Decentralized multi-client functional encryption for inner product
J Chotard, E Dufour Sans, R Gay, DH Phan… - Advances in Cryptology …, 2018 - Springer
We consider a situation where multiple parties, owning data that have to be frequently
updated, agree to share weighted sums of these data with some aggregator, but where they …
updated, agree to share weighted sums of these data with some aggregator, but where they …
VOSA: Verifiable and oblivious secure aggregation for privacy-preserving federated learning
Federated learning has emerged as a promising paradigm by collaboratively training a
global model through sharing local gradients without exposing raw data. However, the …
global model through sharing local gradients without exposing raw data. However, the …
Decentralizing inner-product functional encryption
Multi-client functional encryption (MCFE) is a more flexible variant of functional encryption
whose functional decryption involves multiple ciphertexts from different parties. Each party …
whose functional decryption involves multiple ciphertexts from different parties. Each party …
Edge-assisted public key homomorphic encryption for preserving privacy in mobile crowdsensing
R Ganjavi, AR Sharafat - IEEE Transactions on Services …, 2022 - ieeexplore.ieee.org
Mobile crowdsensing (MCS) is becoming an increasingly important topic due to rapid
proliferation of mobile apps where participants' anonymity is a pivotal requirement with direct …
proliferation of mobile apps where participants' anonymity is a pivotal requirement with direct …
: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning
Aggregating data from multiple sources is often required in multiple applications. In this
paper, we introduce DEVA DEVA, a protocol that allows a distributed set of servers to …
paper, we introduce DEVA DEVA, a protocol that allows a distributed set of servers to …
An efficient and secure aggregation encryption scheme in edge computing
J Wu, X Sheng, G Li, K Yu, J Liu - China Communications, 2022 - ieeexplore.ieee.org
Edge computing is a highly virtualized paradigm that can services the Internet of Things (IoT)
devices more efficiently. It is a non-trivial extension of cloud computing, which can not only …
devices more efficiently. It is a non-trivial extension of cloud computing, which can not only …
Private stream aggregation with labels in the standard model
J Ernst, A Koch - Proceedings on Privacy Enhancing …, 2021 - petsymposium.org
A private stream aggregation (PSA) scheme is a protocol of n clients and one aggregator. At
every time step, the clients send an encrypted value to the (untrusted) aggregator, who is …
every time step, the clients send an encrypted value to the (untrusted) aggregator, who is …
Dipsauce: efficient private stream aggregation without trusted parties
J Brorsson, M Gunnarsson - Nordic Conference on Secure IT Systems, 2023 - Springer
Abstract Private Stream Aggregation (PSA) schemes are efficient protocols for distributed
data analytics. In a PSA scheme, a set of data producers can encrypt data for a central party …
data analytics. In a PSA scheme, a set of data producers can encrypt data for a central party …
TEVA: Training-Efficient and Verifiable Aggregation for Federated Learning for Consumer Electronics in Industry 5.0
Federated learning (FL) has been widely used for privacy-preserving model updates in
Industry 5.0, facilitated by 6G networks. Despite FL's privacy-preserving advantages, it …
Industry 5.0, facilitated by 6G networks. Despite FL's privacy-preserving advantages, it …
Identity-based verifiable aggregator oblivious encryption and its applications in smart grids
Z Wang - IEEE Transactions on Sustainable Computing, 2019 - ieeexplore.ieee.org
Verifiable aggregator oblivious encryption is a useful notion that not only allows an untrusted
aggregator to compute aggregated data without learning any other information but also …
aggregator to compute aggregated data without learning any other information but also …