Secure Byzantine resilient federated learning based on multi-party computation

被引:0
|
作者
Gao, Hongfeng [1 ,2 ]
Huang, Hao [1 ,3 ]
Tian, Youliang [1 ,3 ]
机构
[1] College of Computer Science and Technology, Guizhou University, Guiyang,550025, China
[2] Network and Information Management Center, Guizhou University, Guiyang,550025, China
[3] State Key Laboratory of Public Big Data, Guizhou University, Guiyang,550025, China
来源
基金
中国国家自然科学基金;
关键词
Adversarial machine learning - Ciphertext - Data privacy - Differential privacy;
D O I
10.11959/j.issn.1000-436x.2025023
中图分类号
学科分类号
摘要
To address issues such as gradient privacy protection, server inference attacks, and low accuracy caused by client data poisoning in federated learning, a secure Byzantine resilient federated learning scheme based on multi-party computation was proposed, targeting the server-client two-layer architecture. Firstly, a two-party ciphertext calculation method based on additive secret sharing was proposed to split the local model gradient to resist the inference attack of the server. Secondly, a poisoning detection algorithm and client screening mechanism under confidential data were designed to resist poisoning attacks. Finally, experiments were conducted on the MNIST and CIFAR-10 datasets to verify the feasibility of the scheme. Compared with the traditional Trim-mean and Median methods, when the proportion of Byzantine participants reaches 40%, the accuracy of the model is improved by 3%~6%. In summary, the proposed scheme can not only resist inference attacks and poisoning attacks, but also improve the accuracy of the global model, which is sufficient to prove the effectiveness of the scheme. © 2025 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:108 / 122
相关论文
共 50 条
  • [21] Augmented Multi-Party Computation Against Gradient Leakage in Federated Learning
    Zhang, Chi
    Ekanut, Sotthiwat
    Zhen, Liangli
    Li, Zengxiang
    IEEE TRANSACTIONS ON BIG DATA, 2024, 10 (06) : 742 - 751
  • [22] An Electronic Voting Scheme Based On Secure Multi-Party Computation
    Gang, Cao
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 292 - 294
  • [23] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [24] Securing of Clouds Based on Lightweight Secure Multi-party Computation
    Takahashi, Kouta
    Sato, Fumiaki
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 452 - 464
  • [25] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [26] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [27] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [28] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [29] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [30] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266