2024
DOI: 10.3390/math12050718
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Fairness Guarantee Approach for Privacy-Preserving Collaborative Training in Computing Force Network

Zhe Sun,
Weiping Li,
Junxi Liang
et al.

Abstract: The advent of the big data era has brought unprecedented data demands. The integration of computing resources with network resources in the computing force network enables the possibility of distributed collaborative training. However, unencrypted collaborative training is vulnerable to threats such as gradient inversion attacks and model theft. To address this issue, the data in collaborative training are usually protected by cryptographic methods. However, the semantic meaninglessness of encrypted data makes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(8 citation statements)
references
References 29 publications
0
0
0
Order By: Relevance
“…This section will compare various encryption methods and discuss the 6G scenarios suitable for each method, as shown in Table 10. When the size of the encryption group increases, the encryption time for Paillier increases linearly, but the encryption time for BCP and the method from the literature [42] remains constant. The method from the literature's [42] encryption takes less time.…”
Section: Evaluation Of the Contribution Of Ciphertext Datamentioning
confidence: 99%
See 4 more Smart Citations
“…This section will compare various encryption methods and discuss the 6G scenarios suitable for each method, as shown in Table 10. When the size of the encryption group increases, the encryption time for Paillier increases linearly, but the encryption time for BCP and the method from the literature [42] remains constant. The method from the literature's [42] encryption takes less time.…”
Section: Evaluation Of the Contribution Of Ciphertext Datamentioning
confidence: 99%
“…When the size of the encryption group increases, the encryption time for Paillier increases linearly, but the encryption time for BCP and the method from the literature [42] remains constant. The method from the literature's [42] encryption takes less time. When the message length is 300, the encryption times for BCP and Paillier are almost the same.…”
Section: Evaluation Of the Contribution Of Ciphertext Datamentioning
confidence: 99%
See 3 more Smart Citations