{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:44:18Z","timestamp":1774964658307,"version":"3.50.1"},"reference-count":147,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFF0905300"],"award-info":[{"award-number":["2023YFF0905300"]}]},{"DOI":"10.13039\/501100020771","name":"Natural Science Foundation for Young Scientists of Shanxi Province","doi-asserted-by":"publisher","award":["62402040"],"award-info":[{"award-number":["62402040"]}],"id":[{"id":"10.13039\/501100020771","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020771","name":"Natural Science Foundation for Young Scientists of Shanxi Province","doi-asserted-by":"publisher","award":["62302037"],"award-info":[{"award-number":["62302037"]}],"id":[{"id":"10.13039\/501100020771","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024T171132"],"award-info":[{"award-number":["2024T171132"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2023M740246"],"award-info":[{"award-number":["2023M740246"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postdoctoral Fellowship Program of CPSF","award":["GZB20230938"],"award-info":[{"award-number":["GZB20230938"]}]},{"name":"Data Security Collaborative Operation Project led by 360 Company"},{"name":"NSFC-FDCT","award":["0051\/2022\/AFJ"],"award-info":[{"award-number":["0051\/2022\/AFJ"]}]},{"name":"China &amp; Macau S.A.R."}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tnse.2025.3566140","type":"journal-article","created":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T13:25:05Z","timestamp":1746105905000},"page":"3864-3887","source":"Crossref","is-referenced-by-count":2,"title":["Secure Multi-Party Learning: Fundamentals, Frameworks, State of the Art, Trends, and Challenges"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2971-9285","authenticated-orcid":false,"given":"Yuhang","family":"Li","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0962-4464","authenticated-orcid":false,"given":"Yajie","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Qing","family":"Fan","sequence":"additional","affiliation":[{"name":"North China Electric Power University, Beijing, China"}]},{"given":"Zijie","family":"Pan","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4441-7230","authenticated-orcid":false,"given":"Yan","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6313-4407","authenticated-orcid":false,"given":"Zijian","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1680-2521","authenticated-orcid":false,"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3459037"},{"key":"ref3","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref4","article-title":"Pavement crack instance segmentation using YOLOv7-WMF with connected feature fusion","volume-title":"Automat. Construction","volume":"160","author":"Ye","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3432871"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3316643"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2025.3533016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TICPS.2024.3524483"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3390208"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.003.2300053"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3240707"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3459029"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3322819"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.016.2300547"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3240697"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3391767"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3445171"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3350886"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3401159"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2025.3570202"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.013.2300485"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3414628"},{"key":"ref23","article-title":"SOK: Training machine learning models over multiple sources with privacy preservation","author":"Song","year":"2020","journal-title":"CoRR"},{"key":"ref24","volume-title":"A Fully Homomorphic Encryption Scheme","author":"Gentry","year":"2009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39466-4_27"},{"key":"ref26","article-title":"How to exchange secrets with oblivious transfer","author":"Rabin","year":"2005","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref27","first-page":"162","article-title":"How to generate and exchange secrets (extended abstract)","volume-title":"Proc. 27th Annu. Symp. Found. Comput. Sci.","author":"Yao","year":"1986"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335755"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335756"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.024"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00028"},{"issue":"5","key":"ref32","first-page":"1068","article-title":"Cryptographic approaches for privacy-preserving machine learning","volume":"42","author":"Jiang","year":"2020","journal-title":"J. Electron. Inf. Technol."},{"key":"ref33","article-title":"Privacy-preserving machine learning: Methods, challenges and directions","author":"Xu","year":"2021","journal-title":"CoRR"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1051\/sands\/2021001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179483"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3388992"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"ref38","article-title":"On data banks and privacy homomorphisms","author":"Rivest","year":"1978"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1985.1057074"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-x_16"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100287"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_15"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_8"},{"key":"ref50","article-title":"Deep leakage from gradients","author":"Mu","year":"2023","journal-title":"CoRR"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/mark.1979.8817296"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237996"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-004-0173-6"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315306"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1379287.1379291"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/sp40000.2020.00092"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0036"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0011"},{"key":"ref62","first-page":"2651","article-title":"SWIFT: Super-fast and robust privacy-preserving machine learning","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Koti","year":"2021"},{"key":"ref63","first-page":"4961","article-title":"Crypten: Secure multi-party computation meets machine learning","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Knott"},{"key":"ref64","first-page":"2183","article-title":"Fantastic four: Honest-majority four-party secure computation with malicious security","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Dalskov","year":"2021"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560697"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179468"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583272"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0107"},{"key":"ref69","first-page":"1939","article-title":"Scalable multi-party computation protocols for machine learning in the honest-majority setting","volume-title":"Proc. 33rd USENIX Secur. Symp.","author":"Liu"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/sp54263.2024.00164"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/sp54263.2024.00063"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_26"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_12"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0010"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00078"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0021"},{"key":"ref78","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2024.23380","article-title":"MPCDiff: Testing and repairing MPC-hardened deep learning models","volume-title":"Proc. 31st Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Pang"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2013.43"},{"key":"ref80","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. 33nd Int. Conf. Mach. Learn.","volume":"48","author":"Gilad-Bachrach","year":"2016"},{"key":"ref81","article-title":"CryptoDL: Deep neural networks over encrypted data","author":"Hesamifard","year":"2017","journal-title":"CoRR"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/cse-euc.2017.102"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2019.00121"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357371"},{"key":"ref85","first-page":"179","article-title":"Multinomial logistic regression model based on homomorphic encryption","volume":"7","author":"Xu","year":"2020","journal-title":"J. Cryptol. Res."},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623136"},{"key":"ref87","article-title":"Bumblebee: Secure two-party inference framework for large transformers","volume-title":"IACR Cryptol. ePrint Arch.","author":"Lu","year":"2023"},{"key":"ref88","first-page":"6329","article-title":"Secure floating-point training","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Rathee","year":"2023"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2021049"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01704-0_25"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2013.30"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808774"},{"key":"ref93","article-title":"Conditionals in homomorphic encryption and machine learning applications","author":"Chialva","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref94","article-title":"Privacy-preserving classification on deep neural network","volume-title":"IACR Cryptol. ePrint Arch.","author":"Chabanne","year":"2017"},{"key":"ref95","first-page":"2505","article-title":"DELPHI: A cryptographic inference service for neural networks","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Mishra","year":"2020"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00045"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/cdc45484.2021.9683401"},{"key":"ref98","first-page":"2723","article-title":"Cerebro: A platform for multi-party cryptographic collaborative learning","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Zheng","year":"2021"},{"key":"ref99","first-page":"40","article-title":"Towards deep neural network training on encrypted data","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops","author":"Nandakumar","year":"2019"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363207"},{"key":"ref101","first-page":"2201","article-title":"MUSE: Secure inference resilient to malicious clients","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Lehmkuhl","year":"2021"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_5"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_24"},{"key":"ref104","article-title":"Dynamic decentralized functional encryptions from pairings in the standard model","volume-title":"IACR Cryptol. ePrint Arch.","author":"Nguyen","year":"2024"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17259-6_5"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/tps-isa50397.2020.00038"},{"key":"ref107","article-title":"Partially encrypted machine learning using functional encryption","author":"Ryffel","year":"2019","journal-title":"CoRR"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813705"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0053"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2019.00043"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"ref112","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Juvekar","year":"2018"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196023"},{"key":"ref114","first-page":"1501","article-title":"XONN: Xnor-based oblivious deep neural network inference","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Riazi","year":"2019"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00873"},{"key":"ref116","first-page":"5377","article-title":"Efficient 3PC for binary circuits with application to maliciously-secure DNN inference","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Li","year":"2023"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"ref118","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2015.23113","article-title":"ABY - A framework for efficient mixed-protocol secure two-party computation","volume-title":"22nd Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Demmler"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33627-0_25"},{"key":"ref120","first-page":"287","article-title":"Fairplay - Secure two-party computation system","volume-title":"Proc. 13th USENIX Secur. Symp.","author":"Malkhi"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"ref124","first-page":"809","article-title":"Cheetah: Lean and fast secure two-party deep neural network inference","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Huang","year":"2022"},{"key":"ref125","first-page":"6435","article-title":"Squirrel: A scalable secure two-party computation framework for training gradient boosting decision tree","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Lu","year":"2023"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24512"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358922"},{"key":"ref128","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.24202","article-title":"BLAZE: Blazing fast privacy-preserving machine learning","volume-title":"Proc. 27th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Patra"},{"key":"ref129","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.23005","article-title":"Trident: Efficient 4PC framework for privacy preserving machine learning","volume-title":"Proc. 27th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Chaudhari"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/sp40001.2021.00098"},{"key":"ref131","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2023.23199","article-title":"Fusion: Efficient and secure inference resilient to malicious servers","volume-title":"Proc. 30th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Dong","year":"2023"},{"key":"ref132","first-page":"2227","article-title":"MD-ML: Super fast privacy-preserving machine learning for malicious security with a dishonest majority","volume-title":"Proc. 33rd USENIX Secur. Symp.","author":"Yuan"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.12"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"ref136","first-page":"2165","article-title":"ABY2.0: Improved mixed-protocol secure two-party computation","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Patra","year":"2021"},{"key":"ref137","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2021.24351","article-title":"GALA: Greedy computation for linear algebra in privacy-preserved neural networks","volume-title":"Proc. 28th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Zhang","year":"2021"},{"key":"ref138","first-page":"17","article-title":"Secretflow-SPU: A performant and user-friendly framework for privacy-preserving machine learning","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Ma","year":"2023"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330920"},{"key":"ref140","article-title":"PPCA: Privacy-preserving principal component analysis using secure multiparty computation(MPC)","author":"Fan","year":"2021","journal-title":"CoRR"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467210"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179422"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_24"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3273914"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107560"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3339638"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11134536\/10981699.pdf?arnumber=10981699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:47:59Z","timestamp":1756154879000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10981699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":147,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3566140","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}