_id":"CNS 1828363","funder_id":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka"},{"id":"https://openalex.org/G2808409033","display_name":null,"funder_award_id":"2019YFB2102000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G2932100258","display_name":null,"funder_award_id":"CNS 1651947","funder_id":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka"},{"id":"https://openalex.org/G4254440648","display_name":null,"funder_award_id":"CNS 1629746","funder_id":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka"},{"id":"https://openalex.org/G5381277905","display_name":null,"funder_award_id":"61672283","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5790579954","display_name":null,"funder_award_id":"CNS 1824440","funder_id":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka"},{"id":"https://openalex.org/G588621995","display_name":null,"funder_award_id":"61602238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8110016296","display_name":null,"funder_award_id":"CNS 1564128","funder_id":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka"},{"id":"https://openalex.org/G8790639319","display_name":null,"funder_award_id":"CNS 1757533","funder_id":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335353","display_name":"National Science Foundation of Sri Lanka","ror":"https://ror.org/010xaa060"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W97050142","https://openalex.org/W1514415033","https://openalex.org/W1976060656","https://openalex.org/W2000077104","https://openalex.org/W2000239500","https://openalex.org/W2012986054","https://openalex.org/W2014239329","https://openalex.org/W2042986815","https://openalex.org/W2055817410","https://openalex.org/W2058401212","https://openalex.org/W2105103777","https://openalex.org/W2117141700","https://openalex.org/W2132172731","https://openalex.org/W2152924492","https://openalex.org/W2161152118","https://openalex.org/W2262390119","https://openalex.org/W2291662179","https://openalex.org/W2400861403","https://openalex.org/W2416799949","https://openalex.org/W2484415328","https://openalex.org/W2526944246","https://openalex.org/W2564810971","https://openalex.org/W2577854396","https://openalex.org/W2586923239","https://openalex.org/W2591915039","https://openalex.org/W2594248285","https://openalex.org/W2725337021","https://openalex.org/W2747537200","https://openalex.org/W2794166119","https://openalex.org/W2794596638","https://openalex.org/W2800873021","https://openalex.org/W2898367412","https://openalex.org/W2904036856","https://openalex.org/W2910143551","https://openalex.org/W4229879624","https://openalex.org/W6604030426","https://openalex.org/W6722069756"],"related_works":["https://openalex.org/W4323528671","https://openalex.org/W4386820853","https://openalex.org/W2094069016","https://openalex.org/W4212859770","https://openalex.org/W3036675567","https://openalex.org/W1484081998","https://openalex.org/W2610450802","https://openalex.org/W2518050971","https://openalex.org/W1507098372","https://openalex.org/W2092515448"],"abstract_inverted_index":{"Edge":[0],"computing":[1],"is":[2,31,146],"envisioned":[3],"to":[4,38,48,68,126],"be":[5,160],"a":[6,100],"powerful":[7],"platform":[8],"that":[9,144],"provides":[10],"efficient":[11],"data":[12,29,54,136,157],"storage":[13],"and":[14,86,102,119,131,155,189],"computation":[15],"services":[16],"in":[17,81,91,183],"the":[18,34,69,73,77,109,114,128,135,150,156],"smart":[19,74],"Internet-of-Things":[20],"(IoT)":[21],"systems.":[22],"In":[23],"this":[24,50,96],"data-intensive":[25],"architecture,":[26],"protecting":[27],"user-side":[28],"privacy":[30,40,85,129],"one":[32],"of":[33,72,83,185],"most":[35],"critical":[36],"concerns":[37],"prevent":[39],"leakage":[41],"from":[42],"any":[43],"other":[44,174],"untrusted":[45],"entities.":[46],"Aiming":[47],"resist":[49],"concern,":[51],"many":[52],"privacy-preserving":[53],"aggregation":[55,137],"(PPDA)":[56],"schemes":[57],"have":[58],"been":[59],"proposed":[60],"for":[61,108],"various":[62],"cloud-enabled":[63],"IoT":[64,75,111],"applications.":[65],"However,":[66],"due":[67],"resource-constrained":[70],"nature":[71],"devices,":[76],"conventional":[78],"PPDA":[79,104,175,182],"solutions,":[80],"terms":[82,184],"both":[84],"performance":[87],"requirements,":[88],"are":[89,124],"unsuitable":[90],"edge":[92],"computing.":[93],"To":[94],"address":[95],"challenge,":[97],"we":[98],"propose":[99],"lightweight":[101,181],"verifiable":[103],"scheme,":[105],"named":[106],"LVPDA,":[107],"edge-computing-enabled":[110],"system,":[112],"where":[113],"Paillier":[115],"homomorphic":[116],"encryption":[117],"method":[118],"an":[120],"online/offline":[121],"signature":[122],"technique":[123],"combined":[125],"ensure":[127],"preserving":[130],"integrity":[132,158],"verification":[133],"during":[134],"process.":[138],"A":[139],"detailed":[140],"security":[141],"analysis":[142],"indicates":[143],"LVPDA":[145],"existentially":[147],"unforgeable":[148],"under":[149,165],"chosen":[151],"message":[152],"attack":[153],"(EU-CMA)":[154],"can":[159,179],"guaranteed":[161],"with":[162,173],"formal":[163],"proof":[164],"q":[166],"-strong":[167],"Diffie-Hellman":[168],"(q":[169],"-SDH)":[170],"assumptions.":[171],"Compared":[172],"methods,":[176],"our":[177],"scheme":[178],"achieve":[180],"less":[186],"computational":[187],"complexity":[188],"communication":[190],"overhead.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":22},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
