17th International Symposium on Medical Information Processing and Analysis 2021
DOI: 10.1117/12.2606256
|View full text |Cite
|
Sign up to set email alerts
|

Secure neuroimaging analysis using federated learning with homomorphic encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 42 publications
(27 citation statements)
references
References 25 publications
0
27
0
Order By: Relevance
“…Cryptographic techniques require that both the client and aggregation ES operate on encrypted messages. Two of the most widely used privacy-preserving algorithms are homomorphic encryption [73,74,75,76] and multi-party computation [77,78,79]. On the other hand, differential privacy introduces random noise to either the data or the model parameters [80,81,82,83].…”
Section: ) Federated Learningmentioning
confidence: 99%
“…Cryptographic techniques require that both the client and aggregation ES operate on encrypted messages. Two of the most widely used privacy-preserving algorithms are homomorphic encryption [73,74,75,76] and multi-party computation [77,78,79]. On the other hand, differential privacy introduces random noise to either the data or the model parameters [80,81,82,83].…”
Section: ) Federated Learningmentioning
confidence: 99%
“…We use homomorphic encryption to communicate the (encrypted) local and global models between the Federation Controller and the learners, and compute the new global model by aggregating learners' local models in encrypted space. Figure 4 We had used a similar training pipeline in [61]. However, in our previous work we encrypted the entire model into a single ciphertext, which created scalability issues for large models.…”
Section: Learning Under Homomorphic Encryptionmentioning
confidence: 99%
“…The secret key can be generated via interactions between users [108], [109], [110] or with the assistance of a trusted third party [111], [112], [113], [114], [115]. Besides, the crypto-system can be instantiated in different way to provide different security level, e.g., whether post-quantum or not, such as RSA-based [116], BGN-based [117], ElGamal-based [25], Paillier-based [108], [109], [112], [114], [118], [119], [120], [120], [121], lattice-based crypto-system [122], [123]. However, the above-mentioned schemes require rigorous security assumption that all users are at least semi-honest while there is no collusion between any user and the central server.…”
Section: He-based Aggregationmentioning
confidence: 99%