Privacy of federated QR decomposition using additive secure multiparty computation

نویسندگان

چکیده

Federated learning (FL) is a privacy-aware data mining strategy keeping the private on owners’ machine and thereby confidential. The clients compute local models send them to an aggregator which computes global model. In hybrid FL, parameters are additionally masked using secure aggregation, such that only aggregated statistics become available in clear text, not client specific updates. this context, we investigate leakage of three popular algorithms for QR decomposition, Gram-Schmidt orthonormalization, Householder algorithm Givens rotation. We show that, even when additive SMPC, rotation matrix leak raw therefore suited computation paradigm. orthonormalization relies inner vector products does points.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Output Privacy in Secure Multiparty Computation

In secure multiparty computation, a set of mutually mistrusting players engage in a protocol to compute an arbitrary, publicly known polynomial-sized function of the party’s private inputs, in a way that does not reveal (to an adversary controlling some of the players) any knowledge about the remaining inputs, beyond what can be deduced from the obtained output(s). Since its introduction by Yao...

متن کامل

New privacy preserving clustering methods for secure multiparty computation

Many researches on privacy preserving data mining have been done. Privacy preserving data mining can be achieved in various ways by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Further, in order to increase the security of data mining, secure multiparty computation (SMC) has been introduced. Most of works in SMC are developed on applying the model of SM...

متن کامل

New Privacy Preserving Back Propagation Learning for Secure Multiparty Computation

Many studies have been done with the security of cloud computing. Data encryption is one of typical approaches. However, complex computing requirement for encrypted data needs a great deal of time and effort for the system in this case. Therefore, another studies on secure sharing and computing methods are made to avoid secure risks being abused or leaked and to reduce computing cost. The secur...

متن کامل

Privacy Preserving Fuzzy Modeling for Secure Multiparty Computation

Many studies on privacy preserving of machine learning and data mining have been done in various methods by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Data encryption is one of typical approaches. However, its system requires both encryption and decryption for requests of client or user, so its complexity of computation is very high. Therefore, studie...

متن کامل

Secure Multiparty Computation for Privacy-Preserving Data Mining

In this paper, we survey the basic paradigms and notions of secure multiparty computation and discuss their relevance to the field of privacy-preserving data mining. In addition to reviewing definitions and constructions for secure multiparty computation, we discuss the issue of efficiency and demonstrate the difficulties involved in constructing highly efficient protocols. We also present comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2023

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2023.3301710