{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:16:52Z","timestamp":1775881012060,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819997848","type":"print"},{"value":"9789819997855","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-9785-5_27","type":"book-chapter","created":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T18:02:05Z","timestamp":1706983325000},"page":"382-399","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Post-quantum Dropout-Resilient Aggregation for\u00a0Federated Learning via\u00a0Lattice-Based PRF"],"prefix":"10.1007","author":[{"given":"Ruozhou","family":"Zuo","sequence":"first","affiliation":[]},{"given":"Haibo","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Fangguo","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,4]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Chandnani, N., Khairnar, C.N.: A reliable protocol for data aggregation and optimized routing in IoT WSNs based on machine learning. Wirel. Pers. Commun. 130(4), 2589\u20132622 (2023)","DOI":"10.1007\/s11277-023-10393-5"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-030-63076-8_17","volume-title":"Federated Learning","author":"Guodong Long","year":"2020","unstructured":"Long, Guodong, Tan, Yue, Jiang, Jing, Zhang, Chengqi: Federated Learning for Open Banking. In: Yang, Qiang, Fan, Lixin, Yu, Han (eds.) Federated Learning. LNCS (LNAI), vol. 12500, pp. 240\u2013254. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63076-8_17"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Nguyen, D.C., Ding, M., Pathirana, P.N., Seneviratne, A., Li, J., Poor, H.V.: Federated learning for internet of things: a comprehensive survey. IEEE Commun. Surv. Tutorials 23(3), 1622\u20131658 (2021)","DOI":"10.1109\/COMST.2021.3075439"},{"key":"27_CR4","doi-asserted-by":"publisher","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 12:1\u201312:19 (2019). https:\/\/doi.org\/10.1145\/3298981","DOI":"10.1145\/3298981"},{"key":"27_CR5","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Wallach, H.M., Larochelle, H., Beygelzimer, A., d\u2019Alch\u00e9-Buc, F., Fox, E.B., Garnett, R. (eds.) Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8\u201314, 2019, Vancouver, BC, Canada, pp. 14747\u201314756 (2019). https:\/\/proceedings.neurips.cc\/paper\/2019\/hash\/60a6c4002cc7b29142def8871531281a-Abstract.html"},{"key":"27_CR6","unstructured":"Oded, G.: Secure multi-party computation. manuscript. preliminary version 78(110) (1998)"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 169\u2013178. ACM (2009). https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"key":"27_CR9","unstructured":"Stevens, T., Skalka, C., Vincent, C., Ring, J., Clark, S., Near, J.P.: Efficient differentially private secure aggregation for federated learning via hardness of learning with errors. In: Butler, K.R.B., Thomas, K. (eds.) 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10\u201312, 2022, pp. 1379\u20131395. USENIX Association (2022), https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/stevens"},{"key":"27_CR10","doi-asserted-by":"publisher","unstructured":"Gehlhar, T., Marx, F., Schneider, T., Suresh, A., Wehrle, T., Yalame, H.: SAFEFL: MPC-friendly framework for private and robust federated learning. In: 2023 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023, pp. 69\u201376. IEEE (2023). https:\/\/doi.org\/10.1109\/SPW59333.2023.00012","DOI":"10.1109\/SPW59333.2023.00012"},{"key":"27_CR11","doi-asserted-by":"publisher","unstructured":"Jaehyoung, P., Hyuk, L.: Privacy-preserving federated learning using homomorphic encryption. Appl. Sci. 12(2) (2022). https:\/\/doi.org\/10.3390\/app12020734,https:\/\/www.mdpi.com\/2076-3417\/12\/2\/734","DOI":"10.3390\/app12020734,"},{"key":"27_CR12","unstructured":"Yang, T., et al.: Applied federated learning: Improving google keyboard query suggestions. CoRR abs\/1812.02903 (2018). https:\/\/arxiv.org\/abs\/1812.02903"},{"key":"27_CR13","doi-asserted-by":"publisher","unstructured":"Bonawitz, K.A., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Thuraisingham, B., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 1175\u20131191. ACM (2017). https:\/\/doi.org\/10.1145\/3133956.3133982","DOI":"10.1145\/3133956.3133982"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Kalikinkar, M., Guang, G.: PrivFL: Practical privacy-preserving federated regressions on high-dimensional data over mobile networks. In: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, pp. 57\u201368 (2019)","DOI":"10.1145\/3338466.3358926"},{"key":"27_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-981-16-7913-1_7","volume-title":"Security and Privacy in Social Networks and Big Data","author":"Jiale Guo","year":"2021","unstructured":"Guo, Jiale, Liu, Ziyao, Lam, Kwok-Yan., Zhao, Jun, Chen, Yiqiang: Privacy-Enhanced Federated Learning with Weighted Aggregation. In: Lin, Limei, Liu, Yuhong, Lee, Chia-Wei. (eds.) SocialSec 2021. CCIS, vol. 1495, pp. 93\u2013109. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-7913-1_7"},{"key":"27_CR16","doi-asserted-by":"publisher","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. In: Goldreich, O. (ed.) providing sound foundations for cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 241\u2013264. ACM (2019). https:\/\/doi.org\/10.1145\/3335741.3335752","DOI":"10.1145\/3335741.3335752"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Liu, Z., Guo, J., Lam, K., Zhao, J.: Efficient dropout-resilient aggregation for privacy-preserving machine learning. IEEE Trans. Inf. Forensics Secur. 18, 1839\u20131854 (2023)","DOI":"10.1109\/TIFS.2022.3163592"},{"key":"27_CR18","doi-asserted-by":"publisher","unstructured":"Yang, S., Chen, Y., Tu, S., Yang, Z.: A post-quantum secure aggregation for federated learning. In: Proceedings of the 12th International Conference on Communication and Network Security, ICCNS 2022, Beijing, China, December 1\u20133, 2022, pp. 117\u2013124. ACM (2022). https:\/\/doi.org\/10.1145\/3586102.3586120","DOI":"10.1145\/3586102.3586120"},{"key":"27_CR19","unstructured":"Elaine, S., T-H. Hubert, C., Eleanor, R., Richard, C., Dawn, S.: Privacy-preserving aggregation of time-series data. ACM Trans. Sen. Netw 5(3), 1\u201336 (2009)"},{"key":"27_CR20","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. Electron. Colloquium Comput. Complex. TR11-111 (2011). https:\/\/eccc.weizmann.ac.il\/report\/2011\/111"},{"key":"27_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"Zvika Brakerski","year":"2012","unstructured":"Brakerski, Zvika: Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. In: Safavi-Naini, Reihaneh, Canetti, Ran (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 868\u2013886. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_50"},{"key":"27_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-319-78381-9_14","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"Jung Hee Cheon","year":"2018","unstructured":"Cheon, Jung Hee, Han, Kyoohyung, Kim, Andrey, Kim, Miran, Song, Yongsoo: Bootstrapping for Approximate Homomorphic Encryption. In: Nielsen, Jesper Buus, Rijmen, Vincent (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 360\u2013384. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78381-9_14"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","DOI":"10.1145\/359168.359176"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"So, J., G\u00fcler, B., Avestimehr, A.S.: Turbo-aggregate: Breaking the quadratic aggregation barrier in secure federated learning. IEEE J. Sel. Areas Inf. Theory 2(1), 479\u2013489 (2021)","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"27_CR25","doi-asserted-by":"publisher","unstructured":"Bell, J.H., Bonawitz, K.A., Gasc\u00f3n, A., Lepoint, T., Raykova, M.: Secure single-server aggregation with (poly)logarithmic overhead. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) CCS \u201920: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9\u201313, 2020, pp. 1253\u20131269. ACM (2020). https:\/\/doi.org\/10.1145\/3372297.3417885","DOI":"10.1145\/3372297.3417885"},{"key":"27_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13190-5_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"Vadim Lyubashevsky","year":"2010","unstructured":"Lyubashevsky, Vadim, Peikert, Chris, Regev, Oded: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, Henri (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1\u201323. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_1"},{"key":"27_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-662-46497-7_2","volume-title":"Theory of Cryptography","author":"Abhishek Banerjee","year":"2015","unstructured":"Banerjee, Abhishek, Fuchsbauer, Georg, Peikert, Chris, Pietrzak, Krzysztof, Stevens, Sophie: Key-Homomorphic Constrained Pseudorandom Functions. In: Dodis, Yevgeniy, Nielsen, Jesper Buus (eds.) TCC 2015. LNCS, vol. 9015, pp. 31\u201360. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46497-7_2"},{"key":"27_CR28","doi-asserted-by":"publisher","unstructured":"Tian, H., Wen, Y., Zhang, F., Shao, Y., Li, B.: A distributed threshold additive homomorphic encryption for federated learning with dropout resiliency based on lattice. In: Chen, X., Shen, J., Susilo, W. (eds.) Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi\u2019an, China, October 16\u201318, 2022, Proceedings. Lecture Notes in Computer Science, vol. 13547, pp. 277\u2013292. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-18067-5_20","DOI":"10.1007\/978-3-031-18067-5_20"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"von zur Gathen, J., Gerhard, J.: Modern Computer Algebra (3. ed.). Cambridge University Press (2013)","DOI":"10.1017\/CBO9781139856065"},{"key":"27_CR30","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symp. on Secur. and Priv., SP 2017, San Jose, CA, USA, May 22\u201326, 2017. pp. 3\u201318. IEEE Comput. Soc. (2017). https:\/\/doi.org\/10.1109\/SP.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Froelicher, D., et al.: Scalable privacy-preserving distributed learning. Proc. Priv. Enhancing Technol. 2021(2), 323\u2013347 (2021)","DOI":"10.2478\/popets-2021-0030"},{"key":"27_CR32","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: Chiappa, S., Calandra, R. (eds.) The 23rd International Conference on Artificial Intelligence and Statistics, AISTATS 2020, 26\u201328 August 2020, Online [Palermo, Sicily, Italy]. Proceedings of Machine Learning Research, vol. 108, pp. 2938\u20132948. PMLR (2020). https:\/\/proceedings.mlr.press\/v108\/bagdasaryan20a.html"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Tian, H., Li, M., Ren, S.: ESE: Efficient security enhancement method for the secure aggregation protocol in federated learning. Chinese J. Electron. 32(3), 542\u2013555 (2023). 10.23919\/CJE.2021.00.370","DOI":"10.23919\/cje.2021.00.370"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-9785-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T02:06:56Z","timestamp":1731204416000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-9785-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819997848","9789819997855"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-9785-5_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"4 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/aisp2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23 large model and security workshop papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}