For concreteness and brevity, in the rest of the article, we discuss secure aggregation using the context and terminology of sensor networks. Much of the published literature in secure aggregation is motivated by the application context of sensor networks; in general the models and analysis are often sufficiently general to apply to various other distributed data collection and computation networks such as peer-to-peer and grid computing networks.
展开▼