{"id":"https://openalex.org/W4415368719","doi":"https://doi.org/10.1109/isit63088.2025.11195258","title":"Multi-Message Secure Aggregation with Demand Privacy","display_name":"Multi-Message Secure Aggregation with Demand Privacy","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4415368719","doi":"https://doi.org/10.1109/isit63088.2025.11195258"},"language":null,"primary_location":{"id":"doi:10.1109/isit63088.2025.11195258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023083036","display_name":"Chenyi Sun","orcid":"https://orcid.org/0009-0003-7203-8833"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenyi Sun","raw_affiliation_strings":["Huazhong University of Science and Technology,Wuhan,China,430074"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,Wuhan,China,430074","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065764307","display_name":"Ziting Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziting Zhang","raw_affiliation_strings":["Huazhong University of Science and Technology,Wuhan,China,430074"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,Wuhan,China,430074","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042862785","display_name":"Kai Wan","orcid":"https://orcid.org/0000-0003-4671-3287"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Wan","raw_affiliation_strings":["Huazhong University of Science and Technology,Wuhan,China,430074"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,Wuhan,China,430074","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036447883","display_name":"Qing Feng","orcid":"https://orcid.org/0009-0007-7947-4418"},"institutions":[{"id":"https://openalex.org/I4210100255","display_name":"Beijing Academy of Artificial Intelligence","ror":"https://ror.org/016a74861","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210100255"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Feng","raw_affiliation_strings":["PKU-Wuhan institute for Artificial Intelligence,China"],"affiliations":[{"raw_affiliation_string":"PKU-Wuhan institute for Artificial Intelligence,China","institution_ids":["https://openalex.org/I4210100255"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056678232","display_name":"Feng Yan","orcid":"https://orcid.org/0000-0001-9926-7554"},"institutions":[{"id":"https://openalex.org/I140786321","display_name":"Tibet University","ror":"https://ror.org/05petvd47","country_code":"CN","type":"education","lineage":["https://openalex.org/I140786321"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Feng","raw_affiliation_strings":["Xizang University,College of Information Science and Technology,Lhasa,China,850000"],"affiliations":[{"raw_affiliation_string":"Xizang University,College of Information Science and Technology,Lhasa,China,850000","institution_ids":["https://openalex.org/I140786321"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058252389","display_name":"Giuseppe Caire","orcid":"https://orcid.org/0000-0002-7749-1333"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Giuseppe Caire","raw_affiliation_strings":["Technische Universit&#x00E4;t Berlin,Berlin,Germany,10587"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t Berlin,Berlin,Germany,10587","institution_ids":["https://openalex.org/I4577782"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5023083036"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.8194,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79941143,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.8999999761581421,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.8999999761581421,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.8912000060081482,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.8535000085830688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5453000068664551},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4984000027179718},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4814000129699707},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.46630001068115234},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.43459999561309814},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.3619000017642975},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35850000381469727},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.357699990272522},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.34290000796318054}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7321000099182129},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5453000068664551},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4984000027179718},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4814000129699707},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4706000089645386},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.46630001068115234},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.43459999561309814},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.3619000017642975},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35850000381469727},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.357699990272522},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.34290000796318054},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.335999995470047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3206999897956848},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.31200000643730164},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.2994000017642975},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29910001158714294},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.29750001430511475},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2872999906539917},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.2639999985694885},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.26260000467300415},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2590000033378601},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2556000053882599},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.25209999084472656},{"id":"https://openalex.org/C2983523559","wikidata":"https://www.wikidata.org/wiki/Q410657","display_name":"On demand","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit63088.2025.11195258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2073346043","https://openalex.org/W2109394932","https://openalex.org/W2593599278","https://openalex.org/W2599749253","https://openalex.org/W2767079719","https://openalex.org/W2808769206","https://openalex.org/W2906543194","https://openalex.org/W2964081636","https://openalex.org/W2995022099","https://openalex.org/W3124562976","https://openalex.org/W3141797743","https://openalex.org/W4226549547","https://openalex.org/W4318619660","https://openalex.org/W4401692233","https://openalex.org/W4415368719"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"considers":[2],"a":[3,13,132],"multi-message":[4],"secure":[5],"aggregation":[6],"with":[7],"demand":[8,130],"privacy":[9],"problem,":[10],"in":[11,102,145,154,179],"which":[12],"server":[14,46],"aims":[15],"to":[16,173,186],"compute":[17],"<tex":[18,29,86,109,113,120,162,210,221],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[19,30,87,110,114,121,163,211,222],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$K_{c}":[20],"\\geq":[21],"1$</tex>":[22],"linear":[23,52,175],"combinations":[24,53,176],"of":[25,78,96,127,177,190],"local":[26],"inputs":[27],"from":[28,67],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$K$</tex>":[31],"distributed":[32],"and":[33,62,93,112,141,213],"non-colluding":[34],"users.":[35],"The":[36,183],"problem":[37],"addresses":[38],"two":[39,106,198],"tasks:":[40],"(1)":[41],"security,":[42],"ensuring":[43],"that":[44],"the":[45,50,59,70,76,94,128,146,155,180,188,197,205,214],"can":[47,90],"only":[48],"obtain":[49],"desired":[51],"without":[54],"any":[55],"else":[56],"information":[57],"about":[58,69],"users'":[60],"inputs,":[61],"(2)":[63],"privacy,":[64],"preventing":[65],"users":[66,89,98,136],"learning":[68],"server's":[71,129],"computation":[72,172],"task.":[73],"In":[74],"addition,":[75],"effect":[77],"user":[79,195],"dropouts":[80],"is":[81,185],"considered,":[82],"where":[83,135],"at":[84],"most":[85],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$K-U$</tex>":[88],"drop":[91],"out":[92],"identity":[95],"these":[97],"cannot":[99],"be":[100],"predicted":[101],"advance.":[103],"We":[104],"propose":[105],"schemes":[107,202],"for":[108,158],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\mathrm{K}_{\\mathrm{c}}=1$</tex>":[111,212],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$2":[115,164,223],"\\leq":[116,165,224],"\\mathrm{K}_{\\mathrm{c}}&lt;\\mathrm{U}$</tex>,":[117,166],"respectively.":[118],"For":[119,161],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\mathrm{K}_{\\mathrm{c}}=1$</tex>,":[122],"we":[123,167],"introduce":[124],"multiplicative":[125],"encryption":[126],"using":[131],"random":[133],"variable,":[134],"share":[137],"coded":[138,152],"keys":[139,153,178],"offline":[140],"transmit":[142],"masked":[143],"models":[144],"first":[147],"round,":[148],"followed":[149],"by":[150,193],"aggregated":[151],"second":[156,181],"round":[157],"task":[159],"recovery.":[160],"use":[168],"robust":[169],"symmetric":[170],"private":[171],"recover":[174],"round.":[182],"objective":[184],"minimize":[187],"number":[189],"symbols":[191],"sent":[192],"each":[194],"during":[196],"rounds.":[199],"Our":[200],"proposed":[201],"have":[203],"achieved":[204],"optimal":[206,216],"rate":[207,217],"region":[208],"when":[209,220],"order":[215],"(within":[218],"2)":[219],"\\mathrm{K}_{\\mathrm{c}}&lt;\\mathrm{U}$</tex>.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-21T00:00:00"}
