{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:07:01Z","timestamp":1777338421496,"version":"3.51.4"},"reference-count":122,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T00:00:00Z","timestamp":1721001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"China, NSFC","award":["U2001207"],"award-info":[{"award-number":["U2001207"]}]},{"name":"Guangdong Provincial Key Lab of Integrated Communication, Sensing and Computation for Ubiquitous Internet of Things","award":["2023B1212010007"],"award-info":[{"award-number":["2023B1212010007"]}]},{"name":"Project of DEGP","award":["2023KCXTD042"],"award-info":[{"award-number":["2023KCXTD042"]}]},{"name":"Zhejiang Lab Open Research Project","award":["K2022PDOAB01"],"award-info":[{"award-number":["K2022PDOAB01"]}]},{"DOI":"10.13039\/501100012243","name":"Foundation for Distinguished Young Talents in Higher Education of Guangdong","doi-asserted-by":"publisher","award":["2022KQNCX084"],"award-info":[{"award-number":["2022KQNCX084"]}],"id":[{"id":"10.13039\/501100012243","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fund which aims to improve scientific research capability of key construction disciplines in Guangdong province \u201cLight-Weight Federal Learning Paradigm and Its Application\u201d","award":["2022ZDJS058"],"award-info":[{"award-number":["2022ZDJS058"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,7,15]]},"DOI":"10.1109\/jiot.2024.3382875","type":"journal-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T17:44:34Z","timestamp":1720460674000},"page":"24569-24580","source":"Crossref","is-referenced-by-count":145,"title":["Efficiency Optimization Techniques in Privacy-Preserving Federated Learning With Homomorphic Encryption: A Brief Survey"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5500-0249","authenticated-orcid":false,"given":"Qipeng","family":"Xie","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]},{"given":"Siyang","family":"Jiang","sequence":"additional","affiliation":[{"name":"Zhejiang Laboratory, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8501-9488","authenticated-orcid":false,"given":"Linshan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Institute of Data Science, National University Singapore, 3 Research Link, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3728-3502","authenticated-orcid":false,"given":"Yongzhi","family":"Huang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]},{"given":"Zhihe","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1470-0529","authenticated-orcid":false,"given":"Salabat","family":"Khan","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Qilu Institute of Technology, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5192-1649","authenticated-orcid":false,"given":"Wangchen","family":"Dai","sequence":"additional","affiliation":[{"name":"Zhejiang Laboratory, Hangzhou, China"}]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang Laboratory, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2216-0737","authenticated-orcid":false,"given":"Kaishun","family":"Wu","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25899"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.10.007"},{"issue":"4","key":"ref3","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1109\/TSUSC.2023.3279111","article-title":"Blockchain-based personalized federated learning for Internet of Medical Things","volume":"8","author":"Lian","year":"2023","journal-title":"IEEE Trans. Sustain. Comput."},{"issue":"4","key":"ref4","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1109\/TCSS.2022.3216802","article-title":"Blockchain-based two-stage federated learning with non-IID data in IoMT system","volume":"10","author":"Lian","year":"2023","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453520"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3275199"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN54338.2022.00029"},{"key":"ref8","article-title":"Model-heterogeneous federated learning for Internet of Things: Enabling technologies and future directions","author":"Fan","year":"2023","journal-title":"arXiv:2312.12091"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05933-9_1"},{"key":"ref10","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref11","first-page":"1","article-title":"FedBE: Making Bayesian model ensemble applicable to federated learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Chen"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2897554"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref15","article-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020","journal-title":"arXiv:2001.02610"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref17","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Geiping"},{"key":"ref18","article-title":"A novel attribute reconstruction attack in federated learning","author":"Lyu","year":"2021","journal-title":"arXiv:2108.06910"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref20","first-page":"694","article-title":"Lightsecagg: A lightweight and versatile design for secure aggregation in federated learning","volume-title":"Proc. Mach. Learn. Syst.","author":"So"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref22","first-page":"1","article-title":"COFEL: Communication-efficient and optimized federated learning with local differential privacy","volume-title":"Proc. IEEE Int. Conf. Commun. (ICC)","author":"Lian"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20901-7_2"},{"issue":"5","key":"ref25","doi-asserted-by":"crossref","first-page":"3047","DOI":"10.1109\/TNSE.2022.3153519","article-title":"EPPDA: An efficient privacy-preserving data aggregation federated learning scheme","volume":"10","author":"Song","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796833"},{"key":"ref27","first-page":"1","article-title":"Evaluating differentially private machine learning in practice","volume-title":"Proc. USENIX Secur. Symp.","author":"Jayaraman"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref31","article-title":"Solving small exponential ECDLP in EC-based additively homomorphic encryption and applications","author":"Tang","year":"2022"},{"key":"ref32","article-title":"XNET: A real-time unified secure inference framework using homomorphic encryption","author":"Yang","year":"2023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358926"},{"key":"ref35","article-title":"NVIDIA FLARE: Federated learning from simulation to real-world","author":"Roth","year":"2022","journal-title":"arXiv:2210.13291"},{"key":"ref36","volume-title":"FATE framework from webank","year":"2019"},{"key":"ref37","article-title":"IBM federated learning: An enterprise framework white paper V 0.1","author":"Ludwig","year":"2020","journal-title":"arXiv:2007.10987"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1117\/12.2606256"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.107861"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3216981"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3460427"},{"key":"ref42","article-title":"Vertical federated learning","author":"Liu","year":"2022","journal-title":"arXiv:2211.12814"},{"key":"ref43","article-title":"A survey on vertical federated learning: From a layered perspective","author":"Yang","year":"2023","journal-title":"arXiv:2304.01829"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2022.3190835"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3177222"},{"key":"ref47","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Secur. Symp. (USENIX Secur.)","author":"Juvekar"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.7744"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3412357"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref56","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/int.22818"},{"key":"ref61","article-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption","author":"Hardy","year":"2017","journal-title":"arXiv:1711.10677"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2021.3082561"},{"key":"ref63","first-page":"493","article-title":"BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Zhang"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1561\/9781680835090"},{"key":"ref66","article-title":"SecureBoost+: A high performance gradient boosting tree framework for large scale vertical federated learning","author":"Chen","year":"2021","journal-title":"arXiv:2110.10927"},{"key":"ref67","article-title":"Efficient batch homomorphic encryption for vertically federated XGBoost","author":"Xu","year":"2021","journal-title":"arXiv:2112.04261"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3323358"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101824"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.5555\/3294771.3294915"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"ref72","first-page":"1","article-title":"Binarized neural networks","volume-title":"Proc. 30th Conf. Neural Inf. Process. Syst.","author":"Hubara"},{"key":"ref73","first-page":"4490","article-title":"TAPAS: Tricks to accelerate (encrypted) prediction as a service","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sanyal"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17277-0_9"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148628"},{"key":"ref76","first-page":"563","article-title":"Vf2boost: Very fast vertical federated gradient boosting for cross-enterprise learning","volume-title":"Proc. Int. Conf. Manag. Data","author":"Fu"},{"key":"ref77","article-title":"ESAFL: Efficient secure additively homomorphic encryption for cross-silo federated learning","author":"Wu","year":"2023","journal-title":"arXiv:2305.08599"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV50220.2020.9305383"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401521"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00044"},{"key":"ref81","article-title":"Accelerating vertical federated learning","author":"Cai","year":"2022","journal-title":"arXiv:2207.11456"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.3390\/a15080273"},{"key":"ref83","article-title":"Layer-wise characterization of latent information leakage in federated learning","author":"Mo","year":"2020","journal-title":"arXiv:2010.08762"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00978"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1587\/transinf.2021BCP0006","article-title":"Layer-based communication-efficient federated learning with privacy preservation","volume":"105","author":"Lian","year":"2022","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref86","article-title":"FedML-HE: An efficient homomorphic-encryption-based privacy-preserving federated learning system","author":"Jin","year":"2023","journal-title":"arXiv:2303.10837"},{"key":"ref87","article-title":"A communication efficient collaborative learning framework for distributed features","author":"Liu","year":"2019","journal-title":"arXiv:1912.11187"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-01017-x"},{"key":"ref89","article-title":"Additively homomorphical encryption based deep neural network for asymmetrically collaborative machine learning","author":"Zhang","year":"2020","journal-title":"arXiv:2007.06849"},{"key":"ref90","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"},{"key":"ref91","article-title":"A quasi-Newton method based vertical federated learning framework for logistic regression","author":"Yang","year":"2019","journal-title":"arXiv:1912.00513"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.05.010"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-021-3415-1"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761267"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2427113"},{"key":"ref96","first-page":"1","article-title":"Towards end-to-end secure and efficient federated learning for XGBoost","volume-title":"Proc. AAAI","author":"Jin"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0030"},{"key":"ref98","article-title":"Poseidon: Privacy-preserving federated neural network learning","author":"Sav","year":"2020","journal-title":"arXiv:2009.00349"},{"key":"ref99","article-title":"HAFLO: GPU-based acceleration for federated logistic regression","author":"Cheng","year":"2021","journal-title":"arXiv:2107.13797"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3227874"},{"key":"ref101","article-title":"FPGA-based hardware accelerator of homomorphic encryption for efficient federated learning","author":"Yang","year":"2020","journal-title":"arXiv:2007.10560"},{"key":"ref102","first-page":"1057","article-title":"{FLASH}: Towards a high-performance hardware acceleration architecture for cross-silo federated learning","volume-title":"Proc. 20th USENIX Symp. Netw. Syst. Des. Implement. (NSDI)","author":"Zhang"},{"key":"ref103","volume-title":"Accelerating Secure Computing for Federated Learning","year":"2021"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2925496"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3501812"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407811"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467210"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3206785"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT52863.2021.9609814"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT56656.2022.9974402"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/2684746.2689060"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"ref114","article-title":"SoK: Fully homomorphic encryption accelerators","author":"Zhang","year":"2022","journal-title":"arXiv:2212.01713"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.8805"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-018-0401-7"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568050"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486926"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00017"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3233024"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169918"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3625687.3625789"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10589449\/10589503.pdf?arnumber=10589503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:57:07Z","timestamp":1725605827000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10589503\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,15]]},"references-count":122,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3382875","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,15]]}}}