• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Lüjun, Xiao Di, Yu Zhuyang, Huang Hui, Li Min. Communication-Efficient Federated Learning Based on Secret Sharing and Compressed Sensing[J]. Journal of Computer Research and Development, 2022, 59(11): 2395-2407. DOI: 10.7544/issn1000-1239.20220526
Citation: Chen Lüjun, Xiao Di, Yu Zhuyang, Huang Hui, Li Min. Communication-Efficient Federated Learning Based on Secret Sharing and Compressed Sensing[J]. Journal of Computer Research and Development, 2022, 59(11): 2395-2407. DOI: 10.7544/issn1000-1239.20220526

Communication-Efficient Federated Learning Based on Secret Sharing and Compressed Sensing

Funds: This work was supported by the National Natural Science Foundation of China (62072063), the National Key Research and Development Program of China (2020YFB1805400), and the Graduate Student Research and Innovation Foundation of Chongqing (CYB21062).
More Information
  • Published Date: October 31, 2022
  • The rapid development of deep learning technology has brought us great convenience, but it also results in the disclosure of a large number of private data. Federated learning (FL) allows clients to jointly train models only by sharing gradients, which seems to solve the privacy information leakage problem, but some research show that gradients transmitted in FL frameworks can still result in privacy information leakage. Moreover, the high communication cost of FL is difficult to apply to resource-constrained environments. Therefore, we put forward two communication-efficient and secure FL algorithms, which use Top-K sparse and compressed sensing to reduce communication overhead caused by the gradient transmission, and further use additive secret sharing in secure multi-party computation (MPC) to encrypt the important gradient parameter measurements in order to simultaneously realize communication overhead reduction and security enhancement. The main difference between the two algorithms is that the client and server communicate with each other by transmitting the gradient measurement value and the quantization result of the gradient measurement value, respectively. Experiments on MNIST and Fashion-MNIST data show that, compared with other algorithms, the proposed algorithms can further increase the security at a lower communication cost and have better performance in model accuracy.
  • Related Articles

    [1]Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
    [2]Zhu Longlong, Chen Xiang, Chen Haodong, Niu Jitang, Liu Wenjing, Lin Shengrui, Zhang Dong, Wu Chunming. An Accurate Blockchain Anomaly Detection Mechanism Built on Approximate Sketch Algorithms[J]. Journal of Computer Research and Development, 2024, 61(10): 2526-2539. DOI: 10.7544/issn1000-1239.202440477
    [3]Ke Yuhong, Lin Chao, Huang Xinyi, Wu Wei, Chen Yujie. An Efficient Passwordless Authentication Scheme Based on Blockchain[J]. Journal of Computer Research and Development, 2024, 61(10): 2514-2525. DOI: 10.7544/issn1000-1239.202440468
    [4]Chen Xiao, Huang Muhong, Tian Yifan, Wang Yan, Cao Sheng, Zhang Xiaosong. Internet of Vehicles Data Sharing Scheme via Blockchain Sharding[J]. Journal of Computer Research and Development, 2024, 61(9): 2246-2260. DOI: 10.7544/issn1000-1239.202330899
    [5]He Yunhua, Luo Mingshun, Hu Qing, Wu Bin, Wang Chao, Xiao Ke. Research Progress on Security Technology for Cross-Chain Service of Energy Blockchain[J]. Journal of Computer Research and Development, 2024, 61(4): 1018-1037. DOI: 10.7544/issn1000-1239.202220892
    [6]Liu Wei, Tang Congke, Ma Jie, Tian Zhao, Wang Qi, She Wei. A Federated Learning Model for Privacy Protection Based on Blockchain and Dynamic Evaluation[J]. Journal of Computer Research and Development, 2023, 60(11): 2583-2593. DOI: 10.7544/issn1000-1239.202330269
    [7]Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095
    [8]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [9]Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang. Cyber Security Threat Intelligence Sharing Model Based on Blockchain[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    [10]Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
  • Cited by

    Periodical cited type(0)

    Other cited types(2)

Catalog

    Article views (221) PDF downloads (146) Cited by(2)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return