PRIVACY PRESERVING FEDERATED LEARNING FROM MULTI-INPUT FUNCTIONAL PROXY RE-ENCRYPTION

被引:1
|
作者
Feng, Xinyu [1 ,3 ,4 ]
Shen, Qingni [1 ,3 ,4 ]
Li, Cong [2 ,3 ,4 ]
Fang, Yuejian [1 ,3 ,4 ]
Wu, Zhonghai [1 ,2 ,3 ,4 ]
机构
[1] Peking Univ, Sch Software & Microelectron, Beijing, Peoples R China
[2] Peking Univ, Sch Comp Sci, Beijing, Peoples R China
[3] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
[4] Peking Univ, PKU OCTA Lab Blockchain & Privacy Comp, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
Federated Learning; Proxy Re-encryption; Multi-Input Functional Encryption; PPML;
D O I
10.1109/ICASSP48485.2024.10446283
中图分类号
学科分类号
摘要
Federated learning (FL) allows different participants to collaborate on model training without transmitting raw data, thereby protecting user data privacy. However, FL faces a series of security and privacy issues (e.g. the leakage of raw data from publicly shared parameters). Several privacy protection technologies, such as homomorphic encryption, differential privacy and functional encryption, are introduced for privacy enhancement in FL. Among them, the FL frameworks based on functional encryption better balance security and performance, thus receiving increasing attention. The previous FL frameworks based on functional encryption suffer from several security issues, including attacks by combining multiple rounds of ciphertexts and keys, and leakage of global parameters to the central server. To tackle these issues, we propose a novel multi-input functional proxy re-encryption (MI-FPRE) scheme and further design a new FL framework with better privacy based on MI-FPRE. Our framework allows a semi-trusted central server to aggregate the parameters without knowing the intermediate parameters and the result of aggregation, thus achieves better privacy in FL training. The experimental results indicate that our framework achieves less communication overhead and higher computational efficiency without losing accuracy.
引用
收藏
页码:6955 / 6959
页数:5
相关论文
共 50 条
  • [31] Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
    Rabieh, Khaled
    Mercan, Suat
    Akkaya, Kemal
    Baboolal, Vashish
    Aygun, Ramazan S.
    2020 IEEE 21ST INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2020), 2020, : 45 - 52
  • [32] Proxy Re-Encryption and Re-Signatures from Lattices
    Fan, Xiong
    Liu, Feng-Hao
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 363 - 382
  • [33] Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
    Chandran, Nishanth
    Chase, Melissa
    Liu, Feng-Hao
    Nishimaki, Ryo
    Xagawa, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 95 - 112
  • [34] Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning
    Fang, Haokun
    Qian, Quan
    FUTURE INTERNET, 2021, 13 (04):
  • [35] Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud
    Xia, Zhe
    Yang, Qiliang
    Qiao, Zirui
    Feng, Feng
    INFORMATION SCIENCES, 2023, 621 : 58 - 73
  • [36] Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps
    Tang, Fei
    Li, Hongda
    Chang, Jinyong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (02) : 762 - 766
  • [37] Proxy Re-encryption Scheme from IBE to CBE
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 99 - 102
  • [38] Secure Proxy Re-Encryption from CBE to IBE
    CHEN Yan
    Wuhan University Journal of Natural Sciences, 2008, (06) : 657 - 661
  • [39] PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System
    Chen, Yange
    Wang, Baocang
    Zhang, Zhili
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2032 - 2043
  • [40] Achieving key privacy without losing CCA security in proxy re-encryption
    Shao, Jun
    Liu, Peng
    Zhou, Yuan
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) : 655 - 665