{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T03:50:36Z","timestamp":1778903436169,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3603166.3632144","type":"proceedings-article","created":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T19:23:27Z","timestamp":1712258607000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["MPCFL: Towards Multi-party Computation for Secure Federated Learning Aggregation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-8982-4745","authenticated-orcid":false,"given":"Hiroki","family":"Kaminaga","sequence":"first","affiliation":[{"name":"Cybernetica AS, Tallin, Estonia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9561-6099","authenticated-orcid":false,"given":"Feras M.","family":"Awaysheh","sequence":"additional","affiliation":[{"name":"University of Tartu, Tartu, Estonia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6309-2892","authenticated-orcid":false,"given":"Sadi","family":"Alawadi","sequence":"additional","affiliation":[{"name":"Blekinge Tekniska H\u00f6gskola, Karlskrona, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1479-2195","authenticated-orcid":false,"given":"Liina","family":"Kamm","sequence":"additional","affiliation":[{"name":"Cybernetica AS, Tartu, Estonia"}]}],"member":"320","published-online":{"date-parts":[[2024,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"FedCSD: A Federated Learning Based Approach for Code-Smell Detection. arXiv preprint arXiv:2306.00038","author":"Alawadi Sadi","year":"2023","unstructured":"Sadi Alawadi, Khalid Alkharabsheh, Fahed Alkhabbas, Victor Kebande, Feras M Awaysheh, and Fabio Palomba. 2023. FedCSD: A Federated Learning Based Approach for Code-Smell Detection. arXiv preprint arXiv:2306.00038 (2023)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.21552\/EDPL\/2016\/3\/4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22186842"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy090"},{"key":"e_1_3_2_1_5_1","volume-title":"Trust, Security and Privacy for Big Data","author":"Awaysheh Feras M","unstructured":"Feras M Awaysheh. 2022. From the Cloud to the Edge Towards a Distributed and Light Weight Secure Big Data Pipelines for IoT Applications. In Trust, Security and Privacy for Big Data. CRC Press, 50--68."},{"key":"e_1_3_2_1_6_1","volume-title":"2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 1--6.","author":"Awaysheh Feras M","year":"2022","unstructured":"Feras M Awaysheh, Sadi Alawadi, and Sawsan AlZubi. 2022. FLIoDT: A Federated Learning Architecture from Privacy by Design to Privacy by Default over IoT. In 2022 Seventh International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 1--6."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3094993"},{"key":"e_1_3_2_1_8_1","volume-title":"2023 IEEE International Conference on Edge Computing and Communications (EDGE). IEEE, 319--329","author":"Awaysheh Feras M","year":"2023","unstructured":"Feras M Awaysheh, Riccardo Tommasini, and Ahmed Awad. 2023. Big Data Analytics from the Rich Cloud to the Frugal Edge. In 2023 IEEE International Conference on Edge Computing and Communications (EDGE). IEEE, 319--329."},{"key":"e_1_3_2_1_9_1","first-page":"24","article-title":"Are the EU GDPR and the California CCPA becoming the de facto global standards for data privacy and protection","volume":"15","author":"Barrett Catherine","year":"2019","unstructured":"Catherine Barrett. 2019. Are the EU GDPR and the California CCPA becoming the de facto global standards for data privacy and protection? Scitech Lawyer 15, 3 (2019), 24--29.","journal-title":"Scitech Lawyer"},{"key":"e_1_3_2_1_10_1","volume-title":"Sharemind: programmable secure computations with practical applications. Ph. D. Dissertation","author":"Bogdanov Dan","unstructured":"Dan Bogdanov. 2013. Sharemind: programmable secure computations with practical applications. Ph. D. Dissertation. University of Tartu. http:\/\/hdl.handle.net\/10062\/29041"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1515\/popets-2016-0019","article-title":"Students and Taxes: a Privacy-Preserving Study Using Secure Computation","volume":"2016","author":"Bogdanov Dan","year":"2016","unstructured":"Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, and Riivo Talviste. 2016. Students and Taxes: a Privacy-Preserving Study Using Secure Computation. PoPETs 2016, 3 (2016), 117--135. http:\/\/www.degruyter.com\/view\/j\/popets.2016.2016.issue-3\/popets-2015-0019\/popets-2016-0019.xml","journal-title":"PoPETs"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_13_1","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. Advances in neural information processing systems 33 (2020) 1877--1901."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Diane Cook Aaron Crandall and Brian Thomas. 2019. Human Activity Recognition from Continuous Ambient Sensor Data. UCI Machine Learning Repository. 10.24432\/C5D60P","DOI":"10.24432\/C5D60P"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"R. Cramer I. Damg\u00e5rd and J. Nielsen. 2015. Secure Multiparty Computation and Secret Sharing. Cambridge University Press.","DOI":"10.1017\/CBO9781107337756"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_17_1","volume-title":"Deep learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT press."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00028"},{"key":"e_1_3_2_1_19_1","volume-title":"A fast learning algorithm for deep belief nets. Neural computation 18, 7","author":"Hinton Geoffrey E","year":"2006","unstructured":"Geoffrey E Hinton, Simon Osindero, and Yee-Whye Teh. 2006. A fast learning algorithm for deep belief nets. Neural computation 18, 7 (2006), 1527--1554."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0271-8"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21186018"},{"key":"e_1_3_2_1_22_1","unstructured":"Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images. https:\/\/www.cs.toronto.edu\/~kriz\/learning-features-2009-TR.pdf"},{"key":"e_1_3_2_1_23_1","volume-title":"MNIST handwritten digit database. ATT Labs [Online]. Available: http:\/\/yann.lecun.com\/exdb\/mnist 2","author":"LeCun Yann","year":"2010","unstructured":"Yann LeCun, Corinna Cortes, and CJ Burges. 2010. MNIST handwritten digit database. ATT Labs [Online]. Available: http:\/\/yann.lecun.com\/exdb\/mnist 2 (2010)."},{"key":"e_1_3_2_1_24_1","volume-title":"Threats to federated learning: A survey. arXiv preprint arXiv:2003.02133","author":"Lyu Lingjuan","year":"2020","unstructured":"Lingjuan Lyu, Han Yu, and Qiang Yang. 2020. Threats to federated learning: A survey. arXiv preprint arXiv:2003.02133 (2020)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"140","DOI":"10.56553\/popets-2023-0009","article-title":"Sok: Secure aggregation based on cryptographic schemes for federated learning","volume":"1","author":"Mansouri Mohamad","year":"2023","unstructured":"Mohamad Mansouri, Melek Onen, Wafa Ben Jaballah, and Mauro Conti. 2023. Sok: Secure aggregation based on cryptographic schemes for federated learning. Proc. Priv. Enhancing Technol 1 (2023), 140--157.","journal-title":"Proc. Priv. Enhancing Technol"},{"key":"e_1_3_2_1_26_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273--1282."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography5030021"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2429--2443","author":"Pasquini Dario","year":"2022","unstructured":"Dario Pasquini, Danilo Francati, and Giuseppe Ateniese. 2022. Eluding secure aggregation in federated learning via model inconsistency. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2429--2443."},{"key":"e_1_3_2_1_29_1","volume-title":"Programming Languages for Secure Multi-party Computation Application Development. Ph. D. Dissertation","author":"Randmets Jaak","unstructured":"Jaak Randmets. 2017. Programming Languages for Secure Multi-party Computation Application Development. Ph. D. Dissertation. University of Tartu. http:\/\/hdl.handle.net\/10062\/56298"},{"key":"e_1_3_2_1_30_1","volume-title":"2023 IEEE Symposium on Security and Privacy (SP). IEEE","author":"Rathee Mayank","year":"2023","unstructured":"Mayank Rathee, Conghao Shen, Sameer Wagh, and Raluca Ada Popa. 2023. Elsa: Secure aggregation for federated learning with malicious actors. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 1961--1979."},{"key":"e_1_3_2_1_31_1","volume-title":"How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? arXiv e-prints","author":"Elkordy Ahmed Roushdy","year":"2022","unstructured":"Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H Ezzeldin, Konstantinos Psounis, and Salman Avestimehr. 2022. How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? arXiv e-prints (2022), arXiv-2208."},{"key":"e_1_3_2_1_32_1","volume-title":"Yahya H Ezzeldin, Salman Avestimehr, and Saurabh Bagchi.","author":"Zhao Joshua C","year":"2023","unstructured":"Joshua C Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H Ezzeldin, Salman Avestimehr, and Saurabh Bagchi. 2023. Secure aggregation in federated learning is not private: Leaking user data at large scale through model modification. arXiv preprint arXiv:2303.12233 (2023)."},{"key":"e_1_3_2_1_33_1","volume-title":"Deep leakage from gradients. Advances in neural information processing systems 32","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep leakage from gradients. Advances in neural information processing systems 32 (2019)."}],"event":{"name":"UCC '23: IEEE\/ACM 16th International Conference on Utility and Cloud Computing","location":"Taormina (Messina) Italy","acronym":"UCC '23","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE TCSC"]},"container-title":["Proceedings of the IEEE\/ACM 16th International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632144","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603166.3632144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:09Z","timestamp":1750286949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":33,"alternative-id":["10.1145\/3603166.3632144","10.1145\/3603166"],"URL":"https:\/\/doi.org\/10.1145\/3603166.3632144","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2024-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}