[1] |
Sav S, Pyrgelis A, Troncoso-Pastoriza J R, et al. POSEIDON: privacy-preserving federated neural network
|
|
learning[J], arXiv Preprint, arXive: 2009. 00349,2020.
|
[2] |
Chen H, Dai W, Kim M, et al. Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference [C] / / the 2019 ACM SIGSAC Conference, 2019.
|
[3] |
Ping L , Li J, Huang Z, et al. Multi-key privacypreserving deep learning in cloud computing[J]. Future
|
|
Generation Computer Systems, 2017,74(9):76-85.
|
[4] |
Mouchet C. Multiparty homomorphic encryption: from theory to practice [ C ]. IACR Cryptol ePrint Arch, 2020.
|
[5] |
Lopez-Alt, Adriana, Eran Tromer, et al. On-the-fly multiparty computation on the cloud via multikey fully
|
|
homomorphic encryption[C]. Proceedings of the Fortyfourth Annual ACM Symposium on Theory of Computing, 2012.
|
[6] |
Asharov, Gilad. Multiparty computation with low communication, computation and interaction via threshold FHE[C]. Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2012.
|
[7 ] |
Cramer, Ronald, Ivan Damgard, et al. Multiparty computation from threshold homomorphic encryption
|
[ C ] |
International Conference on the Theory and Applications of Cryptographic Techniques, 2001.
|
[8] |
Wu Y, Cai S, Xiao X, et al. Privacy preserving vertical federated learning for tree-based models [ J ], arXiv Preprint, arXive: 2008. 06170,2020.
|
[9] |
Ma J, Naas S A, Sigg S, et al. Privacy-preserving federated learning based on multi-key homomorphic encryption [ J], arXiv Preprint, arXive: 2104. 06824,2021.
|
[10] |
Karabat C, Kiraz M S, Erdogan H, et al. THRIVE: threshold homomorphic encryption based secure and
|
|
privacy preserving bIometric VErification system [ J ], arXiv Preprint, arXive: 1409. 8212,2014.
|
[11] |
Chen H, Chillotti I, Song Y. Multi-key homomorphic encryption from TFHE[C]. International Conference on
|
|
the Theory and Application of Cryptology and Information Security, 2019.
|
[12] |
Hazay C, Mikkelsen G L, Rabin T, et al. Efficient RSA key generation and threshold paillier in the two-party setting [ J ]. Journal of Cryptology, 2019, 32 ( 2):265-323.
|