{"id":"https://openalex.org/W4289536399","doi":"https://doi.org/10.1109/tifs.2022.3186739","title":"LaF: Lattice-Based and Communication-Efficient Federated Learning","display_name":"LaF: Lattice-Based and Communication-Efficient Federated Learning","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4289536399","doi":"https://doi.org/10.1109/tifs.2022.3186739"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3186739","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3186739","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001599037","display_name":"Peng Xu","orcid":"https://orcid.org/0000-0003-4268-4976"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Xu","raw_affiliation_strings":["Services Computing Technology and System Laboratory, National Engineering Research Center for Big Data Technology and System, and the Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Services Computing Technology and System Laboratory, National Engineering Research Center for Big Data Technology and System, and the Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079846619","display_name":"Manqing Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Manqing Hu","raw_affiliation_strings":["Services Computing Technology and System Laboratory, National Engineering Research Center for Big Data Technology and System, and the Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Services Computing Technology and System Laboratory, National Engineering Research Center for Big Data Technology and System, and the Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101808017","display_name":"Tianyang Chen","orcid":"https://orcid.org/0000-0002-6714-3159"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyang Chen","raw_affiliation_strings":["Services Computing Technology and System Laboratory, National Engineering Research Center for Big Data Technology and System, and the Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Services Computing Technology and System Laboratory, National Engineering Research Center for Big Data Technology and System, and the Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100392305","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0003-4457-6709"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Cyber-Physical-Social Systems Laboratory, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cyber-Physical-Social Systems Laboratory, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["Services Computing Technology and System Laboratory, National Engineering Research Center for Big Data Technology and System, and the Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Services Computing Technology and System Laboratory, National Engineering Research Center for Big Data Technology and System, and the Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5001599037"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":4.2748,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.94835057,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"2483","last_page":"2496"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8142585754394531},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.7048599720001221},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.65531986951828},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6180161237716675},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5011336803436279},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5004563331604004},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.44410020112991333},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.4281766712665558},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.417483925819397},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38838624954223633},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33023956418037415},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3149871230125427},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29198968410491943},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2523770332336426},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18643072247505188},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09291186928749084}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8142585754394531},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.7048599720001221},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.65531986951828},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6180161237716675},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5011336803436279},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5004563331604004},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.44410020112991333},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.4281766712665558},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.417483925819397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38838624954223633},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33023956418037415},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3149871230125427},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29198968410491943},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2523770332336426},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18643072247505188},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09291186928749084},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3186739","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3186739","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.49000000953674316,"display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G2711482822","display_name":null,"funder_award_id":"61872412","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6718487430","display_name":null,"funder_award_id":"2021YFB3101304","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1426154471","https://openalex.org/W2055595354","https://openalex.org/W2080939522","https://openalex.org/W2096430557","https://openalex.org/W2116612304","https://openalex.org/W2132172731","https://openalex.org/W2141420453","https://openalex.org/W2526932592","https://openalex.org/W2535838896","https://openalex.org/W2767079719","https://openalex.org/W2911978475","https://openalex.org/W2930926105","https://openalex.org/W2956549007","https://openalex.org/W2963540401","https://openalex.org/W2964162474","https://openalex.org/W2990595670","https://openalex.org/W3004155269","https://openalex.org/W3006403184","https://openalex.org/W3009927559","https://openalex.org/W3016632787","https://openalex.org/W3019945581","https://openalex.org/W3021654819","https://openalex.org/W3023244064","https://openalex.org/W3027749727","https://openalex.org/W3038028469","https://openalex.org/W3040384242","https://openalex.org/W3042621011","https://openalex.org/W3045674654","https://openalex.org/W3045720734","https://openalex.org/W3047380981","https://openalex.org/W3091870957","https://openalex.org/W3103245149","https://openalex.org/W3107100345","https://openalex.org/W3176786489","https://openalex.org/W3177095755","https://openalex.org/W3178386862","https://openalex.org/W3200969281","https://openalex.org/W3204009762","https://openalex.org/W3209752568","https://openalex.org/W4205765479","https://openalex.org/W4297687186","https://openalex.org/W6718865826","https://openalex.org/W6724049718","https://openalex.org/W6728757088","https://openalex.org/W6752600739","https://openalex.org/W6759226220","https://openalex.org/W6780438843"],"related_works":["https://openalex.org/W2092530219","https://openalex.org/W2388464034","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W4214920459","https://openalex.org/W2105580438","https://openalex.org/W4300994926","https://openalex.org/W4312061170","https://openalex.org/W2953258282","https://openalex.org/W4389325564"],"abstract_inverted_index":{"Federated":[0],"learning":[1,65,111,155],"is":[2],"an":[3],"emerging":[4],"technology":[5],"which":[6],"allows":[7,122],"a":[8,12,45,91,152,165],"server":[9],"to":[10,56,71,80,97,103,125,150],"train":[11],"global":[13],"model":[14],"with":[15,171],"the":[16,22,133,175],"cooperation":[17],"of":[18,63,109,135,167],"participants":[19,105],"without":[20],"exposing":[21],"participants&#x2019;":[23,58,136],"data.":[24],"In":[25,41,116],"recent":[26],"years,":[27],"there":[28],"have":[29],"been":[30],"many":[31],"studies":[32],"focusing":[33],"on":[34],"maintaining":[35,132],"participant":[36,124],"privacy":[37,134],"against":[38,138],"honest-but-curious":[39],"servers.":[40],"2017,":[42],"Google":[43],"proposed":[44],"promising":[46],"solution":[47,69],"that":[48,162,179],"applies":[49,144],"double":[50],"masking":[51],"and":[52,75,174],"secret":[53,82,94,101,128,147],"sharing":[54,95,148],"tools":[55],"protect":[57],"gradients":[59,137],"for":[60],"each":[61,107,123],"round":[62,108],"federated":[64,110,154],"(CCS&#x2019;17).":[66],"However,":[67],"this":[68,86,88,119,142,145],"fails":[70],"achieve":[72],"post-quantum":[73,114],"security":[74],"costs":[76,169],"high":[77],"communication":[78,168],"overhead":[79],"distribute":[81],"shares.":[83],"To":[84],"address":[85],"problem,":[87],"work":[89,143],"designs":[90],"lattice-based":[92,153],"multi-use":[93],"scheme":[96],"avoid":[98],"distributing":[99],"new":[100,120,146],"shares":[102,129],"all":[104],"in":[106],"while":[112,131],"achieving":[113],"security.":[115],"other":[117],"words,":[118],"tool":[121],"update":[126],"his":[127],"locally":[130],"quantum":[139],"attacks.":[140],"Finally,":[141],"technique":[149],"construct":[151],"protocl":[156],"<i>LaF</i>.":[157],"The":[158],"theoretic":[159],"analysis":[160],"demonstrates":[161],"<i>LaF</i>":[163,180],"saves":[164],"lot":[166],"compared":[170],"Google&#x2019;s":[172],"solution,":[173],"experimental":[176],"results":[177],"show":[178],"achieves":[181],"higher":[182],"runtime":[183],"efficiency.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
