Decentralized multi-client functional encryption for inner product

J Chotard, E Dufour Sans, R Gay, DH Phan… - Advances in Cryptology …, 2018 - Springer
We consider a situation where multiple parties, owning data that have to be frequently
updated, agree to share weighted sums of these data with some aggregator, but where they …

VOSA: Verifiable and oblivious secure aggregation for privacy-preserving federated learning

Y Wang, A Zhang, S Wu, S Yu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Federated learning has emerged as a promising paradigm by collaboratively training a
global model through sharing local gradients without exposing raw data. However, the …

Decentralizing inner-product functional encryption

M Abdalla, F Benhamouda, M Kohlweiss… - … Workshop on Public Key …, 2019 - Springer
Multi-client functional encryption (MCFE) is a more flexible variant of functional encryption
whose functional decryption involves multiple ciphertexts from different parties. Each party …

Edge-assisted public key homomorphic encryption for preserving privacy in mobile crowdsensing

R Ganjavi, AR Sharafat - IEEE Transactions on Services …, 2022 - ieeexplore.ieee.org
Mobile crowdsensing (MCS) is becoming an increasingly important topic due to rapid
proliferation of mobile apps where participants' anonymity is a pivotal requirement with direct …

: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning

G Tsaloli, B Liang, C Brunetta, G Banegas… - … on Information Security, 2021 - Springer
Aggregating data from multiple sources is often required in multiple applications. In this
paper, we introduce DEVA DEVA, a protocol that allows a distributed set of servers to …

An efficient and secure aggregation encryption scheme in edge computing

J Wu, X Sheng, G Li, K Yu, J Liu - China Communications, 2022 - ieeexplore.ieee.org
Edge computing is a highly virtualized paradigm that can services the Internet of Things (IoT)
devices more efficiently. It is a non-trivial extension of cloud computing, which can not only …

Private stream aggregation with labels in the standard model

J Ernst, A Koch - Proceedings on Privacy Enhancing …, 2021 - petsymposium.org
A private stream aggregation (PSA) scheme is a protocol of n clients and one aggregator. At
every time step, the clients send an encrypted value to the (untrusted) aggregator, who is …

Dipsauce: efficient private stream aggregation without trusted parties

J Brorsson, M Gunnarsson - Nordic Conference on Secure IT Systems, 2023 - Springer
Abstract Private Stream Aggregation (PSA) schemes are efficient protocols for distributed
data analytics. In a PSA scheme, a set of data producers can encrypt data for a central party …

TEVA: Training-Efficient and Verifiable Aggregation for Federated Learning for Consumer Electronics in Industry 5.0

Y Xia, Y Liu, J Chen, Y Liang, F Khan… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Federated learning (FL) has been widely used for privacy-preserving model updates in
Industry 5.0, facilitated by 6G networks. Despite FL's privacy-preserving advantages, it …

Identity-based verifiable aggregator oblivious encryption and its applications in smart grids

Z Wang - IEEE Transactions on Sustainable Computing, 2019 - ieeexplore.ieee.org
Verifiable aggregator oblivious encryption is a useful notion that not only allows an untrusted
aggregator to compute aggregated data without learning any other information but also …