{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T05:12:39Z","timestamp":1771477959082,"version":"3.50.1"},"reference-count":38,"publisher":"Oxford University Press (OUP)","issue":"2","license":[{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/pages\/standard-publication-reuse-rights"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,2,15]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>With the widespread adoption of smart devices, vast amounts of multidimensional data are continuously generated across various sectors. Integrating and evaluating this data can provide strong support for decision-making. However, existing aggregation schemes face several challenges when handling multidimensional data tasks from multiple requesters, including single points of failure, privacy leakage, lack of result validation, and inefficiency. This paper mitigates the challenges by integrating packed secret sharing, Kate, Zaverucha and Goldberg (KZG) commitments and the Chinese Remainder Theorem to design a data aggregation scheme. For the first time, we achieve both multi-task and multi-dimensional data aggregation within a single data transmission, ensuring data integrity and privacy, while keeping the overhead minimal. Users can provide data for only certain dimensions, thereby safeguarding personal data privacy while emphasizing the user-centric approach to data control. By incorporating multiple fog nodes (FN) and blockchain, the data aggregation scheme is implemented in a decentralized manner. Both data users and FNs are accountable, ensuring the data authenticity and the correctness of the aggregation process. Moreover, it is fault-tolerant, making the system robust. Rigorous security analysis and extensive experimental evaluations demonstrate that the proposed approach excels in computational efficiency.<\/jats:p>","DOI":"10.1093\/comjnl\/bxaf111","type":"journal-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T11:47:42Z","timestamp":1756813662000},"page":"236-246","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-preserving and verifiable aggregation for multi-task and multi-dimensional data"],"prefix":"10.1093","volume":"69","author":[{"given":"Hang","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Cyberspace Security (School of Cryptology) , Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228,","place":["China"]}]},{"given":"Liang","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security (School of Cryptology) , Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228,","place":["China"]},{"name":"Department of Industrial Engineering and Decision Analytics , Hong Kong University of Science and Technology, Clear Water Bay, Kowloon,","place":["Hong Kong"]}]},{"given":"Xingyu","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security (School of Cryptology) , Hainan University, No. 58, Renmin Avenue, Haikou, Hainan 570228,","place":["China"]}]},{"given":"Jiheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering and Decision Analytics , Hong Kong University of Science and Technology, Clear Water Bay, Kowloon,","place":["Hong Kong"]}]}],"member":"286","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"2026021823461717200_ref1","doi-asserted-by":"crossref","first-page":"25520","DOI":"10.1109\/JIOT.2024.3356593","article-title":"PFDAM: rivacy-preserving fine-grained data aggregation scheme supporting multi-functionality in smart grid","volume":"11","author":"Zhang","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"2026021823461717200_ref2","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.3390\/electronics10091012","article-title":"Machine learning in wireless sensor networks for smart cities: a survey","volume":"10","author":"Sharma","year":"2021","journal-title":"Electronics"},{"key":"2026021823461717200_ref3","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/TIFS.2022.3140657","article-title":"Privacy-preserving aggregation-authentication scheme for safety warning system in fog-cloud based VANET","volume":"17","author":"Yang","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2026021823461717200_ref4","doi-asserted-by":"publisher","first-page":"11999","DOI":"10.1109\/TKDE.2021.3130595","article-title":"Abnormal samples oversampling for anomaly detection based on uniform scale strategy and closed area","volume":"35","author":"Shangguan","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2026021823461717200_ref5","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1109\/COMST.2023.3305312","article-title":"Blockchain intelligence for internet of vehicles: challenges and solutions","volume":"25","author":"Wang","year":"2023","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2026021823461717200_ref6","first-page":"418","article-title":"Efficient approximate range aggregation over large-scale spatial data federation","volume":"35","author":"Shi","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2026021823461717200_ref7","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00521-023-08270-0","article-title":"FC-SEEDA: fog computing-based secure and energy efficient data aggregation scheme for internet of healthcare things","volume":"36","author":"Chakraborty","year":"2024","journal-title":"Neural Comput Appl"},{"key":"2026021823461717200_ref8","doi-asserted-by":"publisher","first-page":"10474","DOI":"10.1109\/JIOT.2021.3062630","article-title":"Internet of things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities","volume":"8","author":"Bhuiyan","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"2026021823461717200_ref9","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1109\/TDSC.2023.3252593","article-title":"A robust and lightweight privacy-preserving data aggregation scheme for smart grid","volume":"21","author":"Wu","year":"2024","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2026021823461717200_ref10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/3441558","article-title":"Enabling renewable energy through smarter grids","volume":"64","author":"Oakes","year":"2021","journal-title":"Commun ACM"},{"key":"2026021823461717200_ref11","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TIFS.2017.2656475","article-title":"Efficient privacy-preserving cube-data aggregation scheme for smart grids","volume":"12","author":"Shen","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2026021823461717200_ref12","doi-asserted-by":"publisher","first-page":"3569","DOI":"10.1109\/TIFS.2022.3207905","article-title":"Enabling efficient and strong privacy-preserving truth discovery in mobile crowdsensing","volume":"17","author":"Zhang","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2026021823461717200_ref13","doi-asserted-by":"publisher","first-page":"164","DOI":"10.3390\/computers13070164","article-title":"Integrity and privacy assurance framework for remote healthcare monitoring based on IoT","volume":"13","author":"Alharbi","year":"2024","journal-title":"Computers"},{"key":"2026021823461717200_ref14","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1109\/TNSE.2019.2892583","article-title":"Privacy-aware task allocation and data aggregation in fog-assisted spatial crowdsourcing","volume":"7","author":"Wu","year":"2019","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2026021823461717200_ref15","doi-asserted-by":"publisher","first-page":"4151","DOI":"10.1109\/TKDE.2021.3126577","article-title":"Private and utility enhanced recommendations with local differential privacy and gaussian mixture model","volume":"35","author":"Neera","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2026021823461717200_ref16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2018.2817229","article-title":"BEATS: blocks of eigenvalues algorithm for time series segmentation","volume":"30","author":"Gonzalez-Vidal","year":"2018","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2026021823461717200_ref17","doi-asserted-by":"publisher","first-page":"4755","DOI":"10.1109\/JIOT.2018.2874473","article-title":"Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"2026021823461717200_ref18","doi-asserted-by":"publisher","first-page":"6132","DOI":"10.1109\/JIOT.2019.2957314","article-title":"FESDA: fog-enabled secure data aggregation in smart grid IoT network","volume":"7","author":"Saleem","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"2026021823461717200_ref19","doi-asserted-by":"publisher","first-page":"4889","DOI":"10.1109\/TITS.2020.2983466","article-title":"Achieving privacy-preserving and verifiable data sharing in vehicular fog with blockchain","volume":"22","author":"Kong","year":"2021","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2026021823461717200_ref20","doi-asserted-by":"publisher","first-page":"2145","DOI":"10.1109\/TDSC.2023.3300749","article-title":"Smart contract assisted privacy-preserving data aggregation and management scheme for smart grid","volume":"21","author":"Hu","year":"2024","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2026021823461717200_ref21","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TII.2017.2721542","article-title":"PPMA: privacy-preserving multisubset data aggregation in smart grid","volume":"14","author":"Li","year":"2018","journal-title":"IEEE Trans Industr Inform"},{"key":"2026021823461717200_ref22","doi-asserted-by":"publisher","first-page":"4225","DOI":"10.1109\/TDSC.2021.3124546","article-title":"Enabling verifiable privacy-preserving multi-type data aggregation in smart grids","volume":"19","author":"Zhang","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2026021823461717200_ref23","doi-asserted-by":"crossref","first-page":"10363","DOI":"10.1109\/JIOT.2019.2938776","article-title":"MDMS: efficient and privacy-preserving multidimension and multisubset data collection for AMI networks","volume":"6","author":"Alsharif","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"2026021823461717200_ref24","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TSG.2019.2920836","article-title":"Enabling efficient and privacy-preserving aggregation communication and function query for fog computing-based smart grid","volume":"11","author":"Liu","year":"2020","journal-title":"IEEE Trans Smart Grid"},{"key":"2026021823461717200_ref25","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1109\/TDSC.2023.3277831","article-title":"Fog-enabled privacy-preserving multi-task data aggregation for mobile crowdsensing","volume":"21","author":"Yan","year":"2023","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2026021823461717200_ref26","doi-asserted-by":"publisher","first-page":"6143","DOI":"10.1109\/JIOT.2020.3040982","article-title":"An efficient and secure multidimensional data aggregation for fog-computing-based smart grid","volume":"8","author":"Merad-Boudia","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"2026021823461717200_ref27","first-page":"403","article-title":"TaskMe: Multi-task allocation in mobile crowd sensing","volume-title":"Proceedings of UbiComp 2016, Heidelberg, Germany, 12\u201316 September","author":"Liu","year":"2016"},{"key":"2026021823461717200_ref28","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1109\/TMC.2018.2793908","article-title":"Multi-task allocation in mobile crowd sensing with individual task quality assurance","volume":"17","author":"Wang","year":"2018","journal-title":"IEEE Trans Mob Comput"},{"key":"2026021823461717200_ref29","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TMC.2018.2827375","article-title":"Heterogeneous multi-task assignment in mobile crowdsensing using spatiotemporal correlation","volume":"18","author":"Wang","year":"2019","journal-title":"IEEE Trans Mob Comput"},{"key":"2026021823461717200_ref30","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1504\/IJCNDS.2020.107462","article-title":"New multi-secret sharing scheme based on superincreasing sequence for level-ordered access structure","volume":"24","author":"Basit","year":"2020","journal-title":"Int J Commun Networks Distrib Syst"},{"key":"2026021823461717200_ref31","doi-asserted-by":"publisher","first-page":"4257","DOI":"10.1109\/JSYST.2023.3262321","article-title":"A privacy-preserving data aggregation scheme based on Chinese remainder theorem in mobile crowdsensing system","volume":"17","author":"Zhu","year":"2023","journal-title":"IEEE Syst J"},{"key":"2026021823461717200_ref32","first-page":"699","article-title":"Communication complexity of secure computation","volume-title":"Proceedings of STOC 1992, Victoria, British Columbia, Canada, 3\u20135 may","author":"Franklin","year":"1992"},{"key":"2026021823461717200_ref33","first-page":"177","article-title":"Constant-size commitments to polynomials and their applications","volume-title":"Proceedings of ASIACRYPT 2010, Singapore, 5\u20139 December","author":"Kate","year":"2010"},{"key":"2026021823461717200_ref34","first-page":"417","volume-title":"Proceedings of ACISP 2001, Sydney, Australia,","author":"Stinson","year":"2001"},{"key":"2026021823461717200_ref35","first-page":"311","article-title":"ALBATROSS: Publicly attestable batched randomness based on secret sharing","volume-title":"Proceedings of ASIACRYPT 2020, Daejeon, South Korea, 7\u201311 December","author":"Cascudo","year":"2020"},{"key":"2026021823461717200_ref36","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1090\/S0025-5718-1995-1297477-5","article-title":"On multivariate Lagrange interpolation","volume":"64","author":"Sauer","year":"1995","journal-title":"Math Comput"},{"key":"2026021823461717200_ref37","first-page":"105","article-title":"Powers-of-tau to the people: Decentralizing setup ceremonies","volume-title":"Proceedings of ACNS 2024, Abu Dhabi, UAE, 5\u20138 February","author":"Nikolaenko","year":"2024"},{"key":"2026021823461717200_ref38","article-title":"Powers of tau in asynchrony","author":"Das","year":"2022, 1356","journal-title":"Cryptology ePrint Archive"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/69\/2\/236\/64380636\/bxaf111.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/69\/2\/236\/64380636\/bxaf111.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:46:27Z","timestamp":1771476387000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/69\/2\/236\/8263586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,25]]},"references-count":38,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,9,25]]},"published-print":{"date-parts":[[2026,2,15]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxaf111","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2026,2]]},"published":{"date-parts":[[2025,9,25]]}}}