{"id":"https://openalex.org/W4412818475","doi":"https://doi.org/10.32604/cmc.2025.067563","title":"An Efficient and Verifiable Data Aggregation Protocol with Enhanced Privacy Protection","display_name":"An Efficient and Verifiable Data Aggregation Protocol with Enhanced Privacy Protection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412818475","doi":"https://doi.org/10.32604/cmc.2025.067563"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067563","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067563","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067563","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100395351","display_name":"Yiming Zhang","orcid":"https://orcid.org/0000-0001-6450-8485"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yiming Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100441598","display_name":"Wei Zhang","orcid":"https://orcid.org/0000-0002-3000-6038"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5033212196","display_name":"Cong Shen","orcid":"https://orcid.org/0009-0008-9570-644X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cong Shen","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100395351"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10355153,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"2","first_page":"3185","last_page":"3211"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9743000268936157,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8776376843452454},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.6813324689865112},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.666682243347168},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.650007426738739},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6103777289390564},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5070226192474365},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4503379166126251},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4414274990558624},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26152241230010986},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.08578938245773315},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.05734890699386597}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8776376843452454},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.6813324689865112},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.666682243347168},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.650007426738739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6103777289390564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5070226192474365},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4503379166126251},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4414274990558624},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26152241230010986},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.08578938245773315},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.05734890699386597},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.067563","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067563","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067563","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067563","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2781091734","https://openalex.org/W2963540401","https://openalex.org/W2995191368","https://openalex.org/W3013310637","https://openalex.org/W3084128899","https://openalex.org/W3095859802","https://openalex.org/W3110845456","https://openalex.org/W3120048668","https://openalex.org/W3167626677","https://openalex.org/W3209606284","https://openalex.org/W3211993156","https://openalex.org/W3214878825","https://openalex.org/W4205423013","https://openalex.org/W4210485920","https://openalex.org/W4226049484","https://openalex.org/W4285605561","https://openalex.org/W4312944124","https://openalex.org/W4321020874","https://openalex.org/W4322730952","https://openalex.org/W4367277161","https://openalex.org/W4381537550","https://openalex.org/W4394743446","https://openalex.org/W4394910358"],"related_works":["https://openalex.org/W3120813729","https://openalex.org/W3196150687","https://openalex.org/W4409714128","https://openalex.org/W3175527458","https://openalex.org/W2899491940","https://openalex.org/W4312461427","https://openalex.org/W3022534164","https://openalex.org/W4408518828","https://openalex.org/W2799236100","https://openalex.org/W3156135475"],"abstract_inverted_index":{"Distributed":[0],"data":[1,25,79],"fusion":[2],"is":[3,55,208],"essential":[4],"for":[5],"numerous":[6],"applications,":[7],"yet":[8],"faces":[9],"significant":[10],"privacy":[11,26,84,111,184],"security":[12],"challenges.":[13],"Federated":[14,154],"learning":[15,21],"(FL),":[16],"as":[17],"a":[18,164,233],"distributed":[19],"machine":[20],"paradigm,":[22],"offers":[23],"enhanced":[24,83,126],"protection":[27,112,185],"and":[28,77,103,142,186,203],"has":[29],"attracted":[30],"widespread":[31],"attention.":[32],"Consequently,":[33],"research":[34],"increasingly":[35],"focuses":[36],"on":[37,139],"developing":[38],"more":[39],"secure":[40],"FL":[41,53],"techniques.":[42],"However,":[43],"in":[44,167,183],"real-world":[45],"scenarios":[46],"involving":[47],"malicious":[48,225],"entities,":[49],"the":[50,61,110,140,153,172,191,210,216],"accuracy":[51,150],"of":[52,63,130,181,218,235],"results":[54,222],"often":[56],"compromised,":[57],"particularly":[58],"due":[59],"to":[60,152,171,190],"threat":[62],"collusion":[64],"between":[65,134,200],"two":[66,135],"servers.":[67,136],"To":[68],"address":[69],"this":[70,72,229],"challenge,":[71],"paper":[73],"proposes":[74],"an":[75,125,178],"efficient":[76],"verifiable":[78],"aggregation":[80],"protocol":[81,123,148,176],"with":[82],"protection.":[85],"After":[86],"analyzing":[87],"attack":[88],"methods":[89],"against":[90],"prior":[91],"schemes,":[92],"we":[93,108],"implement":[94],"key":[95],"improvements.":[96],"Specifically,":[97],"by":[98,114],"incorporating":[99],"cascaded":[100],"random":[101],"numbers":[102],"perturbation":[104],"terms":[105],"into":[106],"gradients,":[107],"strengthen":[109],"afforded":[113],"polynomial":[115],"masking,":[116],"effectively":[117],"preventing":[118],"information":[119],"leakage.":[120],"Furthermore,":[121],"our":[122,147,175],"features":[124],"verification":[127,168,187,211],"mechanism":[128,212],"capable":[129],"detecting":[131],"collusive":[132],"behaviors":[133],"Accuracy":[137],"testing":[138],"MNIST":[141],"CIFAR-10":[143],"datasets":[144],"demonstrates":[145],"that":[146,209],"maintains":[149],"comparable":[151],"Averaging":[155],"Algorithm.":[156],"In":[157],"scheme":[158],"efficiency":[159],"comparisons,":[160],"while":[161],"incurring":[162],"only":[163],"marginal":[165],"increase":[166],"overhead":[169,188,202],"relative":[170],"baseline":[173],"scheme,":[174],"achieves":[177],"average":[179],"improvement":[180],"93.13%":[182],"compared":[189],"state-of-the-art":[192],"scheme.":[193],"This":[194],"result":[195],"highlights":[196],"its":[197],"optimal":[198],"balance":[199],"overall":[201],"functionality.":[204],"A":[205],"current":[206],"limitation":[207,230],"cannot":[213],"precisely":[214],"pinpoint":[215],"source":[217],"anomalies":[219],"within":[220],"aggregated":[221],"when":[223],"server-side":[224],"behavior":[226],"occurs.":[227],"Addressing":[228],"will":[231],"be":[232],"focus":[234],"future":[236],"research.":[237]},"counts_by_year":[],"updated_date":"2025-12-05T23:21:25.405358","created_date":"2025-10-10T00:00:00"}
