{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T05:39:47Z","timestamp":1774503587175,"version":"3.50.1"},"reference-count":41,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065887","type":"journal-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T04:47:16Z","timestamp":1748494036000},"page":"2935-2957","source":"Crossref","is-referenced-by-count":0,"title":["VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server"],"prefix":"10.32604","volume":"84","author":[{"given":"Peizheng","family":"Lai","sequence":"first","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yixin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Ya","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Fuqiang","family":"Di","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MCC.2015.45","article-title":"Security and privacy in cloud computing: vision, trends, and challenges","volume":"2","author":"Tari","year":"2015","journal-title":"IEEE Cloud Computing"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","article-title":"High capacity reversible data hiding in encrypted images by patch-level sparse representation","volume":"46","author":"Cao","year":"2015","journal-title":"IEEE Trans Cybern"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","article-title":"Reversible data hiding: advances in the past two decades","volume":"4","author":"Shi","year":"2016","journal-title":"IEEE Access"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1109\/TDSC.2016.2634161","article-title":"Separable reversible data hiding in encrypted JPEG bitstreams","volume":"15","author":"Qian","year":"2016","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"13765","DOI":"10.1007\/s11042-015-2920-y","article-title":"Lossless data hiding algorithm for encrypted images with high capacity","volume":"75","author":"Zheng","year":"2016","journal-title":"Multimed Tools Appl"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","article-title":"An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images","volume":"13","author":"Puteaux","year":"2018","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref7","first-page":"1273","author":"McMahan","year":"2017","journal-title":"Artificial intelligence and statistics"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3719","DOI":"10.1109\/TIFS.2024.3362592","article-title":"Lossless data hiding in NTRU cryptosystem by polynomial encoding and modulation","volume":"19","author":"Wu","year":"2024","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"46269","DOI":"10.1007\/s11042-023-15455-1","article-title":"Design and development of reversible data hiding-homomorphic encryption & rhombus pattern prediction approach","volume":"82","author":"Anushiadevi","year":"2023","journal-title":"Multimedia Tools Appl"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"81412","DOI":"10.1109\/ACCESS.2020.2990903","article-title":"Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"3688","DOI":"10.1109\/TCYB.2022.3163245","article-title":"Lossless data hiding in encrypted images compatible with homomorphic processing","volume":"53","author":"Wu","year":"2022","journal-title":"IEEE Trans Cybern"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1109\/TDSC.2019.2913422","article-title":"Lossless data hiding based on homomorphic cryptosystem","volume":"18","author":"Zheng","year":"2019","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"3099","DOI":"10.1109\/TCSVT.2017.2742023","article-title":"Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group","volume":"28","author":"Xiang","year":"2018","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1109\/TCSVT.2019.2963393","article-title":"Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain","volume":"30","author":"Ke","year":"2020","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref15","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"603","article-title":"Deep models under the GAN: information leakage from collaborative deep learning","author":"Hitaj","year":"2017"},{"key":"ref16","first-page":"14747","article-title":"Deep leakage from gradients","volume":"32","author":"Zhu","year":"2019","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/MNET.001.1900506","article-title":"On safeguarding privacy and security in the framework of federated learning","volume":"34","author":"Ma","year":"2020","journal-title":"IEEE Network"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","article-title":"VerifyNet: secure and verifiable federated learning","volume":"15","author":"Xu","year":"2019","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref19","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"223","article-title":"Public-key cryptosystems based on composite degree residuosity classes","author":"Paillier","year":"1999"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.ins.2022.04.052","article-title":"CORK: a privacy-preserving and lossless federated learning scheme for deep neural network","volume":"603","author":"Zhao","year":"2022","journal-title":"Inform Sciences"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","article-title":"Federated learning with differential privacy: algorithms and performance analysis","volume":"15","author":"Wei","year":"2020","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"4488","DOI":"10.1109\/TIFS.2023.3293417","article-title":"Personalized federated learning with differential privacy and convergence guarantee","volume":"18","author":"Wei","year":"2023","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref23","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1175","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"Bonawitz","year":"2017"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TIFS.2020.3043139","article-title":"VeriFL: communication-efficient and fast verifiable aggregation for federated learning","volume":"16","author":"Guo","year":"2020","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1109\/TSC.2024.3520867","article-title":"VPFLI: verifiable privacy-preserving federated learning with irregular users based on single server","volume":"18","author":"Ren","year":"2024","journal-title":"IEEE Trans Services Computing"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/TSC.2024.3451183","article-title":"PriVeriFL: privacy-preserving and aggregation-verifiable federated learning","volume":"18","author":"Wang","year":"2024","journal-title":"IEEE Trans Services Computing"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TDSC.2021.3126323","article-title":"VERSA: verifiable secure aggregation for cross-device federated learning","volume":"20","author":"Hahn","year":"2021","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"4297","DOI":"10.1109\/TDSC.2023.3272338","article-title":"Comments on \u201cVERSA: verifiable secure aggregation for cross-device federated learning\u201d","volume":"21","author":"Xu","year":"2024","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/TDSC.2023.3253082","article-title":"Comments on \u201cVERSA: verifiable secure aggregation for cross-device federated learning\u201d","volume":"21","author":"Luo","year":"2024","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref30","series-title":"Advances in Cryptology-CRYPTO\u201994: 14th Annual International Cryptology Conference","first-page":"21","article-title":"Incremental cryptography: the case of hashing and signing","author":"Bellare","year":"1994 Aug 21\u201325"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2577","DOI":"10.1109\/TCE.2023.3342834","article-title":"Federated learning and convex hull enhancement for privacy preserving WiFi-based device-free localization","volume":"70","author":"Huang","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCBB.2023.3243932","article-title":"Robust and privacy-preserving decentralized deep federated learning training: focusing on digital healthcare applications","volume":"21","author":"Tian","year":"2024","journal-title":"IEEE\/ACM Trans Comput Bi"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"3105","DOI":"10.1109\/JIOT.2024.3476950","article-title":"Enhancing mutual trustworthiness in federated learning for data-rich smart cities","volume":"12","author":"Wehbi","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"ref34","series-title":"Proceedings of COMPSTAT\u20192010: 19th International Conference on Computational Statistics","first-page":"177","article-title":"Large-scale machine learning with stochastic gradient descent","author":"Bottou","year":"2010 Aug 22\u201327"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun ACM"},{"key":"ref36","series-title":"2018 IEEE Symposium on Security and Privacy (SP)","first-page":"19","article-title":"Manipulating machine learning: poisoning attacks and countermeasures for regression learning","author":"Jagielski","year":"2018"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1007\/s00145-014-9184-y","article-title":"Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs","volume":"28","author":"Gentry","year":"2015","journal-title":"J Cryptol"},{"key":"ref38","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","volume":"25","author":"Krizhevsky","year":"2012","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref39","first-page":"1","article-title":"Learning multiple layers of features from tiny images","volume":"1","author":"Krizhevsky","year":"2009","journal-title":"Handb Systemic Autoimmune Dis"},{"key":"ref40","unstructured":"LeCun Y. The MNIST database of handwritten digits; 1998. [cited 2025 May 7]. Available from: http:\/\/yann.lecun.com\/exdb\/mnist\/."},{"key":"ref41","unstructured":"Zhang J, Liu Y, Hua Y, Wang H, Song T, Xue Z, et al. PFLlib: personalized federated learning algorithm library. arXiv:231204992. 2023."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_65887\/TSP_CMC_65887.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:52:56Z","timestamp":1763344376000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":41,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065887","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}