{"id":"https://openalex.org/W7117295230","doi":"https://doi.org/10.1109/tit.2025.3648767","title":"Optimal Communication and Key Rate Region for Hierarchical Secure Aggregation With User Collusion","display_name":"Optimal Communication and Key Rate Region for Hierarchical Secure Aggregation With User Collusion","publication_year":2025,"publication_date":"2025-12-26","ids":{"openalex":"https://openalex.org/W7117295230","doi":"https://doi.org/10.1109/tit.2025.3648767"},"language":null,"primary_location":{"id":"doi:10.1109/tit.2025.3648767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2025.3648767","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121303152","display_name":"Xiang Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Xiang Zhang","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, Technical University of Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, Technical University of Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042862785","display_name":"Kai Wan","orcid":"https://orcid.org/0000-0003-4671-3287"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Wan","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121343730","display_name":"Hua Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hua Sun","raw_affiliation_strings":["Department of Electrical Engineering, University of North Texas, Denton, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of North Texas, Denton, TX, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shiqiang Wang","orcid":"https://orcid.org/0000-0003-2090-5512"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shiqiang Wang","raw_affiliation_strings":["Department of Computer Science, University of Exeter, Exeter, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Exeter, Exeter, U.K","institution_ids":["https://openalex.org/I23923803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121333326","display_name":"Mingyue Ji","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mingyue Ji","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121360720","display_name":"Giuseppe Caire","orcid":null},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Giuseppe Caire","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, Technical University of Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, Technical University of Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5121303152"],"corresponding_institution_ids":["https://openalex.org/I4577782"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8107652,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"2","first_page":"1030","last_page":"1050"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.4927000105381012,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.4927000105381012,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.1378999948501587,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.10559999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6173999905586243},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5426999926567078},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5156999826431274},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.4916999936103821},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4607999920845032},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4343000054359436},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.42309999465942383},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.3783999979496002},{"id":"https://openalex.org/keywords/universal-composability","display_name":"Universal composability","score":0.3734999895095825}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8586000204086304},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6614999771118164},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6173999905586243},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5623999834060669},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5426999926567078},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5156999826431274},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.4916999936103821},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4607999920845032},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4343000054359436},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.42309999465942383},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.3783999979496002},{"id":"https://openalex.org/C165751822","wikidata":"https://www.wikidata.org/wiki/Q7894118","display_name":"Universal composability","level":4,"score":0.3734999895095825},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.36890000104904175},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.33880001306533813},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.3303999900817871},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.31450000405311584},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.3109999895095825},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.3003999888896942},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.274399995803833},{"id":"https://openalex.org/C158156997","wikidata":"https://www.wikidata.org/wiki/Q1416645","display_name":"Models of communication","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2694999873638153},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.25360000133514404},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2025.3648767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2025.3648767","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5604416835","display_name":null,"funder_award_id":"789190","funder_id":"https://openalex.org/F4320325370","funder_display_name":"National Research Council of Science and Technology"},{"id":"https://openalex.org/G888043903","display_name":null,"funder_award_id":"62571206","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320325370","display_name":"National Research Council of Science and Technology","ror":"https://ror.org/058rymf81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1599026900","https://openalex.org/W1604351949","https://openalex.org/W1968245619","https://openalex.org/W2080132708","https://openalex.org/W2099111195","https://openalex.org/W2108603792","https://openalex.org/W2109394932","https://openalex.org/W2141420453","https://openalex.org/W2767079719","https://openalex.org/W2995022099","https://openalex.org/W3007279825","https://openalex.org/W3013310637","https://openalex.org/W3016632787","https://openalex.org/W3023244064","https://openalex.org/W3045638580","https://openalex.org/W3091870957","https://openalex.org/W3106378891","https://openalex.org/W3124562976","https://openalex.org/W3157850870","https://openalex.org/W3169582402","https://openalex.org/W4211099356","https://openalex.org/W4226049484","https://openalex.org/W4226116859","https://openalex.org/W4283798991","https://openalex.org/W4289655152","https://openalex.org/W4323065158","https://openalex.org/W4386057503","https://openalex.org/W4386066460","https://openalex.org/W4386075114","https://openalex.org/W4389665995","https://openalex.org/W4389961161","https://openalex.org/W4395448275","https://openalex.org/W4396817396","https://openalex.org/W4400230359","https://openalex.org/W4402113918","https://openalex.org/W4405908543","https://openalex.org/W4407462080","https://openalex.org/W4414158983"],"related_works":[],"abstract_inverted_index":{"Secure":[0],"aggregation":[1,20,99,163,176,218],"is":[2,78,253],"concerned":[3],"with":[4,81,120,174],"the":[5,10,13,24,27,84,106,113,126,134,146,161,192,196,206,223,254,257,266,313,318],"task":[6],"of":[7,12,91,123,144,148,182,250,256,265,268],"securely":[8],"computing":[9],"sum":[11,299],"inputs":[14,28],"from":[15],"multiple":[16],"users":[17,172],"by":[18,155,231],"an":[19,71,175,179,277],"server":[21,25,68,107,177,188,193],"without":[22],"letting":[23],"know":[26],"beyond":[29,112],"their":[30,56],"summation.":[31],"It":[32],"finds":[33],"broad":[34],"applications":[35],"in":[36,138,151,165],"distributed":[37],"machine":[38],"learning":[39,44],"paradigms":[40],"such":[41,214],"as":[42,61,83,262],"federated":[43,157],"(FL)":[45],"where":[46,170],"numerous":[47],"clients,":[48],"each":[49],"holding":[50],"a":[51,64,88,121,166,215,263,282,287,306],"proprietary":[52],"dataset,":[53],"periodically":[54],"upload":[55],"locally":[57],"trained":[58],"models":[59],"(abstracted":[60],"inputs)":[62],"to":[63,104,186,210,311],"parameter":[65],"server.":[66],"The":[67],"then":[69],"generates":[70],"aggregate":[72],"model,":[73],"typically":[74],"through":[75],"averaging,":[76],"which":[77,190],"shared":[79],"back":[80],"clients":[82],"starting":[85],"point":[86],"for":[87,317],"new":[89],"round":[90],"local":[92],"training.":[93],"To":[94],"protect":[95],"data":[96],"security,":[97,203],"secure":[98,139,162,217],"protocols":[100],"leverage":[101],"cryptographic":[102],"techniques":[103],"ensure":[105],"gains":[108],"no":[109],"additional":[110],"information":[111],"input":[114,197,298],"sum,":[115,198],"even":[116],"if":[117],"it":[118,141],"colludes":[119],"subset":[122],"users.":[124],"While":[125],"simple":[127],"star":[128],"client-server":[129],"architecture":[130],"provides":[131],"insights":[132],"into":[133],"fundamental":[135],"utility-security":[136],"trade-off":[137,226],"aggregation,":[140],"falls":[142],"short":[143],"capturing":[145],"impact":[147],"network":[149],"topology":[150],"practical":[152],"systems.":[153],"Motivated":[154],"hierarchical":[156,168,216],"learning,":[158],"we":[159,199,221,304],"investigate":[160],"problem":[164],"three-layer":[167],"network,":[169],"clustered":[171],"communicate":[173],"via":[178],"intermediate":[180],"layer":[181],"relays.":[183],"In":[184],"addition":[185],"conventional":[187],"security":[189],"ensures":[191],"learns":[194],"only":[195],"also":[200],"impose":[201],"relay":[202],"requiring":[204],"that":[205,295],"relays":[207],"remain":[208],"oblivious":[209],"users\u2019":[211],"inputs.":[212],"For":[213],"(HSA)":[219],"problem,":[220],"characterize":[222],"optimal":[224,258,278,314],"multifaceted":[225],"between":[227],"communication":[228,235,279],"efficiency":[229,240],"(measured":[230],"user-to-relay":[232],"and":[233,237,243,272,301],"relay-to-server":[234],"rates)":[236],"key":[238,245,260,283],"generation":[239,284],"(including":[241],"individual":[242],"source":[244,259],"rates).":[246],"A":[247],"core":[248],"contribution":[249],"this":[251],"work":[252],"derivation":[255],"rate":[261,315],"function":[264],"number":[267],"relays,":[269],"cluster":[270],"size,":[271],"collusion":[273],"level.":[274],"We":[275],"propose":[276],"scheme":[280,285],"alongside":[281],"utilizing":[286],"novel":[288],"matrix":[289,294],"structure":[290],"called":[291],"extended":[292],"Vandermonde":[293],"guarantees":[296],"both":[297],"recovery":[300],"security.":[302],"Moreover,":[303],"derive":[305],"tight":[307],"information-theoretic":[308],"converse":[309],"proof":[310],"establish":[312],"region":[316],"HSA":[319],"problem.":[320]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-26T00:00:00"}
