{"id":"https://openalex.org/W4381537550","doi":"https://doi.org/10.1109/tifs.2023.3273914","title":"Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning","display_name":"Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4381537550","doi":"https://doi.org/10.1109/tifs.2023.3273914"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3273914","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3273914","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/9970396/10121168.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/10206/9970396/10121168.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Tamer Eltaras","orcid":"https://orcid.org/0000-0003-2849-0569"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Tamer Eltaras","raw_affiliation_strings":["Computer Science and Engineering Department, Qatar University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0003-2849-0569","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041426186","display_name":"Farida Sabry","orcid":"https://orcid.org/0000-0001-5639-983X"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Farida Sabry","raw_affiliation_strings":["Computer Science and Engineering Department, Qatar University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0001-5639-983X","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008152604","display_name":"Wadha Labda","orcid":"https://orcid.org/0000-0001-6097-2395"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Wadha Labda","raw_affiliation_strings":["Computer Science and Engineering Department, Qatar University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0001-6097-2395","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055971550","display_name":"Khawla Alzoubi","orcid":"https://orcid.org/0000-0002-2797-2673"},"institutions":[{"id":"https://openalex.org/I4210116586","display_name":"Community College of Qatar","ror":"https://ror.org/01psb9158","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210116586"]},{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Khawla Alzoubi","raw_affiliation_strings":["Engineering Technology Department, Community College, Qatar University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0002-2797-2673","affiliations":[{"raw_affiliation_string":"Engineering Technology Department, Community College, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I4210116586","https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":null,"display_name":"Qutaibah AHMEDELTARAS","orcid":"https://orcid.org/0000-0002-8664-9091"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Qutaibah AHMEDELTARAS","raw_affiliation_strings":["Computer Science and Engineering Department, Qatar University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0002-8664-9091","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I60342839"],"apc_list":null,"apc_paid":null,"fwci":12.1524,"has_fulltext":true,"cited_by_count":72,"citation_normalized_percentile":{"value":0.99024803,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"2977","last_page":"2990"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.9014391303062439},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8762191534042358},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7178447246551514},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4780576527118683},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4595550298690796},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.44459185004234314},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44194889068603516},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3179699778556824},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.07086625695228577}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.9014391303062439},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8762191534042358},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7178447246551514},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4780576527118683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4595550298690796},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44459185004234314},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44194889068603516},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3179699778556824},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.07086625695228577},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2023.3273914","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3273914","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/9970396/10121168.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/25243381","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Efficient_Verifiable_Protocol_for_Privacy-Preserving_Aggregation_in_Federated_Learning/25243381","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1109/tifs.2023.3273914","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3273914","pdf_url":"https://ieeexplore.ieee.org/ielx7/10206/9970396/10121168.pdf","source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5299999713897705}],"awards":[{"id":"https://openalex.org/G3692039123","display_name":null,"funder_award_id":"ECRA 01-006-1-001","funder_id":"https://openalex.org/F4320332753","funder_display_name":"Qatar National Research Fund"}],"funders":[{"id":"https://openalex.org/F4320321038","display_name":"Fonds National de la Recherche Luxembourg","ror":"https://ror.org/039z13y21"},{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"},{"id":"https://openalex.org/F4320334468","display_name":"Qatar National Library","ror":"https://ror.org/02jv93662"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4381537550.pdf","grobid_xml":"https://content.openalex.org/works/W4381537550.grobid-xml"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W1549842354","https://openalex.org/W1971569850","https://openalex.org/W2093678760","https://openalex.org/W2112796928","https://openalex.org/W2535838896","https://openalex.org/W2726092462","https://openalex.org/W2768174108","https://openalex.org/W2781091734","https://openalex.org/W2805074088","https://openalex.org/W2886444620","https://openalex.org/W2951832089","https://openalex.org/W2963540401","https://openalex.org/W2970606380","https://openalex.org/W2995022099","https://openalex.org/W2997721570","https://openalex.org/W2998628425","https://openalex.org/W3013310637","https://openalex.org/W3015415068","https://openalex.org/W3016632787","https://openalex.org/W3043303805","https://openalex.org/W3044796230","https://openalex.org/W3049595782","https://openalex.org/W3088123628","https://openalex.org/W3090750097","https://openalex.org/W3091870957","https://openalex.org/W3101860164","https://openalex.org/W3110845456","https://openalex.org/W3118608800","https://openalex.org/W3157850870","https://openalex.org/W3159560790","https://openalex.org/W3178386862","https://openalex.org/W3192324887","https://openalex.org/W3211993156","https://openalex.org/W4200630816","https://openalex.org/W4205383771","https://openalex.org/W4205423013","https://openalex.org/W4206055738","https://openalex.org/W4206573848","https://openalex.org/W4210485920","https://openalex.org/W4214742958","https://openalex.org/W4226047321","https://openalex.org/W4285166735","https://openalex.org/W4285218634","https://openalex.org/W4285605561","https://openalex.org/W4289656845","https://openalex.org/W4289822670","https://openalex.org/W4293363185","https://openalex.org/W4295358171","https://openalex.org/W4297687186","https://openalex.org/W4312722905","https://openalex.org/W4318619660","https://openalex.org/W6632826170","https://openalex.org/W6728757088","https://openalex.org/W6732298257","https://openalex.org/W6740443968","https://openalex.org/W6754708698","https://openalex.org/W6757006202","https://openalex.org/W6781597409","https://openalex.org/W6783183097","https://openalex.org/W6787972765","https://openalex.org/W6791673544","https://openalex.org/W6795487366","https://openalex.org/W6805407591"],"related_works":["https://openalex.org/W2956602083","https://openalex.org/W3013119816","https://openalex.org/W1827060200","https://openalex.org/W2159180878","https://openalex.org/W2161433742","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W1982325601","https://openalex.org/W2282990539"],"abstract_inverted_index":{"Federated":[0],"learning":[1,30,35,58,82],"has":[2],"gained":[3],"extensive":[4],"interest":[5],"in":[6,79,140,155],"recent":[7],"years":[8],"owing":[9],"to":[10,13,41,61,125],"its":[11],"ability":[12],"update":[14],"model":[15,31,77,97],"parameters":[16,78],"without":[17,105],"obtaining":[18],"raw":[19,108],"data":[20,109],"from":[21,54],"users,":[22],"which":[23],"makes":[24],"it":[25,121,178],"a":[26,70,80,167],"viable":[27],"privacy-preserving":[28],"machine":[29],"for":[32,73,160],"collaborative":[33],"distributed":[34],"among":[36],"various":[37],"devices.":[38],"However,":[39],"due":[40],"the":[42,94,102,107,128,133,150,161,170,182,187],"fact":[43],"that":[44,177],"adversaries":[45],"can":[46],"track":[47],"and":[48,64,120,144,174],"deduce":[49],"private":[50],"information":[51],"about":[52],"users":[53],"shared":[55],"gradients,":[56],"federated":[57,81],"is":[59,84,88,115,138,146,164,172],"vulnerable":[60],"numerous":[62],"security":[63],"privacy":[65,145],"threats.":[66],"In":[67],"this":[68],"work,":[69],"communication-efficient":[71],"protocol":[72,114,137,171],"secure":[74,139],"aggregation":[75],"of":[76,110,152,169,181,189],"setting":[83,163],"proposed":[85,113,162],"where":[86],"training":[87],"done":[89],"on":[90,101],"user":[91,124],"devices":[92],"while":[93],"aggregated":[95,129],"trained":[96],"could":[98],"be":[99],"constructed":[100],"server":[103],"side":[104],"revealing":[106],"users.":[111],"The":[112,135],"robust":[116],"against":[117],"users\u2019":[118],"dropouts,":[119],"enables":[122],"each":[123],"independently":[126],"validate":[127],"result":[130],"supplied":[131],"by":[132],"server.":[134],"suggested":[136],"an":[141],"honest-but-curious":[142],"environment,":[143],"maintained":[147],"even":[148],"if":[149],"majority":[151],"parties":[153],"are":[154],"collusion.":[156],"A":[157],"practical":[158],"scenario":[159],"discussed.":[165],"Additionally,":[166],"simulation":[168],"evaluated,":[173],"results":[175],"demonstrate":[176],"outperforms":[179],"one":[180],"state-of-art":[183],"protocols,":[184],"especially":[185],"when":[186],"number":[188],"dropouts":[190],"increases.":[191]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":43},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":3}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
