Nothing Special   »   [go: up one dir, main page]

Lin et al., 2023 - Google Patents

Privacy-protected aggregation in federated learning based on semi-homomorphic encryption

Lin et al., 2023

Document ID
9667281698762253326
Author
Lin H
Chen C
Hu Y
Publication year
Publication venue
3rd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2023)

External Links

Snippet

As people pay more and more attention to privacy protection, federated learning with privacy protection ability comes into being, and gradually becomes one of the research hotspots in the field of machine learning. As a distributed machine learning framework, federated …
Continue reading at www.spiedigitallibrary.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management

Similar Documents

Publication Publication Date Title
Gutoski et al. Hierarchical deterministic bitcoin wallets that tolerate key leakage
Kvyetnyy et al. Usage of the hybrid encryption in a cloud instant messages exchange system
Alexandru et al. Secure multi-party computation for cloud-based control
Ogunseyi et al. Privacy-preserving matrix factorization for cross-domain recommendation
Liu et al. Distributed and deep vertical federated learning with big data
Samanthula et al. Interest-driven private friend recommendation
Yuan et al. Toward secure and scalable computation in internet of things data applications
Mahato et al. Securing edge computing using cryptographic schemes: a review
Lin et al. Privacy-protected aggregation in federated learning based on semi-homomorphic encryption
Ogunseyi et al. Survey and analysis of cryptographic techniques for privacy protection in recommender systems
Chen Cloud storage third-party data security scheme based on fully homomorphic encryption
Shen et al. A robust, distributed, and privacy-preserving aggregation scheme for smart grid communications
Wu et al. A complete classification of quantum public-key encryption protocols
Rong et al. Outsourced k-means clustering over encrypted data under multiple keys in spark framework
Kamel et al. Distributed Cryptography for Lightweight Encryption in Decentralized CP-ABE
Kvetny et al. Partially homomorphic encryption algorithm based on elliptic curves
Ye et al. Verifiable outsourcing of high-degree polynomials and its application in keyword search
Zhang et al. Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things
Bessonov et al. Probabilistic solution of Yao’s millionaires’ problem
Zhang et al. Attribute-based encryption with personalized search
Li et al. Multi-party Security Computation with Differential Privacy over Outsourced Data
He et al. Hierarchical conditional proxy re-encryption: A new insight of fine-grained secure data sharing
Xie et al. Privacy-preserving method of edge computing based on secret sharing and homomorphic encryption
Vu-Thi et al. An Elliptic Curve-Based Privacy-Preserving Recommender System
Zhu et al. Beaver Triple Generator from Multiplicatively Homomorphic Key Management Protocol