Lin et al., 2023 - Google Patents
Privacy-protected aggregation in federated learning based on semi-homomorphic encryptionLin et al., 2023
- Document ID
- 9667281698762253326
- Author
- Lin H
- Chen C
- Hu Y
- Publication year
- Publication venue
- 3rd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2023)
External Links
Snippet
As people pay more and more attention to privacy protection, federated learning with privacy protection ability comes into being, and gradually becomes one of the research hotspots in the field of machine learning. As a distributed machine learning framework, federated …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gutoski et al. | Hierarchical deterministic bitcoin wallets that tolerate key leakage | |
Kvyetnyy et al. | Usage of the hybrid encryption in a cloud instant messages exchange system | |
Alexandru et al. | Secure multi-party computation for cloud-based control | |
Ogunseyi et al. | Privacy-preserving matrix factorization for cross-domain recommendation | |
Liu et al. | Distributed and deep vertical federated learning with big data | |
Samanthula et al. | Interest-driven private friend recommendation | |
Yuan et al. | Toward secure and scalable computation in internet of things data applications | |
Mahato et al. | Securing edge computing using cryptographic schemes: a review | |
Lin et al. | Privacy-protected aggregation in federated learning based on semi-homomorphic encryption | |
Ogunseyi et al. | Survey and analysis of cryptographic techniques for privacy protection in recommender systems | |
Chen | Cloud storage third-party data security scheme based on fully homomorphic encryption | |
Shen et al. | A robust, distributed, and privacy-preserving aggregation scheme for smart grid communications | |
Wu et al. | A complete classification of quantum public-key encryption protocols | |
Rong et al. | Outsourced k-means clustering over encrypted data under multiple keys in spark framework | |
Kamel et al. | Distributed Cryptography for Lightweight Encryption in Decentralized CP-ABE | |
Kvetny et al. | Partially homomorphic encryption algorithm based on elliptic curves | |
Ye et al. | Verifiable outsourcing of high-degree polynomials and its application in keyword search | |
Zhang et al. | Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things | |
Bessonov et al. | Probabilistic solution of Yao’s millionaires’ problem | |
Zhang et al. | Attribute-based encryption with personalized search | |
Li et al. | Multi-party Security Computation with Differential Privacy over Outsourced Data | |
He et al. | Hierarchical conditional proxy re-encryption: A new insight of fine-grained secure data sharing | |
Xie et al. | Privacy-preserving method of edge computing based on secret sharing and homomorphic encryption | |
Vu-Thi et al. | An Elliptic Curve-Based Privacy-Preserving Recommender System | |
Zhu et al. | Beaver Triple Generator from Multiplicatively Homomorphic Key Management Protocol |