Research Article
Open access
Published on 19 March 2025
Download pdf
Ma,X. (2025). A secure aggregation method for federated learning based on homomorphic encryption. Advances in Engineering Innovation,16(2),80-85.
Export citation

A secure aggregation method for federated learning based on homomorphic encryption

Xiaoge Ma *,1,
  • 1 Shenzhen University

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2977-3903/2025.21661

Abstract

The development of cloud computing and big data has promoted the use of cloud servers in machine learning but has also raised concerns about privacy security. To enhance security and efficiency, this paper proposes a multi-key aggregation scheme based on improved Ring Learning With Errors (R-LWE) homomorphic encryption. This method protects the privacy of local model parameters and prevents information leakage through collaborative decryption. Experimental results demonstrate that the proposed scheme can resist collusion attacks, reduce communication overhead, and maintain model accuracy.

Keywords

federated learning, privacy protection, homomorphic encryption

[1]. SHA, J., EBADI, A. G., MAVALURU, D., et al. (2020). A Method for Virtual Machine Migration in Cloud Computing Using a Collective Behavior-based Metaheuristics Algorithm. Concurrency and Computation: Practice and Experience, 32(2), e5441.

[2]. Wei, L., Chen, C., Zhang, L., et al. (2020). Security Issues and Privacy Protection in Machine Learning. Journal of Computer Research and Development, 57(10), 2066-2085.

[3]. McMahan, H. B., Moore, E., Ramage, D., et al. (2016). Federated Learning of Deep Networks Using Model Averaging. arXiv preprint arXiv:1602.05629, 2(2), 15-18.

[4]. Yang, Y., Zhao, Y., Zhang, J., et al. (2021). Progress in Homomorphic Cryptography Theory and Applications. Journal of Electronics & Information Technology, 43(02), 475-487.

[5]. He, K., Zhang, X., Ren, S., et al. (2016). Deep Residual Learning for Image Recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 770-778.

[6]. Ryffel, T., Trask, A., Dahl, M., et al. (2018). A Generic Framework for Privacy-preserving Deep Learning. arXiv preprint arXiv:1811.04017.

[7]. Shokri, R., Shmatikov, V. (2015). Privacy-preserving Deep Learning. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 1310-1321.

[8]. Aono, Y., Hayashi, T., Wang, L., et al. (2017). Privacy-preserving Deep Learning via Additively Homomorphic Encryption. IEEE Transactions on Information Forensics and Security, 13(5), 1333-1345.

[9]. Jayaraman, B., Wang, L., Evans, D., et al. (2018). Distributed Learning without Distress: Privacy-preserving Empirical Risk Minimization. Advances in Neural Information Processing Systems, 31.

[10]. Abadi, M., Chu, A., Goodfellow, I., et al. (2016). Deep Learning with Differential Privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 308-318.

[11]. Hardy, S., Henecka, W., Ivey-Law, H., et al. (2017). Private Federated Learning on Vertically Partitioned Data via Entity Resolution and Additively Homomorphic Encryption. arXiv preprint arXiv:1711.10677.

[12]. Bonawitz, K., Ivanov, V., Kreuter, B., et al. (2016). Practical Secure Aggregation for Federated Learning on User-held Data. arXiv preprint arXiv:1611.04482.

[13]. Zhao, L., Zhang, Y., Wang, Q., et al. (2018). Privacy-preserving Collaborative Deep Learning with Irregular Participants. arXiv preprint arXiv:1812.10113.

[14]. Nishio, T., Yonetani, R. (2019). Client Selection for Federated Learning with Heterogeneous Resources in Mobile Edge. ICC 2019 - IEEE International Conference on Communications (ICC), 1-7.

[15]. Yoshida, N., Nishio, T., Morikura, M., et al. (2020). Hybrid-FL for Wireless Networks: Cooperative Learning Mechanism using non-IID Data. ICC 2020 - IEEE International Conference on Communications (ICC), 1-7.

Cite this article

Ma,X. (2025). A secure aggregation method for federated learning based on homomorphic encryption. Advances in Engineering Innovation,16(2),80-85.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title:

Conference website:
ISBN:(Print) / (Online)
Conference date: 1 January 0001
Editor:
Series: Advances in Engineering Innovation
Volume number: Vol.16
ISSN:2977-3903(Print) / 2977-3911(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).