{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:02:19Z","timestamp":1764831739654,"version":"3.46.0"},"reference-count":41,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067563","type":"journal-article","created":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T07:30:41Z","timestamp":1754033441000},"page":"3185-3211","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient and Verifiable Data Aggregation Protocol with Enhanced Privacy Protection"],"prefix":"10.32604","volume":"85","author":[{"given":"Yiming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Shen","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Proceedings of the 29th Conference on Neural Information Processing Systems (NeurIPS); 2016 Dec 5\u201310","first-page":"5","article-title":"Federated learning: strategies for improving communication efficiency","author":"Kone\u010dn\u00fd"},{"key":"ref2","unstructured":"Hard A, Rao K, Mathews R, Ramaswamy Beaufays F, Augenstein S, Eichner H, et al. Federated learning for mobile keyboard prediction. arXiv:1811.03604. 2018."},{"key":"ref3","unstructured":"Yang T, Andrew G, Eichner H, Sun H, Li W, Kong N. Applied federated learning: improving google keyboard query suggestions. arXiv:1812.02903. 2018."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3339474","article-title":"Federated machine learning: concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Transact Intell Syst Technol (TIST)"},{"key":"ref5","series-title":"Advances in Neural Information Processing Systems 32","article-title":"Deep leakage from gradients","author":"Zhu","year":"2019"},{"key":"ref6","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; 2017 Oct 30\u2013Nov 3","first-page":"603","article-title":"Deep models under the GAN: information leakage from collaborative deep learning","author":"Hitaj"},{"key":"ref7","series-title":"IEEE INFOCOM 2019-IEEE Conference on Computer Communications; 2019 Apr 29\u2013May 2","first-page":"2512","article-title":"Beyond inferring class representatives: user-level privacy leakage from federated learning","author":"Wang"},{"key":"ref8","unstructured":"Zhu J, Blaschko M. R-gap: recursive gradient attack on privacy. arXiv:2010.07733. 2020."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"102420","DOI":"10.1016\/j.inffus.2024.102420","article-title":"ESVFL: efficient and secure verifiable federated learning with privacy-preserving","volume":"109","author":"Cai","year":"2024","journal-title":"Inf Fusion"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yu H. Towards verifiable federated learning. arXiv:2202.08310. 2022.","DOI":"10.24963\/ijcai.2022\/792"},{"key":"ref11","article-title":"Safetynets: verifiable execution of deep neural networks on an untrusted cloud","volume":"30","author":"Ghodsi","year":"2017","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","article-title":"VerifyNet: secure and verifiable federated learning","volume":"15","author":"Xu","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref13","series-title":"Proceedings of the 2021 International Conference on Wireless Algorithms, Systems, and Applications (WASA\u201921); 2021 Jun 25\u201327","first-page":"198","article-title":"A verifiable federated learning based on secure multiparty computation","author":"Mou"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12652-020-02664-x","article-title":"Verifiable and privacy preserving federated learning without fully trusted centers","volume":"13","author":"Han","year":"2022","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref15","series-title":"Proceedings of the 2020 IEEE International Conference on Communications (ICC\u201920); 2020 Jun 7\u201311","first-page":"1","article-title":"A privacy-preserving and verifiable federated learning scheme","author":"Zhang"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3316","DOI":"10.1109\/TII.2020.3036166","article-title":"VFL: a verifiable federated learning with privacy-preserving for big data in industrial IoT","volume":"18","author":"Fu","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.ins.2021.05.077","article-title":"PFLM: privacy-preserving federated learning with membership proof","volume":"576","author":"Jiang","year":"2021","journal-title":"Inf Sci"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TDSC.2021.3126323","article-title":"Versa: verifiable secure aggregation for cross-device federated learning","volume":"20","author":"Hahn","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TIFS.2020.3043139","article-title":"Verifl: communication-efficient and fast verifiable aggregation for federated learning","volume":"16","author":"Guo","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"3760","DOI":"10.1109\/TIFS.2023.3271268","article-title":"Vcd-fl: verifiable, collusion-resistant, and dynamic federated learning","volume":"18","author":"Gao","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"2977","DOI":"10.1109\/TIFS.2023.3273914","article-title":"Efficient verifiable protocol for privacy-preserving aggregation in federated learning","volume":"18","author":"Eltaras","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.future.2021.10.017","article-title":"Non-interactive verifiable privacy-preserving federated learning","volume":"128","author":"Xu","year":"2022","journal-title":"Future Gener Comput Syst"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"25147","DOI":"10.1109\/JIOT.2024.3390545","article-title":"RVFL: rational verifiable federated learning secure aggregation protocol","volume":"11","author":"Mu","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Phong","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"5880","DOI":"10.1002\/int.22818","article-title":"Privacy-preserving federated learning based on multi-key homomorphic encryption","volume":"37","author":"Ma","year":"2022","journal-title":"Int J Intell Syst"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2879","DOI":"10.1109\/TSC.2023.3250705","article-title":"Privacy-preserving and reliable decentralized federated learning","volume":"16","author":"Gao","year":"2023","journal-title":"IEEE Trans Serv Comput"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1109\/TII.2021.3131175","article-title":"Privacy-preserving federated learning for industrial edge computing via hybrid differential privacy and adaptive compression","volume":"19","author":"Jiang","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"ref28","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; 2017 Oct 30\u2013Nov 3","first-page":"1175","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"Bonawitz"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TCOMM.2023.3244243","article-title":"Codedpaddedfl and codedsecagg: straggler mitigation and secure aggregation in federated learning","volume":"71","author":"Schlegel","year":"2021","journal-title":"IEEE Trans Commun"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/JSAIT.2021.3054610","article-title":"Turbo-aggregate: breaking the quadratic aggregation barrier in secure federated learning","volume":"2","author":"So","year":"2021","journal-title":"IEEE J Selec Areas Inform Theory"},{"key":"ref31","series-title":"2022 IEEE International Symposium on Information Theory (ISIT); 2022 Jun 26\u2013Jul 1","first-page":"103","article-title":"Swiftagg: communication-efficient and dropout-resistant secure aggregation for federated learning with worst-case security guarantees","author":"Jahani-Nezhad"},{"key":"ref32","unstructured":"Choi B, Sohn J-Y, Han D-J, Moon J. Communication-computation efficient secure aggregation for federated learning. arXiv:2012.05433. 2020."},{"article-title":"Privacy-preserving aggregation of time-series data","series-title":"Annual Network & Distributed System Security Symposium (NDSS) 2011; 2011 Feb 6\u20139","author":"Shi","key":"ref33"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1109\/TDSC.2022.3146448","article-title":"Aggregation service for federated learning: an efficient, secure, and more resilient realization","volume":"20","author":"Zheng","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1001","DOI":"10.1109\/TBDATA.2022.3227326","article-title":"Feverless: fast and secure vertical federated learning based on xgboost for decentralized labels","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Trans Big Data"},{"key":"ref36","unstructured":"Nasirigerdeh R, Torkzadehmahani R, Matschinske J, Baumbach J, Rueckert D, Kaissis G. Hyfed: a hybrid federated framework for privacy-preserving machine learning. arXiv:2105.10545. 2021."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1109\/TIFS.2022.3163592","article-title":"Efficient dropout-resilient aggregation for privacy-preserving machine learning","volume":"18","author":"Liu","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"6178","DOI":"10.1109\/JIOT.2020.3022911","article-title":"Privacy-preserving federated learning framework based on chained secure multiparty computing","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref39","series-title":"Web Information Systems and Applications: 18th International Conference, WISA 2021","first-page":"237","article-title":"Chain-aafl: Chained adversarial-aware federated learning framework","volume":"18","author":"Ge","year":"2021"},{"key":"ref40","series-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS) 2017; 2017 Apr 20\u201322","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan"},{"key":"ref41","unstructured":"Boneh D, Shoup V. A graduate course in applied cryptography. Version 0.5; 2020 [Book]. [cited 2025 Jul 8]. Available from: https:\/\/dlib.hust.edu.vn\/bitstream\/HUST\/18098\/3\/OER000000253.pdf."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_67563\/TSP_CMC_67563.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:42Z","timestamp":1764826542000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":41,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067563","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}