Research Article

Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching

Table 3

Definition of .

’s operation is as follows:
(1) On input (Init, ) from , generate random numbers for the corresponding , store (,…), and send (,…) to corrupted adversary .
(2) On input (Init, ) from CS, generate random numbers .
Once the IDs of the CS and are equal, there sets , .
For corrupted CS, send (,) to it. Store them.
(3) On input (signature, ) from , choose randomly, and compute .
Send them to CS and store ().
(4) On input (Bsignature, ) from CS, compute .
Send to , where are random numbers.
(5) On input (Open, ) from . Check whether there exists ().
If exiting, can be got, or abandon it. Generate random and store ().
(6) On input (Sign, ), compute (). Generate random for every .
If existing , setting and storing (). Send () to the corresponding .
(7) On input (Compare, ), generate the comparison matrix using 1 and random numbers, where there exist in (), 1 will be set, or a random number will be set.