VerifyNet: Secure and verifiable federated learning

G Xu, H Li, S Liu, K Yang, X Lin - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As an emerging training model with neural networks, federated learning has received
widespread attention due to its ability to update parameters without collecting users' raw …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Achieving privacy-preserving and verifiable support vector machine training in the cloud

C Hu, C Zhang, D Lei, T Wu, X Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the proliferation of machine learning, the cloud server has been employed to collect
massive data and train machine learning models. Several privacy-preserving machine …

Doubly-efficient zkSNARKs without trusted setup

RS Wahby, I Tzialla, A Shelat, J Thaler… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We present a zero-knowledge argument for NP with low communication complexity, low
concrete cost for both the prover and the verifier, and no trusted setup, based on standard …

VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning

C Hahn, H Kim, M Kim, J Hur - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In privacy-preserving cross-device federated learning, users train a global model on their
local data and submit encrypted local models, while an untrusted central server aggregates …

Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing

Y Zheng, H Duan, C Wang - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Mobile crowdsensing enables convenient sensory data collection from a large number of
mobile devices and has found various applications. In the real practice, however, the …

Verifiable fully homomorphic encryption

A Viand, C Knabenhans, A Hithnawi - arXiv preprint arXiv:2301.07041, 2023 - arxiv.org
Fully Homomorphic Encryption (FHE) is seeing increasing real-world deployment to protect
data in use by allowing computation over encrypted data. However, the same malleability …

Verifiable searchable encryption with aggregate keys for data sharing system

Z Liu, T Li, P Li, C Jia, J Li - Future Generation Computer Systems, 2018 - Elsevier
In a secure data sharing system, the keyword search over encrypted files is a basic need of
a user with appropriate privileges. Although the traditional searchable encryption technique …

Pile: Robust privacy-preserving federated learning via verifiable perturbations

X Tang, M Shen, Q Li, L Zhu, T Xue… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Federated learning (FL) protects training data in clients by collaboratively training local
machine learning models of clients for a global model, instead of directly feeding the training …

Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system

J Cao, P Yu, X Xiang, M Ma, H Li - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The narrowband Internet of Things (NB-IoT) system has become an integral part of the future
fifth generation (5G) network. Although the NB-IoT system has gradually been improved in …