{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T12:37:24Z","timestamp":1726231044385},"reference-count":48,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1016\/j.future.2022.01.007","type":"journal-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T16:02:32Z","timestamp":1643040152000},"page":"28-42","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices"],"prefix":"10.1016","volume":"131","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7658-3797","authenticated-orcid":false,"given":"Mei","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3472-419X","authenticated-orcid":false,"given":"Kun","family":"He","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[]},{"given":"Bingsheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zengpeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.future.2022.01.007_b1","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TIFS.2016.2515513","article-title":"Privacy-preserving data aggregation in mobile phone sensing","volume":"11","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.future.2022.01.007_b2","first-page":"9","article-title":"Efficient and privacy-preserving min and kth min computations in mobile sensing systems","volume":"14","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"issue":"7","key":"10.1016\/j.future.2022.01.007_b3","doi-asserted-by":"crossref","first-page":"6132","DOI":"10.1109\/JIOT.2019.2957314","article-title":"FESDA: fog-enabled secure data aggregation in smart grid IoT network","volume":"7","author":"Saleem","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.future.2022.01.007_b4","doi-asserted-by":"crossref","first-page":"1948","DOI":"10.1109\/TII.2020.2995228","article-title":"Enabling privacy-assured fog-based data aggregation in E-healthcare systems","volume":"17","author":"Guo","year":"2021","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.future.2022.01.007_b5","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/TIFS.2020.3014487","article-title":"Smart and practical privacy-preserving data aggregation for fog-based smart grids","volume":"16","author":"Zhao","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2022.01.007_b6","series-title":"Proc. of INFOCOM","article-title":"KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks","author":"Groat","year":"2011"},{"issue":"4","key":"10.1016\/j.future.2022.01.007_b7","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/TIFS.2014.2307197","article-title":"Secure data aggregation in wireless sensor networks: Filtering out the attacker\u2019s impact","volume":"9","author":"Roy","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"10.1016\/j.future.2022.01.007_b8","doi-asserted-by":"crossref","first-page":"3948","DOI":"10.1109\/JIOT.2019.2959094","article-title":"Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks","volume":"7","author":"Zhou","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2022.01.007_b9","series-title":"Proc. of CCS","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"Bonawitz","year":"2017"},{"key":"10.1016\/j.future.2022.01.007_b10","series-title":"Proc. of S&P","article-title":"SecureMl: A system for scalable privacy-preserving machine learning","author":"Mohassel","year":"2017"},{"key":"10.1016\/j.future.2022.01.007_b11","series-title":"Proc. of INFOCOM","article-title":"Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation","author":"Jung","year":"2013"},{"key":"10.1016\/j.future.2022.01.007_b12","series-title":"Proc. of INFOCOM","article-title":"Communication-efficient and privacy-preserving data aggregation without trusted authority","author":"Gong","year":"2018"},{"key":"10.1016\/j.future.2022.01.007_b13","series-title":"Proc. of CCSW","article-title":"PrivFL: Practical privacy-preserving federated regressions on high-dimensional data over mobile networks","author":"Mandal","year":"2019"},{"key":"10.1016\/j.future.2022.01.007_b14","series-title":"Proc. of TrustBus","article-title":"A distributed trust framework for privacy-preserving machine learning","author":"Abramson","year":"2020"},{"key":"10.1016\/j.future.2022.01.007_b15","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.comcom.2021.02.014","article-title":"Privacy preserving distributed machine learning with federated learning","volume":"171","author":"Chamikara","year":"2021","journal-title":"Comput. Commun."},{"issue":"6412","key":"10.1016\/j.future.2022.01.007_b16","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1126\/science.aat4807","article-title":"Realizing private and practical pharmacological collaboration","volume":"362","author":"Hie","year":"2018","journal-title":"Science"},{"key":"10.1016\/j.future.2022.01.007_b17","series-title":"Proc. of ECAI","article-title":"Privacy-preserving machine learning using federated learning and secure aggregation","author":"Lia","year":"2020"},{"key":"10.1016\/j.future.2022.01.007_b18","series-title":"Proc. of HPEC","article-title":"Arithmetic and Boolean secret sharing MPC on FPGAs in the data center","author":"Patel","year":"2020"},{"key":"10.1016\/j.future.2022.01.007_b19","series-title":"Proc. of FPL","article-title":"Secret sharing MPC on FPGAs in the datacenter","author":"Wolfe","year":"2020"},{"key":"10.1016\/j.future.2022.01.007_b20","series-title":"Federated learning: Strategies for improving communication efficiency","author":"Konecn\u00fd","year":"2016"},{"issue":"2","key":"10.1016\/j.future.2022.01.007_b21","doi-asserted-by":"crossref","first-page":"12:1","DOI":"10.1145\/3298981","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"3","key":"10.1016\/j.future.2022.01.007_b22","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MCE.2019.2959108","article-title":"Preserving data privacy via federated learning: Challenges and solutions","volume":"9","author":"Li","year":"2020","journal-title":"IEEE Consum. Electron. Mag."},{"key":"10.1016\/j.future.2022.01.007_b23","series-title":"Proc. of FOCS","article-title":"Protocols for secure computations (extended abstract)","author":"Yao","year":"1982"},{"key":"10.1016\/j.future.2022.01.007_b24","series-title":"Proc. of FOCS","article-title":"How to generate and exchange secrets (extended abstract)","author":"Yao","year":"1986"},{"key":"10.1016\/j.future.2022.01.007_b25","series-title":"Proc. of FOCS","article-title":"How to play almost any mental game over the net - concurrent composition via super-polynomial simulation","author":"Barak","year":"2005"},{"key":"10.1016\/j.future.2022.01.007_b26","series-title":"Proc. of CRYPTO","article-title":"Efficient constant round multi-party computation combining BMR and SPDZ","author":"Lindell","year":"2015"},{"key":"10.1016\/j.future.2022.01.007_b27","series-title":"Proc. of STOC","article-title":"Fully homomorphic encryption using ideal lattices","author":"Gentry","year":"2009"},{"key":"10.1016\/j.future.2022.01.007_b28","series-title":"Proc. of EUROCRYPT","article-title":"Implementing gentry\u2019s fully-homomorphic encryption scheme","author":"Gentry","year":"2011"},{"key":"10.1016\/j.future.2022.01.007_b29","series-title":"Securely Outsourcing Computations using Homomorphic Encryption","author":"Peter","year":"2013"},{"key":"10.1016\/j.future.2022.01.007_b30","series-title":"Secure outsourced calculations with homomorphic encryption","author":"Wang","year":"2018"},{"issue":"1","key":"10.1016\/j.future.2022.01.007_b31","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1186\/s42400-020-00057-3","article-title":"Lightning-fast and privacy-preserving outsourced computation in the cloud","volume":"3","author":"Liu","year":"2020","journal-title":"Cybersecurity"},{"key":"10.1016\/j.future.2022.01.007_b32","series-title":"Proc. of CTS","article-title":"Secured histories for presence systems","author":"Rieffel","year":"2011"},{"key":"10.1016\/j.future.2022.01.007_b33","series-title":"Proc. of ICNP","article-title":"Efficient and privacy-preserving data aggregation in mobile sensing","author":"Li","year":"2012"},{"key":"10.1016\/j.future.2022.01.007_b34","series-title":"Proc. of NSDI","article-title":"TimeCrypt: Encrypted data stream processing at scale with cryptographic access control","author":"Burkhalter","year":"2020"},{"issue":"3","key":"10.1016\/j.future.2022.01.007_b35","doi-asserted-by":"crossref","first-page":"20:1","DOI":"10.1145\/1525856.1525858","article-title":"Efficient and provably secure aggregation of encrypted data in wireless sensor networks","volume":"5","author":"Castelluccia","year":"2009","journal-title":"ACM Trans. Sens. Netw."},{"key":"10.1016\/j.future.2022.01.007_b36","series-title":"Proc. ICDCS","article-title":"Providing efficient privacy-aware incentives for mobile sensing","author":"Li","year":"2014"},{"key":"10.1016\/j.future.2022.01.007_b37","series-title":"Introduction to Modern Cryptography","author":"Katz","year":"2021"},{"key":"10.1016\/j.future.2022.01.007_b38","unstructured":"R. P. Protection, RFC 5246, Internet Engineering Task Force."},{"key":"10.1016\/j.future.2022.01.007_b39","series-title":"Intel software guard extensions (intel SGX)","year":"2021"},{"key":"10.1016\/j.future.2022.01.007_b40","series-title":"ARM trustzone","year":"2021"},{"key":"10.1016\/j.future.2022.01.007_b41","series-title":"Advanced microchip devices","year":"2021"},{"key":"10.1016\/j.future.2022.01.007_b42","series-title":"Proc. of NDSS","article-title":"Giving state to the stateless: Augmenting trustworthy computation with ledgers","author":"Kaptchuk","year":"2019"},{"key":"10.1016\/j.future.2022.01.007_b43","series-title":"Proc. of EuroS&P","article-title":"Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts","author":"Cheng","year":"2019"},{"key":"10.1016\/j.future.2022.01.007_b44","series-title":"Proc. of EUROCRYPT","article-title":"Our data, ourselves: Privacy via distributed noise generation","author":"Dwork","year":"2006"},{"key":"10.1016\/j.future.2022.01.007_b45","series-title":"Proc. of SIGMOD","article-title":"Differentially private aggregation of distributed time-series with transformation and encryption","author":"Rastogi","year":"2010"},{"key":"10.1016\/j.future.2022.01.007_b46","series-title":"Proc. of NDSS","article-title":"Privacy-preserving aggregation of time-series data","author":"Shi","year":"2011"},{"key":"10.1016\/j.future.2022.01.007_b47","series-title":"Proc. of FC, Vol. 7397","first-page":"200","article-title":"Privacy-preserving stream aggregation with fault tolerance","author":"Chan","year":"2012"},{"key":"10.1016\/j.future.2022.01.007_b48","series-title":"Proc. of TCC","article-title":"Functional encryption: Definitions and challenges","author":"Boneh","year":"2011"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X22000152?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X22000152?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T15:25:09Z","timestamp":1711985109000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X22000152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":48,"alternative-id":["S0167739X22000152"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2022.01.007","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2022,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2022.01.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}