{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T03:31:01Z","timestamp":1768620661342,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","funder":[{"name":"Swiss National Science Foundation","award":["215216"],"award-info":[{"award-number":["215216"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,10]]},"DOI":"10.1145\/3701717.3730543","type":"proceedings-article","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:52:43Z","timestamp":1752673963000},"page":"152-163","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Practical Secure Aggregation by Combining Cryptography and Trusted Execution Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3476-1688","authenticated-orcid":false,"given":"Romain","family":"de Laage","sequence":"first","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3371-9228","authenticated-orcid":false,"given":"Peterson","family":"Yuhala","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6090-7901","authenticated-orcid":false,"given":"Fran\u00e7ois-Xavier","family":"Wicht","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, University of Bern, Bern, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1574-6721","authenticated-orcid":false,"given":"Pascal","family":"Felber","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8967-9213","authenticated-orcid":false,"given":"Christian","family":"Cachin","sequence":"additional","affiliation":[{"name":"University of Bern, Bern, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1493-6603","authenticated-orcid":false,"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"1996. Health Insurance Portability and Accountability Act of 1996. https:\/\/www.congress.gov\/bill\/104th-congress\/house-bill\/3103 Public Law No: 104-191."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_7"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"e_1_3_3_2_6_2","first-page":"4805","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Bell James","year":"2023","unstructured":"James Bell et\u00a0al. 2023. ACORN: Input Validation for Secure Aggregation. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 4805\u20134822. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/bell"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_19"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"William\u00a0J Buchanan et\u00a0al. 2020. Review and critical analysis of privacy-preserving infection tracking and contact tracing. Frontiers in Communications and Networks 1 (2020) 583376.","DOI":"10.3389\/frcmn.2020.583376"},{"key":"e_1_3_3_2_11_2","unstructured":"California State Legislature. 2018. California Consumer Privacy Act of 2018 (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/383962.384047"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_3_2_14_2","unstructured":"Pau-Chen Cheng et\u00a0al. 2023. Intel TDX Demystified: A Top-Down Approach. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2303.15540 (2023)."},{"key":"e_1_3_3_2_15_2","unstructured":"James Choncholas et\u00a0al. 2023. TGh: A TEE\/GC Hybrid Enabling Confidential FaaS Platforms. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.07764 (2023)."},{"key":"e_1_3_3_2_16_2","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. 2016 (2016) 86. http:\/\/eprint.iacr.org\/2016\/086"},{"key":"e_1_3_3_2_17_2","unstructured":"OSU Crypto. [n. d.]. LibOTe: A fast portable and easy to use Oblivious Transfer Library. https:\/\/github.com\/osu-crypto\/libOTe. Accessed on 11-10-2024."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516944"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224999"},{"key":"e_1_3_3_2_20_2","unstructured":"Advanced\u00a0Micro Devices. [n. d.]. AMD SEV-TIO: Trusted I\/O for Secure Encrypted Virtualization. https:\/\/www.amd.com\/content\/dam\/amd\/en\/documents\/developer\/sev-tio-whitepaper.pdf. Accessed on 11-07-2023."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660280"},{"key":"e_1_3_3_2_22_2","unstructured":"European Parliament. 2016. Regulation (EU) 2016\/679 the General Data Protection Regulation (GDPR). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"David Evans et\u00a0al. 2018. A pragmatic introduction to secure multi-party computation. Foundations and Trends\u00ae in Privacy and Security 2 2-3 (2018) 70\u2013246.","DOI":"10.1561\/3300000019"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22444-7_15"},{"key":"e_1_3_3_2_25_2","unstructured":"Craig Gentry. 2009. A fully homomorphic encryption scheme. Ph.\u00a0D. Dissertation. Stanford University. crypto.stanford.edu\/craig."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Craig Gentry. 2010. Computing arbitrary functions of encrypted data. Commun. ACM 53 3 (March 2010) 97\u2013105. https:\/\/doi.org\/10.1145\/1666420.1666444","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_3_3_2_27_2","unstructured":"Google. 2023. Gperftools profiler. https:\/\/github.com\/gperftools\/gperftools."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_11"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps52748.2021.9682053"},{"key":"e_1_3_3_2_30_2","unstructured":"Aggelos Kiayias et\u00a0al. 2022. Privacy Preserving Opinion Aggregation. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Paul Kocher et\u00a0al. 2020. Spectre attacks: Exploiting speculative execution. Commun. ACM 63 7 (2020) 93\u2013101.","DOI":"10.1145\/3399742"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978381"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00022"},{"key":"e_1_3_3_2_34_2","first-page":"465","volume-title":"16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22)","author":"Li Xupeng","year":"2022","unstructured":"Xupeng Li et\u00a0al. 2022. Design and Verification of the Arm Confidential Compute Architecture. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). USENIX Association, Carlsbad, CA, 465\u2013484. https:\/\/www.usenix.org\/conference\/osdi22\/presentation\/li"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Moritz Lipp et\u00a0al. 2020. Meltdown: reading kernel memory from user space. Commun. ACM 63 6 (May 2020) 46\u201356. https:\/\/doi.org\/10.1145\/3357033","DOI":"10.1145\/3357033"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/1655084.1655089"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_3_2_39_2","first-page":"619","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko et\u00a0al. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 619\u2013636. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/ohrimenko"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Sandro Pinto and Nuno Santos. 2019. Demystifying Arm TrustZone: A Comprehensive Survey. ACM Comput. Surv. 51 6 Article 130 (jan 2019) 36\u00a0pages. https:\/\/doi.org\/10.1145\/3291047","DOI":"10.1145\/3291047"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"e_1_3_3_2_42_2","unstructured":"Leonie Reichert et\u00a0al. 2020. Privacy-preserving contact tracing of COVID-19 patients. Cryptology ePrint Archive (2020)."},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359660"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Adi Shamir. 1979. How to share a secret. Commun. ACM 22 11 (Nov. 1979) 612\u2013613. https:\/\/doi.org\/10.1145\/359168.359176","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378469"},{"key":"e_1_3_3_2_46_2","volume-title":"Annual Network & Distributed System Security Symposium (NDSS)","author":"Shi Elaine","year":"2011","unstructured":"Elaine Shi et\u00a0al. 2011. Privacy-preserving aggregation of time-series data. In Annual Network & Distributed System Security Symposium (NDSS). Internet Society."},{"key":"e_1_3_3_2_47_2","unstructured":"Timothy Stevens Joseph Near and Christian Skalka. 2022. Secret sharing sharing for highly scalable secure aggregation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2201.00864 (2022)."},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Wenjuan Tang et\u00a0al. 2019. Secure Data Aggregation of Lightweight E-Healthcare IoT Devices With Fair Incentives. IEEE Internet of Things Journal 6 5 (2019) 8714\u20138726. https:\/\/doi.org\/10.1109\/JIOT.2019.2923261","DOI":"10.1109\/JIOT.2019.2923261"},{"key":"e_1_3_3_2_49_2","first-page":"645","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 2017)","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai et\u00a0al. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 2017), Dilma\u00a0Da Silva and Bryan Ford (Eds.). Santa Clara, CA, USA, 645\u2013658. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/tsai"},{"key":"e_1_3_3_2_50_2","first-page":"827","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Watson Jean-Luc","year":"2022","unstructured":"Jean-Luc Watson et\u00a0al. 2022. Piranha: A GPU Platform for Secure Computation. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 827\u2013844. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/watson"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Jie Wen et\u00a0al. 2023. A survey on federated learning: challenges and applications. International Journal of Machine Learning and Cybernetics 14 2 (01 Feb 2023) 513\u2013535. https:\/\/doi.org\/10.1007\/s13042-022-01647-y","DOI":"10.1007\/s13042-022-01647-y"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24173"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3457388.3458665"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Lingchen Zhao et\u00a0al. 2022. SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning. IEEE Transactions on Dependable and Secure Computing 19 5 (2022) 3329\u20133342. https:\/\/doi.org\/10.1109\/TDSC.2021.3093711","DOI":"10.1109\/TDSC.2021.3093711"}],"event":{"name":"DEBS '25: The 19th ACM International Conference on Distributed and Event-based Systems","location":"Gothenburg Sweden","acronym":"DEBS '25","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 19th ACM International Conference on Distributed and Event-based Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701717.3730543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:53:00Z","timestamp":1752673980000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701717.3730543"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":53,"alternative-id":["10.1145\/3701717.3730543","10.1145\/3701717"],"URL":"https:\/\/doi.org\/10.1145\/3701717.3730543","relation":{},"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"2025-06-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}