{"id":"https://openalex.org/W4289792488","doi":"https://doi.org/10.1109/tnsm.2022.3196404","title":"G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning","display_name":"G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning","publication_year":2022,"publication_date":"2022-08-04","ids":{"openalex":"https://openalex.org/W4289792488","doi":"https://doi.org/10.1109/tnsm.2022.3196404"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2022.3196404","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3196404","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070361846","display_name":"Zhuangzhuang Zhang","orcid":"https://orcid.org/0000-0001-7749-2718"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhuangzhuang Zhang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102735309","display_name":"Libing Wu","orcid":"https://orcid.org/0000-0002-6863-3280"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Libing Wu","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence, MatrixElements Technologies, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence, MatrixElements Technologies, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391116","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0002-8967-8525"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102865094","display_name":"Dan Wu","orcid":"https://orcid.org/0000-0003-0113-3908"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Dan Wu","raw_affiliation_strings":["School of Computer Science, University of Windsor, Windsor, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Windsor, Windsor, Canada","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064888917","display_name":"Xiaochuan Shi","orcid":"https://orcid.org/0000-0002-2044-0965"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochuan Shi","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023893507","display_name":"Chao Ma","orcid":"https://orcid.org/0000-0002-7443-6267"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Ma","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5070361846"],"corresponding_institution_ids":["https://openalex.org/I180726961","https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":5.5519,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.96353636,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"19","issue":"4","first_page":"4219","last_page":"4231"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.9046823978424072},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8717852830886841},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5713912844657898},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.5708224773406982},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.525152862071991},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.49143683910369873},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.48085981607437134},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47772881388664246},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4255082607269287},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4192366898059845},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31955236196517944},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2796880304813385}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.9046823978424072},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8717852830886841},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5713912844657898},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.5708224773406982},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.525152862071991},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.49143683910369873},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.48085981607437134},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47772881388664246},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4255082607269287},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4192366898059845},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31955236196517944},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2796880304813385},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2022.3196404","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3196404","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4201753823","display_name":null,"funder_award_id":"61772377","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G575899936","display_name":null,"funder_award_id":"2021YFB3101104","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8024709401","display_name":null,"funder_award_id":"U20A20177","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W2051267297","https://openalex.org/W2473418344","https://openalex.org/W2530417694","https://openalex.org/W2535690855","https://openalex.org/W2535838896","https://openalex.org/W2591882872","https://openalex.org/W2701059868","https://openalex.org/W2765209872","https://openalex.org/W2767079719","https://openalex.org/W2781091734","https://openalex.org/W2793062918","https://openalex.org/W2800439477","https://openalex.org/W2801491268","https://openalex.org/W2921713989","https://openalex.org/W2927692314","https://openalex.org/W2930926105","https://openalex.org/W2963456518","https://openalex.org/W2963540401","https://openalex.org/W2963752132","https://openalex.org/W2964162474","https://openalex.org/W2967497108","https://openalex.org/W2994111940","https://openalex.org/W3004715243","https://openalex.org/W3008381581","https://openalex.org/W3008493372","https://openalex.org/W3015535799","https://openalex.org/W3016560828","https://openalex.org/W3030382486","https://openalex.org/W3033371054","https://openalex.org/W3045670331","https://openalex.org/W3084128899","https://openalex.org/W3095859802","https://openalex.org/W3102360395","https://openalex.org/W3102893897","https://openalex.org/W3103245149","https://openalex.org/W3108146280","https://openalex.org/W3110845456","https://openalex.org/W3118608800","https://openalex.org/W3138090943","https://openalex.org/W3173211653","https://openalex.org/W3211993156","https://openalex.org/W3217374154","https://openalex.org/W4221140362","https://openalex.org/W4297687186","https://openalex.org/W6728757088","https://openalex.org/W6763736615","https://openalex.org/W6764838729","https://openalex.org/W6787972765","https://openalex.org/W6810663505"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W4285814369","https://openalex.org/W2956602083","https://openalex.org/W3013119816"],"abstract_inverted_index":{"Federated":[0],"learning,":[1],"as":[2],"a":[3,43,102,128],"typical":[4],"distributed":[5],"learning":[6,24,77,108,117,159],"paradigm,":[7],"shows":[8],"great":[9],"potential":[10],"in":[11,93,190],"Industrial":[12],"Internet":[13],"of":[14,39,46,123,137],"Things,":[15],"Smart":[16,18],"Home,":[17],"City,":[19],"etc.":[20],"It":[21],"enables":[22,155],"collaborative":[23],"without":[25],"data":[26],"leaving":[27],"local":[28],"users.":[29],"Despite":[30],"the":[31,37,68,114,121,135,138,191,198],"huge":[32],"benefits,":[33],"it":[34],"still":[35,90],"faces":[36,91],"risk":[38],"privacy":[40,122],"breaches":[41],"and":[42,82,125,149,182,195],"single":[44],"point":[45],"failure":[47],"for":[48],"aggregation":[49,69,131],"server.":[50,70],"Adversaries":[51],"can":[52],"use":[53,113],"intermediate":[54],"models":[55],"to":[56,119,133],"infer":[57],"user":[58],"privacy,":[59],"or":[60],"even":[61],"return":[62],"incorrect":[63],"global":[64,139],"model":[65],"by":[66,160,172],"manipulating":[67],"To":[71],"address":[72],"these":[73],"issues,":[74],"several":[75],"federated":[76,107,158],"solutions":[78,89],"focusing":[79],"on":[80,169],"privacy-preserving":[81,106,157],"security":[83],"have":[84],"been":[85],"proposed.":[86],"However,":[87],"theses":[88],"challenges":[92],"resource-limited":[94],"scenarios.":[95],"In":[96],"this":[97],"paper,":[98],"we":[99,111],"propose":[100,127],"G-VCFL,":[101],"grouped":[103,115],"verifiable":[104,129,156],"chained":[105],"scheme.":[109],"Specifically,":[110],"first":[112],"chain":[116],"mechanism":[118],"guarantee":[120,134],"users,":[124],"then":[126],"secure":[130],"protocol":[132],"verifiability":[136],"model.":[140],"G-VCFL":[141,174,187],"does":[142,150],"not":[143,151],"require":[144],"any":[145],"complex":[146],"cryptographic":[147],"primitives":[148],"introduce":[152],"noise,":[153],"but":[154],"utilizing":[161],"lightweight":[162],"pseudorandom":[163],"generators.":[164],"We":[165],"conduct":[166],"extensive":[167],"experiments":[168],"real-world":[170],"datasets":[171],"comparing":[173],"with":[175],"other":[176],"state-of-the-art":[177],"approaches.":[178],"The":[179],"experimental":[180,193],"results":[181],"functional":[183],"evaluation":[184],"indicate":[185],"that":[186],"is":[188],"efficient":[189],"six":[192],"cases":[194],"satisfies":[196],"all":[197],"intended":[199],"design":[200],"goals.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":17},{"year":2023,"cited_by_count":7}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
