{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:32Z","timestamp":1772119892284,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11280-023-01151-5","type":"journal-article","created":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T07:02:12Z","timestamp":1689577332000},"page":"3275-3301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TFPA: A traceable federated privacy aggregation protocol"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7705-0709","authenticated-orcid":false,"given":"Xingyu","family":"Li","sequence":"first","affiliation":[]},{"given":"Yucheng","family":"Long","sequence":"additional","affiliation":[]},{"given":"Li","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"key":"1151_CR1","doi-asserted-by":"crossref","unstructured":"Lim, W.Y.B., Luong, N.C., Hoang, D.T., Jiao Y., Liang, Y.C., Yang, Q., Niyato, D., Miao, C.: Federated learning in mobile edge networks: A comprehensive survey. IEEE Commun. Surv. Tutorials (2020)","DOI":"10.1109\/COMST.2020.2986024"},{"key":"1151_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3339474","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10, 1\u201319 (2019)","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"1151_CR3","doi-asserted-by":"publisher","unstructured":"Wu, D., Pan, M., Xu, Z. Zhang, Y., Han, Z.: Towards Efficient Secure Aggregation for Model Update in Federated Learning. GLOBECOM 2020 - 2020 IEEE Global Communications Conference, pp. 1\u20136 (2020) https:\/\/doi.org\/10.1109\/GLOBECOM42002.2020.9347960","DOI":"10.1109\/GLOBECOM42002.2020.9347960"},{"key":"1151_CR4","doi-asserted-by":"publisher","unstructured":"So, J., G\u00fcler, B., Avestimehr, A.S.: Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning,\u201d in IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 479\u2013489 (2021). https:\/\/doi.org\/10.1109\/JSAIT.2021.3054610","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"1151_CR5","unstructured":"So, J., Ali, R.E., Guler, B., Jiao, J., Avestimehr, S.: Securing secure aggregation: mitigating multi-round privacy leakage in federated learning (2021)"},{"key":"1151_CR6","doi-asserted-by":"publisher","unstructured":"Bell, J.H., Bonawitz, K.A., Gasc\u00f3n, A., Lepoint, T., Raykova, M.: Secure Single-Server Aggregation with (Poly)Logarithmic Overhead. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA, 1253-1269 (2020). https:\/\/doi.org\/10.1145\/3372297.3417885","DOI":"10.1145\/3372297.3417885"},{"key":"1151_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GCWkshps52748.2021.9682053","volume":"2021","author":"E Hosseini","year":"2021","unstructured":"Hosseini, E., Khisti, A.: Secure Aggregation in Federated Learning via Multiparty Homomorphic Encryption. IEEE Globecom Workshops (GC Wkshps) 2021, 1\u20136 (2021). https:\/\/doi.org\/10.1109\/GCWkshps52748.2021.9682053","journal-title":"IEEE Globecom Workshops (GC Wkshps)"},{"key":"1151_CR8","doi-asserted-by":"publisher","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B., Patel, S., Ramage, D., Segal, A., Seth, K.: Practical Secure Aggregation for Privacy-Preserving Machine Learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ($$CCS_{^{\\prime }}$$17). Association for Computing Machinery, New York, NY, USA, 1175\u20131191 (2017). https:\/\/doi.org\/10.1145\/3133956.3133982","DOI":"10.1145\/3133956.3133982"},{"key":"1151_CR9","doi-asserted-by":"publisher","unstructured":"Mandal, K., Gong, G.: PrivFL: Practical Privacy-preserving Federated regressions on High-dimensional Data over Mobile Networks. In Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop (CCSW\u201919). Association for Computing Machinery, New York, NY, USA, 57\u201368 (2019). https:\/\/doi.org\/10.1145\/3338466.3358926","DOI":"10.1145\/3338466.3358926"},{"key":"1151_CR10","unstructured":"Mandal, K., Gong, G., Liu, C.: Nike-based fast privacy-preserving highdimensional data aggregation for mobile devices. IEEE T Depend Secure; Technical Report; University of Waterloo: Waterloo, ON, Canada, pp. 142\u2013149 (2018)"},{"key":"1151_CR11","doi-asserted-by":"crossref","unstructured":"Dong, Y., Chen, X., Shen, L., Wang, D.: Privacy-Preserving Distributed Machine Learning Based on Secret Sharing. Information and Communications Security, Ed.: Zhou, Jianying and Luo, Xiapu and Shen, Qingni and Xu, Zhen, Springer International Publishing, pp. 684\u2013702 (2020)","DOI":"10.1007\/978-3-030-41579-2_40"},{"key":"1151_CR12","unstructured":"Corrigan-Gibbs, H., Boneh, D.: Prio: Private, Robust, and Scalable Computation of Aggregate Statistics . Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, USENIX Association, pp. 259\u2013282 (2017)"},{"key":"1151_CR13","doi-asserted-by":"crossref","unstructured":"Dong, Y., Chen, X., Li, K., Wang, D., Zeng, S.: FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority. IACR Cryptol. ePrint Arch., p. 993 (2021)","DOI":"10.1007\/978-3-030-88418-5_24"},{"key":"1151_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101824","volume":"94","author":"Ye Dong","year":"2020","unstructured":"Dong, Ye., Chen, Xiaojun, Shen, Liyan, Wang, Dakui: EaSTFLy: Efficient and secure ternary federated learning. Comput. Secur. 94, 101824 (2020)","journal-title":"Comput. Secur."},{"key":"1151_CR15","unstructured":"Bhagoji, A.N., Chakraborty, S., Mittal, P., Calo, S. Analyzing federated learning through an adversarial lens (2018). arXiv preprint arXiv:1811.12470"},{"key":"1151_CR16","unstructured":"Fang, M., Cao, X., Jia, J., Gong, N.Z.: Local model poisoning attacks to byzantine-robust federated learning. arXiv preprint arXiv:1911.11815, 2019. arXiv preprint arXiv:2003.14053, 2020"},{"key":"1151_CR17","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated"},{"key":"1151_CR18","unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., Moeller, M.: Inverting gradients- how easy is it to break privacy in federated learning?"},{"key":"1151_CR19","doi-asserted-by":"publisher","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds) Automata, Languages and Programming. ICALP 2006. Lecture Notes in Computer Science, vol. 4052. Springer, Berlin, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1","DOI":"10.1007\/11787006_1"},{"key":"1151_CR20","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMa han, H.B., Patel, S., Ramage, D., Segal, A., Seth, K.: Practical secure aggregation for federated learning on user-held data (2016). arXiv preprint arXiv:1611.04482"},{"key":"1151_CR21","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B., Patel, S., Ramage, D., Segal, A., Seth, K.: Practical secure aggregation for privacy-preserving machine learning. In ACM SIGSAC Conf. on Comp. and Comm. Security, pages 1175\u20131191. ACM (2017)","DOI":"10.1145\/3133956.3133982"},{"issue":"4\u20135","key":"1151_CR22","first-page":"185","volume":"5","author":"S-I Amari","year":"1993","unstructured":"Amari, S.-I.: Backpropagation and stochastic gradient descent method. Neuro. computing 5(4\u20135), 185\u2013196 (1993)","journal-title":"Neuro. computing"},{"key":"1151_CR23","doi-asserted-by":"publisher","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22 (11), 612-613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","DOI":"10.1145\/359168.359176"},{"key":"1151_CR24","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1631\/FITEE.2000366","volume":"23","author":"L Wu","year":"2022","unstructured":"Wu, L., Han, Y., Yang, X., et al.: Identity-based threshold proxy re-encryption scheme from lattices and its applications. Front Inform Technol Electron Eng 23, 258\u2013277 (2022). https:\/\/doi.org\/10.1631\/FITEE.2000366","journal-title":"Front Inform Technol Electron Eng"},{"key":"1151_CR25","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Suzuki, K.: Traceable ring signature. In Tatsuaki Okamoto and Xiaoyun Wang, editors, Public Key Cryptography-PKC 2007, pages 181-200, Berlin, Heidelberg (2007). Springer Berlin Heidelberg","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"1151_CR26","unstructured":"Giuseppe, A., et al.: Improved proxy Re-encryption schemes with applications to secure distributed storage. In: 12th Annual Network and Distributed System Security Symposium, pp. 29\u201335, LNCS. Springer-Verlag(2005)"},{"key":"1151_CR27","unstructured":"Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In Proceedings of the third symposium on Operating systems design and implementation (OSDI \u201999). USENIX Association, USA, 173\u2013186 (1999)"},{"key":"1151_CR28","doi-asserted-by":"crossref","unstructured":"Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H., Zhang, R., Zhou, Y.: A hybrid approach to privacy-preserving federated learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 1\u201311 (2019)","DOI":"10.1145\/3338501.3357370"},{"key":"1151_CR29","doi-asserted-by":"crossref","unstructured":"Xu, R., Baracaldo, N., Zhou, Y., Anwar, A., Ludwig, H.: Hybridalpha: An efficient approach for privacy-preserving federated learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 13\u201323 (2019)","DOI":"10.1145\/3338501.3357371"},{"key":"1151_CR30","doi-asserted-by":"crossref","unstructured":"Cao, X., Fang, M., Liu, J., Gong, N.Z.: Fltrust: Byzantine-robust federated learning via trust bootstrapping (2020). arXiv preprint arXiv:2012.13995","DOI":"10.14722\/ndss.2021.24434"},{"key":"1151_CR31","unstructured":"Dua, D., Graff, C.: UCI machine learning repository (2017). https:\/\/archive.ics.uci.edu\/ml\/datasets\/Breast+Cancer+Wisconsin+(Diagnostic). Accessed 22-23 Aug 2022"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-023-01151-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-023-01151-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-023-01151-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T00:25:16Z","timestamp":1696983916000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-023-01151-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["1151"],"URL":"https:\/\/doi.org\/10.1007\/s11280-023-01151-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2059591\/v1","asserted-by":"object"}]},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,17]]},"assertion":[{"value":"13 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}