4.7 Article

PFLM: Privacy-preserving federated learning with membership proof

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent

Fengwei Wang et al.

Summary: This paper presents a privacy-preserving and non-interactive federated learning scheme named VANE, which allows multiple data owners to train a global regression model while protecting their private data. By using a secure data aggregation algorithm and data pre-processing method, the training process is non-interactive and avoids disclosing sensitive information.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage

Yuan Zhang et al.

Summary: This paper presents a secure PEKS scheme called SEPSE, which can defend against keyword guessing attacks by allowing users to encrypt keywords with dedicated key servers and supporting key renewal. Furthermore, SEPSE can resist online KGA through a public blockchain, enabling key servers to learn the number of keyword requests made by users.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Information Systems

PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage

Yuan Zhang et al.

Summary: PROTECT is a password-based threshold single-sign-on authentication scheme that effectively defends against adversaries compromising identity servers, supports key renewal to resist secret leakage, and efficiently combats offline DGA, online DGA, and password testing attacks. Performance evaluation demonstrates high efficiency on the user side for PROTECT.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2021)

Article Computer Science, Information Systems

Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors

Yuan Zhang et al.

Summary: The deployment of cloud storage services brings significant benefits in data management for users, but also raises security issues, such as data integrity. Public verification techniques can help users employ third-party auditors to verify data integrity, but existing schemes are vulnerable to procrastinating auditors. CPVPA is a certificateless public verification scheme using blockchain technology to address this issue, requiring auditors to record verification results in transactions on the blockchain.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)

Article Computer Science, Hardware & Architecture

FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things

Xiaojun Zhang et al.

Summary: The proposed forward secure PEKS scheme (FS-PEKS) based on lattice assumptions for cloud-assisted IIoT is post-quantum secure, achieving forward security and resisting insider keyword guessing attacks. The study defines the first formal security model on forward security of PEKS and proves the security of FS-PEKS under the model.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

A training-integrity privacy-preserving federated learning scheme with trusted execution environment

Yu Chen et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Privacy-preserving and high-accurate outsourced disease predictor on random forest

Zhuoran Ma et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Le Trieu Phong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing

Jun Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Enabling verifiable multiple keywords search over encrypted cloud data

Yinbin Miao et al.

INFORMATION SCIENCES (2018)

Proceedings Paper Computer Science, Information Systems

Practical Secure Aggregation for Privacy-Preserving Machine Learning

Keith Bonawitz et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)