Your new experience awaits. Try the new design now and help us make it even better

METHODS article

Front. Big Data

Sec. Cybersecurity and Privacy

Volume 8 - 2025 | doi: 10.3389/fdata.2025.1638307

Secure aggregation of suciently many private inputs

Provisionally accepted
  • 1Netherlands Organisation for Applied Scientific Research, Amsterdam, Netherlands
  • 2Universiteit Twente, Enschede, Netherlands
  • 3Austrian Institute of Technology GmbH, Vienna, Austria
  • 4TNO, The Hague, Netherlands

The final, formatted version of the article will be published soon.

Secure aggregation of distributed inputs is a well studied problem. In this paper anonymity of inputs is achieved by assuring a minimal quota before publishing the outcome. We design and implement an ecient cryptographic protocol that mitigates the most important security risks, and show its application in the cyber threat intelligence (CTI) domain. Our approach allows for generic aggregation and quota functions. With 20 inputs from dierent parties, we can do 3 secure and anonymous aggregations per second, and in a CTI community of 100 partners, 10, 000 aggregations could be performed during one night.

Keywords: Secure multi party computation, Secure aggregation, Shamir (k,n) -threshold, Cyber threat intelligence, Security model

Received: 30 May 2025; Accepted: 15 Aug 2025.

Copyright: © 2025 Veugen, Spini and Muller. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

* Correspondence: Thijs Veugen, Netherlands Organisation for Applied Scientific Research, Amsterdam, Netherlands

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.