{"id":"https://openalex.org/W4393956384","doi":"https://doi.org/10.1145/3603166.3632144","title":"MPCFL: Towards Multi-party Computation for Secure Federated Learning Aggregation","display_name":"MPCFL: Towards Multi-party Computation for Secure Federated Learning Aggregation","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4393956384","doi":"https://doi.org/10.1145/3603166.3632144"},"language":"en","primary_location":{"id":"doi:10.1145/3603166.3632144","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632144","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632144","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632144","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074002940","display_name":"Hiroki Kaminaga","orcid":"https://orcid.org/0009-0002-8982-4745"},"institutions":[{"id":"https://openalex.org/I4210160054","display_name":"Cybernetica (Estonia)","ror":"https://ror.org/054gqc795","country_code":"EE","type":"company","lineage":["https://openalex.org/I4210160054"]}],"countries":["EE"],"is_corresponding":true,"raw_author_name":"Hiroki Kaminaga","raw_affiliation_strings":["Cybernetica AS, Tallin, Estonia"],"raw_orcid":"https://orcid.org/0009-0002-8982-4745","affiliations":[{"raw_affiliation_string":"Cybernetica AS, Tallin, Estonia","institution_ids":["https://openalex.org/I4210160054"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065801245","display_name":"Feras M. Awaysheh","orcid":"https://orcid.org/0000-0002-9561-6099"},"institutions":[{"id":"https://openalex.org/I56085075","display_name":"University of Tartu","ror":"https://ror.org/03z77qz90","country_code":"EE","type":"education","lineage":["https://openalex.org/I56085075"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Feras M. Awaysheh","raw_affiliation_strings":["University of Tartu, Tartu, Estonia"],"raw_orcid":"https://orcid.org/0000-0002-9561-6099","affiliations":[{"raw_affiliation_string":"University of Tartu, Tartu, Estonia","institution_ids":["https://openalex.org/I56085075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050385229","display_name":"Sadi Alawadi","orcid":"https://orcid.org/0000-0002-6309-2892"},"institutions":[{"id":"https://openalex.org/I52719799","display_name":"Blekinge Institute of Technology","ror":"https://ror.org/0093a8w51","country_code":"SE","type":"education","lineage":["https://openalex.org/I52719799"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Sadi Alawadi","raw_affiliation_strings":["Blekinge Tekniska H\u00f6gskola, Karlskrona, Sweden"],"raw_orcid":"https://orcid.org/0000-0002-6309-2892","affiliations":[{"raw_affiliation_string":"Blekinge Tekniska H\u00f6gskola, Karlskrona, Sweden","institution_ids":["https://openalex.org/I52719799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073177074","display_name":"Liina Kamm","orcid":"https://orcid.org/0000-0003-1479-2195"},"institutions":[{"id":"https://openalex.org/I4210160054","display_name":"Cybernetica (Estonia)","ror":"https://ror.org/054gqc795","country_code":"EE","type":"company","lineage":["https://openalex.org/I4210160054"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Liina Kamm","raw_affiliation_strings":["Cybernetica AS, Tartu, Estonia"],"raw_orcid":"https://orcid.org/0000-0003-1479-2195","affiliations":[{"raw_affiliation_string":"Cybernetica AS, Tartu, Estonia","institution_ids":["https://openalex.org/I4210160054"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074002940"],"corresponding_institution_ids":["https://openalex.org/I4210160054"],"apc_list":null,"apc_paid":null,"fwci":5.0073,"has_fulltext":true,"cited_by_count":30,"citation_normalized_percentile":{"value":0.96324984,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7790650129318237},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.504804253578186},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.4752461910247803},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4628962576389313},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4168775677680969},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37221503257751465},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.332850843667984},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3178163170814514},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11258447170257568}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7790650129318237},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.504804253578186},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.4752461910247803},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4628962576389313},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4168775677680969},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37221503257751465},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.332850843667984},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3178163170814514},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11258447170257568}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603166.3632144","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632144","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632144","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3603166.3632144","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632144","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632144","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320324717","display_name":"Tartu \u00dclikool","ror":"https://ror.org/03z77qz90"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4393956384.pdf","grobid_xml":"https://content.openalex.org/works/W4393956384.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W2051267297","https://openalex.org/W2140585646","https://openalex.org/W2346967072","https://openalex.org/W2397857137","https://openalex.org/W2526085503","https://openalex.org/W2767079719","https://openalex.org/W2889894313","https://openalex.org/W2929650703","https://openalex.org/W3178107049","https://openalex.org/W3195448463","https://openalex.org/W3197395848","https://openalex.org/W4224296621","https://openalex.org/W4296793905","https://openalex.org/W4315779371","https://openalex.org/W4388867283","https://openalex.org/W6907615366"],"related_works":["https://openalex.org/W4298221930","https://openalex.org/W2777914285","https://openalex.org/W4287823391","https://openalex.org/W3013363440","https://openalex.org/W4312762663","https://openalex.org/W2069340834","https://openalex.org/W2550686250","https://openalex.org/W2083288298","https://openalex.org/W2076840701","https://openalex.org/W2607129240"],"abstract_inverted_index":{"In":[0],"the":[1,11,20,35,53,61,90,140],"rapidly":[2],"evolving":[3],"machine":[4],"learning":[5,25],"(ML)":[6],"and":[7,83,121,132,148,160],"distributed":[8],"systems":[9],"realm,":[10],"escalating":[12],"concern":[13],"for":[14,99,145],"data":[15,40],"privacy":[16],"naturally":[17],"comes":[18],"to":[19,64,94,167,170],"forefront":[21],"of":[22,33,38,109],"discussions.":[23],"Federated":[24],"(FL)":[26],"emerges":[27],"as":[28],"a":[29,73,102,165],"pivotal":[30],"technology":[31],"capable":[32],"addressing":[34],"inherent":[36],"issues":[37],"centralized":[39,46],"privacy.":[41],"However,":[42],"FL":[43,75,111,150,173],"architectures":[44],"with":[45],"orchestration":[47],"are":[48],"still":[49],"vulnerable,":[50],"especially":[51],"in":[52],"aggregation":[54,62,174],"phase.":[55],"A":[56],"malicious":[57],"server":[58],"can":[59],"exploit":[60],"process":[63],"learn":[65],"about":[66],"participants'":[67],"data.":[68],"This":[69,162],"study":[70],"proposes":[71],"MPCFL,":[72],"secure":[74,79,147],"algorithm":[76,88,125,142],"based":[77],"on":[78,128],"multi-party":[80],"computation":[81],"(MPC)":[82],"secret":[84],"sharing.":[85],"The":[86,124],"proposed":[87,141],"leverages":[89],"Sharemind":[91],"MPC":[92],"framework":[93],"aggregate":[95],"local":[96],"model":[97,119,122],"updates":[98],"securely":[100],"formulating":[101],"global":[103],"model.":[104],"MPCFL":[105],"provides":[106],"practical":[107],"mitigation":[108],"trending":[110],"concerns,":[112],"e.g.,":[113],"inference":[114],"attack,":[115,118],"gradient":[116],"leakage":[117],"poisoning,":[120],"inversion.":[123],"is":[126,143,164],"evaluated":[127],"several":[129],"benchmark":[130],"datasets":[131],"shows":[133],"promising":[134],"results.":[135],"Our":[136],"results":[137],"demonstrate":[138],"that":[139],"viable":[144],"developing":[146],"privacy-preserving":[149],"applications,":[151],"significantly":[152],"improving":[153],"all":[154],"performance":[155],"metrics":[156],"while":[157],"maintaining":[158],"security":[159],"reliability.":[161],"investigation":[163],"precursor":[166],"deeper":[168],"explorations":[169],"craft":[171],"robust":[172],"algorithms.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":4}],"updated_date":"2026-05-15T08:27:34.491423","created_date":"2025-10-10T00:00:00"}
