文章摘要
YANG Ruizhe(杨睿哲)*,ZHAO Xuehui*,ZHANG Yanhua*,SI Pengbo*,TENG Yinglei**.[J].高技术通讯(英文),2022,28(4):337~344
The adaptive distributed learning based on homomorphic encryption and blockchain
  
DOI:10.3772/j.issn.1006-6748.2022.04.001
中文关键词: 
英文关键词: blockchain, distributed machine learning (DML), privacy, security
基金项目:
Author NameAffiliation
YANG Ruizhe(杨睿哲)* (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China) (**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) 
ZHAO Xuehui* (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China) (**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) 
ZHANG Yanhua* (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China) (**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) 
SI Pengbo* (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China) (**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) 
TENG Yinglei** (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China) (**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) 
Hits: 1102
Download times: 810
中文摘要:
      
英文摘要:
      The privacy and security of data are recently research hotspots and challenges.For this issue, an adaptive scheme of distributed learning based on homomorphic encryption and blockchain is proposed. Specifically, in the form of homomorphic encryption, the computing party iteratively aggregates the learning models from distributed participants, so that the privacy of both the data and model is ensured. Moreover, the aggregations are recorded and verified by blockchain, which prevents attacks from malicious nodes and guarantees the reliability of learning. For these sophisticated privacy and security technologies, the computation cost and energy consumption in both the encrypted learning and consensus reaching are analyzed, based on which a joint optimization of computation resources allocation and adaptive aggregation to minimize loss function is established with the realistic solution followed. Finally, the simulations and analysis evaluate the performance of the proposed scheme.
View Full Text   View/Add Comment  Download reader
Close

分享按钮