{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:01:07Z","timestamp":1773655267799,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,5]]},"DOI":"10.1145\/3787330.3787351","type":"proceedings-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T08:43:42Z","timestamp":1773650622000},"page":"123-128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Privacy-Preserving Measurement: Architecture, Protocols, and Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8930-1085","authenticated-orcid":false,"given":"Yu","family":"Fu","sequence":"first","affiliation":[{"name":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0444-5360","authenticated-orcid":false,"given":"Yingbin","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0561-0675","authenticated-orcid":false,"given":"Qiong","family":"Sun","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3920-1416","authenticated-orcid":false,"given":"Guozhen","family":"Bian","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9673-0463","authenticated-orcid":false,"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2354-506X","authenticated-orcid":false,"given":"Fazhi","family":"Qin","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Network Operating System R&amp;D Center, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2026,3,16]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"IETF Internet-Draft, draft-ietf-ppm-dap-12","author":"Chase J.","year":"2023","unstructured":"J. Chase, H. Corrigan-Gibbs, A. Davidson, et al., Distributed Aggregation Protocol for privacy-preserving measurement, IETF Internet-Draft, draft-ietf-ppm-dap-12, 2023. [Online]. Available: https:\/\/datatracker.ietf.org\/doc\/draft-ietf-ppm-dap\/"},{"key":"e_1_3_3_1_2_2","volume-title":"IETF Internet-Draft, draft-irtf-cfrg-vdaf-03","author":"Corrigan-Gibbs H.","year":"2023","unstructured":"H. Corrigan-Gibbs, D. Boneh, and D. Mazieres, Prio3: Practical distributed aggregation with verifiable privacy, IETF Internet-Draft, draft-irtf-cfrg-vdaf-03, 2023. [Online]. Available: https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-vdaf\/"},{"key":"e_1_3_3_1_3_2","first-page":"1062","volume-title":"Proc. IEEE Symp. Security and Privacy (S&P)","author":"Corrigan-Gibbs H.","year":"2021","unstructured":"H. Corrigan-Gibbs, D. Boneh, and S. Gorbunov, Poplar: Private and verifiable distributed aggregation, in Proc. IEEE Symp. Security and Privacy (S&P), 2021, pp. 1045\u20131062."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_3_1_5_2","first-page":"407","volume-title":"Found. Trends Theor. Comput. Sci.","volume":"9","author":"Dwork C.","year":"2014","unstructured":"C. Dwork, A. Roth, The algorithmic foundations of differential privacy, Found. Trends Theor. Comput. Sci., vol. 9, nos. 3\u20134, pp. 211\u2013407, 2014."},{"key":"e_1_3_3_1_6_2","first-page":"282","volume-title":"Proc. USENIX Symp. Networked Systems Design and Implementation (NSDI)","author":"Corrigan-Gibbs H.","year":"2017","unstructured":"H. Corrigan-Gibbs and D. Boneh, Prio: Private, robust, and scalable, in Proc. USENIX Symp. Networked Systems Design and Implementation (NSDI), 2017, pp. 259\u2013282."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_3_1_8_2","first-page":"1321","volume-title":"Proc. ACM Conf. Computer and Communications Security (CCS)","author":"Shokri R.","year":"2015","unstructured":"R. Shokri and V. Shmatikov, Privacy-preserving deep learning, in Proc. ACM Conf. Computer and Communications Security (CCS), 2015, pp. 1310\u20131321."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"e_1_3_3_1_10_2","first-page":"10","volume-title":"Proc. IEEE Int. Conf. Pervasive Computing and Communications (PerCom)","author":"Stevens M.","year":"2019","unstructured":"M. Stevens, M. Kasper, and R. Holz, Toward scalable verifiable private data aggregation for the internet of things, in Proc. IEEE Int. Conf. Pervasive Computing and Communications (PerCom), 2019, pp. 1\u201310."},{"key":"e_1_3_3_1_11_2","volume-title":"IETF Internet-Draft, draft-irtf-cfrg-vdaf-05","author":"Corrigan-Gibbs H.","year":"2024","unstructured":"H. Corrigan-Gibbs, D. Boneh, and Y. Lindell, Verifiable distributed aggregation functions: Primitives for privacy-preserving measurement, IETF Internet-Draft, draft-irtf-cfrg-vdaf-05, 2024. [Online]. Available: https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-vdaf\/"},{"key":"e_1_3_3_1_12_2","volume-title":"Dec.","year":"2023","unstructured":"3rd Generation Partnership Project (3GPP), Study on security aspects of 6G services, 3GPP TR 33.899 V0.3.0, Dec. 2023."}],"event":{"name":"ICIT 2025: 2025 The 13th International Conference on Information Technology: IoT and Smart City","location":"Shanghai China","acronym":"ICIT 2025"},"container-title":["Proceedings of the 13th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3787330.3787351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:09:23Z","timestamp":1773652163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3787330.3787351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,5]]},"references-count":12,"alternative-id":["10.1145\/3787330.3787351","10.1145\/3787330"],"URL":"https:\/\/doi.org\/10.1145\/3787330.3787351","relation":{},"subject":[],"published":{"date-parts":[[2025,12,5]]},"assertion":[{"value":"2026-03-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}