ADMM Based Privacy-Preserving Decentralized Optimization
نویسندگان
چکیده
منابع مشابه
Privacy-preserving Decentralized Optimization Based on ADMM
In this paper, we address the problem of privacypreservation in decentralized optimization, where N agents cooperatively minimize an objective function that is the sum of N strongly convex functions private to these individual agents. In most existing decentralized optimization approaches, participating agents exchange and disclose estimates explicitly, which may not be desirable when the estim...
متن کاملPPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encryption system as the encryptor can control the access structure when encrypting a message. In this paper, we propose a privacy-preserving decentralized CP-ABE (PPDCP-ABE) scheme where the central authority is not required, namely each authority can work independently without the cooperation to initialize the ...
متن کاملPrivacy - Preserving Collaborative Optimization
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv ACKNOWLEDGEMENTS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v LIST OF TABLES. . . . . . . . . . . . . ....
متن کاملPrivacy Preserving Reputation Systems for Decentralized Environments
Reputation systems are a key technology for making users accountable for their behavior in online communities. A reputation system computes the reputation of a user based on the feedback provided by the community. If the user draws negative feedback, it loses good reputation and may eventually be excluded from the network. It has been observed that users in a reputation system often hesitate in...
متن کاملReClaim: a Privacy-Preserving Decentralized Social Network
The privacy concerns associated with the popularity of online social networks have given rise to numerous research papers which focus on either storing the data in encrypted form, or decentralizing the network. However, without the incentive of being able to read private data, a centralized system cannot be sustained. A decentralized network does not rely on such incentives and can continue to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2019
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2018.2855169