{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T12:58:42Z","timestamp":1773406722112,"version":"3.50.1"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2011,2,1]],"date-time":"2011-02-01T00:00:00Z","timestamp":1296518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001459","name":"Ministry of Education - Singapore","doi-asserted-by":"publisher","award":["R-252-000-331-112"],"award-info":[{"award-number":["R-252-000-331-112"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2011,2]]},"abstract":"<jats:p>A formal treatment to the security of Concealed Data Aggregation (CDA) and the more general Private Data Aggregation (PDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA or PDA are still lacking. Standard security notions for public key encryption, including semantic security and indistinguishability against chosen ciphertext attacks, are refined to cover the multisender nature and aggregation functionality of CDA and PDA in the security model. The proposed security model is sufficiently general to cover most application scenarios and constructions of privacy-preserving data aggregation. An impossibility result on achieving security against adaptive chosen ciphertext attacks in CDA\/PDA is shown. A generic CDA construction based on public key homomorphic encryption is given, along with a proof of its security in the proposed model. The security of a number of existing schemes is analyzed in the proposed model.<\/jats:p>","DOI":"10.1145\/1921621.1921623","type":"journal-article","created":{"date-parts":[[2011,3,2]],"date-time":"2011-03-02T18:19:53Z","timestamp":1299089993000},"page":"1-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["A security framework for privacy-preserving data aggregation in wireless sensor networks"],"prefix":"10.1145","volume":"7","author":[{"given":"Aldar C-F.","family":"Chan","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[{"name":"INRIA, Cedex, France"}]}],"member":"320","published-online":{"date-parts":[[2011,2,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.38"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2005.44"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.10.019"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the International Workshop on Information Security (ISW'97)","volume":"1396","author":"Bellare M.","year":"1997"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Conference on Advances in Cryptology (CRYPTO'96)","volume":"1109","author":"Bellare M."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the Conference on Advances in Cryptology (CRYPTO'98)","volume":"1462","author":"Bellare M."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the Conference on Advances in Cryptology (CRYPTO'95)","volume":"963","author":"Bellare M."},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the Conference on Advances in Cryptology (CRYPTO'94)","volume":"839","author":"Bellare M."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the Conference on Advances in Cryptology (CRYPTO'93)","volume":"950","author":"Bellare M."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_26"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180440"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795291562"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/648026.744660"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the Conference on Advances in Cryptology (CRYPTO'93)","volume":"773","author":"Fiat A."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460440"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the IEEE International Conference on Communications (ICC'05)","author":"Girao J."},{"key":"e_1_2_1_22_1","volume-title":"Foundations of Cryptography: Part 1","author":"Goldreich O."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom'07)","author":"He W."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the Workshop on Security and Assurance in Ad hoc Networks.","author":"Hu L."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0310-8"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0432-z"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.586"},{"key":"e_1_2_1_31_1","volume-title":"Pseudorandomness and Cryptographic Applications","author":"Luby M."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060303"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the International Conference on Computational Science and Its Applications (ICCSA'07)","volume":"4705","author":"Manulis M."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1498915.1498919"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217025"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100273"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754868.1754929"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.23"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_1_44_1","unstructured":"Shoup V. 2004. Sequences of games: A tool for taming complexity in security proofs. Cryptology ePrint Archive rep. 2004\/332. http:\/\/eprint.iacr.org\/  Shoup V. 2004. Sequences of games: A tool for taming complexity in security proofs. Cryptology ePrint Archive rep. 2004\/332. http:\/\/eprint.iacr.org\/"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0020-9"},{"key":"e_1_2_1_46_1","first-page":"105","article-title":"Cipher printing telegraph systems for secret wire and radio telegraphic communications","volume":"45","author":"Vernam G. S.","year":"1926","journal-title":"J. Amer. Inst. Electric. Engin."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.144"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1921621.1921623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1921621.1921623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:11Z","timestamp":1750243931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1921621.1921623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["10.1145\/1921621.1921623"],"URL":"https:\/\/doi.org\/10.1145\/1921621.1921623","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2]]},"assertion":[{"value":"2008-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-02-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}