{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T20:05:50Z","timestamp":1775765150046,"version":"3.50.1"},"reference-count":71,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179434","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"477-496","source":"Crossref","is-referenced-by-count":61,"title":["Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning"],"prefix":"10.1109","author":[{"given":"Yiping","family":"Ma","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Jess","family":"Woods","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Sebastian","family":"Angel","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Antigoni","family":"Polychroniadou","sequence":"additional","affiliation":[{"name":"J.P. Morgan AI Research &#x0026; AlgoCRYPT CoE"}]},{"given":"Tal","family":"Rabin","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Cloudflare randomness beacon"},{"key":"ref2","article-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","volume-title":"Technical report","author":"Abadi","year":"2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14791-3_23"},{"key":"ref4","article-title":"Aggregate measurement via oblivious shuffling","volume-title":"Cryptology ePrint Archive, Paper 2021\/1490","author":"Anderson"},{"key":"ref5","article-title":"Efficient representation of numerical optimization problems for SNARKs","volume-title":"Proceedings of the USENIX Security Symposium","author":"Angel"},{"key":"ref6","article-title":"How to backdoor federated learning","volume-title":"Proceedings of the Artificial Intelligence and Statistics Conference (AISTATS)","author":"Bagdasaryan"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_22"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref9","article-title":"Acorn: Input validation for secure aggregation","volume-title":"Cryptology ePrint Archive, Paper 2022\/1461","author":"Bell"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00048"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_13"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1145\/3384441.3395986","volume-title":"ABIDES: Agent-based interactive discrete event simulation environment","author":"Byrd","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3384441.3395986"},{"key":"ref15","volume-title":"Leaf: A benchmark for federated settings","author":"Caldas"},{"key":"ref16","volume-title":"Leaf: A benchmark for federated settings","author":"Caldas","year":"2018"},{"key":"ref17","article-title":"Linearly homomorphic encryption from ddh","volume-title":"Cryptology ePrint Archive, Paper 2015\/047","author":"Castagnos"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363202"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560611"},{"key":"ref22","article-title":"Prio: Private, robust, and scalable computation of aggregate statistics","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Corrigan-Gibbs"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833580"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3560830.3563729"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57220-1_47"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660280"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0030"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"ref29","article-title":"Threshold rsa for dynamic and adhoc groups","volume-title":"Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)","author":"Gennaro"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84245-1_3"},{"key":"ref32","article-title":"MicroFedML: Privacy preserving federated learning for small weights","volume-title":"Cryptology ePrint Archive, Paper 2022\/714","author":"Guo"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03810-6_10"},{"key":"ref35","volume-title":"Hashing to elliptic curves","author":"Hern\u00e1ndez","year":"2021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_27"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00088"},{"key":"ref38","article-title":"FastSecAgg: Scalable secure aggregation for privacy-preserving federated learning","volume-title":"ICML Workshop on Federated Learning for User Privacy and Data Confidentiality","author":"Kadhe"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423364"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363203"},{"key":"ref42","article-title":"Learning multiple layers of features from tiny images","volume-title":"Technical report","author":"Krizhevsky","year":"2009"},{"key":"ref43","volume-title":"The CIFAR-100 dataset","author":"Krizhevsky"},{"key":"ref44","article-title":"Oort: Efficient federated learning via guided participant selection","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Lai"},{"key":"ref45","article-title":"Aardvark: An asynchronous authenticated dictionary with short proofs","volume-title":"Proceedings of the USENIX Security Symposium","author":"Leung"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.1109\/SP46215.2023.10179434","article-title":"Flamingo: Multi-round single-server secure aggregation with applications to private federated learning","volume-title":"Cryptology ePrint Archive, Paper 2023\/486","author":"Ma"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0009"},{"key":"ref48","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proceedings of the Artificial Intelligence and Statistics Conference (AISTATS)","author":"McMahan"},{"key":"ref49","article-title":"CONIKS: bringing key transparency to end users","volume-title":"Proceedings of the USENIX Security Symposium","author":"Melara"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23175"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_47"},{"key":"ref52","article-title":"VPriv: Protecting privacy in location-based vehicular services","volume-title":"Proceedings of the USENIX Security Symposium","author":"Popa"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046781"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483585"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359660"},{"key":"ref56","article-title":"Orchard: Differentially private analytics at scale","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Roth"},{"key":"ref57","article-title":"Privacy-preserving aggregation of time-series data","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Shi"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0020-9"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"ref60","article-title":"LightSecAgg: a lightweight and versatile design for secure aggregation in federated learning","volume-title":"Proceedings of Machine Learning and Systems","author":"So"},{"key":"ref61","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","volume-title":"Proceedings of the USENIX Security Symposium","author":"Stevens"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345652"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560605"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23143"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i4.154-179"},{"key":"ref67","volume-title":"Eavesdrop the composition proportion of training labels in federated learning","author":"Wang","year":"2023"},{"key":"ref68","article-title":"Federated accelerated stochastic gradient descent","author":"Yuan","year":"2020","journal-title":"Neural Information Processing Systems (NeurIPS)"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560651"},{"key":"ref70","article-title":"Addax: A fast, private, and accountable ad exchange infrastructure","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Zhong"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179434.pdf?arnumber=10179434","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,21]],"date-time":"2024-07-21T04:00:06Z","timestamp":1721534406000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179434\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179434","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}