{"id":"https://openalex.org/W4395017388","doi":"https://doi.org/10.1109/tdsc.2024.3392424","title":"MaskCrypt: Federated Learning With Selective Homomorphic Encryption","display_name":"MaskCrypt: Federated Learning With Selective Homomorphic Encryption","publication_year":2024,"publication_date":"2024-04-22","ids":{"openalex":"https://openalex.org/W4395017388","doi":"https://doi.org/10.1109/tdsc.2024.3392424"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3392424","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3392424","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078809003","display_name":"Chenghao Hu","orcid":"https://orcid.org/0000-0001-9842-3877"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Chenghao Hu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083596391","display_name":"Baochun Li","orcid":"https://orcid.org/0000-0003-2404-0974"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Baochun Li","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada","institution_ids":["https://openalex.org/I185261750"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5078809003"],"corresponding_institution_ids":["https://openalex.org/I185261750"],"apc_list":null,"apc_paid":null,"fwci":17.4045,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.99383469,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"22","issue":"1","first_page":"221","last_page":"233"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9668999910354614,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9411160349845886},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7425867319107056},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4988710880279541},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4360302686691284},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34633898735046387}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9411160349845886},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7425867319107056},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4988710880279541},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4360302686691284},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34633898735046387}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3392424","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3392424","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1575598731","https://openalex.org/W1966731635","https://openalex.org/W2053637704","https://openalex.org/W2132172731","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2591882872","https://openalex.org/W2767079719","https://openalex.org/W2768174108","https://openalex.org/W2781091734","https://openalex.org/W2903890850","https://openalex.org/W2930926105","https://openalex.org/W2963378725","https://openalex.org/W3109695251","https://openalex.org/W3164712068","https://openalex.org/W3178386862","https://openalex.org/W3197363474","https://openalex.org/W3209752568","https://openalex.org/W4210485920","https://openalex.org/W4385573947","https://openalex.org/W6728757088","https://openalex.org/W6747855403","https://openalex.org/W6775563089","https://openalex.org/W6778434676","https://openalex.org/W6780438843","https://openalex.org/W6791673544","https://openalex.org/W6793226373","https://openalex.org/W6801359086"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2539930818","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W4256358502"],"abstract_inverted_index":{"The":[0],"federated":[1],"learning":[2],"paradigm":[3],"protects":[4],"private":[5,218],"data":[6,219],"from":[7],"explicit":[8],"leakage,":[9],"yet":[10,212],"exposing":[11],"the":[12,91,124,140,147,152,163,199,216,225],"model":[13,105,158,210],"weights":[14],"still":[15,213],"raises":[16],"serious":[17],"privacy":[18,40],"concerns":[19],"with":[20,190,207],"well-known":[21],"attacks,":[22,222],"such":[23,34],"as":[24,35],"membership":[25,228],"inference":[26,229],"attacks.":[27],"It":[28],"has":[29],"been":[30],"acknowledged":[31],"that":[32,189],"mechanisms":[33,53],"homomorphic":[36,98],"encryption":[37,99,115,141],"and":[38,61,95,160,223],"differential":[39],"can":[41],"be":[42,71],"adopted":[43],"to":[44,70,89,117,138,145,166,174,204,231],"provide":[45],"a":[46,56,85,120,135,167,176,191],"higher":[47],"level":[48],"of":[49,59,123,156,227],"protection.":[50],"However,":[51],"these":[52],"may":[54],"incur":[55],"formidable":[57],"amount":[58],"overhead":[60,201],"reductions":[62],"in":[63,73,107],"training":[64,148],"performance,":[65],"which":[66,143],"make":[67],"them":[68],"unlikely":[69],"employed":[72],"real-world":[74],"applications.":[75],"In":[76],"this":[77],"paper,":[78],"we":[79],"propose":[80],"<sc":[81,110,130,195],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[82,111,131,170,196],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">MaskCrypt</small>":[83,112,132,197],",":[84],"new":[86],"mechanism":[87,137,173],"designed":[88],"balance":[90],"trade-off":[92],"between":[93],"security":[94],"practicality":[96],"when":[97],"is":[100],"used.":[101],"Rather":[102],"than":[103],"encrypting":[104,208],"updates":[106,125],"their":[108],"entirety,":[109],"applies":[113],"an":[114],"mask":[116,165,178],"sift":[118],"out":[119],"small":[121,192],"portion":[122],"for":[126,179],"encryption.":[127],"Specifically,":[128],"each":[129],"client":[133],"adopts":[134],"gradient-guided":[136],"select":[139],"mask,":[142],"aims":[144],"obfuscate":[146],"trace":[149],"by":[150,202],"maximizing":[151],"local":[153],"loss":[154],"value":[155],"exposed":[157],"weights,":[159],"then":[161],"sending":[162],"individual":[164],"special":[168],"<italic":[169],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Mask":[171],"Consensus</i>":[172],"obtain":[175],"final":[177],"all":[180],"clients.":[181],"Our":[182],"experimental":[183],"results":[184],"have":[185],"shown":[186],"convincing":[187],"evidence":[188],"encrypt":[193],"ratio,":[194],"reduced":[198,224],"communication":[200],"up":[203],"4.15\u00d7":[205],"compared":[206],"entire":[209],"updates,":[211],"effectively":[214],"protected":[215],"client's":[217],"against":[220],"inversion":[221],"accuracy":[226],"attacks":[230],"49.2%.w":[232]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":41},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
