[1] |
闫树, 袁博, 吕艾临. 隐私计算--推进数据“可用不可见”的关键技术[M]. 北京: 电子工业出版社出版, 2022.
|
[2] |
中国信息通信研究院云计算与大数据研究所. 隐私计算白皮书(2021年)[R], 2021.
|
[3] |
KONEN J, MCMAHAN B, RAMAGE D. Federated optimization: distributed optimization beyond the datacenter[J]. Mathematics, 2015.
|
[4] |
YANG Q, LIU Y, CHEN T, et al. Federated machine learning: concept and applications[J]. ACM Transactions on Intelligent Systems and Technology, 2019, 10(2):1-19.
|
[5] |
HARDY S, HENECKA W, IVEYLAW H, et al. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption[J], 2017. DOI: 10.48550/arXiv.1711.10677
doi: 10.48550/arXiv.1711.10677
|
[6] |
YANG S, REN B, ZHOU X, et al. Parallel Distributed Logistic Regression for Vertical Federated Learning without Third-Party Coordinator[J]. arXiv:1911. 09824, 2019.
|
[7] |
CHEN C, ZHOU J, WANG L, et al. When homomorphic encryption marries secret sharing: secure Large-Scale sparse logistic regression and applications in risk control[J]. Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, 2021(8):2652-2662.
|
[8] |
RIVEST R L, ADLEMAN L M, DERTOUZOS M L. On data banks and privacy homomorphisms[J]. Foundations of Secure Compuation, 1978:169-180.
|
[9] |
EVANS D, KOLESNIKOV V, ROSULEK M. A pragmatic introduction to secure multi-party computation[J]. Foundations & Trends© in Privacy & Security, 2018, 2(2-3):70-246.
|
[10] |
PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[J]. Proc. EUROCRYPT’99, Czech Republic, May, 1999(4):223-238.
|
[11] |
CHENG K, FAN T, JIN Y, et al. SecureBoost: a lossless federated learning framework[J]. Intelligent Systems, IEEE, 2021,(99):1-1.
|
[12] |
FU F, SHAO Y, YU L, et al. VF 2 boost: very fast vertical federated gradient boosting for cross-enterprise learning[J]. Proceedings of the 2021 International Conference on Management of DataJune, 2021:563-576.
|
[13] |
WU Y, CAI S, XIAO X, et al. Privacy Preserving Vertical Federated Learning for Tree-based Models[J], 2020. DOI: 10.14778/3407790.3407811.
doi: 10.14778/3407790.3407811
|
[14] |
ZHANG C, LI S, XUA J, et al. BatchCrypt: efficient homomorphic encryption for cross-silo federated learning[J]. In 2020 USENIX Annual Technical Conference, 2020(7):493-506
|
[15] |
DEMMLER D, SCHNEIDER T, ZOHNER M. ABY-a framework for efficient mixed-protocol secure two-party computation[C]// Network & Distributed System Security Symposium, 2015.
|
[16] |
MOHASSEL P, RINDAL P. ABY3: a mixed protocol framework for machine learning[J]. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityOctober, 2018(10):35-52.
|
[17] |
SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979. DOI: 10.1145/359168.359176.
doi: 10.1145/359168.359176
|
[18] |
BEAVER D. Efficient multiparty protocols using circuit randomization[C]// Advances in Cryptology-CRYPTO’91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, Proceedings. Springer-Verlag, 1991.
|
[19] |
PULLONEN P. Actively secure two-party computation: efficient beaver triple generation[Z], 2013.
|
[20] |
GOLDREICH O. The foundations of cryptography - volume 2, basic applications[M], 2004.
|
[21] |
LINDELL Y. How to simulate it - a tutorial on the simulation proof technique[J]. Springer International Publishing, 2017:277-346.
|