{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:56:32Z","timestamp":1775627792613,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Gottfried Wilhelm Leibniz-Preis of German Science Foundation (DFG) in 2021"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62401266"],"award-info":[{"award-number":["62401266"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangxi Natural Science Foundation","award":["2025GXNSFBA069315"],"award-info":[{"award-number":["2025GXNSFBA069315"]}]},{"DOI":"10.13039\/501100004608","name":"Jiangsu Natural Science Foundation","doi-asserted-by":"crossref","award":["BK20241452"],"award-info":[{"award-number":["BK20241452"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"name":"European Research Council (ERC) through the ERC Starting","award":["101220383"],"award-info":[{"award-number":["101220383"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62571206"],"award-info":[{"award-number":["62571206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Wuhan Chen Guang Program","doi-asserted-by":"publisher","award":["2024040801020211"],"award-info":[{"award-number":["2024040801020211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Commun."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/jsac.2026.3678509","type":"journal-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T19:50:27Z","timestamp":1774641027000},"page":"4414-4428","source":"Crossref","is-referenced-by-count":0,"title":["Information-Theoretic Decentralized Secure Aggregation With Passive Collusion Resilience"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6341-7730","authenticated-orcid":false,"given":"Xiang","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Technical University of Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4070-3985","authenticated-orcid":false,"given":"Zhou","family":"Li","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Multimedia Communications and Network Technology, Guangxi University, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9503-4865","authenticated-orcid":false,"given":"Shuangyang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Technical University of Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4671-3287","authenticated-orcid":false,"given":"Kai","family":"Wan","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6400-712X","authenticated-orcid":false,"given":"Derrick Wing Kwan","family":"Ng","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7749-1333","authenticated-orcid":false,"given":"Giuseppe","family":"Caire","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Technical University of Berlin, Berlin, Germany"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Information-theoretic secure aggregation in decentralized networks","author":"Zhang","year":"2026","journal-title":"arXiv:2601.17970"},{"key":"ref2","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref3","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Konecny","year":"2016","journal-title":"arXiv:1610.05492"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref5","article-title":"Applied federated learning: Improving Google keyboard query suggestions","author":"Yang","year":"2018","journal-title":"arXiv:1812.02903"},{"key":"ref6","first-page":"5132","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","volume":"119","author":"Karimireddy"},{"key":"ref7","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref8","article-title":"On the convergence of Adam and beyond","author":"Reddi","year":"2019","journal-title":"arXiv:1904.09237"},{"key":"ref9","article-title":"On the convergence of FedAvg on non-IID data","author":"Li","year":"2019","journal-title":"arXiv:1907.02189"},{"key":"ref10","first-page":"4541","article-title":"COLA: Decentralized linear learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"He"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3315746"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3083263"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000200"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3075203"},{"key":"ref15","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Geiping"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IACIS61494.2024.10722002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref19","article-title":"Practical secure aggregation for federated learning on user-held data","author":"Bonawitz","year":"2016","journal-title":"arXiv:1611.04482"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3192874"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991416"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3342095"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3163592"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3242702"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-9765-7.ch006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3342571"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref31","first-page":"694","article-title":"Lightsecagg: A lightweight and versatile design for secure aggregation in federated learning","volume":"4","author":"So","year":"2022","journal-title":"Proc. Mach. Learn. Syst."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834750"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2024.3422087"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2024.3393740"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2025.3541551"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206914"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206930"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2025.3569675"},{"key":"ref39","article-title":"Hierarchical secure aggregation with heterogeneous security constraints and arbitrary user collusion","author":"Li","year":"2025","journal-title":"arXiv:2507.14768"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2026.3659032"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT63088.2025.11195564"},{"key":"ref42","article-title":"Optimal communication and key rate region for hierarchical secure aggregation with user collusion","author":"Zhang","year":"2024","journal-title":"arXiv:2410.14035"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ITW61385.2024.10806947"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2025.3606645"},{"key":"ref45","article-title":"Capacity of hierarchical secure coded gradient aggregation with straggling communication links","author":"Lu","year":"2024","journal-title":"arXiv:2412.11496"},{"key":"ref46","article-title":"Fundamental limits of hierarchical secure aggregation with cyclic user association","author":"Zhang","year":"2025","journal-title":"arXiv:2503.04564"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8902577"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050064"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2015.7227127"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2756959"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/49\/11372474\/11456969.pdf?arnumber=11456969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:15:59Z","timestamp":1775625359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11456969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/jsac.2026.3678509","relation":{},"ISSN":["1558-0008","0733-8716"],"issn-type":[{"value":"1558-0008","type":"electronic"},{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]}}}