Paper
28 October 2022 NIPVS-FL: a non-interactive publicly verifiable secure federated-learning scheme against malicious servers
Yizhuo Wang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen
Author Affiliations +
Proceedings Volume 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022); 124530I (2022) https://doi.org/10.1117/12.2659133
Event: Third International Conference on Computer Communication and Network Security (CCNS 2022), 2022, Hohhot, China
Abstract
Federated learning (FL) enables decentralized data sources like mobile phones to joint training a neural network model without sharing the original data. However, shared local gradients make the privacy of local data in FL vulnerable. The aggregation server also may return incorrect results to clients due to unexpected error or the deliberately attack. In this work, we explore how to design a non-interactive and publicly verifiable aggregation scheme. The existing verifiable schemes are under semi-honest adversary model, in which the server is honest-but-curious but with additional power to counterfeit the aggregation result. We propose a scheme under stronger security model against malicious servers. The proposed scheme guarantees that as long as the two servers are non-colluding, even a malicious server cannot obtain input privacy of client. The malicious server will be detected by honest clients when it tries to tamper the result.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yizhuo Wang, Zhenfu Cao, Xiaolei Dong, and Jiachen Shen "NIPVS-FL: a non-interactive publicly verifiable secure federated-learning scheme against malicious servers", Proc. SPIE 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022), 124530I (28 October 2022); https://doi.org/10.1117/12.2659133
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer simulations

Data modeling

Systems modeling

Information security

Java

Machine learning

Neural networks

Back to Top