PRIVACY PRESERVING FEDERATED LEARNING FROM MULTI-INPUT FUNCTIONAL PROXY RE-ENCRYPTION

被引:1
|
作者
Feng, Xinyu [1 ,3 ,4 ]
Shen, Qingni [1 ,3 ,4 ]
Li, Cong [2 ,3 ,4 ]
Fang, Yuejian [1 ,3 ,4 ]
Wu, Zhonghai [1 ,2 ,3 ,4 ]
机构
[1] Peking Univ, Sch Software & Microelectron, Beijing, Peoples R China
[2] Peking Univ, Sch Comp Sci, Beijing, Peoples R China
[3] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
[4] Peking Univ, PKU OCTA Lab Blockchain & Privacy Comp, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
Federated Learning; Proxy Re-encryption; Multi-Input Functional Encryption; PPML;
D O I
10.1109/ICASSP48485.2024.10446283
中图分类号
学科分类号
摘要
Federated learning (FL) allows different participants to collaborate on model training without transmitting raw data, thereby protecting user data privacy. However, FL faces a series of security and privacy issues (e.g. the leakage of raw data from publicly shared parameters). Several privacy protection technologies, such as homomorphic encryption, differential privacy and functional encryption, are introduced for privacy enhancement in FL. Among them, the FL frameworks based on functional encryption better balance security and performance, thus receiving increasing attention. The previous FL frameworks based on functional encryption suffer from several security issues, including attacks by combining multiple rounds of ciphertexts and keys, and leakage of global parameters to the central server. To tackle these issues, we propose a novel multi-input functional proxy re-encryption (MI-FPRE) scheme and further design a new FL framework with better privacy based on MI-FPRE. Our framework allows a semi-trusted central server to aggregate the parameters without knowing the intermediate parameters and the result of aggregation, thus achieves better privacy in FL training. The experimental results indicate that our framework achieves less communication overhead and higher computational efficiency without losing accuracy.
引用
收藏
页码:6955 / 6959
页数:5
相关论文
共 50 条
  • [1] Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption
    Ku, Hanchao
    Susilo, Willy
    Zhang, Yudi
    Liu, Wenfen
    Zhang, Mingwu
    COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [2] Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption
    Shen, Xiaoying
    Luo, Xue
    Yuan, Feng
    Wang, Baocang
    Chen, Yange
    Tang, Dianhua
    Gao, Le
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144
  • [3] Offline privacy preserving proxy re-encryption in mobile cloud computing
    Koe, Arthur Sandor Voundi
    Lin, Yaping
    PERVASIVE AND MOBILE COMPUTING, 2019, 59
  • [4] Preserving Privacy of Drone Videos using Proxy Re-encryption Technique
    Baboolal, Vashish
    Akkaya, Kemal
    Saputro, Nico
    Rabieh, Khaled
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 336 - 337
  • [5] Preserving Patient's Privacy using Proxy Re-encryption in Permissioned Blockchain
    Meena, Devendra
    Dwivedi, Ras
    Shukla, Sandeep
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 450 - 457
  • [6] PAC: Privacy preserving proxy re-encryption for access control in public cloud
    Chaudhari, Payal
    Das, Manik Lal
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 612 - 627
  • [7] ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning
    Fan, Chun-, I
    Hsu, Ya-Wen
    Shie, Cheng-Han
    Tseng, Yi-Fan
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [8] A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption
    Zwattendorfer, Bernd
    Slamanig, Daniel
    Stranacher, Klaus
    Hoerandner, Felix
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 92 - 103
  • [9] Using Homomorphic Proxy Re-Encryption to Enhance Security and Privacy of Federated Learning-Based Intelligent Connected Vehicles
    Bai, Yang
    Rao, Yutang
    Wu, Hongyan
    Wang, Juan
    Yang, Wentao
    Xing, Gaojie
    Yang, Jiawei
    Yuan, Xiaoshu
    IET INFORMATION SECURITY, 2025, 2025 (01)
  • [10] Proxy Re-encryption from Lattices
    Kirshanova, Elena
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 77 - 94