期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Cycling Attacks against Homomorphic Cryptosystems
1
作者 WANG Lin XU Maozhi HU Zhi YUE Zhihong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期727-732,共6页
We study security of some homomorphic cryptosysterns with similar algebraic structure. It is found out that those cryptosystems have special common properties. Based on these properties, we pose two cycling attacks an... We study security of some homomorphic cryptosysterns with similar algebraic structure. It is found out that those cryptosystems have special common properties. Based on these properties, we pose two cycling attacks and point out some parameters under which the attacks are efficient. It is verified that randomly selected parameters almost impossibly submit to such attacks. Anyhow, two effective methods are given to construct weak parameters for certain homomorphic cryptosystems, and two moduli over 1 024 bits computed by them are shown to be vulnerable to our cycling attacks. It is concluded that strong primes should be used to avert weak parameters. 展开更多
关键词 homomorphic cryptosystem projection problem cycling attack weak parameter
原文传递
VPFL:A verifiable privacy-preserving federated learning scheme for edge computing systems 被引量:1
2
作者 Jiale Zhang Yue Liu +3 位作者 Di Wu Shuai Lou Bing Chen Shui Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期981-989,共9页
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra... Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy. 展开更多
关键词 Federated learning Edge computing PRIVACY-PRESERVING Verifiable aggregation homomorphic cryptosystem
下载PDF
Reliable and Privacy-Preserving Federated Learning with Anomalous Users
3
作者 ZHANG Weiting LIANG Haotian +1 位作者 XU Yuhua ZHANG Chuan 《ZTE Communications》 2023年第1期15-24,共10页
Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accu... Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accuracy of trained models.Although some existing works manage to solve this problem,they either lack privacy protection for users’sensitive information or introduce a two-cloud model that is difficult to find in reality.A reliable and privacy-preserving FL scheme named reliable and privacy-preserving federated learning(RPPFL)based on a single-cloud model is proposed.Specifically,inspired by the truth discovery technique,we design an approach to identify the user’s reliability and thereby decrease the impact of anomalous users.In addition,an additively homomorphic cryptosystem is utilized to provide comprehensive privacy preservation(user’s local gradient privacy and reliability privacy).We give rigorous theoretical analysis to show the security of RPPFL.Based on open datasets,we conduct extensive experiments to demonstrate that RPPEL compares favorably with existing works in terms of efficiency and accuracy. 展开更多
关键词 federated learning anomalous user privacy preservation reliability homomorphic cryptosystem
下载PDF
A Privacy-preserving Energy Management System Based on Homomorphic Cryptosystem for IoT-enabled Active Distribution Network
4
作者 Qian Hu Siqi Bu +1 位作者 Wencong Su Vladimir Terzija 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第1期167-178,共12页
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity threats.In this paper,the eavesdropping... Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity threats.In this paper,the eavesdropping attacks that lead to privacy breaches are addressed for the IoT-enabled ADN.A privacy-preserving energy management system(EMS)is proposed and empowered by secure data exchange protocols based on the homomorphic cryptosystem.During the information transmission among distributed generators and load customers in the EMS,private information including power usage and electricity bidding price can be effectively protected against eavesdropping attacks.The correctness of the final solutions,e.g.,optimal market clearing price and unified power utilization ratio,can be deterministically guaranteed.The simulation results demonstrate the effectiveness and the computational efficiency of the proposed homomorphically encrypted EMS. 展开更多
关键词 Eavesdropping attack energy management system homomorphic cryptosystem Internet of Things(IOTs) active distribution network(ADN) PRIVACY-PRESERVING
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部