{"id":"https://openalex.org/W7136424882","doi":"https://doi.org/10.4108/eetsis.11991","title":"An Efficient Privacy-Preserving Secure Aggregation Scheme for Federated Learning with Input Verification and Dropout Resistance","display_name":"An Efficient Privacy-Preserving Secure Aggregation Scheme for Federated Learning with Input Verification and Dropout Resistance","publication_year":2026,"publication_date":"2026-03-16","ids":{"openalex":"https://openalex.org/W7136424882","doi":"https://doi.org/10.4108/eetsis.11991"},"language":null,"primary_location":{"id":"doi:10.4108/eetsis.11991","is_oa":true,"landing_page_url":"https://doi.org/10.4108/eetsis.11991","pdf_url":"https://publications.eai.eu/index.php/sis/article/download/11991/3975","source":{"id":"https://openalex.org/S4210240886","display_name":"ICST Transactions on Scalable Information Systems","issn_l":"2032-9407","issn":["2032-9407"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321145","host_organization_name":"European Alliance for Innovation","host_organization_lineage":["https://openalex.org/P4310321145"],"host_organization_lineage_names":["European Alliance for Innovation"],"type":"journal"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICST Transactions on Scalable Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://publications.eai.eu/index.php/sis/article/download/11991/3975","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129458179","display_name":"Zijun Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zijun Guo","raw_affiliation_strings":["Chinese People's Armed Police Force Engineering University"],"affiliations":[{"raw_affiliation_string":"Chinese People's Armed Police Force Engineering University","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129417413","display_name":"Yuteng Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuteng Sun","raw_affiliation_strings":["Chinese People's Armed Police Force Engineering University"],"affiliations":[{"raw_affiliation_string":"Chinese People's Armed Police Force Engineering University","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129531661","display_name":"Xinyue Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyue Zhang","raw_affiliation_strings":["Chinese People's Armed Police Force Engineering University"],"affiliations":[{"raw_affiliation_string":"Chinese People's Armed Police Force Engineering University","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129561836","display_name":"Lingling Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingling Wu","raw_affiliation_strings":["Chinese People's Armed Police Force Engineering University"],"affiliations":[{"raw_affiliation_string":"Chinese People's Armed Police Force Engineering University","institution_ids":["https://openalex.org/I4210134428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5129458179"],"corresponding_institution_ids":["https://openalex.org/I4210134428"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8910497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"8","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9282000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9282000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.02290000021457672,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.010099999606609344,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7207000255584717},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5203999876976013},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5042999982833862},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4388999938964844},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43540000915527344},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.43140000104904175},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.4296000003814697},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4050999879837036},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.3955000042915344},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.39329999685287476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8440999984741211},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7207000255584717},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5580999851226807},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5203999876976013},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5042999982833862},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4388999938964844},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43540000915527344},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.43140000104904175},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.4296000003814697},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41600000858306885},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4050999879837036},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3955000042915344},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.39329999685287476},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.39259999990463257},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.38679999113082886},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.35030001401901245},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34599998593330383},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.3246999979019165},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3160000145435333},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.3100999891757965},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.30300000309944153},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.3010999858379364},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.28780001401901245},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C180073179","wikidata":"https://www.wikidata.org/wiki/Q3304359","display_name":"Secure channel","level":3,"score":0.2800000011920929},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2750000059604645},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.26510000228881836},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.2563999891281128}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4108/eetsis.11991","is_oa":true,"landing_page_url":"https://doi.org/10.4108/eetsis.11991","pdf_url":"https://publications.eai.eu/index.php/sis/article/download/11991/3975","source":{"id":"https://openalex.org/S4210240886","display_name":"ICST Transactions on Scalable Information Systems","issn_l":"2032-9407","issn":["2032-9407"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321145","host_organization_name":"European Alliance for Innovation","host_organization_lineage":["https://openalex.org/P4310321145"],"host_organization_lineage_names":["European Alliance for Innovation"],"type":"journal"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICST Transactions on Scalable Information Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.4108/eetsis.11991","is_oa":true,"landing_page_url":"https://doi.org/10.4108/eetsis.11991","pdf_url":"https://publications.eai.eu/index.php/sis/article/download/11991/3975","source":{"id":"https://openalex.org/S4210240886","display_name":"ICST Transactions on Scalable Information Systems","issn_l":"2032-9407","issn":["2032-9407"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321145","host_organization_name":"European Alliance for Innovation","host_organization_lineage":["https://openalex.org/P4310321145"],"host_organization_lineage_names":["European Alliance for Innovation"],"type":"journal"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICST Transactions on Scalable Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.544480562210083,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1771858652","display_name":null,"funder_award_id":"210245","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G247340839","display_name":null,"funder_award_id":"62102452","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7836098811","display_name":null,"funder_award_id":"62172436","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7136424882.pdf","grobid_xml":"https://content.openalex.org/works/W7136424882.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning,":[1],"as":[2],"a":[3,14,196],"distributed":[4,33,205],"machine":[5],"learning":[6],"paradigm,":[7],"allows":[8],"multiple":[9],"participants":[10],"to":[11],"collaboratively":[12],"train":[13],"shared":[15],"model":[16],"without":[17],"sharing":[18,154],"their":[19],"local":[20],"data.":[21],"However,":[22],"the":[23,36,87,90,133,147,162,169],"increasing":[24],"demand":[25],"for":[26,65,199],"privacy":[27,188],"protection":[28,189],"during":[29,60],"data":[30,78,116,144],"aggregation":[31,104,202],"within":[32],"systems":[34],"underscores":[35],"persistent":[37],"challenge":[38],"of":[39,89,107,151],"ensuring":[40,142],"both":[41,118],"security":[42,182],"and":[43,77,114,120,128,181],"efficiency.":[44,164],"Many":[45],"existing":[46],"Privacy-Preserving":[47],"Machine":[48],"Learning":[49],"(PPML)":[50],"schemes":[51],"relying":[52],"on":[53],"homomorphic":[54,149],"encryption":[55],"introduce":[56],"substantial":[57],"computational":[58,177],"overhead":[59],"aggregation,":[61],"rendering":[62],"them":[63],"impractical":[64],"large-scale":[66,204],"PPML":[67],"applications":[68],"involving":[69],"resource-constrained":[70],"participant":[71,109],"devices.":[72],"Moreover,":[73],"device":[74],"dropout":[75,110],"events":[76],"poisoning":[79],"attacks":[80,140],"perpetrated":[81],"by":[82],"malicious":[83,121,139],"clients":[84],"adversely":[85],"affect":[86],"integrity":[88],"aggregated":[91],"results.":[92],"To":[93],"address":[94],"these":[95],"challenges,":[96],"this":[97,193],"paper":[98],"proposes":[99],"an":[100],"efficient":[101,156],"privacy-preserving":[102],"secure":[103,200],"scheme":[105,134,171,194],"capable":[106],"tolerating":[108],"at":[111],"arbitrary":[112],"stages":[113],"securing":[115],"against":[117,138],"semi-honest":[119],"participants.":[122],"By":[123,184],"integrating":[124],"input":[125],"verification":[126],"protocols":[127],"applying":[129],"gradient":[130],"masking":[131],"techniques,":[132],"enhances":[135],"its":[136],"resilience":[137],"while":[141],"user":[143],"privacy.":[145],"Leveraging":[146],"additive":[148],"property":[150],"Shamir's":[152],"secret":[153],"enables":[155],"global":[157],"mask":[158],"recovery,":[159],"significantly":[160,172],"optimizing":[161],"scheme's":[163],"Experimental":[165],"results":[166],"demonstrate":[167],"that":[168],"proposed":[170],"outperforms":[173],"baseline":[174],"methods":[175],"in":[176,203],"efficiency,":[178],"communication":[179],"overhead,":[180],"robustness.":[183],"effectively":[185],"balancing":[186],"high":[187],"with":[190],"practical":[191],"feasibility,":[192],"presents":[195],"promising":[197],"solution":[198],"multi-party":[201],"systems.":[206]},"counts_by_year":[],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2026-03-17T00:00:00"}
