期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Systematic Survey for Differential Privacy Techniques in Federated Learning
1
作者 Yi Zhang yunfan lu Fengxia Liu 《Journal of Information Security》 2023年第2期111-135,共25页
Federated learning is a distributed machine learning technique that trains a global model by exchanging model parameters or intermediate results among multiple data sources. Although federated learning achieves physic... Federated learning is a distributed machine learning technique that trains a global model by exchanging model parameters or intermediate results among multiple data sources. Although federated learning achieves physical isolation of data, the local data of federated learning clients are still at risk of leakage under the attack of malicious individuals. For this reason, combining data protection techniques (e.g., differential privacy techniques) with federated learning is a sure way to further improve the data security of federated learning models. In this survey, we review recent advances in the research of differentially-private federated learning models. First, we introduce the workflow of federated learning and the theoretical basis of differential privacy. Then, we review three differentially-private federated learning paradigms: central differential privacy, local differential privacy, and distributed differential privacy. After this, we review the algorithmic optimization and communication cost optimization of federated learning models with differential privacy. Finally, we review the applications of federated learning models with differential privacy in various domains. By systematically summarizing the existing research, we propose future research opportunities. 展开更多
关键词 Federated Learning Differential Privacy Privacy Computing
下载PDF
Learning with Errors Public Key Cryptosystem with Its Security
2
作者 Zhiyong Zheng Kun Tian +1 位作者 Yi Zhang yunfan lu 《Journal of Information Security》 2023年第1期25-38,共14页
The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous res... The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous research results. Then we prove the security of LWE public key cryptosystem by Regev in detail. For not only independent identical Gaussian disturbances but also any general independent identical disturbances, we give a more accurate estimation probability of decryption error of general LWE cryptosystem. This guarantees high security and widespread applications of the LWE public key cryptosystem. 展开更多
关键词 Learning With Errors Problem CRYPTOSYSTEM Decryption Error PROBABILITY SECURITY
下载PDF
Cyclic Lattices, Ideal Lattices and Bounds for the Smoothing Parameter
3
作者 Zhiyong Zheng Fengxia Liu +1 位作者 yunfan lu Kun Tian 《Journal of Information Security》 2022年第4期272-293,共22页
In this article, we introduce the discrete subgroup in &#x211D;<sup>n</sup> as preliminaries first. Then we provide some theories of cyclic lattices and ideal lattices. By regarding the cyclic lattices... In this article, we introduce the discrete subgroup in &#x211D;<sup>n</sup> as preliminaries first. Then we provide some theories of cyclic lattices and ideal lattices. By regarding the cyclic lattices and ideal lattices as the correspondences of finitely generated R-modules, we prove our main theorem, i.e. the correspondence between cyclic lattices in &#x211D;<sup>n</sup> and finitely generated R-modules is one-to-one. Finally, we give an explicit and countable upper bound for the smoothing parameter of cyclic lattices. 展开更多
关键词 Cyclic Lattice Ideal Lattice Finitely Generated R-Module Smoothing Parameter
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部