{"id":"https://openalex.org/W4410866989","doi":"https://doi.org/10.32604/cmc.2025.065887","title":"VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server","display_name":"VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410866989","doi":"https://doi.org/10.32604/cmc.2025.065887"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065887","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065887","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065887","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057604002","display_name":"Peizheng Lai","orcid":"https://orcid.org/0009-0008-0779-3329"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Peizheng Lai","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056157124","display_name":"Minqing Zhang","orcid":"https://orcid.org/0000-0002-8783-3608"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minqing Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056399656","display_name":"Yixin Tang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yixin Tang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061334554","display_name":"Yinghong Yue","orcid":"https://orcid.org/0000-0001-9425-763X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ya Yue","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5028984288","display_name":"Fuqiang Di","orcid":"https://orcid.org/0000-0001-9930-4829"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fuqiang Di","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5057604002"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.1733,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88610843,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"84","issue":"2","first_page":"2935","last_page":"2957"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.9425501823425293},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6584222316741943},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47859689593315125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37732261419296265},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3760942220687866}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.9425501823425293},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6584222316741943},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47859689593315125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37732261419296265},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3760942220687866},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065887","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065887","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065887","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065887","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1671780007","https://openalex.org/W1797691632","https://openalex.org/W2046763185","https://openalex.org/W2141420453","https://openalex.org/W2322525404","https://openalex.org/W2403682575","https://openalex.org/W2558527387","https://openalex.org/W2748251709","https://openalex.org/W2793696846","https://openalex.org/W2940937153","https://openalex.org/W2963540401","https://openalex.org/W2997530193","https://openalex.org/W3013124972","https://openalex.org/W3016632787","https://openalex.org/W3022458346","https://openalex.org/W3110845456","https://openalex.org/W3211993156","https://openalex.org/W4224088763","https://openalex.org/W4225264920","https://openalex.org/W4323065874","https://openalex.org/W4323338423","https://openalex.org/W4367721911","https://openalex.org/W4372300745","https://openalex.org/W4383754164","https://openalex.org/W4389890871","https://openalex.org/W4391582516","https://openalex.org/W4401943207","https://openalex.org/W4403278143","https://openalex.org/W4405718357"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"has":[3],"emerged":[4],"as":[5],"a":[6,29,60,69,121,160],"promising":[7],"distributed":[8],"machine":[9],"learning":[10],"paradigm":[11],"that":[12,175],"enables":[13,89],"multi-party":[14],"collaborative":[15],"training":[16],"while":[17],"eliminating":[18],"the":[19,104,108,116,129,147],"need":[20],"for":[21,138,165,190],"raw":[22],"data":[23,71],"sharing.":[24],"However,":[25],"its":[26],"reliance":[27],"on":[28],"server":[30,105],"introduces":[31],"critical":[32,61],"security":[33],"vulnerabilities:":[34],"malicious":[35],"servers":[36],"can":[37,127,177],"infer":[38],"private":[39],"information":[40],"from":[41,111],"received":[42],"local":[43],"model":[44,101,198],"updates":[45],"or":[46],"deliberately":[47],"manipulate":[48],"aggregation":[49,54,106,163],"results.":[50],"Consequently,":[51],"achieving":[52],"verifiable":[53,161],"without":[55],"compromising":[56],"client":[57],"privacy":[58],"remains":[59],"challenge.":[62],"To":[63],"address":[64],"these":[65],"problem,":[66],"we":[67,145],"propose":[68],"reversible":[70],"hiding":[72],"in":[73],"encrypted":[74],"domains":[75],"(RDHED)":[76],"scheme,":[77],"which":[78],"designs":[79],"joint":[80,122,135],"secret":[81,93],"message":[82,137],"embedding":[83,123,136],"and":[84,132,155,171,185,192],"extraction":[85],"mechanism.":[86],"This":[87],"approach":[88],"clients":[90,113,126],"to":[91,119,158],"embed":[92],"messages":[94,110],"into":[95],"ciphertext":[96,117],"redundancy":[97],"spaces":[98],"generated":[99],"during":[100],"encryption.":[102],"During":[103],"process,":[107],"embedded":[109],"all":[112],"fuse":[114],"within":[115],"space":[118],"form":[120],"message.":[124],"Subsequently,":[125],"decrypt":[128],"aggregated":[130],"results":[131],"extract":[133],"this":[134,143],"verification":[139],"purposes.":[140],"Building":[141],"upon":[142],"foundation,":[144],"integrate":[146],"proposed":[148],"RDHED":[149],"scheme":[150],"with":[151,196],"linear":[152],"homomorphic":[153],"hash":[154],"digital":[156],"signatures":[157],"design":[159],"privacy-preserving":[162],"protocol":[164],"single-server":[166],"architectures":[167],"(VPAFL).":[168],"Theoretical":[169],"proofs":[170],"experimental":[172],"analyses":[173],"show":[174],"VPAFL":[176],"effectively":[178],"protect":[179],"user":[180],"privacy,":[181],"achieve":[182],"lightweight":[183],"computational":[184],"communication":[186],"overhead":[187],"of":[188],"users":[189],"verification,":[191],"present":[193],"significant":[194],"advantages":[195],"increasing":[197],"dimension.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-24T08:23:43.765630","created_date":"2025-10-10T00:00:00"}
