Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning
-
Published:2024-02-22
Issue:5
Volume:13
Page:848
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Zhang Yongjing1, Zhang Zhouyang2, Ji Shan1, Wang Shenqing1, Huang Shitao3
Affiliation:
1. College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China 2. Research Center for Basic Theories of Intelligent Computing, Research Institute of Basic Theories, Zhejiang Laboratory, Hangzhou 311100, China 3. School of Computer Science, Nanjing University of Science Information and Technology, Nanjing 210044, China
Abstract
The need of data owners for privacy protection has given rise to collaborative learning, and data-related issues heterogeneity faced by federated learning has further given rise to clustered federated learning; whereas the traditional privacy-preserving scheme of federated learning using homomorphic encryption alone fails to fulfill the privacy protection demands of clustered federated learning. To address these issues, this research provides an effective and safeguarded answer for sharing homomorphic encryption keys among clusters in clustered federated learning grounded in conditional representative broadcast re-encryption. This method constructs a key sharing mechanism. By combining the functions of the bilinear pairwise accumulator and specific conditional proxy broadcast re-ciphering, the mechanism can verify the integrity of homomorphic encryption keys stored on cloud servers. In addition, the solution enables key management centers to grant secure and controlled access to re-encrypted homomorphic encryption keys to third parties without disclosing the sensitive information contained therein. The scheme achieves this by implementing a sophisticated access tree-based mechanism that enables the cloud server to convert forwarded ciphertexts into completely new ciphertexts customized specifically for a given group of users. By effectively utilizing conditional restrictions, the scheme achieves fine-grained access control to protect the privacy of shared content. Finally, this paper showcases the scheme’s security against selective ciphertext attacks without relying on random prediction.
Funder
National Natural Science Foundation of China Natural Science Foundation of Zhejiang Province Open Fund of the Key Laboratory of Port, Waterway, and Sedimentation Engineering, Ministry of Communications, China National Key Research and Development Program of Guangdong Province Natural Science Foundation of Jiangsu Province
Reference46 articles.
1. Location privacy protection based on differential privacy strategy for big data in industrial internet of things;Yin;IEEE Trans. Ind. Inform.,2017 2. An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks;Wang;Int. J. Distrib. Sens. Netw.,2019 3. Ge, C., Liu, Z., Susilo, W., Fang, L., and Wang, H. (IEEE Trans. Dependable Secur. Comput., 2023). Attribute-based encryption with reliable outsourced decryption in cloud computing using smart contract, IEEE Trans. Dependable Secur. Comput., early access. 4. Liu, J., Liang, T., Sun, R., Du, X., and Guizani, M. (2020, January 7–11). A privacy-preserving medical data sharing scheme based on consortium blockchain. Proceedings of the GLOBECOM 2020–2020 IEEE Global Communications Conference, IEEE, Taipei, Taiwan. 5. Konečnỳ, J., McMahan, H.B., Yu, F.X., Richtárik, P., Suresh, A.T., and Bacon, D. (2016). Federated learning: Strategies for improving communication efficiency. arXiv.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|