Secure multiparty learning from the aggregation of locally trained models

被引:18
作者
Ma, Xu [1 ,2 ]
Ji, Cunmei [2 ]
Zhang, Xiaoyu [1 ]
Wang, Jianfeng [1 ]
Li, Jin [3 ]
Li, Kuan-Ching [4 ]
Chen, Xiaofeng [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[2] Qufu Normal Univ, Sch Software, Qufu, Shandong, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou, Peoples R China
[4] Providence Univ, Sch Comp Sci & Informat Engn, Taichung, Taiwan
基金
中国国家自然科学基金;
关键词
Multi-party learning; Verifiable computation delegation; Proxy re-encryption; Aggregate signature; COMPUTATION;
D O I
10.1016/j.jnca.2020.102754
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In many applications, multiple parties would benefit from a precise learning model trained from the aggregated dataset. However, the trivial method that all the data is aggregated into one datacenter and processed centrally is not appropriate when data privacy is a significant concern. In this paper, we propose a new framework for secure multi-party learning and construct a concrete scheme by incorporating aggregate signature and proxy re-encryption techniques. Unlike the previous solutions for multi-party privacy-preserving machine learning, we don't use encryption algorithm to encrypt the whole dataset or the intermediate values during the training process. In our scheme, secure verifiable computation delegation is utilized to privately label a public dataset from the aggregation of locally trained models. Using these newly generated labeled data items, the participants can update their learning models with great accuracy improvement. Further, we prove that the proposed scheme satisfies the desired security properties, and the experimental analysis on MNIST and HAM10000 shows that it is highly efficient.
引用
收藏
页数:10
相关论文
共 41 条
[1]   Predicting the sequence specificities of DNA- and RNA-binding proteins by deep learning [J].
Alipanahi, Babak ;
Delong, Andrew ;
Weirauch, Matthew T. ;
Frey, Brendan J. .
NATURE BIOTECHNOLOGY, 2015, 33 (08) :831-+
[2]  
[Anonymous], 2013, INTRIGUING PROPERTIE
[3]  
[Anonymous], 2007, EURASIP J INF SECUR
[4]  
[Anonymous], IEEE T PATTERN ANAL
[5]  
Asharov G., 2013, P 2013 ACM SIGSAC C, P535, DOI DOI 10.1145/2508859.2516738
[6]  
Barni Mauro, 2006, P 8 WORKSH MULT SEC, P146
[7]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[8]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[9]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[10]   Bagging predictors [J].
Breiman, L .
MACHINE LEARNING, 1996, 24 (02) :123-140