{"id":"https://openalex.org/W4411336740","doi":"https://doi.org/10.1109/jiot.2025.3580094","title":"Efficient Privacy-Preserving Federated Learning for IIoT Using Dual Proxy Re-Encryption","display_name":"Efficient Privacy-Preserving Federated Learning for IIoT Using Dual Proxy Re-Encryption","publication_year":2025,"publication_date":"2025-06-16","ids":{"openalex":"https://openalex.org/W4411336740","doi":"https://doi.org/10.1109/jiot.2025.3580094"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3580094","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3580094","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100662562","display_name":"Jianhong Zhang","orcid":"https://orcid.org/0000-0001-8674-3988"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianhong Zhang","raw_affiliation_strings":["School of Artificial Intelligence and Computer Science, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Computer Science, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111291521","display_name":"Chuming Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuming Shi","raw_affiliation_strings":["School of Artificial Intelligence and Computer Science, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence and Computer Science, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100662562"],"corresponding_institution_ids":["https://openalex.org/I1456306"],"apc_list":null,"apc_paid":null,"fwci":8.5347,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.97231298,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"12","issue":"17","first_page":"35972","last_page":"35984"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8799617886543274},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8536038398742676},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6016015410423279},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5978594422340393},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.59342360496521},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4788360893726349},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4657493531703949},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43644845485687256},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4172728955745697},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2867439389228821},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.14763209223747253}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8799617886543274},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8536038398742676},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6016015410423279},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5978594422340393},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.59342360496521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4788360893726349},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4657493531703949},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43644845485687256},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4172728955745697},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2867439389228821},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.14763209223747253},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3580094","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3580094","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W133884053","https://openalex.org/W2031533839","https://openalex.org/W2053637704","https://openalex.org/W2106463421","https://openalex.org/W2473418344","https://openalex.org/W2767079719","https://openalex.org/W2781091734","https://openalex.org/W2911978475","https://openalex.org/W2919337578","https://openalex.org/W2936154336","https://openalex.org/W2955023110","https://openalex.org/W2963313259","https://openalex.org/W2972714212","https://openalex.org/W2979658571","https://openalex.org/W3114473259","https://openalex.org/W4285262410","https://openalex.org/W4293083969","https://openalex.org/W4328028950","https://openalex.org/W4391697047","https://openalex.org/W4398188118","https://openalex.org/W4401725597","https://openalex.org/W4405303655","https://openalex.org/W4407007798","https://openalex.org/W4407317456"],"related_works":["https://openalex.org/W2063733680","https://openalex.org/W2156318122","https://openalex.org/W2080320258","https://openalex.org/W2789097676","https://openalex.org/W2396704985","https://openalex.org/W2068013785","https://openalex.org/W2370868004","https://openalex.org/W2158897804","https://openalex.org/W2286370870","https://openalex.org/W3173222018"],"abstract_inverted_index":{"The":[0],"Industrial":[1],"Internet":[2],"of":[3,92,170,181,198],"Things":[4],"(IIoT)":[5],"is":[6,176],"revolutionizing":[7],"industries":[8],"such":[9],"as":[10,208],"smart":[11,62],"grids,":[12],"healthcare,":[13],"and":[14,21,37,64,89,165,187,205],"predictive":[15],"maintenance":[16],"by":[17,46,152,210],"harnessing":[18],"big":[19],"data":[20,53,87,114,126],"deep":[22,40,104],"learning":[23,41,71,105],"technologies.":[24],"However,":[25],"limited":[26],"datasets":[27,49],"in":[28,33,58,179],"IIoT":[29],"devices":[30],"often":[31],"result":[32],"suboptimal":[34],"model":[35,94,135],"performance":[36],"overfitting.":[38],"Federated":[39],"can":[42],"mitigate":[43],"this":[44],"issue":[45],"leveraging":[47],"distributed":[48],"across":[50],"devices,":[51],"but":[52,156],"privacy":[54,88],"concerns":[55],"persist,":[56],"especially":[57],"sensitive":[59],"applications":[60],"like":[61],"healthcare":[63],"energy":[65],"management.":[66],"rgb0.00,0.00,0.00Although":[67],"numerous":[68],"privacy-preserving":[69],"federated":[70],"schemes":[72,194],"have":[73],"been":[74],"proposed,":[75],"their":[76],"vulnerabilities":[77],"hinder":[78],"widespread":[79],"adoption":[80],"due":[81],"to":[82,112,124,131],"insufficient":[83],"guarantees":[84],"for":[85],"participant":[86,130],"the":[90,153,162,168,171,184,196],"security":[91],"global":[93,134],"parameters.":[95],"To":[96],"address":[97],"these":[98],"challenges,":[99],"we":[100],"propose":[101],"a":[102,119,140],"novel":[103],"framework":[106],"that":[107],"leverages":[108],"proxy":[109,121,141,172],"re-encryption":[110,122],"techniques":[111],"enhance":[113,125],"privacy.":[115],"Our":[116],"scheme":[117],"employs":[118],"dual":[120],"mechanism":[123],"security,":[127],"enabling":[128],"each":[129],"securely":[132],"access":[133,151],"parameters":[136],"without":[137],"relying":[138],"on":[139],"server":[142,164,186],"during":[143],"training":[144],"rounds.":[145],"This":[146],"not":[147],"only":[148],"prevents":[149],"unauthorized":[150],"parameter":[154,163,185],"server,":[155],"also":[157],"resists":[158],"collusion":[159,182],"attacks":[160],"between":[161],"participants.":[166,188],"Furthermore,":[167],"confidentiality":[169],"server\u2019s":[173],"private":[174],"key":[175],"maintained,":[177],"even":[178],"cases":[180],"involving":[183],"A":[189],"comparative":[190],"analysis":[191],"with":[192],"existing":[193],"highlights":[195],"advantages":[197],"our":[199],"approach,":[200],"including":[201],"reduced":[202],"communication":[203],"overhead":[204],"computational":[206],"complexity,":[207],"demonstrated":[209],"experimental":[211],"results.":[212]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
