A coding computation scheme for secure aggregation

被引:0
|
作者
Yang, Ze
Tian, Youliang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
基金
中国国家自然科学基金;
关键词
Data aggregation; Coding theory; Chinese Residual Theorem (CRT); Privacy preservation;
D O I
10.1016/j.jksuci.2024.102073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation involves the integration of relevant data generated across platforms and devices, leveraging the potential value of sensory data. However, in addition to security and efficiency, which are the basic requirements for data aggregation involving private data, how to achieve fault tolerance and interference of aggregation in real computing networks is imminent and is the main contribution of this paper. In this paper, we propose a secure aggregation framework involving multiple servers based on coding theory, which is not only robust to clients dropping out and tolerant to partial server withdrawal but also resistant to malicious computation by servers and forgery attacks by adversaries. In particular, the proposed protocol employs the Chinese Residual Theorem (CRT) to encode private data and constructs Lagrange interpolation polynomials to perform aggregation, which achieves lightweight privacy preservation while achieving robust, verifiable and secure aggregation goals.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Fog-enabled secure multiparty computation based aggregation scheme in smart grid
    Khan, Hayat Mohammad
    Khan, Abid
    Jabeen, Farhana
    Anjum, Adeel
    Jeon, Gwanggil
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 94 (94)
  • [2] A Secure Broadcasting Scheme with Network Coding
    Wang, Xiao
    Guo, Wangmei
    Yang, Yanbo
    Wang, Bin
    IEEE COMMUNICATIONS LETTERS, 2013, 17 (07) : 1435 - 1438
  • [3] Refined Secure Network Coding Scheme with no Restriction on Coding Vectors
    Kim, Young-Sik
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (11) : 1907 - 1910
  • [4] Verifiable and Secure Aggregation Scheme for Federated Learning
    Ren Y.
    Fu Y.
    Li Y.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (03): : 49 - 55
  • [5] Implementation of a Modular Coding Scheme for Secure Communication
    Frank, Anna
    Voichtleitner, Johannes
    Wiese, Moritz
    Boche, Holger
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 2900 - 2905
  • [6] An Efficient and Secure Scheme of Verifiable Computation for Intel SGX
    Ding, Wenxiu
    Sun, Wei
    Yan, Zheng
    Deng, Robert H.
    Wan, Zhiguo
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 473 - 482
  • [7] A Secure and Verifiable Outsourcing Scheme for Matrix Inverse Computation
    Hu, Chunqiang
    Alhothaily, Abdulrahman
    Alrawais, Arwa
    Cheng, Xiuzhen
    Sturtivant, Carl
    Liu, Hang
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [8] A Fast and Secure Transformer Inference Scheme with Secure Multi-Party Computation
    Liu W.
    Guan Y.
    Huo J.
    Ding Y.
    Guo H.
    Li B.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (05): : 1218 - 1229
  • [9] Secure Aggregation Scheme for Horizontal Fedetated Learning System
    Huang, Xiuli
    Yu, Pengfei
    Gao, Xianzhou
    Computer Engineering and Applications, 60 (14): : 294 - 305
  • [10] An Improved Watermarking Scheme for Secure Data Aggregation in WSNs
    Li, Xiangyang
    Zhong, Yangjing
    Liao, Fubao
    Li, Rong
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6298 - 6301