Privacy?preserving federated learning based on multi?key homomorphic encryption
نویسندگان
چکیده
With the advance of machine learning and Internet Things (IoT), security privacy have become critical concerns in mobile services networks. Transferring data to a central unit violates sensitive data. Federated mitigates this need transfer local by sharing model updates only. However, leakage remains an issue. This paper proposes xMK-CKKS, improved version MK-CKKS multi-key homomorphic encryption protocol, design novel privacy-preserving federated scheme. In scheme, are encrypted via aggregated public key before with server for aggregation. For decryption, collaboration among all participating devices is required. Our scheme prevents from publicly shared resistant collusion between k < N ? 1 server. The evaluation demonstrates that outperforms other innovations communication computational cost while preserving accuracy.
منابع مشابه
Homomorphic Encryption Based Data Security on Federated Cloud Computing
Cloud computing usage has increased rapidly in both industries and in research. In recent days as the data grows rapidly, in order to meet the business needs federated cloud is adopted. In federated cloud, as the data is stored and processed away from the user and the cloud service provider, privacy and integrity of the data plays a crucial role. This paper proposes a practical and efficient me...
متن کاملPrivate federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption
Consider two data providers, each maintaining private records of different feature sets about common entities. They aim to learn a linear model jointly in a federated setting, namely, data is local and a shared model is trained from locally computed updates. In contrast with most work on distributed learning, in this scenario (i) data is split vertically, i.e. by features, (ii) only one data pr...
متن کاملIncorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy
Numerous services are being offered over the Internet and require identification of users as in face-to-face interactions. To simplify the authentication procedure and reduce the need to manage multiple credentials to access services, Electronic Identification (eID) schemes have been introduced. eID schemes commonly involve many service providers (SPs) which provide services, such as online sho...
متن کاملTargeted Homomorphic Attribute-Based Encryption
In (key-policy) attribute based encryption (ABE), messages are encrypted respective to attributes x, and keys are generated respective to policy functions f . The ciphertext is decryptable by a key only if f(x) = 0. Adding homomorphic capabilities to ABE is a long standing open problem, with current techniques only allowing compact homomorphic evaluation on ciphertext respective to the same x. ...
متن کاملHomomorphic Encryption
Fully homomorphic encryption (FHE) has been called the “Swiss Army knife of cryptography”, since it provides a single tool that can be uniformly applied to many cryptographic applications. In this tutorial we study FHE and describe its different properties, relations with other concepts in cryptography, and constructions. We briefly discuss the three generations of FHE constructions since Gentr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Intelligent Systems
سال: 2022
ISSN: ['1098-111X', '0884-8173']
DOI: https://doi.org/10.1002/int.22818