{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T12:15:56Z","timestamp":1765196156638,"version":"3.46.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031948541"},{"type":"electronic","value":"9783031948558"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94855-8_23","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:51:33Z","timestamp":1749793893000},"page":"356-371","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Threshold Multiparty Private Set Intersection via\u00a0Federated Graph Neural Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5998-2940","authenticated-orcid":false,"given":"Sotirios","family":"Messinis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7701-5644","authenticated-orcid":false,"given":"Nicholas E.","family":"Protonotarios","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9550-0088","authenticated-orcid":false,"given":"Dimitris","family":"Kalogeras","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4064-8990","authenticated-orcid":false,"given":"Nikolaos","family":"Doulamis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"23_CR1","first-page":"103786","volume":"83","author":"P Alaeifar","year":"2024","unstructured":"Alaeifar, P., Pal, S., Jadidi, Z., Hussain, M., Foo, E.: Current approaches and future directions for cyber threat intelligence sharing: a survey. J. Inf. Secur. Appl. 83, 103786 (2024)","journal-title":"J. Inf. Secur. Appl."},{"key":"23_CR2","doi-asserted-by":"publisher","unstructured":"Chen, J., Yan, H., Liu, Z., Zhang, M., Xiong, H., Yu, S.: When federated learning meets privacy-preserving computation. ACM Comput. Surv. 56(12) (2024). https:\/\/doi.org\/10.1145\/3679013","DOI":"10.1145\/3679013"},{"key":"23_CR3","doi-asserted-by":"publisher","unstructured":"Elkordy, A.R., Ezzeldin, Y.H., Avestimehr, S.: Federated k-private set intersection. In: Proceedings of the 31st ACM International Conference on Information & Knowledge Management, CIKM 2022, dpp. 436\u2013445. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3511808.3557321","DOI":"10.1145\/3511808.3557321"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 1\u201319. Springer (2004)","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Fu, X., Chen, Z., Zhang, B., Chen, C., Li, J.: Federated graph learning with structure proxy alignment. In: Proceedings of the 30th ACM SIGKDD Conference on Knowle DGE Discovery and Data Mining, KDD 2024, pp. 827\u2013838. Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3637528.3671717","DOI":"10.1145\/3637528.3671717"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Nilges, T.: An algebraic approach to maliciously secure private set intersection. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 154\u2013185. Springer (2019)","DOI":"10.1007\/978-3-030-17659-4_6"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Simkin, M.: The communication complexity of threshold private set intersection. In: Annual International Cryptology Conference, pp. 3\u201329. Springer (2019)","DOI":"10.1007\/978-3-030-26951-7_1"},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-031-31371-4_9","volume-title":"Public-Key Cryptography - PKC 2023","author":"S Ghosh","year":"2023","unstructured":"Ghosh, S., Simkin, M.: Threshold private set intersection with better communication complexity. In: Boldyreva, A., Kolesnikov, V. (eds.) Public-Key Cryptography - PKC 2023, pp. 251\u2013272. Springer, Cham (2023)"},{"key":"23_CR9","doi-asserted-by":"publisher","unstructured":"Guan, C., van Assen, J., Erkin, Z.: Collective threshold multiparty private set intersection protocols for cyber threat intelligence. In: 2024 IEEE International Workshop on Information Forensics and Security (WIFS), pp.\u00a01\u20136 (2024). https:\/\/doi.org\/10.1109\/WIFS61860.2024.10810671","DOI":"10.1109\/WIFS61860.2024.10810671"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Hallgren, P., Orlandi, C., Sabelfeld, A.: PrivatePool: privacy-preserving ridesharing. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 276\u2013291. IEEE (2017)","DOI":"10.1109\/CSF.2017.24"},{"key":"23_CR11","unstructured":"Hu, J., Liu, Z., Zuo, C.: Delegated multi-party private set intersection from secret sharing. Cryptology ePrint Archive (2025)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Kiltz, E., O\u2019Neill, A., Smith, A.: Instantiability of RSA-OAEP under chosen-plaintext attack. In: Rabin, T. (ed.) Advances in Cryptology \u2013 CRYPTO 2010, pp. 295\u2013313. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14623-7_16"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Kissner, L., Song, D.: Privacy-preserving set operations. In: Annual International Cryptology Conference, pp. 241\u2013257. Springer (2005)","DOI":"10.1007\/11535218_15"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TIFS.2023.3343973","volume":"19","author":"G Ling","year":"2024","unstructured":"Ling, G., Tang, F., Cai, C., Shan, J., Xue, H., Li, W., Tang, P., Huang, X., Qiu, W.: P$$^{2}$$frpsi: privacy-preserving feature retrieved private set intersection. IEEE Trans. Inf. Forensics Secur. 19, 2201\u20132216 (2024). https:\/\/doi.org\/10.1109\/TIFS.2023.3343973","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"23_CR15","doi-asserted-by":"publisher","unstructured":"Liu, F.H., Zhang, E., Qin, L.: Efficient multiparty probabilistic threshold private set intersection. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, pp. 2188\u20132201. Association for Computing Machinery, New York (2023). https:\/\/doi.org\/10.1145\/3576915.3623158","DOI":"10.1145\/3576915.3623158"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Liu, R., Xing, P., Deng, Z., Li, A., Guan, C., Yu, H.: Federated graph neural networks: overview, techniques, and challenges. IEEE Trans. Neural Netw. Learn. Syst. (2024)","DOI":"10.1109\/TNNLS.2024.3360429"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"103781","DOI":"10.1016\/j.csi.2023.103781","volume":"88","author":"L Ma","year":"2024","unstructured":"Ma, L., et al.: Over-threshold multi-party private set operation protocols for lightweight clients. Comput. Stand. Interfaces 88, 103781 (2024)","journal-title":"Comput. Stand. Interfaces"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"103870","DOI":"10.1016\/j.jnca.2024.103870","volume":"226","author":"N Mahmoud","year":"2024","unstructured":"Mahmoud, N., Abdelkader, H., Aly, A.: BRIP: towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and ipfs. J. Netw. Comput. Appl. 226, 103870 (2024)","journal-title":"J. Netw. Comput. Appl."},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":"Mansour\u00a0Bahar, A.A., Ferrahi, K.S., Messai, M.L., Seba, H., Amrouche, K.: FedHE-graph: federated learning with hybrid encryption on graph neural networks for advanced persistent threat detection. In: Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024, Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3664476.3670466","DOI":"10.1145\/3664476.3670466"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Manu, D., Yao, J., Liu, W., Sun, X.: GraphGANFed: a federated generative framework for graph-structured molecules towards efficient drug discovery. IEEE\/ACM Trans. Comput. Biol. Bioinform. (2024)","DOI":"10.1109\/TCBB.2024.3349990"},{"issue":"2","key":"23_CR21","first-page":"e1490","volume":"13","author":"VS Naresh","year":"2023","unstructured":"Naresh, V.S., Thamarai, M.: Privacy-preserving data mining and machine learning in healthcare: applications, challenges, and solutions. Wiley Interdisc. Rev.: Data Min. Knowl. Discov. 13(2), e1490 (2023)","journal-title":"Wiley Interdisc. Rev.: Data Min. Knowl. Discov."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Pinkas, B., Schneider, T., Weinert, C., Wieder, U.: Efficient circuit-based PSI via cuckoo hashing. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 125\u2013157. Springer (2018)","DOI":"10.1007\/978-3-319-78372-7_5"},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.future.2023.09.008","volume":"150","author":"P Qi","year":"2024","unstructured":"Qi, P., Chiaro, D., Guzzo, A., Ianni, M., Fortino, G., Piccialli, F.: Model aggregation techniques in federated learning: a comprehensive survey. Futur. Gener. Comput. Syst. 150, 272\u2013293 (2024). https:\/\/doi.org\/10.1016\/j.future.2023.09.008","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"23_CR24","doi-asserted-by":"publisher","first-page":"100182","DOI":"10.1016\/j.neuri.2024.100182","volume":"5","author":"M Rahad","year":"2025","unstructured":"Rahad, M., Shabab, R., Ahammad, M.S., Reza, M.M., Karmaker, A., Hossain, M.A.: Kl-FedDis: a federated learning approach with distribution information sharing using Kullback-Leibler divergence for non-iid data. Neurosci. Inform. 5(1), 100182 (2025). https:\/\/doi.org\/10.1016\/j.neuri.2024.100182","journal-title":"Neurosci. Inform."},{"key":"23_CR25","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.comcom.2022.07.007","volume":"193","author":"ZA Sheikh","year":"2022","unstructured":"Sheikh, Z.A., Singh, Y., Singh, P.K., Ghafoor, K.Z.: Intelligent and secure framework for critical infrastructure (CPS): current trends, challenges, and future scope. Comput. Commun. 193, 302\u2013331 (2022)","journal-title":"Comput. Commun."},{"key":"23_CR26","unstructured":"Siddhartha, M.: Malicious URLs dataset. https:\/\/www.kaggle.com\/datasets\/sid321axn\/malicious-urls-dataset. Accessed January 2025"},{"key":"23_CR27","unstructured":"Smith, V., Chiang, C.K., Sanjabi, M., Talwalkar, A.S.: Federated multi-task learning. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, vol.\u00a030. Curran Associates, Inc. (2017). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/6211080fa89981f66b1a0c9d55c61d0f-Paper.pdf"},{"key":"23_CR28","doi-asserted-by":"publisher","unstructured":"Sun, Z.: Efficient multiparty private set intersection protocol based on function secret sharing. In: Karras, D.A., Gheisari, M. (eds.) International Conference on Computer Network Security and Software Engineering (CNSSE 2024), vol. 13175, p. 1317505. International Society for Optics and Photonics, SPIE (2024). https:\/\/doi.org\/10.1117\/12.3031902","DOI":"10.1117\/12.3031902"},{"key":"23_CR29","doi-asserted-by":"publisher","unstructured":"Vos, J., Conti, M., Erkin, Z.: SoK: collusion-resistant multi-party private set intersections in the semi-honest model. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 465\u2013483 (2024). https:\/\/doi.org\/10.1109\/SP54263.2024.00079","DOI":"10.1109\/SP54263.2024.00079"},{"key":"23_CR30","doi-asserted-by":"publisher","first-page":"103764","DOI":"10.1016\/j.csi.2023.103764","volume":"87","author":"L Wei","year":"2024","unstructured":"Wei, L., Liu, J., Zhang, L., Wang, Q., Zhang, W., Qian, X.: Efficient multi-party private set intersection protocols for large participants and small sets. Comput. Stand. Interfaces 87, 103764 (2024). https:\/\/doi.org\/10.1016\/j.csi.2023.103764","journal-title":"Comput. Stand. Interfaces"},{"issue":"2","key":"23_CR31","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s13042-022-01647-y","volume":"14","author":"J Wen","year":"2023","unstructured":"Wen, J., Zhang, Z., Lan, Y., Cui, Z., Cai, J., Zhang, W.: A survey on federated learning: challenges and applications. Int. J. Mach. Learn. Cybern. 14(2), 513\u2013535 (2023)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"4","key":"23_CR32","doi-asserted-by":"publisher","first-page":"58","DOI":"10.3390\/cryptography8040058","volume":"8","author":"S Zhao","year":"2024","unstructured":"Zhao, S., Zhao, C., Huang, Y., Song, X., Xu, Q.: Two-party threshold private set intersection protocols from lightweight cryptographic primitives. Cryptography 8(4), 58 (2024)","journal-title":"Cryptography"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Chow, S.S.: Can you find the one for me? In: Proceedings of the 2018 Workshop on Privacy in the Electronic Society, pp. 54\u201365 (2018)","DOI":"10.1145\/3267323.3268965"}],"container-title":["Communications in Computer and Information Science","Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94855-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T12:13:58Z","timestamp":1765196038000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94855-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031948541","9783031948558"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94855-8_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Interdisciplinary Cybersecurity Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rennes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eicc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fvv.um.si\/eicc2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}