|
|
Towards practical data alignment in production federated learning |
Yexuan SHI1,2, Wei YU3, Yuanyuan ZHANG1( ), Chunbo XUE1,2, Yuxiang ZENG1, Zimu ZHOU4, Manxue GUO3, Lun XIN3, Wenjing NIE3 |
1. State Key Laboratory of Complex & Critical Software Environment and Advanced Innovation Center for Future Blockchain and Privacy Computing, Beihang University, Beijing 100191, China 2. Zhongguancun Pan Connected Mobile Communication Technology Innovation and Application Research Institute,Beijing 100088, China 3. China Mobile Research Institute, Beijing 100053, China 4. School of Data Science, City University of Hong Kong, Hong Kong 999077, China |
|
|
|
Corresponding Author(s):
Yuanyuan ZHANG
|
Just Accepted Date: 27 June 2024
Issue Date: 23 August 2024
|
|
1 |
Q, Yang Y, Liu T, Chen Y Tong . Federated machine learning: concept and applications. ACM Transactions on Intelligent Systems and Technology, 2019, 10( 2): 12
|
2 |
K, Zhang X, Song C, Zhang S Yu . Challenges and future directions of secure federated learning: a survey. Frontiers of Computer Science, 2022, 16( 5): 165817
|
3 |
F, Liu Z, Zheng Y, Shi Y, Tong Y Zhang . A survey on federated learning: a perspective from multi-party computation. Frontiers of Computer Science, 2024, 18( 1): 181336
|
4 |
V, Kolesnikov R, Kumaresan M, Rosulek N Trieu . Efficient batched oblivious PRF with applications to private set intersection. In: Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016, 818−829
|
5 |
M, Chase P Miao . Private set intersection in the internet setting from lightweight oblivious PRF. In: Proceedings of the 40th Annual International Cryptology Conference on Advances in Cryptology. 2020, 34−63
|
6 |
B, Pinkas M, Rosulek N, Trieu A Yanai . SpOT-light: lightweight private set intersection from sparse OT extension. In: Proceedings of the 39th Annual International Cryptology Conference on Advances in Cryptology. 2019, 401−431
|
7 |
H, Chen K, Laine P Rindal . Fast private set intersection from homomorphic encryption. In: Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017, 1243−1255
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|