Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ IEEE Accessarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2025 . Peer-reviewed
License: CC BY
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2025
Data sources: DOAJ
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

A Comprehensive Review of Cryptographic Techniques in Federated Learning for Secure Data Sharing and Applications

Authors: Anik Sen; Swee-Huay Heng; Shing-Chiang Tan;

A Comprehensive Review of Cryptographic Techniques in Federated Learning for Secure Data Sharing and Applications

Abstract

The demand for secure data sharing is growing fast in sensitive domains like healthcare, finance, and IoT. Federated Learning (FL) introduces a decentralised machine learning paradigm whereby models can be trained over distributed nodes without sharing data. Despite its promise, FL faces significant security challenges, such as gradient inversion, model poisoning, and privacy leakage, which involve strong cryptographic techniques. Some cryptographic techniques have been proposed to address potential security concerns in the FL environment. This study provides an overview of the major techniques that include Homomorphic Encryption (HE), Secure Multi-Party Computation (SMPC), Differential Privacy (DP), blockchain integration, and emerging hybrid approaches, and their applications from different perspectives. The techniques, along with their respective strengths and weaknesses, are systematically compared to ensure the identification of appropriate application domains. This review addresses hybrid approaches that combine multiple techniques to achieve an optimal trade-off between privacy, computational efficiency, and scalability. Key challenges such as computational overhead, scalability limitations, and the privacy-utility trade-off are identified, along with notable research gaps in the field. Future directions emphasise on the development of optimised hybrid techniques and strategies to alleviate computational and communication overheads in resource-constrained environments. This study therefore reviews those aspects that might provide useful insights to researchers and practitioners in the development of secure, scalable, and computationally efficient FL systems, and hence facilitate their practical implementation in privacy-sensitive domains.

Related Organizations
Keywords

secure multi-party computation, Secure data sharing, federated learning, differential privacy, homomorphic encryption, Electrical engineering. Electronics. Nuclear engineering, TK1-9971

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold