JOURNAL ARTICLE

Verifiable Privacy-Preserving Federated Learning Under Multiple Encrypted Keys

Xiaoying ShenXue LuoYuan FengBaocang WangYange ChenDianhua TangLe Gao

Year: 2023 Journal:   IEEE Internet of Things Journal Vol: 11 (2)Pages: 3430-3445   Publisher: Institute of Electrical and Electronics Engineers

Abstract

Federated learning is a distributed learning helpful approach for resolving data privacy concerns and eliminating data silos. Homomorphic encryption is a vital technology for preserving user privacy in federated learning, and current studies are mainly concentrated on a single-key environment. However, if one user key is exposed in a single-key environment, it implies that the whole system key has been revealed. To strengthen security, we should allow different participants of federated learning to choose different keys to encrypt their local models. The cloud server should finish model aggregation calculation on ciphertexts under different public keys. Besides, research in this area is insufficient to guarantee mobile users' data integrity verification and authentication in open channels. Therefore, this article proposes a privacy protection federated learning scheme VPFL based on the BCP cryptosystem, which can verify user identity and data integrity in a multikey environment. First, this scheme employs the BCP cryptosystem with double trapdoors for data encryption and transmission, enhancing the user's privacy security. Second, a method for verifying user data integrity and identity was created utilizing bilinear aggregate signatures and verifiable secret sharing. It can effectively eliminate some incorrect data of some users. Third, VPFL tolerates users dropping out during training while still guaranteeing high accuracy. Finally, theoretical analysis and experimental evaluation indicate that the proposed scheme is efficient and secure.

Keywords:
Computer science Verifiable secret sharing Encryption Computer security Cryptosystem Homomorphic encryption Data integrity Key (lock) Public-key cryptography Cloud computing Information privacy Authentication (law) Scheme (mathematics)

Metrics

17
Cited By
4.34
FWCI (Field Weighted Citation Impact)
34
Refs
0.93
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Stochastic Gradient Optimization Techniques
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Lightweight verifiable privacy preserving federated learning

Li ZhangBing TangJianbo Xu

Journal:   Journal of Network and Computer Applications Year: 2025 Vol: 244 Pages: 104335-104335
JOURNAL ARTICLE

Privacy-Preserving Ridge Regression Over Encrypted Data Under Multiple Keys

Yanling LiJunzuo LaiMeng SunBeibei SongRobert H. Deng

Journal:   IEEE Transactions on Dependable and Secure Computing Year: 2025 Vol: 22 (5)Pages: 4847-4860
© 2026 ScienceGate Book Chapters — All rights reserved.