Proceedings of the 2021 International Conference on Management of Data 2021
DOI: 10.1145/3448016.3457241
|View full text |Cite
|
Sign up to set email alerts
|

VF 2 Boost: Very Fast Vertical Federated Gradient Boosting for Cross-Enterprise Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(17 citation statements)
references
References 69 publications
0
16
0
Order By: Relevance
“…In this work, we focus on additive HE. For instance, Paillier cryptosystem [53] is a well-known additive HE method and has been used in many FL algorithms [10,19,25,71,75]. Paillier cryptosystem initializes with a key pair ⟨𝑝𝑘, 𝑠𝑘⟩.…”
Section: Privacy-preserving Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…In this work, we focus on additive HE. For instance, Paillier cryptosystem [53] is a well-known additive HE method and has been used in many FL algorithms [10,19,25,71,75]. Paillier cryptosystem initializes with a key pair ⟨𝑝𝑘, 𝑠𝑘⟩.…”
Section: Privacy-preserving Techniquesmentioning
confidence: 99%
“…Security model. Like many previous works [19,49,66,67,71], we consider the semi-honest (a.k.a. honest-but-curious) security model, where all parties honestly execute the protocols, whilst the curious parties try to analyze the others' data through any information obtained during the protocols.…”
Section: Privacy-preserving Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…To address this problem, there are some solutions based on two different technologies: Cryptography, and Local Differential Privacy (LDP). Framework SecureBoost [21] and its subsequent work VF 2 Boost [34] are based on additive homomorphic encryption. Although well-designed engineering optimization is performed, a large number of homomorphic operations still inevitably cause participants to suffer a prohibitively computational overhead.…”
Section: Introductionmentioning
confidence: 99%
“…In SecureBoost proposed by Cheng et al [21], the user holding labels send gradients and hessians encrypted with HE to other users for sorting. Fu et al [34] proposed 𝑉 𝐹 2 Boost to optimize SecureBoost from the perspective of engineering implementation. However, the training process is still extremely time-consuming since a lot of cryptographic operations are irreducible.…”
mentioning
confidence: 99%