{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T06:27:05Z","timestamp":1778308025010,"version":"3.51.4"},"reference-count":91,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Strategic Focal Area Personalized Health and Related Technologies (PHRT) of the ETH Domain","award":["2017-201"],"award-info":[{"award-number":["2017-201"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/tifs.2020.2976612","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T20:43:58Z","timestamp":1583181838000},"page":"3035-3050","source":"Crossref","is-referenced-by-count":51,"title":["Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5012-7486","authenticated-orcid":false,"given":"David","family":"Froelicher","sequence":"first","affiliation":[]},{"given":"Juan Ramon","family":"Troncoso-Pastoriza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7145-3539","authenticated-orcid":false,"given":"Joao Sa","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_6"},{"key":"ref72","article-title":"Scalable anonymous group communication in the anytrust model","author":"wolinsky","year":"2012","journal-title":"Proceedings of European Workshop on System Security (EUROSEC"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_11"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_17"},{"key":"ref76","year":"2019","journal-title":"OAuth 2 0"},{"key":"ref77","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","author":"kogias","year":"2016","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"ref39","first-page":"289","article-title":"Privacy-preserving logistic regression","author":"chaudhuri","year":"2009","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref75","year":"2019","journal-title":"OpenID Connect"},{"key":"ref38","article-title":"Differentially private federated learning: A client level perspective","author":"geyer","year":"2017","journal-title":"arXiv 1712 07557"},{"key":"ref78","year":"2017","journal-title":"The Go Programming Language"},{"key":"ref79","year":"2018","journal-title":"Drynx Implementation"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857731"},{"key":"ref32","first-page":"1651","article-title":"Gazelle: A low latency framework for secure neural network inference","author":"juvekar","year":"2018","journal-title":"Proc 7th USENIX Secur Symp (USENIX Secur )"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_10"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00045"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2809624"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref60","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref62","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"Proc OSDI"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocx068"},{"key":"ref63","article-title":"HotStuff: BFT consensus in the lens of blockchain","author":"yin","year":"2018","journal-title":"arXiv 1803 05069"},{"key":"ref28","first-page":"587","article-title":"Big data analytics over encrypted datasets with seabed","author":"papadimitriou","year":"2016","journal-title":"Proc OSDI"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/978-1-4419-5906-5_752","article-title":"Differential privacy","author":"dwork","year":"2011","journal-title":"Proc Encyclopedia Cryptogr Secur"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"ref65","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proc Theory Cryptogr Conf"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1137\/09076828X"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2818651"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"ref69","first-page":"1","article-title":"Verifiable mixing (shuffling) of ElGamal pairs","author":"neff","year":"2003","journal-title":"Proc VHTi Tech Document"},{"key":"ref2","year":"2018","journal-title":"GDPR"},{"key":"ref1","year":"2018","journal-title":"Big Data Privacy is a Bigger Issue Than You Think"},{"key":"ref20","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","author":"ohrimenko","year":"2016","journal-title":"Proc Usenix Secur Symp"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0019"},{"key":"ref24","first-page":"1310","article-title":"Privacy-preserving deep learning","author":"shokri","year":"2015","journal-title":"Proceedings of the 22nd ACM SIGSAC CCS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0053"},{"key":"ref26","first-page":"259","article-title":"Prio: Private, robust, and computation of aggregate statistics","author":"corrigan-gibbs","year":"2017","journal-title":"Proc NSDI"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833050"},{"key":"ref50","year":"2018","journal-title":"SPHN"},{"key":"ref51","year":"2019","journal-title":"HealthLNK"},{"key":"ref91","year":"2018","journal-title":"Prio Implementation"},{"key":"ref90","year":"2018","journal-title":"Low Birth Weight Dataset"},{"key":"ref59","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref58","first-page":"1","article-title":"Managing Identities using Blockchains and CoSi","author":"kokoris-kogias","year":"2016","journal-title":"Proc HotPETS"},{"key":"ref57","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","author":"fiat","year":"1986","journal-title":"Proc Adv Cryptol (CRYPTO)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_15"},{"key":"ref55","article-title":"Proof systems for general statements about discrete logarithms","volume":"260","author":"camenisch","year":"1997"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref53","year":"2019","journal-title":"P4MI"},{"key":"ref52","year":"2019","journal-title":"Apple Watch Heart Monitoring"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055334"},{"key":"ref11","first-page":"13","article-title":"Towards statistical queries over distributed private user data","volume":"12","author":"chen","year":"2012","journal-title":"Proc NSDI"},{"key":"ref40","first-page":"1876","article-title":"Multiparty differential privacy via aggregation of locally trained classifiers","author":"pathak","year":"2010","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1126\/science.aam9710"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.8805"},{"key":"ref14","first-page":"1","article-title":"Efficient private statistics with succinct sketches","author":"melis","year":"2015","journal-title":"NDSS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2018.2854776"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23187"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0047"},{"key":"ref81","first-page":"1271","article-title":"CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds","author":"nikitin","year":"2017","journal-title":"Proc 26th USENIX Security Symp"},{"key":"ref17","first-page":"1207","article-title":"Governance through privacy, fairness, and respect for individuals","volume":"4","author":"baker","year":"2016","journal-title":"EGEM"},{"key":"ref84","first-page":"319","article-title":"Pairing-friendly elliptic curves of prime order","author":"barreto","year":"2005","journal-title":"Proc Int Workshop Sel Areas Cryptogr"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.002"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.331"},{"key":"ref80","year":"2018","journal-title":"Advanced Crypto Library for the Go language"},{"key":"ref89","year":"2018","journal-title":"Prostate Cancer Data"},{"key":"ref4","year":"2019","journal-title":"Equifax Breach"},{"key":"ref3","year":"2019","journal-title":"A New Data Breach May Have Exposed Every American Adult"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824067"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14778\/3055540.3055542"},{"key":"ref85","year":"2018","journal-title":"Mininet"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.acvd.2009.05.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2012.500"},{"key":"ref87","year":"2018","journal-title":"SPECTF"},{"key":"ref88","year":"2018","journal-title":"Pima Indians Diabetes DataSet"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1109\/TIFS.2019.2931068","article-title":"DP-ADMM: ADMM-based distributed learning with differential privacy","volume":"15","author":"huang","year":"2019","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"ref48","year":"2018","journal-title":"GA4GH"},{"key":"ref47","first-page":"1895","article-title":"Evaluating differentially private machine learning in practice","author":"jayaraman","year":"2019","journal-title":"Proc Usenix Secur Symp"},{"key":"ref42","first-page":"6343","article-title":"Distributed learning without distress: Privacy-preserving empirical risk minimization","author":"jayaraman","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1109\/TIFS.2019.2925496","article-title":"Secure and differentially private logistic regression for horizontally distributed data","volume":"15","author":"kim","year":"2019","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8833568\/09019831.pdf?arnumber=9019831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:00:24Z","timestamp":1651078824000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9019831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":91,"URL":"https:\/\/doi.org\/10.1109\/tifs.2020.2976612","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}