{"id":"https://openalex.org/W6910890055","doi":"https://doi.org/10.5075/epfl-thesis-8263","title":"Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption","display_name":"Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W6910890055","doi":"https://doi.org/10.5075/epfl-thesis-8263"},"language":"en","primary_location":{"id":"pmh:oai:infoscience.epfl.ch:288934","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/181827","pdf_url":"http://infoscience.epfl.ch/record/288934","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doctoral thesis"},"type":"dissertation","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://infoscience.epfl.ch/record/288934","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Froelicher, David Jules","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Froelicher, David Jules","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.7968999743461609,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.7968999743461609,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.16419999301433563,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.004999999888241291,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6754000186920166},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5838000178337097},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5710999965667725},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5333999991416931},{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.5163000226020813},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.48249998688697815},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.47679999470710754},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.461899995803833},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.39399999380111694}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8253999948501587},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6754000186920166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5989999771118164},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5838000178337097},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5710999965667725},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5333999991416931},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.5163000226020813},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.48249998688697815},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.47679999470710754},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.461899995803833},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.39399999380111694},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3817000091075897},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.3555000126361847},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.3531999886035919},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.35179999470710754},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.33160001039505005},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.33160001039505005},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.3305000066757202},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3160000145435333},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3073999881744385},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.30399999022483826},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.30379998683929443},{"id":"https://openalex.org/C175801342","wikidata":"https://www.wikidata.org/wiki/Q1988917","display_name":"Data analysis","level":2,"score":0.27149999141693115},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.26179999113082886},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.251800000667572},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:infoscience.epfl.ch:288934","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/181827","pdf_url":"http://infoscience.epfl.ch/record/288934","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doctoral thesis"},{"id":"doi:10.5075/epfl-thesis-8263","is_oa":true,"landing_page_url":"https://doi.org/10.5075/epfl-thesis-8263","pdf_url":null,"source":{"id":"https://openalex.org/S4306400488","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"pmh:oai:infoscience.epfl.ch:288934","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/181827","pdf_url":"http://infoscience.epfl.ch/record/288934","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doctoral thesis"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7740078568458557,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W6910890055.pdf","grobid_xml":"https://content.openalex.org/works/W6910890055.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Analyzing":[0],"and":[1,7,15,29,36,66,78,111,122,152,155,165,169,183,225,229,231,246,296,320,329,359,389,421,460],"processing":[2],"data":[3,22,49,67,75,97,159,259,355,381,420],"that":[4,43,176,255,298,352,382,414,441,475],"are":[5,23,44],"siloed":[6],"dispersed":[8],"among":[9,41,80],"multiple":[10,81,109,162,267],"distrustful":[11,163],"stakeholders":[12,42,82],"is":[13,59,64,69,76,143],"difficult":[14],"can":[16,127,281,302,322,436,448],"even":[17],"become":[18],"impossible":[19],"when":[20],"the":[21,34,84,117,135,171,220,276,279,332,347,357,386,398,442,470],"sensitive":[24],"or":[25,99,114,131],"confidential.":[26],"Current":[27],"data-protection":[28],"privacy":[30],"regulations":[31],"highly":[32],"restrict":[33],"sharing":[35,68],"outsourcing":[37,100],"of":[38,105,119,222,244,273,275,308,334,349,392,433,473,500],"personal":[39,129],"information":[40,130],"in":[45,53,71,134,195,238,356,424,429,445],"different":[46],"jurisdictions.":[47],"Sharing":[48],"is,":[50],"however,":[51],"required":[52],"many":[54],"domains.":[55],"The":[56],"medical":[57,465],"sector":[58],"a":[60,102,241,253,262,372,411,425],"paradigmatic":[61],"example:":[62],"Privacy":[63],"paramount":[65],"needed":[70],"numerous":[72],"applications":[73],"where":[74,270],"scarce":[77],"scattered":[79],"around":[83],"world.":[85],"Existing":[86],"privacy-preserving":[87,147,257,387],"solutions":[88,149,188,443],"for":[89,150,153,189,366,374,385,452,469],"federated":[90,148,258,364,380,471],"analytics":[91],"(FA)":[92],"rely":[93,201],"either":[94],"(1)":[95,144],"on":[96,116,158,202,261,290,327,379,410,498],"centralization":[98],"to":[101,145,167,186,240,345,407,487],"limited":[103],"number":[104,243],"entities,":[106],"which":[107,126,430],"incur":[108],"security":[110],"trust":[112],"issues,":[113],"(2)":[115,166],"exchange":[118],"cleartext":[120],"aggregated":[121],"optionally":[123],"obfuscated":[124],"data,":[125],"leak":[128],"introduce":[132],"bias":[133],"final":[136],"result.":[137],"In":[138,339],"this":[139,446],"thesis,":[140],"our":[141],"goal":[142],"propose":[146,361,370],"exploration,":[151],"statistical":[154],"machine-learning":[156,400],"analyses":[157,478,488],"held":[160,265],"by":[161,191,218,232,266,288,306,325,462],"stakeholders,":[164],"analyze":[168],"evaluate":[170],"proposed":[172,444],"systems,":[173],"thus":[174],"showing":[175],"they":[177],"provide":[178],"an":[179,350,362],"efficient,":[180],"secure,":[181],"scalable,":[182],"accurate":[184],"alternative":[185],"existing":[187],"FA":[190],"proving":[192],"their":[193,234],"utility":[194],"real-world":[196],"state-of-the-art":[197],"biomedical":[198,456],"studies.":[199,457],"We":[200,284,312,369,458],"multiparty":[203,210],"homomorphic":[204,215,293],"encryption":[205,216,294],"(MHE).":[206],"MHE":[207],"combines":[208],"secure":[209,375,467],"computation":[211,247],"(SMC)":[212],"techniques":[213],"with":[214,479,489],"(HE)":[217],"pooling":[219],"advantages":[221],"both":[223,419],"SMC":[224],"HE,":[226],"i.e.,":[227,236],"interactivity":[228],"flexibility,":[230],"minimizing":[233],"disadvantages,":[235],"difficulty":[237],"scaling":[239],"large":[242],"parties":[245],"complexity.":[248],"First,":[249],"we":[250,341,360,383,439],"design":[251,333,459],"UnLynx,":[252],"system":[254,336],"enables":[256,404],"exploration":[260],"distributed":[263],"dataset":[264],"data-providers":[268],"(DPs),":[269],"N-1":[271,431],"out":[272,432],"N":[274,434],"nodes":[277],"performing":[278],"computations":[280,474],"be":[282,303,323,408,449],"malicious.":[283],"build":[285],"interactive":[286],"protocols":[287],"relying":[289,326],"ElGamal":[291],"additive":[292],"(AHE)":[295],"ensure":[297],"each":[299],"untrusted-node":[300],"operation":[301],"publicly":[304],"verified":[305],"means":[307],"zero-knowledge":[309],"proofs":[310],"(ZKPs).":[311],"then":[313],"explore":[314,343],"how":[315,344],"statistics,":[316],"e.g.,":[317],"standard":[318],"deviation":[319],"variance,":[321],"computed":[324],"AHE":[328],"ZKPs":[330],"through":[331],"another":[335],"named":[337],"Drynx.":[338],"Drynx,":[340],"also":[342],"limit":[346],"influence":[348],"entity":[351],"inputs":[353],"wrong":[354],"system,":[358],"efficient":[363,450],"solution":[365,373],"correctness":[367],"verification.":[368],"Spindle":[371,396],"cooperative":[376],"gradient":[377],"descent":[378],"instantiate":[384],"training":[388],"oblivious":[390,405],"evaluation":[391],"generalized":[393],"linear":[394],"models.":[395],"covers":[397],"entire":[399],"workflow,":[401],"as":[402,484,494],"it":[403],"predictions":[406],"performed":[409],"trained":[412],"model":[413,422,428],"remains":[415],"secret.":[416],"It":[417],"ensures":[418],"confidentiality":[423],"passive":[426],"adversarial":[427],"DPs":[435],"collude.":[437],"Finally,":[438],"demonstrate":[440],"thesis":[447],"enablers":[451],"large-scale,":[453],"sensitive,":[454],"multi-site":[455],"test,":[461],"replicating":[463],"recent":[464],"studies,":[466],"workflows":[468],"execution":[472],"span":[476],"from":[477],"low":[480],"computational":[481,491],"complexity,":[482],"such":[483,493],"survival":[485],"analyses,":[486],"high":[490],"complexity":[492],"genome-wide":[495],"association":[496],"studies":[497],"millions":[499],"variants.":[501]},"counts_by_year":[],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
