{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T22:17:14Z","timestamp":1775859434344,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T00:00:00Z","timestamp":1746748800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T00:00:00Z","timestamp":1746748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01986-x","type":"journal-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T05:49:50Z","timestamp":1746769790000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Pivacy-preserving federated learning based on multi-key fully homomorphic encryption and trusted execution environment"],"prefix":"10.1007","volume":"18","author":[{"given":"Gang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zheng","family":"He","sequence":"additional","affiliation":[]},{"given":"Le","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Senmiao","family":"Su","sequence":"additional","affiliation":[]},{"given":"Jingchen","family":"Su","sequence":"additional","affiliation":[]},{"given":"Keming","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,9]]},"reference":[{"key":"1986_CR1","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics. PMLR, pp 1273\u20131282"},{"issue":"7","key":"1986_CR2","doi-asserted-by":"publisher","first-page":"170305","DOI":"10.1007\/s11432-023-3978-y","volume":"67","author":"L Sun","year":"2024","unstructured":"Sun L, Wang Y, Ren Y, Xia F (2024) Path signature-based xai-enabled network time series classification. Sci China Inf Sci 67(7):170305","journal-title":"Sci China Inf Sci"},{"key":"1986_CR3","doi-asserted-by":"crossref","unstructured":"Kogos KG, Filippova KS, Epishkina AV (2017) Fully homomorphic encryption schemes: the state of the art. In: 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, pp 463\u2013466","DOI":"10.1109\/EIConRus.2017.7910591"},{"key":"1986_CR4","doi-asserted-by":"publisher","first-page":"10562","DOI":"10.1109\/ACCESS.2017.2706947","volume":"5","author":"R Mendes","year":"2017","unstructured":"Mendes R, Vilela JP (2017) Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5:10562\u201310582","journal-title":"IEEE Access"},{"key":"1986_CR5","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Vaikuntanathan V (2011) Fully homomorphic encryption from ring-lwe and security for key dependent messages. In: Annual cryptology conference. Springer, pp 505\u2013524","DOI":"10.1007\/978-3-642-22792-9_29"},{"issue":"22","key":"1986_CR6","doi-asserted-by":"publisher","first-page":"4478","DOI":"10.3390\/electronics13224478","volume":"13","author":"J Shen","year":"2024","unstructured":"Shen J, Zhao Y, Huang S, Ren Y (2024) Secure and flexible privacy-preserving federated learning based on multi-key fully homomorphic encryption. Electronics 13(22):4478","journal-title":"Electronics"},{"key":"1986_CR7","unstructured":"Zhang C-X, Wu D, Cui P-W, Ma J-C, Wang Y, An J-M (2023) Research progress in quantum key distribution. Chin Phys B"},{"issue":"4","key":"1986_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.3390\/cryptography7040048","volume":"7","author":"I Walskaar","year":"2023","unstructured":"Walskaar I, Tran MC, Catak FO (2023) A practical implementation of medical privacy-preserving federated learning using multi-key homomorphic encryption and flower framework. Cryptography 7(4):48","journal-title":"Cryptography"},{"key":"1986_CR9","doi-asserted-by":"crossref","unstructured":"Chen C, Liu J, Tan H, Li X, Wang KI-K, Li P, Sakurai K, Dou D (2024) Trustworthy federated learning: privacy, security, and beyond. Knowl Inf Syst 1\u201336","DOI":"10.1007\/s10115-024-02285-2"},{"key":"1986_CR10","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics. PMLR, pp 1273\u20131282"},{"key":"1986_CR11","doi-asserted-by":"crossref","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on computer and communications security, pp 1175\u20131191","DOI":"10.1145\/3133956.3133982"},{"key":"1986_CR12","unstructured":"Bonawitz K (2019) Towards federated learning at scale: System design. arXiv:1902.01046"},{"key":"1986_CR13","doi-asserted-by":"crossref","unstructured":"Hitaj B, Ateniese G, Perez-Cruz F (2017) Deep models under the gan: information leakage from collaborative deep learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp 603\u2013618","DOI":"10.1145\/3133956.3134012"},{"key":"1986_CR14","unstructured":"Geyer RC, Klein T, Nabi M (2017) Differentially private federated learning: a client level perspective. arXiv:1712.07557"},{"key":"1986_CR15","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM sigsac conference on computer and communications security, pp 308\u2013318","DOI":"10.1145\/2976749.2978318"},{"key":"1986_CR16","unstructured":"Fu J, Hong Y, Ling X, Wang L, Ran X, Sun Z, Wang WH, Chen Z, Cao Y (2024) Differentially private federated learning: a systematic review. arXiv:2405.08299"},{"key":"1986_CR17","doi-asserted-by":"crossref","unstructured":"Wei K, Li J, Ma C, Ding M, Chen W, Wu J, Tao M, Poor HV (2023) Personalized federated learning with differential privacy and convergence guarantee. IEEE Trans Inf Forensics Secur","DOI":"10.1109\/TIFS.2023.3293417"},{"key":"1986_CR18","doi-asserted-by":"crossref","unstructured":"Xu R, Li B, Li C, Joshi J, Ma S, Zhou T, Dong J, Li J (2024) Tapfed: Threshold secure aggregation for privacy-preserving federated learning. IEEE Trans Dependable Secure Comput","DOI":"10.1109\/TDSC.2024.3350206"},{"key":"1986_CR19","doi-asserted-by":"crossref","unstructured":"Miao P, Shi X, Wu C, Xu R (2024) Client-aided privacy-preserving machine learning. In: International conference on security and cryptography for networks. Springer, pp 207\u2013229","DOI":"10.1007\/978-3-031-71070-4_10"},{"key":"1986_CR20","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.future.2020.09.019","volume":"115","author":"Y Ren","year":"2021","unstructured":"Ren Y, Leng Y, Qi J, Sharma PK, Wang J, Almakhadmeh Z, Tolba A (2021) Multiple cloud storage mechanism based on blockchain in smart homes. Futur Gener Comput Syst 115:304\u2013313","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"1986_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar A, Aksu H, Uluagac AS, Conti M (2018) A survey on homomorphic encryption schemes: theory and implementation. ACM Comput Surv (Csur) 51(4):1\u201335","journal-title":"ACM Comput Surv (Csur)"},{"key":"1986_CR22","doi-asserted-by":"crossref","unstructured":"Phong LT, Aono Y, Hayashi T, Wang L, Moriai S (2017) Privacy-preserving deep learning: Revisited and enhanced. In: Applications and techniques in information security: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6\u20137, 2017, Proceedings. Springer, pp 100\u2013110","DOI":"10.1007\/978-981-10-5421-1_9"},{"issue":"13","key":"1986_CR23","doi-asserted-by":"publisher","first-page":"11590","DOI":"10.1109\/JIOT.2021.3130115","volume":"9","author":"Y Li","year":"2021","unstructured":"Li Y, Li H, Xu G, Huang X, Lu R (2021) Efficient privacy-preserving federated learning with unreliable users. IEEE Internet Things J 9(13):11590\u201311603","journal-title":"IEEE Internet Things J"},{"key":"1986_CR24","doi-asserted-by":"crossref","unstructured":"Kokoris-Kogias E, Jovanovic P, Gasser L, Gailly N, Syta E, Ford B (2018) Omniledger: A secure, scale-out, decentralized ledger via sharding. In: 2018 IEEE Symposium on Security and Privacy (SP). IEEE, pp 583\u2013598","DOI":"10.1109\/SP.2018.000-5"},{"issue":"4","key":"1986_CR25","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.3934\/mbe.2019091","volume":"16","author":"Y Ren","year":"2019","unstructured":"Ren Y, Leng Y, Cheng Y, Wang J (2019) Secure data storage based on blockchain and coding in edge computing. Math Biosci Eng 16(4):1874\u20131892","journal-title":"Math Biosci Eng"},{"key":"1986_CR26","doi-asserted-by":"crossref","unstructured":"Hu C, Li B (2024) Maskcrypt: Federated learning with selective homomorphic encryption. IEEE Trans Dependable Secure Comput","DOI":"10.1109\/TDSC.2024.3392424"},{"key":"1986_CR27","doi-asserted-by":"crossref","unstructured":"Kumar KN, Mitra R, Mohan CK (2024) Revamping federated learning security from a defender\u2019s perspective: a unified defense with homomorphic encrypted data space. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 24387\u201324397","DOI":"10.1109\/CVPR52733.2024.02302"},{"key":"1986_CR28","doi-asserted-by":"crossref","unstructured":"Ma J, Naas S-A, Sigg S, Lyu X (2022) Privacy-preserving federated learning based on multi-key homomorphic encryption. Int J Intell Syst 37(9):5880\u20135901","DOI":"10.1002\/int.22818"},{"key":"1986_CR29","doi-asserted-by":"crossref","unstructured":"Han G, Zhang Q, Deng B, Lei M (2024) Implementing automated safety circuit breakers of large language models for prompt integrity","DOI":"10.21203\/rs.3.rs-4624380\/v1"},{"key":"1986_CR30","doi-asserted-by":"crossref","unstructured":"Sabt M, Achemlal M, Bouabdallah A (2015) Trusted execution environment: What it is, and what it is not. In: 2015 IEEE Trustcom\/BigDataSE\/Ispa, vol. 1. IEEE, pp 57\u201364","DOI":"10.1109\/Trustcom.2015.357"},{"key":"1986_CR31","doi-asserted-by":"crossref","unstructured":"Mo F, Haddadi H, Katevas K, Marin E, Perino D, Kourtellis N (2021) Ppfl: Privacy-preserving federated learning with trusted execution environments. In: Proceedings of the 19th annual international conference on mobile systems, applications, and services, pp 94\u2013108","DOI":"10.1145\/3458864.3466628"},{"issue":"2","key":"1986_CR32","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.1109\/TII.2022.3170348","volume":"19","author":"AP Kalapaaking","year":"2022","unstructured":"Kalapaaking AP, Khalil I, Rahman MS, Atiquzzaman M, Yi X, Almashor M (2022) Blockchain-based federated learning with secure aggregation in trusted execution environment for internet-of-things. IEEE Trans Industr Inf 19(2):1703\u20131714","journal-title":"IEEE Trans Industr Inf"},{"issue":"7","key":"1986_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3594542","volume":"20","author":"Y Ren","year":"2024","unstructured":"Ren Y, Lv Z, Xiong NN, Wang J (2024) Hcnct: A cross-chain interaction scheme for the blockchain-based metaverse. ACM Trans Multimed Comput Commun Appl 20(7):1\u201323","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"18","key":"1986_CR34","doi-asserted-by":"publisher","first-page":"3938","DOI":"10.3390\/electronics12183938","volume":"12","author":"J Liao","year":"2023","unstructured":"Liao J, Jiang B, Zhao P, Ning L, Chen L (2023) Unmanned aerial vehicle-assisted federated learning method based on a trusted execution environment. Electronics 12(18):3938","journal-title":"Electronics"},{"key":"1986_CR35","doi-asserted-by":"crossref","unstructured":"Messaoud AA, Mokhtar SB, Nitu V, Schiavoni V (2022) Shielding federated learning systems against inference attacks with arm trustzone. In: Proceedings of the 23rd ACM\/IFIP international middleware conference, pp 335\u2013348","DOI":"10.1145\/3528535.3565255"},{"key":"1986_CR36","doi-asserted-by":"publisher","first-page":"122410","DOI":"10.1016\/j.eswa.2023.122410","volume":"239","author":"Y Cao","year":"2024","unstructured":"Cao Y, Zhang J, Zhao Y, Su P, Huang H (2024) Srfl: A secure & robust federated learning framework for iot with trusted execution environments. Expert Syst Appl 239:122410","journal-title":"Expert Syst Appl"},{"key":"1986_CR37","doi-asserted-by":"crossref","unstructured":"Sabt M, Achemlal M, Bouabdallah A (2015) Trusted execution environment: What it is, and what it is not. In: 2015 IEEE Trustcom\/BigDataSE\/Ispa, vol. 1. IEEE, pp 57\u201364","DOI":"10.1109\/Trustcom.2015.357"},{"key":"1986_CR38","doi-asserted-by":"crossref","unstructured":"Li Z, Ma C, Morais E, Du G (2016) Multi-bit leveled homomorphic encryption via-based. In: International conference on information security and cryptology. Springer, pp 221\u2013242","DOI":"10.1007\/978-3-319-54705-3_14"},{"issue":"2","key":"1986_CR39","doi-asserted-by":"publisher","first-page":"029101","DOI":"10.1007\/s11432-017-9206-y","volume":"61","author":"Z Li","year":"2018","unstructured":"Li Z, Ma C, Zhou H (2018) Multi-key fhe for multi-bit messages. Sci China Inf Sci 61(2):029101","journal-title":"Sci China Inf Sci"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01986-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01986-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01986-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:54Z","timestamp":1758986514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01986-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,9]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1986"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01986-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,9]]},"assertion":[{"value":"27 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"171"}}