Privacy of federated QR decomposition using additive secure multiparty computation
نویسندگان
چکیده
Federated learning (FL) is a privacy-aware data mining strategy keeping the private on owners’ machine and thereby confidential. The clients compute local models send them to an aggregator which computes global model. In hybrid FL, parameters are additionally masked using secure aggregation, such that only aggregated statistics become available in clear text, not client specific updates. this context, we investigate leakage of three popular algorithms for QR decomposition, Gram-Schmidt orthonormalization, Householder algorithm Givens rotation. We show that, even when additive SMPC, rotation matrix leak raw therefore suited computation paradigm. orthonormalization relies inner vector products does points.
منابع مشابه
Output Privacy in Secure Multiparty Computation
In secure multiparty computation, a set of mutually mistrusting players engage in a protocol to compute an arbitrary, publicly known polynomial-sized function of the party’s private inputs, in a way that does not reveal (to an adversary controlling some of the players) any knowledge about the remaining inputs, beyond what can be deduced from the obtained output(s). Since its introduction by Yao...
متن کاملNew privacy preserving clustering methods for secure multiparty computation
Many researches on privacy preserving data mining have been done. Privacy preserving data mining can be achieved in various ways by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Further, in order to increase the security of data mining, secure multiparty computation (SMC) has been introduced. Most of works in SMC are developed on applying the model of SM...
متن کاملNew Privacy Preserving Back Propagation Learning for Secure Multiparty Computation
Many studies have been done with the security of cloud computing. Data encryption is one of typical approaches. However, complex computing requirement for encrypted data needs a great deal of time and effort for the system in this case. Therefore, another studies on secure sharing and computing methods are made to avoid secure risks being abused or leaked and to reduce computing cost. The secur...
متن کاملPrivacy Preserving Fuzzy Modeling for Secure Multiparty Computation
Many studies on privacy preserving of machine learning and data mining have been done in various methods by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Data encryption is one of typical approaches. However, its system requires both encryption and decryption for requests of client or user, so its complexity of computation is very high. Therefore, studie...
متن کاملSecure Multiparty Computation for Privacy-Preserving Data Mining
In this paper, we survey the basic paradigms and notions of secure multiparty computation and discuss their relevance to the field of privacy-preserving data mining. In addition to reviewing definitions and constructions for secure multiparty computation, we discuss the issue of efficiency and demonstrate the difficulties involved in constructing highly efficient protocols. We also present comm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2023
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2023.3301710