{"id":"https://openalex.org/W4407130400","doi":"https://doi.org/10.1109/icnp61940.2024.10858511","title":"FedSSA: Reducing Overhead of Additive Cryptographic Methods in Federated Learning With Sketch","display_name":"FedSSA: Reducing Overhead of Additive Cryptographic Methods in Federated Learning With Sketch","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4407130400","doi":"https://doi.org/10.1109/icnp61940.2024.10858511"},"language":"en","primary_location":{"id":"doi:10.1109/icnp61940.2024.10858511","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp61940.2024.10858511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102719130","display_name":"Z. Y. Ou","orcid":"https://orcid.org/0000-0002-2341-368X"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zirui Ou","raw_affiliation_strings":["School of Computer Science, Peking University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064254673","display_name":"Shujie Han","orcid":"https://orcid.org/0000-0001-5311-5782"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shujie Han","raw_affiliation_strings":["School of Computer Science, Northwestern Polytechnical University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Northwestern Polytechnical University","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qihuan Zeng","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qihuan Zeng","raw_affiliation_strings":["Peking University"],"affiliations":[{"raw_affiliation_string":"Peking University","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084512633","display_name":"Qun Huang","orcid":"https://orcid.org/0000-0002-2387-6131"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qun Huang","raw_affiliation_strings":["School of Computer Science, Peking University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102719130"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23907393,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.8565292358398438},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.7825939655303955},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7612482905387878},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7313060164451599},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4743201434612274},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3468434810638428},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2666231393814087},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23480293154716492},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17711079120635986},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15126419067382812}],"concepts":[{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.8565292358398438},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.7825939655303955},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7612482905387878},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7313060164451599},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4743201434612274},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3468434810638428},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2666231393814087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23480293154716492},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17711079120635986},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15126419067382812}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp61940.2024.10858511","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp61940.2024.10858511","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G787783157","display_name":null,"funder_award_id":"2023YFB2904600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8439060332","display_name":null,"funder_award_id":"62172007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W1836465849","https://openalex.org/W2064675550","https://openalex.org/W2080234606","https://openalex.org/W2132172731","https://openalex.org/W2194775991","https://openalex.org/W2407022425","https://openalex.org/W2473418344","https://openalex.org/W2606891064","https://openalex.org/W2767079719","https://openalex.org/W2768174108","https://openalex.org/W2781091734","https://openalex.org/W2799200478","https://openalex.org/W2970408908","https://openalex.org/W3013730797","https://openalex.org/W3027749727","https://openalex.org/W3096328345","https://openalex.org/W3100779497","https://openalex.org/W3106378891","https://openalex.org/W3107100345","https://openalex.org/W3135434750","https://openalex.org/W3180608480","https://openalex.org/W3192357745","https://openalex.org/W4249843299","https://openalex.org/W4250482878","https://openalex.org/W4282564361","https://openalex.org/W4385270107","https://openalex.org/W4385270464","https://openalex.org/W4385286457","https://openalex.org/W4385299238","https://openalex.org/W4387544248","https://openalex.org/W6679183712","https://openalex.org/W6679963453","https://openalex.org/W6728757088","https://openalex.org/W6728975057","https://openalex.org/W6738460352","https://openalex.org/W6746839373","https://openalex.org/W6748082217","https://openalex.org/W6755988804","https://openalex.org/W6756756286","https://openalex.org/W6758358981","https://openalex.org/W6761040187","https://openalex.org/W6768511045","https://openalex.org/W6768537144","https://openalex.org/W6768911402","https://openalex.org/W6770895831","https://openalex.org/W6774827312","https://openalex.org/W6775563089","https://openalex.org/W6778953822","https://openalex.org/W6780438843","https://openalex.org/W6780897730","https://openalex.org/W6790212648","https://openalex.org/W6791545107","https://openalex.org/W6794811910","https://openalex.org/W6803778537","https://openalex.org/W6803951002","https://openalex.org/W6810277026","https://openalex.org/W6839968328","https://openalex.org/W6840443151","https://openalex.org/W6840527761","https://openalex.org/W6850040158","https://openalex.org/W6851532263","https://openalex.org/W6852705611","https://openalex.org/W6853261327","https://openalex.org/W6991308149"],"related_works":["https://openalex.org/W18954787","https://openalex.org/W3138083505","https://openalex.org/W4254460476","https://openalex.org/W2783353176","https://openalex.org/W2339543721","https://openalex.org/W1514794536","https://openalex.org/W1829339118","https://openalex.org/W3179891621","https://openalex.org/W4390962791","https://openalex.org/W4396879184"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"has":[3],"been":[4,85],"applied":[5],"across":[6],"diverse":[7],"domains":[8],"as":[9],"a":[10,41,64,103,125,135,159,168,203],"powerful":[11],"technique":[12],"but":[13,87],"faces":[14],"critical":[15],"challenges":[16],"in":[17,115],"privacy":[18,43],"protection.":[19],"Secure":[20],"aggregation":[21],"and":[22,50,70,142],"additive":[23,94,112,177,199],"homomorphic":[24,178,200],"encryption":[25],"are":[26],"two":[27,119],"of":[28,67,78,91,111,150],"the":[29,48,52,68,89,109,139,148,182],"most":[30],"commonly":[31],"used":[32],"cryptographic":[33,95,113],"methods":[34,46,114],"to":[35,55,107,190,194],"protect":[36],"model":[37,57,170],"updates.":[38,58],"To":[39,72],"provide":[40],"strong":[42],"guarantee,":[44],"both":[45],"satisfy":[47],"additivity":[49],"require":[51],"integer":[53,140],"form":[54],"encrypt":[56],"However,":[59],"they":[60],"still":[61],"suffer":[62],"from":[63],"non-negligible":[65],"overhead":[66,110],"computation":[69,184],"communication.":[71],"mitigate":[73],"such":[74],"overhead,":[75],"existing":[76],"approaches":[77],"lossy":[79],"compression":[80,105,127,132,161],"(e.g.,":[81],"gradient":[82],"compression)":[83],"have":[84],"explored":[86],"exhibit":[88],"inapplicability":[90],"FL":[92,116],"with":[93,134,138,167,202],"methods.":[96],"In":[97],"this":[98],"paper,":[99],"we":[100],"propose":[101],"FedSSA,":[102],"novel":[104],"framework":[106],"reduce":[108],"based":[117],"on":[118],"new":[120],"techniques:":[121],"(i)":[122],"QSRHT":[123,151],"Sketch,":[124],"sketch-based":[126],"method":[128],"that":[129,156,197],"supports":[130],"large":[131],"ratios":[133],"bounded":[136],"error":[137],"requirement,":[141],"(ii)":[143],"periodic":[144],"rehashing,":[145],"which":[146],"ensures":[147],"unbiasedness":[149],"Sketch.":[152],"Our":[153],"evaluation":[154],"shows":[155],"FEDSSA":[157,180],"achieves":[158],"high":[160],"ratio":[162],"(<tex":[163],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[164],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\times":[165],"160$</tex>)":[166],"low":[169,204],"accuracy":[171,206],"degradation":[172],"(less":[173],"than":[174],"5%).":[175],"For":[176],"encryption,":[179,201],"reduces":[181],"average":[183],"time":[185],"per":[186],"round":[187],"by":[188],"up":[189],"58.15":[191],"%":[192],"compared":[193],"state-of-the-art":[195],"compressor":[196],"support":[198],"test":[205],"drop":[207],"(within":[208],"2.2":[209],"%).":[210]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
