{"id":"https://openalex.org/W4405181436","doi":"https://doi.org/10.1145/3658644.3690200","title":"Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy","display_name":"Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405181436","doi":"https://doi.org/10.1145/3658644.3690200"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690200","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690200","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690200","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690200","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101682370","display_name":"Shuangqing Xu","orcid":"https://orcid.org/0009-0002-5342-7414"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuangqing Xu","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086945099","display_name":"Yifeng Zheng","orcid":"https://orcid.org/0000-0001-7852-6051"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yifeng Zheng","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007080915","display_name":"Zhongyun Hua","orcid":"https://orcid.org/0000-0002-3529-0541"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongyun Hua","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101682370"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":1.7859,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.87884097,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"243","last_page":"257"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.9002567529678345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8597679138183594},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.8014187812805176},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5465256571769714},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.5239613056182861},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5063248872756958},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4872421324253082},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.47383007407188416},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.46747517585754395},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.43804723024368286},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4272872805595398},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38450944423675537},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.361664354801178},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34303003549575806},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2086586356163025},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14264681935310364}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.9002567529678345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8597679138183594},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.8014187812805176},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5465256571769714},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.5239613056182861},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5063248872756958},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4872421324253082},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.47383007407188416},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.46747517585754395},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.43804723024368286},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4272872805595398},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38450944423675537},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.361664354801178},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34303003549575806},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2086586356163025},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14264681935310364},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3690200","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690200","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690200","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690200","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690200","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690200","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1477544716","display_name":null,"funder_award_id":"Guangdong","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2906739224","display_name":null,"funder_award_id":"2023A1515010714","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G2981938667","display_name":null,"funder_award_id":"Shenzhen","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3472539505","display_name":null,"funder_award_id":"202205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3757194791","display_name":null,"funder_award_id":"JCYJ20","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6107177493","display_name":null,"funder_award_id":"5150107","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7124973289","display_name":null,"funder_award_id":"51501071","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7320351434","display_name":null,"funder_award_id":"51501229","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7366406415","display_name":null,"funder_award_id":"2024A1515012299","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G8244995127","display_name":null,"funder_award_id":"62071142","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405181436.pdf","grobid_xml":"https://content.openalex.org/works/W4405181436.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1985623009","https://openalex.org/W1992157848","https://openalex.org/W2027595342","https://openalex.org/W2103647628","https://openalex.org/W2112796928","https://openalex.org/W2245160765","https://openalex.org/W2473418344","https://openalex.org/W2701059868","https://openalex.org/W2767079719","https://openalex.org/W2932329902","https://openalex.org/W2950321888","https://openalex.org/W2963106566","https://openalex.org/W2963881987","https://openalex.org/W2967889168","https://openalex.org/W3003615979","https://openalex.org/W3027749727","https://openalex.org/W3080442116","https://openalex.org/W3085175993","https://openalex.org/W3091476023","https://openalex.org/W3095061623","https://openalex.org/W3165905670","https://openalex.org/W3192324887","https://openalex.org/W3211993156","https://openalex.org/W3215933531","https://openalex.org/W4288057784","https://openalex.org/W4311166015","https://openalex.org/W4385270023","https://openalex.org/W4385299238","https://openalex.org/W4391724735","https://openalex.org/W4392796938","https://openalex.org/W4400021072","https://openalex.org/W6657138077"],"related_works":["https://openalex.org/W2397857137","https://openalex.org/W2083084382","https://openalex.org/W1557783852","https://openalex.org/W2188298058","https://openalex.org/W3214129216","https://openalex.org/W2768332800","https://openalex.org/W2006088653","https://openalex.org/W2129756153","https://openalex.org/W1474916271","https://openalex.org/W1831120058"],"abstract_inverted_index":{"Federated":[0],"learning":[1],"(FL)":[2],"has":[3,44],"rapidly":[4],"become":[5],"a":[6,16,46,58,95,99,138,210],"compelling":[7],"paradigm":[8],"that":[9,233],"enables":[10],"multiple":[11],"clients":[12,65],"to":[13,33,56,89,104,125,198],"jointly":[14],"train":[15],"model":[17,86,108,149],"by":[18,158],"sharing":[19,72],"only":[20],"gradient":[21,36,69,123],"updates":[22,37,70,124],"for":[23,75,82,163,188,194],"aggregation,":[24],"without":[25],"revealing":[26],"their":[27,68],"local":[28,51],"private":[29],"data.":[30],"In":[31,205],"order":[32],"protect":[34],"the":[35,85,106,121,147,164,176,200,215,220,226,240],"which":[38,113],"could":[39],"also":[40,208],"be":[41],"privacy-sensitive,":[42],"there":[43],"been":[45],"line":[47],"of":[48,109,150,180,202,225],"work":[49],"studying":[50],"differential":[52,222],"privacy":[53,60,127,216,223],"(LDP)":[54],"mechanisms":[55],"provide":[57],"formal":[59],"guarantee.":[61],"With":[62],"LDP":[63],"mechanisms,":[64],"locally":[66],"perturb":[67],"before":[71],"them":[73],"out":[74],"aggregation.":[76],"However,":[77],"such":[78],"approaches":[79],"are":[80],"known":[81],"greatly":[83],"degrading":[84],"utility,":[87],"due":[88],"heavy":[90],"noise":[91],"addition.":[92],"To":[93],"enable":[94],"better":[96,236],"privacy-utility":[97,237],"trade-off,":[98],"recently":[100],"emerging":[101],"trend":[102],"is":[103],"apply":[105],"shuffle":[107,148,165],"DP":[110],"in":[111,132,146],"FL,":[112],"relies":[114],"on":[115,120,175,214],"an":[116],"intermediate":[117],"shuffling":[118],"operation":[119],"perturbed":[122],"achieve":[126],"amplification.":[128],"Following":[129],"this":[130,133],"trend,":[131],"paper,":[134],"we":[135,186,207],"present":[136],"Camel,":[137],"new":[139],"communication-efficient":[140],"and":[141,193],"maliciously":[142],"secure":[143],"FL":[144,228],"framework":[145],"DP.":[151],"Camel":[152,173,234],"first":[153],"departs":[154],"from":[155],"existing":[156],"works":[157],"ambitiously":[159],"supporting":[160],"integrity":[161,196],"check":[162],"computation,":[166],"achieving":[167],"security":[168,201],"against":[169],"malicious":[170],"adversary.":[171],"Specifically,":[172],"builds":[174],"trending":[177],"cryptographic":[178],"primitive":[179],"secret-shared":[181],"shuffle,":[182],"with":[183,243],"custom":[184],"techniques":[185],"develop":[187],"optimizing":[189],"system-wide":[190],"communication":[191],"efficiency,":[192],"lightweight":[195],"checks":[197],"harden":[199],"server-side":[203],"computation.":[204],"addition,":[206],"derive":[209],"significantly":[211],"tighter":[212],"bound":[213],"loss":[217],"through":[218],"analyzing":[219],"R\u00e9nyi":[221],"(RDP)":[224],"overall":[227],"process.":[229],"Extensive":[230],"experiments":[231],"demonstrate":[232],"achieves":[235],"trade-offs":[238],"than":[239],"state-of-the-art":[241],"work,":[242],"promising":[244],"performance.":[245]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
