Privacy preserving distributed optimization using homomorphic encryption
From MaRDI portal
Abstract: This paper studies how a system operator and a set of agents securely execute a distributed projected gradient-based algorithm. In particular, each participant holds a set of problem coefficients and/or states whose values are private to the data owner. The concerned problem raises two questions: how to securely compute given functions; and which functions should be computed in the first place. For the first question, by using the techniques of homomorphic encryption, we propose novel algorithms which can achieve secure multiparty computation with perfect correctness. For the second question, we identify a class of functions which can be securely computed. The correctness and computational efficiency of the proposed algorithms are verified by two case studies of power systems, one on a demand response problem and the other on an optimal power flow problem.
Recommendations
- A privacy-preserving method to optimize distributed resource allocation
- Privacy-preserving dual stochastic push-sum algorithm for distributed constrained optimization
- Initialization-free privacy-guaranteed distributed algorithm for economic dispatch problem
- Private computation of polynomials over networks
- Differentially private distributed optimization for multi-agent systems via the augmented Lagrangian algorithm
Cites work
- scientific article; zbMATH DE number 477682 (Why is no real title available?)
- scientific article; zbMATH DE number 1043533 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Advances in Cryptology - EUROCRYPT 2004
- Convex optimization theory.
- Differential Privacy
- Differential privacy under continual observation
- Differentially Private Distributed Constrained Optimization
- Differentially Private Filtering
- Distributed control of robotic networks: a mathematical approach to motion coordination algorithms.
- Distributed optimization-based control of multi-agent networks in complex environments
- Distributed robust adaptive equilibrium computation for generalized convex games
- Efficient secure two-party protocols. Techniques and constructions
- Finite-Dimensional Variational Inequalities and Complementarity Problems
- Foundations of Cryptography
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Homomorphic encryption and applications
- How to share a secret
- Noiseless database privacy
- Privacy preserving distributed optimization using homomorphic encryption
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
- Secure multiparty computation and secret sharing
- The algorithmic foundations of differential privacy
- Understanding Cryptography
Cited in
(31)- Distributed continuous-time algorithm for nonsmooth optimal consensus without sharing local decision variables
- On reconstructability of quadratic utility functions from the iterations in gradient methods
- scientific article; zbMATH DE number 6402149 (Why is no real title available?)
- Distributed encryption fusion estimation against full eavesdropping
- Decentralized Stochastic Optimization With Inherent Privacy Protection
- Enabling Privacy-Preservation in Decentralized Optimization
- Quantization Enabled Privacy Protection in Decentralized Stochastic Optimization
- Secure distributed Kalman filter using partially homomorphic encryption
- Dynamics based privacy preservation in decentralized optimization
- Multi-agent control: a graph-theoretic perspective
- Differentially private resilient distributed cooperative online estimation over digraphs
- Differentially private distributed algorithms for stochastic aggregative games
- Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling
- Private computation of polynomials over networks
- Econometrics with privacy preservation
- A privacy-preserving method to optimize distributed resource allocation
- A privacy-masking learning algorithm for online distributed optimization over time-varying unbalanced digraphs
- Distributed online bandit linear regressions with differential privacy
- Differentially private distributed online learning over time‐varying digraphs via dual averaging
- On privacy preserving data release of linear dynamic networks
- An encoding mechanism for secrecy of remote state estimation
- Hierarchical distributed optimization of constraint-coupled convex and mixed-integer programs using approximations of the dual function
- Gradient-tracking based differentially private distributed optimization with enhanced optimization accuracy
- Enhancement of opacity for distributed state estimation in cyber-physical systems
- Privacy-preserving set-based estimation using partially homomorphic encryption
- Differentially private distributed parameter estimation
- Quadratic Error Minimization in a Distributed Environment with Privacy Preserving
- Surrogate-based distributed optimisation for expensive black-box functions
- Distributed economic dispatch via a predictive scheme: heterogeneous delays and privacy preservation
- Resilient penalty function method for distributed constrained optimization under Byzantine attack
- Privacy preserving distributed optimization using homomorphic encryption
This page was built for publication: Privacy preserving distributed optimization using homomorphic encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1716476)