Affiliation:
1. School of Software, Henan Polytechnic University, Jiaozuo 454000, China
2. Information Engineering Institute, Jiaozuo University, Jiaozuo 454000, China
Abstract
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarded as an effective tool for preserving user privacy. Additionally, message recovery is a useful cryptographic primitive that ensures message recovery during the verification phase. In federated learning, message recovery can reduce the transmission of parameters and help protect parameter privacy. In this paper, we propose a lattice-based group signature with message recovery (GS-MR). We then prove that the GS-MR scheme has full anonymity and traceability under the random oracle model, and we reduce anonymity and traceability to the hardness assumptions of ring learning with errors (RLWE) and ring short integer solution (RSIS), respectively. Furthermore, we conduct some experiments to evaluate the sizes of key and signature, and make a performance comparison between three lattice-based group signature schemes and the GS-MR scheme. The results show that the message–signature size of GS-MR is reduced by an average of 39.17% for less than 2000 members.
Funder
the Henan Province Key R&D and Promotion Special
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference38 articles.
1. Tan, A.Z., Yu, H., Cui, L., and Yang, Q. (2022). Towards personalized federated learning. IEEE Trans. Neural Netw. Learn. Syst., 1–17.
2. Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications;Chen;Expert Syst. Appl.,2023
3. Moshawrab, M., Adda, M., Bouzouane, A., Ibrahim, H., and Raad, A. (2023). Reviewing Federated Machine Learning and Its Use in Diseases Prediction. Sensors, 23.
4. Optimizing federated learning with deep reinforcement learning for digital twin empowered industrial IoT;Yang;IEEE Trans. Ind. Inform.,2022
5. Chaum, D., and Heyst, E.v. (1991, January 8–11). Group signatures. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK. Available online: https://dl.acm.org/doi/abs/10.5555/1754868.1754897.