METHODS article
Front. Big Data
Sec. Cybersecurity and Privacy
Volume 8 - 2025 | doi: 10.3389/fdata.2025.1638307
Secure aggregation of suciently many private inputs
Provisionally accepted- 1Netherlands Organisation for Applied Scientific Research, Amsterdam, Netherlands
- 2Universiteit Twente, Enschede, Netherlands
- 3Austrian Institute of Technology GmbH, Vienna, Austria
- 4TNO, The Hague, Netherlands
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
Secure aggregation of distributed inputs is a well studied problem. In this paper anonymity of inputs is achieved by assuring a minimal quota before publishing the outcome. We design and implement an ecient cryptographic protocol that mitigates the most important security risks, and show its application in the cyber threat intelligence (CTI) domain. Our approach allows for generic aggregation and quota functions. With 20 inputs from dierent parties, we can do 3 secure and anonymous aggregations per second, and in a CTI community of 100 partners, 10, 000 aggregations could be performed during one night.
Keywords: Secure multi party computation, Secure aggregation, Shamir (k,n) -threshold, Cyber threat intelligence, Security model
Received: 30 May 2025; Accepted: 15 Aug 2025.
Copyright: © 2025 Veugen, Spini and Muller. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Thijs Veugen, Netherlands Organisation for Applied Scientific Research, Amsterdam, Netherlands
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.