ICC 2020 - 2020 IEEE International Conference on Communications (ICC) 2020
DOI: 10.1109/icc40277.2020.9148628
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving and Verifiable Federated Learning Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
38
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(38 citation statements)
references
References 16 publications
0
38
0
Order By: Relevance
“…Homomorphic encryption allows a calculation directly to be conducted on a ciphertext to generate an encrypted result such that the decrypted result is the same as the result calculated on the corresponding plaintext. This scheme is an effective way to protect data privacy when exchanging intermediate parameters during the FL training process, and has been widely used in many FL methods [7,26,39,69,71,137,215,221,224]. For example, Phong et al [137] proposed using homomorphic encryption to protect gradient updates during the FL training process.…”
Section: Encryption-based Ppflmentioning
confidence: 99%
See 1 more Smart Citation
“…Homomorphic encryption allows a calculation directly to be conducted on a ciphertext to generate an encrypted result such that the decrypted result is the same as the result calculated on the corresponding plaintext. This scheme is an effective way to protect data privacy when exchanging intermediate parameters during the FL training process, and has been widely used in many FL methods [7,26,39,69,71,137,215,221,224]. For example, Phong et al [137] proposed using homomorphic encryption to protect gradient updates during the FL training process.…”
Section: Encryption-based Ppflmentioning
confidence: 99%
“…Learning. Because cryptographic technique-based FL methods tend to suffer from computation and communication overhead, and perturbation-based FL methods tend to degrade the data utility, in recent years, hybrid PPFL methods have been proposed to balance the tradeoff between data privacy and data utility [30,59,69,70,127,173,198,199,221,224]. For example, the hybrid PPFL methods in References [59,198,224] are based on homomorphic encryption and secret sharing.…”
Section: Hybrid Privacy-preserving Federatedmentioning
confidence: 99%
“…Network training, however, has to be conducted offline and does not involve the untrusted party. Improved schemes have been proposed in [38], [7] using addictive homomorphic encryption to protect model updates, by Zhang et al [8] exploiting privacy-preserving and verifiable federated learning using the Paillier cryptosystem [10], as well as by Froelicher et al [39] who proposed a decentralized system for privacy-conscious statistical analysis on distributed datasets by applying the ElGamal Elliptic Curve additive homomorphic cryptosystem [40]. In these approaches, all participating devices share the same encryption and decryption key, so that private information may leak among devices.…”
Section: Privacy-preserving Federated Learningmentioning
confidence: 99%
“…Any participating device able to observe and analyze these updates may thus pose a threat to the privacy protection interests of other devices, which ultimately discourages participation in the training of a distributed model. homomorphic encryption (HE) enables the computation on encrypted model updates [7,8], all participants in these works share the same public key for encryption and, more importantly, the same secret key for decryption (Fig 1b).…”
Section: Introductionmentioning
confidence: 99%
“…Gao et al [39] proposed an end-to-end privacy protection scheme using HE for federated transfer learning, Zhou et al in [101] combined secret sharing and HE to protect privacy. While Zhang et al [102] introduced HE in Bayesian approaches to protect the privacy of vertical FL, references [103,104] added a coordinator, apart from clients and the central server, and let the coordinator take responsibility for specifying the security protocol including keys and processing functions. Stripelis et al [105] proposed a HE mechanism based on CKKS to reduce the difficulty of encryption and decryption.…”
mentioning
confidence: 99%