{"id":"https://openalex.org/W7127103382","doi":"https://doi.org/10.1109/trustcom66490.2025.00024","title":"Zero-Knowledge Quantized Weighted Majority Algorithm","display_name":"Zero-Knowledge Quantized Weighted Majority Algorithm","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7127103382","doi":"https://doi.org/10.1109/trustcom66490.2025.00024"},"language":null,"primary_location":{"id":"doi:10.1109/trustcom66490.2025.00024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061691079","display_name":"Li Quan","orcid":"https://orcid.org/0000-0002-5832-2446"},"institutions":[{"id":"https://openalex.org/I124055696","display_name":"University of Copenhagen","ror":"https://ror.org/035b05819","country_code":"DK","type":"education","lineage":["https://openalex.org/I124055696"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Li Quan","raw_affiliation_strings":["University of Copenhagen,Department of Computer Science,Copenhagen,Denmark"],"affiliations":[{"raw_affiliation_string":"University of Copenhagen,Department of Computer Science,Copenhagen,Denmark","institution_ids":["https://openalex.org/I124055696"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124849748","display_name":"Xikun Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I124055696","display_name":"University of Copenhagen","ror":"https://ror.org/035b05819","country_code":"DK","type":"education","lineage":["https://openalex.org/I124055696"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Xikun Jiang","raw_affiliation_strings":["University of Copenhagen,Department of Computer Science,Copenhagen,Denmark"],"affiliations":[{"raw_affiliation_string":"University of Copenhagen,Department of Computer Science,Copenhagen,Denmark","institution_ids":["https://openalex.org/I124055696"]}]},{"author_position":"last","author":{"id":null,"display_name":"Boris D\u00fcdder","orcid":null},"institutions":[{"id":"https://openalex.org/I124055696","display_name":"University of Copenhagen","ror":"https://ror.org/035b05819","country_code":"DK","type":"education","lineage":["https://openalex.org/I124055696"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Boris D\u00fcdder","raw_affiliation_strings":["University of Copenhagen,Department of Computer Science,Copenhagen,Denmark"],"affiliations":[{"raw_affiliation_string":"University of Copenhagen,Department of Computer Science,Copenhagen,Denmark","institution_ids":["https://openalex.org/I124055696"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061691079"],"corresponding_institution_ids":["https://openalex.org/I124055696"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85456048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"143","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.3517000079154968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.3517000079154968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.31290000677108765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.04039999842643738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7480000257492065},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6962000131607056},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5593000054359436},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.49390000104904175},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4878000020980835},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4772999882698059},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.46140000224113464},{"id":"https://openalex.org/keywords/decidability","display_name":"Decidability","score":0.42829999327659607},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.40549999475479126}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7480000257492065},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6962000131607056},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6715999841690063},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5803999900817871},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5593000054359436},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.49390000104904175},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4878000020980835},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4772999882698059},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.46140000224113464},{"id":"https://openalex.org/C153269930","wikidata":"https://www.wikidata.org/wiki/Q430001","display_name":"Decidability","level":2,"score":0.42829999327659607},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.40549999475479126},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3946000039577484},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3813999891281128},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.37700000405311584},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.3544999957084656},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3529999852180481},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.3425999879837036},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.33559998869895935},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.33180001378059387},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.32679998874664307},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.31839999556541443},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.3077000081539154},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2847000062465668},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.2840000092983246},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.28299999237060547},{"id":"https://openalex.org/C73301696","wikidata":"https://www.wikidata.org/wiki/Q5469984","display_name":"Formalism (music)","level":3,"score":0.27149999141693115},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26919999718666077},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.2630999982357025}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom66490.2025.00024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1885156594","https://openalex.org/W2005311763","https://openalex.org/W2019385392","https://openalex.org/W2093825590","https://openalex.org/W2133203144","https://openalex.org/W2150865801","https://openalex.org/W2496543269","https://openalex.org/W2795048425","https://openalex.org/W2883748642","https://openalex.org/W2892132959","https://openalex.org/W2969373235","https://openalex.org/W3094241458","https://openalex.org/W3096609273","https://openalex.org/W3154581591","https://openalex.org/W3163926471","https://openalex.org/W3202483316","https://openalex.org/W3213013974","https://openalex.org/W4312463145","https://openalex.org/W4313042292","https://openalex.org/W4362673243","https://openalex.org/W4394907743","https://openalex.org/W4405183082","https://openalex.org/W4405633082","https://openalex.org/W7124250607"],"related_works":[],"abstract_inverted_index":{"The":[0],"rise":[1],"of":[2,55,133,143],"collaborative":[3,167],"AI,":[4],"particularly":[5],"in":[6],"distributed":[7],"Mixture-of-Experts":[8],"(MoE)":[9],"systems,":[10],"has":[11],"created":[12],"a":[13,34,52,61,117,144,159],"critical":[14],"challenge:":[15],"how":[16],"to":[17,64,77,121],"ensure":[18],"trust":[19],"and":[20,42,73,96,153,161],"transparency":[21],"when":[22],"aggregating":[23],"proprietary":[24],"models":[25],"from":[26],"different":[27],"providers.":[28],"To":[29],"address":[30],"this,":[31],"we":[32,119],"introduce":[33],"novel":[35],"cryptographic":[36],"protocol":[37],"ZQ-WMA":[38],"that":[39,90,104],"enables":[40],"verifiable":[41],"privacy-preserving":[43],"online":[44],"learning.":[45],"Our":[46,101],"method":[47],"integrates":[48],"zero-knowledge":[49,110],"proofs":[50,111],"with":[51,149],"quantized":[53],"version":[54],"the":[56,78,105,109,122,131],"Weighted":[57],"Majority":[58],"Algorithm,":[59],"allowing":[60],"central":[62],"aggregator":[63],"publicly":[65],"prove":[66],"it":[67],"is":[68],"honestly":[69],"combining":[70],"expert":[71,91],"advice":[72],"updating":[74],"weights":[75],"according":[76],"agreed-upon":[79],"rules,":[80],"all":[81],"without":[82],"revealing":[83],"any":[84],"confidential":[85],"model":[86],"parameters.This":[87],"approach":[88],"ensures":[89],"contributions":[92],"are":[93],"evaluated":[94],"fairly":[95],"protects":[97],"valuable":[98],"intellectual":[99],"property.":[100],"analysis":[102],"reveals":[103],"quantization":[106],"necessary":[107],"for":[108,164],"can":[112],"counter-intuitively":[113],"enhance":[114],"prediction":[115],"accuracy,":[116],"phenomenon":[118],"attribute":[120],"maximal":[123],"entropy":[124],"random":[125],"walks.":[126],"Furthermore,":[127],"our":[128],"benchmarks":[129],"demonstrate":[130],"efficiency":[132],"this":[134],"method,":[135],"showing":[136],"proof":[137,151],"generation":[138],"complexity":[139],"less":[140],"than":[141],"10%":[142],"standard":[145],"SHA256":[146],"hash":[147],"function,":[148],"O(1)":[150],"size":[152],"verification":[154],"time.":[155],"This":[156],"work":[157],"provides":[158],"practical":[160],"scalable":[162],"framework":[163],"building":[165],"trustworthy":[166],"AI":[168],"systems.":[169]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-02-03T00:00:00"}
