Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Reparable Threshold Paillier Encryption Scheme for Federated Learning

View through CrossRef
Abstract Threshold Paillier encryption scheme finds extensive application in the context of federated learning. However, the issue of client dropout frequently arises within the context of federated learning, rendering the conventional threshold Paillier encryption scheme ineffective for data decryption. To address this issue, this paper introduces a (n,k,d) repairable threshold Paillier encryption scheme by combining the repairable Shamir secret-sharing scheme with the Paillier encryption scheme. The proposed scheme has demonstrated several valuable capabilities. Specifically, we initially establish the security of the secret-sharing property of this scheme, namely, any group of k participants can collaboratively recover the private key, while k-1 or fewer participants cannot recover the private key. Moreover, we demonstrate the scheme's ability to handle the client dropout problem, namely, any group of d normal participants can collectively repair the private key segments of dropout clients. Ultimately, we substantiate that the (n,k,d) recoverable threshold Paillier encryption scheme consistently upholds the precision of decryption processes.
Title: Reparable Threshold Paillier Encryption Scheme for Federated Learning
Description:
Abstract Threshold Paillier encryption scheme finds extensive application in the context of federated learning.
However, the issue of client dropout frequently arises within the context of federated learning, rendering the conventional threshold Paillier encryption scheme ineffective for data decryption.
To address this issue, this paper introduces a (n,k,d) repairable threshold Paillier encryption scheme by combining the repairable Shamir secret-sharing scheme with the Paillier encryption scheme.
The proposed scheme has demonstrated several valuable capabilities.
Specifically, we initially establish the security of the secret-sharing property of this scheme, namely, any group of k participants can collaboratively recover the private key, while k-1 or fewer participants cannot recover the private key.
Moreover, we demonstrate the scheme's ability to handle the client dropout problem, namely, any group of d normal participants can collectively repair the private key segments of dropout clients.
Ultimately, we substantiate that the (n,k,d) recoverable threshold Paillier encryption scheme consistently upholds the precision of decryption processes.

Related Results

Secure PUF-Based Authentication Systems
Secure PUF-Based Authentication Systems
The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address ...
A NEW ROBUST HOMOMORPHIC ENCRYPTION SCHEME BASED ON PAILLIER, RESIDUE NUMBER SYSTEM AND EL-GAMAL
A NEW ROBUST HOMOMORPHIC ENCRYPTION SCHEME BASED ON PAILLIER, RESIDUE NUMBER SYSTEM AND EL-GAMAL
The new focus of cryptographic research is on encryption schemes that can withstand cyber-attacks, with the arrival of cloud computing. The widely used public key encryption system...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
The pandemic Covid-19 currently demands teachers to be able to use technology in teaching and learning process. But in reality there are still many teachers who have not been able ...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Federated Data Linkage in Practice
Federated Data Linkage in Practice
In recent years, great strides have been made towards the deployment of federated systems for data research, including exploring federated trusted research environments (TREs). The...
On a Framework for Federated Cluster Analysis
On a Framework for Federated Cluster Analysis
Federated learning is becoming increasingly popular to enable automated learning in distributed networks of autonomous partners without sharing raw data. Many works focus on superv...
Image-based crop disease detection with federated learning
Image-based crop disease detection with federated learning
Abstract Crop disease detection and management is critical to improving productivity, reducing costs, and promoting environmentally friendly crop treatment methods. Modern ...

Back to Top