{"id":"https://openalex.org/W3164618083","doi":"https://doi.org/10.1109/jiot.2021.3083136","title":"An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT","display_name":"An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT","publication_year":2021,"publication_date":"2021-05-24","ids":{"openalex":"https://openalex.org/W3164618083","doi":"https://doi.org/10.1109/jiot.2021.3083136","mag":"3164618083"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3083136","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3083136","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043346874","display_name":"Cong Peng","orcid":"https://orcid.org/0000-0002-9958-3255"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Cong Peng","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","School of Cyber Science and Engineering and the School of Mathematics and Statistics, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"School of Cyber Science and Engineering and the School of Mathematics and Statistics, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Luo","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I4210142748","https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072011650","display_name":"Muhammad Khurram Khan","orcid":"https://orcid.org/0000-0001-6636-0533"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Khurram Khan","raw_affiliation_strings":["Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, Shanghai, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043346874"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4210136793"],"apc_list":null,"apc_paid":null,"fwci":4.6196,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.95521449,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"9","issue":"1","first_page":"589","last_page":"600"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8624632358551025},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8356353044509888},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5921455025672913},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5347778797149658},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5266789197921753},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.524516224861145},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4821867048740387},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4702388644218445},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4699666202068329},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4646693170070648},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.46004560589790344},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4555540978908539},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4151146411895752},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39941832423210144},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.2863130569458008},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2298080325126648},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18877950310707092}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8624632358551025},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8356353044509888},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5921455025672913},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5347778797149658},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5266789197921753},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.524516224861145},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4821867048740387},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4702388644218445},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4699666202068329},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4646693170070648},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.46004560589790344},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4555540978908539},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4151146411895752},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39941832423210144},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2863130569458008},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2298080325126648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18877950310707092},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3083136","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3083136","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3423709866","display_name":null,"funder_award_id":"61932016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5362131522","display_name":null,"funder_award_id":"RSP-2020/12","funder_id":"https://openalex.org/F4320321145","funder_display_name":"King Saud University"},{"id":"https://openalex.org/G5449561768","display_name":null,"funder_award_id":"2020CFA052","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G6286192115","display_name":null,"funder_award_id":"61972294","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1489169327","https://openalex.org/W1494049356","https://openalex.org/W1531182675","https://openalex.org/W1553083934","https://openalex.org/W1589034595","https://openalex.org/W1616243873","https://openalex.org/W1646354800","https://openalex.org/W1798609567","https://openalex.org/W1805549252","https://openalex.org/W2001340147","https://openalex.org/W2012296980","https://openalex.org/W2027423568","https://openalex.org/W2028009605","https://openalex.org/W2095708839","https://openalex.org/W2114525161","https://openalex.org/W2117141700","https://openalex.org/W2117797270","https://openalex.org/W2132172731","https://openalex.org/W2498278624","https://openalex.org/W2577158880","https://openalex.org/W2580925718","https://openalex.org/W2591915039","https://openalex.org/W2606882085","https://openalex.org/W2725337021","https://openalex.org/W2789816247","https://openalex.org/W2790990575","https://openalex.org/W2809629291","https://openalex.org/W2884658035","https://openalex.org/W2885936154","https://openalex.org/W2910143551","https://openalex.org/W2980182496","https://openalex.org/W2997246639","https://openalex.org/W3004343345","https://openalex.org/W3006426698","https://openalex.org/W3013423866"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4406779505","https://openalex.org/W4403623784","https://openalex.org/W2947510282","https://openalex.org/W2363701519","https://openalex.org/W2601739120","https://openalex.org/W2292786713","https://openalex.org/W3212491810","https://openalex.org/W1970057761","https://openalex.org/W3002024456"],"abstract_inverted_index":{"Internet":[0,10],"of":[1,68,131,172,191],"Things":[2],"(IoT)":[3],"enables":[4],"terminal":[5],"devices":[6,18],"connecting":[7],"with":[8,118],"the":[9,54,60,66,90,119,123,127,147,180,194],"and":[11,34,44,48,110,122,134,155,174],"provides":[12,27],"various":[13],"intelligent":[14],"applications":[15],"by":[16],"analyzing":[17],"data.":[19,70],"As":[20],"a":[21,28,96,102,189],"typical":[22],"IoT":[23],"technique,":[24],"edge":[25,38,139],"computing":[26],"three-tier":[29],"architecture":[30],"to":[31,53,94,167],"reduce":[32],"communications":[33],"improve":[35],"efficiency.":[36],"Specifically,":[37],"nodes":[39],"are":[40],"responsible":[41],"for":[42,56,83],"collecting":[43],"aggregating":[45],"device":[46,69,132],"data,":[47],"then":[49],"send":[50],"processed":[51],"results":[52],"cloud":[55],"subsequent":[57],"analysis.":[58],"However,":[59],"data":[61,80,133],"aggregation":[62,81],"function":[63],"will":[64],"compromise":[65],"privacy":[67],"In":[71,177],"this":[72],"article,":[73],"we":[74,144,160],"proposed":[75,148],"an":[76],"efficient":[77],"privacy-preserving":[78],"multidimensional":[79],"scheme":[82,88,128,149,164,185],"IoT,":[84],"called":[85],"PMDA.":[86],"The":[87],"uses":[89],"Chinese":[91],"remainder":[92],"theorem":[93],"design":[95],"homomorphic":[97,113],"encryption":[98],"method":[99],"that":[100,146,162],"encryptes":[101],"multiple-dimensional":[103],"small":[104],"integer":[105],"vector":[106],"into":[107],"one":[108],"ciphertext":[109],"keeps":[111],"linear":[112],"properties":[114],"per":[115],"dimension.":[116],"Combining":[117],"signature":[120],"mechanism":[121],"batch":[124],"verification":[125,136],"method,":[126],"guarantees":[129],"nonrepudiation":[130],"enhance":[135],"efficiency":[137],"at":[138,193],"nodes.":[140],"Through":[141],"theoretical":[142],"analysis,":[143],"demonstrate":[145,161],"can":[150],"achieve":[151],"correctness,":[152],"privacy,":[153],"authentication,":[154],"integrity.":[156],"After":[157],"performance":[158],"evaluation,":[159],"our":[163,184],"is":[165],"superior":[166],"other":[168],"schemes":[169],"in":[170],"terms":[171],"computation":[173,186],"communication":[175],"costs.":[176],"particular,":[178],"as":[179],"message":[181],"dimension":[182],"increases,":[183],"costs":[187],"almost":[188],"tenth":[190],"others":[192],"80-bits":[195],"security":[196],"level.":[197]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":5}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
