2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) 2019
DOI: 10.1109/ccwc.2019.8666500
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Key Generation for Polymorphic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 6 publications
0
1
0
Order By: Relevance
“…Therefore, it is necessary to strengthen the robustness of aggregation algorithms against attacks, especially inference and backdoor attacks, to prevent malicious entities from reflecting exchanged messages, whether in the form of model updates, gradients, or parameters, in an effort to uncover the data used for local training. In this regard, several technologies can be explored, such as polymorphic encryption [92] and quantum-resistant cryptography [93].…”
Section: Improving Security and Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, it is necessary to strengthen the robustness of aggregation algorithms against attacks, especially inference and backdoor attacks, to prevent malicious entities from reflecting exchanged messages, whether in the form of model updates, gradients, or parameters, in an effort to uncover the data used for local training. In this regard, several technologies can be explored, such as polymorphic encryption [92] and quantum-resistant cryptography [93].…”
Section: Improving Security and Privacymentioning
confidence: 99%
“…Despite the fact that the developed aggregation algorithms have found robust solutions to poisoning attacks such as the Byzantine attack [91], inference and backdoor attacks are still observed in this area, which requires further development and research. In addition, some techniques and methods in the aggregation algorithm domain are still unknown, such as the polymorphic encryption, "PE", which has proven to be a viable technology for exchanging encrypted data with high confidence in privacy, as explained in [92].…”
mentioning
confidence: 99%
“…PUF targets the nanoscale device parametric variations to create unclonable measurements of physical objects. Their ability to generate and store secret information makes them a good candidate for security systems [16,17]. PUFs generate challenge and response pairs (CRPs); the challenge is created during the enrollment, whereas the response is generated each time authen-tications are needed.…”
Section: Toolsmentioning
confidence: 99%