Quadratic Functional Encryption for Secure Training in Vertical Federated Learning

AI-generated keywords: Federated Learning

AI-generated Key Points

  • Federated learning revolutionized the field of machine learning
  • Vertical federated learning (VFL) is a specific type of federated learning where each party holds a subset of features and only one party holds the labels
  • Ensuring privacy in VFL remains a challenge
  • FedV is a framework for secure gradient computation in VFL using multi-input functional encryption proposed by Xu et al.
  • Chen et al. propose using Quadratic functional encryption to avoid information leakage when training generalized linear models for VFL
  • Quadratic functional encryption can be used to encrypt intermediate values during the computation process, preventing any individual party from gaining access to sensitive information about other parties' data
  • This approach offers significant improvements over previous methods that relied on homomorphic encryption or secure multiparty computation techniques that were computationally expensive and impractical for large-scale datasets
  • The authors provide experimental results demonstrating the effectiveness of their approach in terms of both accuracy and privacy preservation
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti

Accepted by ISIT 2023
License: CC ZERO 1.0

Abstract: Vertical federated learning (VFL) enables the collaborative training of machine learning (ML) models in settings where the data is distributed amongst multiple parties who wish to protect the privacy of their individual data. Notably, in VFL, the labels are available to a single party and the complete feature set is formed only when data from all parties is combined. Recently, Xu et al. proposed a new framework called FedV for secure gradient computation for VFL using multi-input functional encryption. In this work, we explain how some of the information leakage in Xu et al. can be avoided by using Quadratic functional encryption when training generalized linear models for vertical federated learning.

Submitted to arXiv on 15 May. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2305.08358v1

The field of machine learning (ML) has been revolutionized by the advent of federated learning, which allows multiple parties to collaborate on training models without sharing their private data. Vertical federated learning (VFL) is a specific type of federated learning where each party holds a subset of the features and only one party holds the labels. However, ensuring privacy in VFL remains a challenge. Recently, Xu et al. proposed FedV, a framework for secure gradient computation in VFL using multi-input functional encryption. In this paper, Chen et al. build upon this work and propose using Quadratic functional encryption to avoid information leakage when training generalized linear models for VFL. The authors explain that Quadratic functional encryption can be used to encrypt intermediate values during the computation process, preventing any individual party from gaining access to sensitive information about other parties' data. This approach offers significant improvements over previous methods that relied on homomorphic encryption or secure multiparty computation techniques that were computationally expensive and impractical for large-scale datasets. The authors provide experimental results demonstrating the effectiveness of their approach in terms of both accuracy and privacy preservation. Overall, this work represents an important step forward in enabling secure collaboration among multiple parties in ML applications while preserving individual data privacy.
Created on 03 Jun. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.