Light weighted privacy protection ViT inference framework based on secret sharing
The ViT (vision transformer) inference framework, which was widely used in image processing, was found to have a risk of leaking user privacy data. However, existing privacy protection inference frameworks had problems such as low computational efficiency and high online communication volume. To add...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | MA Min, FU Yu, HUANG Kai, JIA Xiaofeng |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2024-04-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2024025 |
Similar Items
Light weighted privacy protection ViT inference framework based on secret sharing
by: MA Min, et al.
Published: (2024-04-01)
by: MA Min, et al.
Published: (2024-04-01)
Design of shuffling protocol based on additive secret sharing
by: ZHANG Yanshuo, et al.
Published: (2024-08-01)
by: ZHANG Yanshuo, et al.
Published: (2024-08-01)
Design of shuffling protocol based on additive secret sharing
by: ZHANG Yanshuo, et al.
Published: (2024-08-01)
by: ZHANG Yanshuo, et al.
Published: (2024-08-01)
Privacy-Preserving Data Uploading SchemeBased on Threshold Secret Sharing Algorithm for Internet of Vehicles
by: Zheng Jiang, et al.
Published: (2025-05-01)
by: Zheng Jiang, et al.
Published: (2025-05-01)
Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
by: Na Wang, et al.
Published: (2020-01-01)
by: Na Wang, et al.
Published: (2020-01-01)
An Efficient and Privacy Protection Communication Scheme for Smart Grid
by: Albert Guan, et al.
Published: (2020-01-01)
by: Albert Guan, et al.
Published: (2020-01-01)
A Security-Enhanced Federated Learning Scheme Based on Homomorphic Encryption and Secret Sharing
by: Cong Shen, et al.
Published: (2024-06-01)
by: Cong Shen, et al.
Published: (2024-06-01)
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment<br />
by: Tieming Geng, et al.
Published: (2022-01-01)
by: Tieming Geng, et al.
Published: (2022-01-01)
Fully privacy-preserving distributed optimization in power systems based on secret sharing
by: Nianfeng Tian, et al.
Published: (2022-09-01)
by: Nianfeng Tian, et al.
Published: (2022-09-01)
Continuous-variable ramp quantum secret sharing with Gaussian states and operations
by: Masoud Habibidavijani, et al.
Published: (2019-01-01)
by: Masoud Habibidavijani, et al.
Published: (2019-01-01)
A Privacy-Preserving Record Linkage Method Based on Secret Sharing and Blockchain
by: Shumin Han, et al.
Published: (2025-06-01)
by: Shumin Han, et al.
Published: (2025-06-01)
A Study of Privacy-Preserving Neural Network Prediction Based on Replicated Secret Sharing
by: Yanru Zhang, et al.
Published: (2023-02-01)
by: Yanru Zhang, et al.
Published: (2023-02-01)
Cryptographic inference for large language model via secret sharing
by: CHENG Ke, et al.
Published: (2025-06-01)
by: CHENG Ke, et al.
Published: (2025-06-01)
PPTIF: Privacy-Preserving Transformer Inference Framework for Language Translation
by: Yanxin Liu, et al.
Published: (2024-01-01)
by: Yanxin Liu, et al.
Published: (2024-01-01)
Secret Image Sharing Schemes: A Comprehensive Survey
by: Sanchita Saha, et al.
Published: (2023-01-01)
by: Sanchita Saha, et al.
Published: (2023-01-01)
Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing
by: XIAO Jian, YANG Min
Published: (2023-06-01)
by: XIAO Jian, YANG Min
Published: (2023-06-01)
Anonymous whistleblowers reply scheme based on secret sharing
by: HE Kun, et al.
Published: (2024-12-01)
by: HE Kun, et al.
Published: (2024-12-01)
Image data privacy protection technology based on reversible information hiding and robust secret sharing
by: Wenjun Si
Published: (2024-09-01)
by: Wenjun Si
Published: (2024-09-01)
Essential Multi-Secret Image Sharing for Sensor Images
by: Shang-Kuan Chen
Published: (2025-07-01)
by: Shang-Kuan Chen
Published: (2025-07-01)
Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate
by: Ryutaroh Matsumoto
Published: (2025-01-01)
by: Ryutaroh Matsumoto
Published: (2025-01-01)
A Linear Algebraic Threshold Essential Secret Image Sharing Scheme
by: Mohammad Ghebleh, et al.
Published: (2022-02-01)
by: Mohammad Ghebleh, et al.
Published: (2022-02-01)
Group verifiable secure aggregate federated learning based on secret sharing
by: Sufang Zhou, et al.
Published: (2025-03-01)
by: Sufang Zhou, et al.
Published: (2025-03-01)
Towards edge-collaborative, lightweight and privacy-preserving classification framework
by: Jinbo XIONG, et al.
Published: (2022-01-01)
by: Jinbo XIONG, et al.
Published: (2022-01-01)
Towards edge-collaborative, lightweight and privacy-preserving classification framework
by: Jinbo XIONG, et al.
Published: (2022-01-01)
by: Jinbo XIONG, et al.
Published: (2022-01-01)
Privacy-Preserving Keyword Search With Access Control for Secret Sharing-Based Data Outsourcing
by: Ahmad Akmal Aminuddin Mohd Kamal, et al.
Published: (2025-01-01)
by: Ahmad Akmal Aminuddin Mohd Kamal, et al.
Published: (2025-01-01)
Efficient (k, n) threshold semi-quantum secret sharing protocol
by: Jie Cao, et al.
Published: (2025-02-01)
by: Jie Cao, et al.
Published: (2025-02-01)
A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties
by: Z. Mehrnahad, et al.
Published: (2023-04-01)
by: Z. Mehrnahad, et al.
Published: (2023-04-01)
Interactive Verifiable Secret Sharing Scheme
by: O. V. Kazarin
Published: (2010-09-01)
by: O. V. Kazarin
Published: (2010-09-01)
Interactive Verifiable Secret Sharing Scheme
by: O.V. Kazarin
Published: (2011-03-01)
by: O.V. Kazarin
Published: (2011-03-01)
Visual secret sharing and related Works -A Review
by: Nahidah Darweesh, et al.
Published: (2023-06-01)
by: Nahidah Darweesh, et al.
Published: (2023-06-01)
(k,n) secret image sharing scheme capable of cheating detection
by: Yan-Xiao Liu, et al.
Published: (2018-04-01)
by: Yan-Xiao Liu, et al.
Published: (2018-04-01)
Homomorphic Encryption Based Privacy-Preservation for IoMT
by: Mikail Mohammed Salim, et al.
Published: (2021-09-01)
by: Mikail Mohammed Salim, et al.
Published: (2021-09-01)
Secret Sharing Scheme with Share Verification Capability
by: Nursulu Kapalova, et al.
Published: (2025-09-01)
by: Nursulu Kapalova, et al.
Published: (2025-09-01)
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
by: XU Jing-fang1, et al.
Published: (2009-01-01)
by: XU Jing-fang1, et al.
Published: (2009-01-01)
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
by: XU Jing-fang1, et al.
Published: (2009-01-01)
by: XU Jing-fang1, et al.
Published: (2009-01-01)
Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System
by: Keiichi Iwamura, et al.
Published: (2022-01-01)
by: Keiichi Iwamura, et al.
Published: (2022-01-01)
Sillcom: A Communication-Efficient Privacy-Preserving Scheme for Indoor Localization
by: Shang Song, et al.
Published: (2025-06-01)
by: Shang Song, et al.
Published: (2025-06-01)
Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares
by: Hongliang Cai, et al.
Published: (2020-09-01)
by: Hongliang Cai, et al.
Published: (2020-09-01)
Secure Aggregation Protocol Based on DC-Nets and Secret Sharing for Decentralized Federated Learning
by: Diogo Pereira, et al.
Published: (2024-02-01)
by: Diogo Pereira, et al.
Published: (2024-02-01)
Cryptographic Rational Secret Sharing Schemes over General Networks
by: Alfonso Labao, et al.
Published: (2022-10-01)
by: Alfonso Labao, et al.
Published: (2022-10-01)
Similar Items
-
Light weighted privacy protection ViT inference framework based on secret sharing
by: MA Min, et al.
Published: (2024-04-01) -
Design of shuffling protocol based on additive secret sharing
by: ZHANG Yanshuo, et al.
Published: (2024-08-01) -
Design of shuffling protocol based on additive secret sharing
by: ZHANG Yanshuo, et al.
Published: (2024-08-01) -
Privacy-Preserving Data Uploading SchemeBased on Threshold Secret Sharing Algorithm for Internet of Vehicles
by: Zheng Jiang, et al.
Published: (2025-05-01) -
Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
by: Na Wang, et al.
Published: (2020-01-01)
