{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:52:23Z","timestamp":1769633543001,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071142"],"award-info":[{"award-number":["62071142"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic and Applied Basic Research Foundation of Guangdong Province","award":["2024A1515012299,2023A1515010714"],"award-info":[{"award-number":["2024A1515012299,2023A1515010714"]}]},{"DOI":"10.13039\/501100006374","name":"Shenzhen Fundamental Research Program","doi-asserted-by":"publisher","award":["JCYJ20220531095416037, JCYJ20230807094411024"],"award-info":[{"award-number":["JCYJ20220531095416037, JCYJ20230807094411024"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690200","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"243-257","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5342-7414","authenticated-orcid":false,"given":"Shuangqing","family":"Xu","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7852-6051","authenticated-orcid":false,"given":"Yifeng","family":"Zheng","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3529-0541","authenticated-orcid":false,"given":"Zhongyun","family":"Hua","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of NeurIPS.","author":"Agarwal Naman","year":"2021","unstructured":"Naman Agarwal, Peter Kairouz, and Ziyu Liu. 2021. The Skellam Mechanism for Differentially Private Federated Learning. In Proc. of NeurIPS."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of NeurIPS.","author":"Balle Borja","year":"2018","unstructured":"Borja Balle, Gilles Barthe, and Marco Gaboardi. 2018. Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences. In Proc. of NeurIPS."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of AISTATS.","author":"Balle Borja","year":"2020","unstructured":"Borja Balle, Gilles Barthe, Marco Gaboardi, Justin Hsu, and Tetsuya Sato. 2020. Hypothesis Testing Interpretations and Renyi Differential Privacy. In Proc. of AISTATS."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_22"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417242"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of CRYPTO.","author":"Beaver Donald","year":"1991","unstructured":"Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization. In Proc. of CRYPTO."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_9_1","volume-title":"Arya Tabaie, Gus Gutoski, and Ivo Kubjas.","author":"Botrel Gautam","year":"2023","unstructured":"Gautam Botrel, Thomas Piellard, Youssef El Housni, Arya Tabaie, Gus Gutoski, and Ivo Kubjas. 2023. ConsenSys\/gnark-crypto: v0.11.2."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of NeurIPS.","author":"Canonne Cl\u00e9ment L.","year":"2020","unstructured":"Cl\u00e9ment L. Canonne, Gautam Kamath, and Thomas Steinke. 2020. The Discrete Gaussian for Differential Privacy. In Proc. of NeurIPS."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of ESORICS.","author":"Pathum Chamikara Mahawaga Arachchige","year":"2022","unstructured":"Mahawaga Arachchige Pathum Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bert\u00f3k, and Ibrahim Khalil. 2022. Local Differential Privacy for Federated Learning. In Proc. of ESORICS."},{"key":"e_1_3_2_1_12_1","volume-title":"Secret-Shared Shuffle. In Proc. of ASIACRYPT.","author":"Chase Melissa","year":"2020","unstructured":"Melissa Chase, Esha Ghosh, and Oxana Poburinnaya. 2020. Secret-Shared Shuffle. In Proc. of ASIACRYPT."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833611"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"e_1_3_2_1_16_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci., Vol. 9, 3--4 (2014), 211--407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_17_1","volume-title":"Analyze Privacy Revisited: Formalizations and Empirical Evaluation. CoRR","author":"Erlingsson \u00dalfar","year":"2020","unstructured":"\u00dalfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Shuang Song, Kunal Talwar, and Abhradeep Thakurta. 2020. Encode, Shuffle, Analyze Privacy Revisited: Formalizations and Empirical Evaluation. CoRR, Vol. abs\/2001.03618 (2020)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24141"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW59333.2023.00012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77883-5_16"},{"key":"e_1_3_2_1_22_1","volume-title":"Deepesh Data, and Suhas N. Diggavi","author":"Girgis Antonious M.","year":"2021","unstructured":"Antonious M. Girgis, Deepesh Data, and Suhas N. Diggavi. 2021. Renyi Differential Privacy of The Subsampled Shuffle Model In Distributed Learning. In Proc. of NeurIPS."},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of AISTATS.","author":"Girgis Antonious M.","year":"2021","unstructured":"Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi, Peter Kairouz, and Ananda Theertha Suresh. 2021. Shuffled Model of Differential Privacy in Federated Learning. In Proc. of AISTATS."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. of ACM CCS.","author":"Girgis Antonious M.","year":"2021","unstructured":"Antonious M. Girgis, Deepesh Data, Suhas N. Diggavi, Ananda Theertha Suresh, and Peter Kairouz. 2021. On the R\u00e9nyi Differential Privacy of the Shuffle Model. In Proc. of ACM CCS."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3126323"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00001"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of ICML.","author":"Kairouz Peter","year":"2021","unstructured":"Peter Kairouz, Ziyu Liu, and Thomas Steinke. 2021. The Distributed Discrete Gaussian Mechanism for Federated Learning with Secure Aggregation. In Proc. of ICML."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17053"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59410-7_33"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of ICML.","author":"Liu Yuchen","year":"2023","unstructured":"Yuchen Liu, Chen Chen, Lingjuan Lyu, Fangzhao Wu, Sai Wu, and Gang Chen. 2023. Byzantine-Robust Learning on Heterogeneous Data via Gradient Splitting. In Proc. of ICML."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174075"},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of AISTATS.","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Ag\u00fcera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proc. of AISTATS."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567973"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. of IEEE CSF.","author":"Mironov Ilya","year":"2017","unstructured":"Ilya Mironov. 2017. R\u00e9nyi Differential Privacy. In Proc. of IEEE CSF."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_38_1","first-page":"1","article-title":"PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries","volume":"2024","author":"Mouris Dimitris","year":"2024","unstructured":"Dimitris Mouris, Pratik Sarkar, and Nektarios Georgios Tsoutsos. 2024. PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries. Proc. Priv. Enhancing Technol., Vol. 2024, 3 (2024), 1--19.","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179468"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24021"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/217"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3375527"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815417"},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. of ICML.","author":"Wang Di","year":"2019","unstructured":"Di Wang, Changyou Chen, and Jinhui Xu. 2019. Differentially private empirical risk minimization with non-convex loss functions. In Proc. of ICML."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"e_1_3_2_1_48_1","volume-title":"Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. CoRR","author":"Xiao Han","year":"2017","unstructured":"Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. CoRR, Vol. abs\/1708.07747 (2017)."},{"key":"e_1_3_2_1_49_1","volume-title":"Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy. CoRR","author":"Xu Shuangqing","year":"2024","unstructured":"Shuangqing Xu, Yifeng Zheng, and Zhongyun Hua. 2024. Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy. CoRR (2024)."},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. of NeurIPS.","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep Leakage from Gradients. In Proc. of NeurIPS."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690200","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:07:10Z","timestamp":1755842830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":50,"alternative-id":["10.1145\/3658644.3690200","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690200","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}