{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:01Z","timestamp":1758987601899,"version":"3.44.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Innovation Project of GUET Graduate Education","award":["2025YCXB006"],"award-info":[{"award-number":["2025YCXB006"]}]},{"name":"Guangxi Natural Science Foundation","award":["2025GXNSFGA069004"],"award-info":[{"award-number":["2025GXNSFGA069004"]}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2023YFB3107303"],"award-info":[{"award-number":["2023YFB3107303"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62172119"],"award-info":[{"award-number":["62172119"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open Project Program of Joint Innovation Laboratory of Digital GuangXi Smart Infrastructures","award":["GXDIOP2023006"],"award-info":[{"award-number":["GXDIOP2023006"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02056-y","type":"journal-article","created":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T10:02:57Z","timestamp":1751450577000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EMKPPA: Efficient multi-key privacy-preserving aggregation in federated learning"],"prefix":"10.1007","volume":"18","author":[{"given":"Zhen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Changsong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huiyong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"key":"2056_CR1","doi-asserted-by":"publisher","unstructured":"Ye M, Fang X, Du B, Yuen PC, Tao D (2023) Heterogeneous federated learning: State-of-the-art and research challenges. ACM Comput Surv 56(3). https:\/\/doi.org\/10.1145\/3625558","DOI":"10.1145\/3625558"},{"key":"2056_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110424","volume":"151","author":"H Guan","year":"2024","unstructured":"Guan H, Yap PT, Bozoki A, Liu M (2024) Federated learning for medical image analysis: A survey. Patt Recognit 151:110424. https:\/\/doi.org\/10.1016\/j.patcog.2024.110424","journal-title":"Patt Recognit"},{"key":"2056_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2023.109095","volume":"268","author":"L Kong","year":"2024","unstructured":"Kong L, Zheng G, Brintrup A (2024) A federated machine learning approach for order-level risk prediction in supply chain financing. Int J Prod Econ 268:109095. https:\/\/doi.org\/10.1016\/j.ijpe.2023.109095","journal-title":"Int J Prod Econ"},{"key":"2056_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102189","volume":"104","author":"M Ficco","year":"2024","unstructured":"Ficco M, Guerriero A, Milite E, Palmieri F, Pietrantuono R, Russo S (2024) Federated learning for iot devices: Enhancing tinyml with on-board training. Inf Fusion 104:102189. https:\/\/doi.org\/10.1016\/j.inffus.2023.102189","journal-title":"Inf Fusion"},{"key":"2056_CR5","unstructured":"Zhu L, Liu Z, Han S (2019) Deep leakage from gradients.In: Wallach H, Larochelle H, Beygelzimer A, Alch\u00e9-Buc F, Fox E, Garnett R (eds) Advances in Neural Information Processing Systems, vol 32. Curran Associates, Inc., ???"},{"issue":"10","key":"2056_CR6","doi-asserted-by":"publisher","first-page":"18351","DOI":"10.1109\/JIOT.2024.3363712","volume":"11","author":"Y Xia","year":"2024","unstructured":"Xia Y, Liu Y, Dong S, Li M, Guo C (2024) Svca: Secure and verifiable chained aggregation for privacy-preserving federated learning. IEEE Internet Things J 11(10):18351\u201318365. https:\/\/doi.org\/10.1109\/JIOT.2024.3363712","journal-title":"IEEE Internet Things J"},{"key":"2056_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119717","volume":"652","author":"H Batool","year":"2024","unstructured":"Batool H, Anjum A, Khan A, Izzo S, Mazzocca C, Jeon G (2024) A secure and privacy preserved infrastructure for vanets based on federated learning with local differential privacy. Inf Sci 652:119717. https:\/\/doi.org\/10.1016\/j.ins.2023.119717","journal-title":"Inf Sci"},{"key":"2056_CR8","doi-asserted-by":"publisher","unstructured":"Yang R, Zhao T, Yu FR, Li M, Zhang D, Zhao X (2024) Blockchain-based federated learning with enhanced privacy and security using homomorphic encryption and reputation. IEEE Internet Things J 1\u20131. https:\/\/doi.org\/10.1109\/JIOT.2024.3379395","DOI":"10.1109\/JIOT.2024.3379395"},{"key":"2056_CR9","doi-asserted-by":"publisher","unstructured":"L\u00f3pez-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the 44th annual ACM symposium on theory of computing. STOC \u201912, Association for Computing Machinery, New York, NY, USA, pp 1219\u20131234. https:\/\/doi.org\/10.1145\/2213977.2214086","DOI":"10.1145\/2213977.2214086"},{"key":"2056_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102198","volume":"105","author":"TH Rafi","year":"2024","unstructured":"Rafi TH, Noor FA, Hussain T, Chae DK (2024) Fairness and privacy preserving in federated learning: A survey. Inf Fusion 105:102198. https:\/\/doi.org\/10.1016\/j.inffus.2023.102198","journal-title":"Inf Fusion"},{"key":"2056_CR11","doi-asserted-by":"publisher","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. CCS \u201915, Association for Computing Machinery, New York, NY, USA, pp 1310\u20131321. https:\/\/doi.org\/10.1145\/2810103.2813687","DOI":"10.1145\/2810103.2813687"},{"key":"2056_CR12","doi-asserted-by":"publisher","unstructured":"Truex S, Liu L, Chow KH, Gursoy ME, Wei W (2020) Ldp-fed: federated learning with local differential privacy. In: Proceedings of the Third ACM international workshop on edge systems, analytics and networking. EdgeSys \u201920, Association for Computing Machinery, New York, NY, USA, pp 61\u201366. https:\/\/doi.org\/10.1145\/3378679.3394533","DOI":"10.1145\/3378679.3394533"},{"key":"2056_CR13","doi-asserted-by":"publisher","unstructured":"Jiang Z, Wang W, Chen R (2024) Dordis: Efficient federated learning with dropout-resilient differential privacy. In: Proceedings of the 19th european conference on computer systems. EuroSys \u201924, Association for Computing Machinery, New York, NY, USA, pp 472\u2013488. https:\/\/doi.org\/10.1145\/3627703.3629559","DOI":"10.1145\/3627703.3629559"},{"key":"2056_CR14","doi-asserted-by":"publisher","unstructured":"Fukami T, Murata T, Niwa K, Tyou I (2024) Dp-norm: Differential privacy primal-dual algorithm for decentralized federated learning. IEEE Trans Inf Forensic Secur 1\u20131. https:\/\/doi.org\/10.1109\/TIFS.2024.3390993","DOI":"10.1109\/TIFS.2024.3390993"},{"key":"2056_CR15","doi-asserted-by":"crossref","unstructured":"Yuan W, Wang X (2024) QI-DPFL: Quality-aware and incentive-boosted federated learning with differential privacy","DOI":"10.1109\/IJCNN60899.2024.10651264"},{"key":"2056_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100608","volume":"51","author":"AK Chattopadhyay","year":"2024","unstructured":"Chattopadhyay AK, Saha S, Nag A, Nandi S (2024) Secret sharing: A comprehensive survey, taxonomy and applications. Comput Sci Rev 51:100608. https:\/\/doi.org\/10.1016\/j.cosrev.2023.100608","journal-title":"Comput Sci Rev"},{"key":"2056_CR17","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2016) Practical secure aggregation for federated learning on user-held data"},{"key":"2056_CR18","doi-asserted-by":"publisher","unstructured":"Xu G, Li H, Liu S, Yang K, Lin X () Verifynet: Secure and verifiable federated learning. IEEE Trans Inf Forens Secur 15:911\u2013926 .https:\/\/doi.org\/10.1109\/TIFS.2019.2929409","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"2056_CR19","unstructured":"Choi B, Sohn Jy, Han DJ, Moon J (2021) Communication-computation efficient secure aggregation for federated learning"},{"key":"2056_CR20","doi-asserted-by":"publisher","unstructured":"Kanagavelu R, Li Z, Samsudin J, Yang Y, Yang F, Mong\u00a0Goh R.S, Cheah M, Wiwatphonthana P, Akkarajitsakul K, Wang S (2020) Two-phase multi-party computation enabled privacy-preserving federated learning. In: 2020 20th IEEE\/ACM international symposium on cluster, cloud and internet computing (CCGRID), pp 410\u2013419. https:\/\/doi.org\/10.1109\/CCGrid49817.2020.00-52","DOI":"10.1109\/CCGrid49817.2020.00-52"},{"key":"2056_CR21","doi-asserted-by":"publisher","unstructured":"Wang W, Yang Y, Yin Z, Dev K, Zhou X, Li X, Qureshi NMF, Su C (2022) Bsif: Blockchain-based secure, interactive, and fair mobile crowdsensing. IEEE J Select Areas Commun 40(12):3452\u20133469. https:\/\/doi.org\/10.1109\/JSAC.2022.3213306","DOI":"10.1109\/JSAC.2022.3213306"},{"key":"2056_CR22","doi-asserted-by":"publisher","unstructured":"Han Q, Lu S, Wang W, Qu H, Li J, Gao Y (2024) Privacy preserving and secure robust federated learning: A survey. Concurrency Computat Pract Exper 36(13):e8084. https:\/\/doi.org\/10.1002\/cpe.8084","DOI":"10.1002\/cpe.8084"},{"issue":"5","key":"2056_CR23","doi-asserted-by":"publisher","first-page":"4752","DOI":"10.1109\/TMC.2023.3297854","volume":"23","author":"S Tu","year":"2024","unstructured":"Tu S, Badshah A, Alasmary H, Waqas M (2024) Eake-wc: Efficient and anonymous authenticated key exchange scheme for wearable computing. IEEE Trans Mob Comput 23(5):4752\u20134763. https:\/\/doi.org\/10.1109\/TMC.2023.3297854","journal-title":"IEEE Trans Mob Comput"},{"key":"2056_CR24","doi-asserted-by":"publisher","unstructured":"Wang W, Niyato D, Xiong Z, Yin Z (2025) Authfi: Cross-technology device authentication via commodity wifi. IEEE Trans Mob Comput 1\u201315. https:\/\/doi.org\/10.1109\/TMC.2025.3547010","DOI":"10.1109\/TMC.2025.3547010"},{"key":"2056_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102004","volume":"102","author":"SA Rieyan","year":"2024","unstructured":"Rieyan SA, News MRK, Rahman ABMM, Khan SA, Zaarif STJ, Alam MGR, Hassan MM, Ianni M, Fortino G (2024) An advanced data fabric architecture leveraging homomorphic encryption and federated learning. Inf Fusion 102:102004. https:\/\/doi.org\/10.1016\/j.inffus.2023.102004","journal-title":"Inf Fusion"},{"key":"2056_CR26","doi-asserted-by":"publisher","unstructured":"Wang B, Li H, Guo Y, Wang J () Ppflhe: A privacy-preserving federated learning scheme with homomorphic encryption for healthcare data. Appl Soft Comput 146:110677. https:\/\/doi.org\/10.1016\/j.asoc.2023.110677","DOI":"10.1016\/j.asoc.2023.110677"},{"issue":"3","key":"2056_CR27","doi-asserted-by":"publisher","first-page":"4289","DOI":"10.1109\/JIOT.2023.3302065","volume":"11","author":"NM Hijazi","year":"2024","unstructured":"Hijazi NM, Aloqaily M, Guizani M, Ouni B, Karray F (2024) Secure federated learning with fully homomorphic encryption for iot communications. IEEE Internet Things J 11(3):4289\u20134300. https:\/\/doi.org\/10.1109\/JIOT.2023.3302065","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"2056_CR28","doi-asserted-by":"publisher","first-page":"3430","DOI":"10.1109\/JIOT.2023.3296637","volume":"11","author":"X Shen","year":"2024","unstructured":"Shen X, Luo X, Yuan F, Wang B, Chen Y, Tang D, Gao L (2024) Verifiable privacy-preserving federated learning under multiple encrypted keys. IEEE Internet Things J 11(2):3430\u20133445. https:\/\/doi.org\/10.1109\/JIOT.2023.3296637","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"2056_CR29","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654. https:\/\/doi.org\/10.1109\/TIT.1976.1055638","journal-title":"IEEE Trans Inf Theory"},{"key":"2056_CR30","doi-asserted-by":"crossref","unstructured":"Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: International conference on the theory and applications of cryptographic techniques, Springer, pp 127\u2013144","DOI":"10.1007\/BFb0054122"},{"issue":"1","key":"2056_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur (TISSEC) 9(1):1\u201330","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"2056_CR32","doi-asserted-by":"publisher","unstructured":"Shafagh H, Hithnawi A, Burkhalter L, Fischli P, Duquennoy S (2017) Secure sharing of partially homomorphic encrypted iot data. In: Proceedings of the 15th ACM conference on embedded network sensor systems. SenSys \u201917, Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3131672.3131697","DOI":"10.1145\/3131672.3131697"},{"key":"2056_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119830","volume":"654","author":"Y Li","year":"2024","unstructured":"Li Y, Lai J, Zhang R, Sun M (2024) Secure and efficient multi-key aggregation for federated learning. Inf Sci 654:119830. https:\/\/doi.org\/10.1016\/j.ins.2023.119830","journal-title":"Inf Sci"},{"issue":"12","key":"2056_CR34","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2013.2288131","volume":"8","author":"A Peter","year":"2013","unstructured":"Peter A, Tews E, Katzenbeisser S (2013) Efficiently outsourcing multiparty computation under multiple keys. Trans Info For Sec 8(12):2046\u20132058. https:\/\/doi.org\/10.1109\/TIFS.2013.2288131","journal-title":"Trans Info For Sec"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02056-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02056-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02056-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:37Z","timestamp":1758986557000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02056-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2056"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02056-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,7]]},"assertion":[{"value":"14 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials availability"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"228"}}