{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:42:37Z","timestamp":1772822557282,"version":"3.50.1"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72201022"],"award-info":[{"award-number":["72201022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental ResearchFunds for the Central Universities, and the Research Funds of Renmin University of China","award":["2020030254"],"award-info":[{"award-number":["2020030254"]}]},{"name":"Fundamental ResearchFunds for the Central Universities, and the Research Funds of Renmin University of China","award":["2021030194"],"award-info":[{"award-number":["2021030194"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s00500-025-10640-w","type":"journal-article","created":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T04:18:21Z","timestamp":1747109901000},"page":"3659-3664","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Reparable threshold Paillier encryption scheme for federated learning"],"prefix":"10.1007","volume":"29","author":[{"given":"Yi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Kun","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Yunfan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Fengxia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zixian","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,13]]},"reference":[{"key":"10640_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Generalized secret sharing and monotone functions","author":"J Benaloh","year":"1990","unstructured":"Benaloh J, Leichter J (1990) Generalized secret sharing and monotone functions. Springer, Berlin"},{"issue":"9","key":"10640_CR2","doi-asserted-by":"publisher","first-page":"4539","DOI":"10.1109\/TIT.2010.2054295","volume":"56","author":"AG Dimakis","year":"2010","unstructured":"Dimakis AG, Godfrey PB, Wu Y, Wainwright MJ, Ramchandran K (2010) Network coding for distributed storage systems. IEEE Trans Inf Theory 56(9):4539\u20134551","journal-title":"IEEE Trans Inf Theory"},{"key":"10640_CR3","doi-asserted-by":"crossref","unstructured":"Fouque P-A, Poupard G, Stern J (2001) Sharing decryption in the context of voting or lotteries. In: Financial cryptography: 4th international conference, FC 2000 Anguilla, British West Indies, February 20\u201324, 2000 Proceedings 4. Springer, p 90\u2013104","DOI":"10.1007\/3-540-45472-1_7"},{"key":"10640_CR4","unstructured":"Guang X, Lu J, Fu F-W (2014) Repairable threshold secret sharing schemes. Preprint arXiv:1410.7190"},{"issue":"02","key":"10640_CR5","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1142\/S0129054104002510","volume":"15","author":"C-P Lai","year":"2004","unstructured":"Lai C-P, Ding C (2004) Several generalizations of Shamir\u2019s secret sharing scheme. Int J Found Comput Sci 15(02):445\u2013458","journal-title":"Int J Found Comput Sci"},{"key":"10640_CR6","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics. PMLR, p 1273\u20131282"},{"key":"10640_CR7","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri V, Parizi RM, Pouriyeh S, Huang Y, Dehghantanha A, Srivastava G (2021) A survey on security and privacy of federated learning. Future Gener Comput Syst 115:619\u2013640","journal-title":"Future Gener Comput Syst"},{"key":"10640_CR8","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, p 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"8","key":"10640_CR9","doi-asserted-by":"publisher","first-page":"5227","DOI":"10.1109\/TIT.2011.2159049","volume":"57","author":"KV Rashmi","year":"2011","unstructured":"Rashmi KV, Shah NB, Kumar PV (2011) Optimal exact-regenerating codes for distributed storage at the MSR and MBR points via a product-matrix construction. IEEE Trans Inf Theory 57(8):5227\u20135239","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"10640_CR10","first-page":"1","volume":"13","author":"H Ren","year":"2022","unstructured":"Ren H, Deng J, Xie X (2022) GRNN: generative regression neural network? a data leakage attack for federated learning. ACM Trans Intel Syst Technol TIST 13(4):1\u201324","journal-title":"ACM Trans Intel Syst Technol TIST"},{"issue":"7","key":"10640_CR11","first-page":"1539","volume":"32","author":"W Wu","year":"2020","unstructured":"Wu W, He L, Lin W, Mao R (2020) Accelerating federated learning over reliability-agnostic clients in mobile edge computing systems. IEEE Trans Parallel Distrib Syst 32(7):1539\u20131551","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"11","key":"10640_CR12","doi-asserted-by":"publisher","first-page":"10782","DOI":"10.1109\/JIOT.2020.2987958","volume":"7","author":"C Zhou","year":"2020","unstructured":"Zhou C, Fu A, Yu S, Yang W, Wang H, Zhang Y (2020) Privacy-preserving federated learning in fog computing. IEEE Internet Things J 7(11):10782\u201310793","journal-title":"IEEE Internet Things J"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10640-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-10640-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10640-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T14:02:44Z","timestamp":1749218564000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-10640-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":12,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["10640"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-10640-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3453596\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"10 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research did not involve human participants, animals, or sensitive information. As such, ethical approval was not required for this study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This research did not involve the use of human participants or animals.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human participants and\/or animals"}}]}}