Figures
Abstract
Under the federated learning framework, frequent parameter interactions between edge devices and servers result in communication inefficiency, while conventional encryption methods fail to resist multi-node collusion attacks. To address these challenges, this paper proposes an optimized federated learning scheme integrating adaptive channel pruning with multi-key homomorphic encryption. First, we construct a dynamic threshold determination mechanism that automatically calibrates channel pruning rates through precision feedback during the pre-pruning phase, achieving the optimal balance between model compression and accuracy, while significantly reducing communication bandwidth consumption compared to traditional algorithms. Second, based on the Brakerski-Gentry-Vaikuntanathan (BGV) multi-key fully homomorphic encryption architecture, we design a distributed public-key encryption protocol that enables aggregation servers to securely fuse multi-source model parameters without decryption, resisting collusion attacks from up to C − 1 nodes (where C denotes the total number of devices). Experiments on MNIST and CIFAR-10 datasets demonstrate that our scheme significantly reduces communication overhead through two complementary mechanisms: adaptive pruning reduces both the computational burden of local training and the volume of parameters transmitted per round, while multi-key BGV encryption ensures privacy-preserving aggregation without decryption. This work provides a novel technical pathway for privacy-preserving federated learning in resource-constrained scenarios.
Citation: Guo J, Liu R, Xing J (2026) Threshold-adaptive pruning with multi-key homomorphic encryption for communication-efficient secure federated learning. PLoS One 21(5): e0349432. https://doi.org/10.1371/journal.pone.0349432
Editor: Je Sen Teh, Deakin University, AUSTRALIA
Received: May 1, 2025; Accepted: April 30, 2026; Published: May 18, 2026
Copyright: © 2026 Guo et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All MNIST and CIFAR-10 dataset files used in this study are publicly available from established repositories: - The MNIST dataset of handwritten digits is available from Kaggle (https://www.kaggle.com/datasets/oddrationale/mnist-in-csv) and also accessible via TensorFlow Datasets (https://www.tensorflow.org/datasets/catalog/mnist). - The CIFAR-10 dataset is available from the official University of Toronto repository (https://www.cs.toronto.edu/~kriz/cifar.html) and through TensorFlow Datasets (https://www.tensorflow.org/datasets/catalog/cifar10).
Funding: This work was supported by the Fundamental Research Program of Shanxi Province (Grant No. 20210302124257). The funders provided financial support for this study but had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The authors have declared that no competing interests exist.
Introduction
In federated learning, edge devices need to engage in regular model parameter exchanges with the central server to achieve collaborative training. However, as machine learning models continue to grow in scale, communication and computational overhead issues become increasingly prominent. More complex models require greater bandwidth and computational resources to transmit and process parameters, while edge devices are typically resource-constrained, lacking sufficient bandwidth and processing power. To address these challenges, researchers have introduced model pruning techniques [1,2] in federated learning, effectively reducing the computational burden and communication overhead of edge devices. For example, Jiang et al. [3] proposed reducing communication costs by pruning weights; while Munir et al. [4] successfully shortened overall training time by pruning global models for lower-performing devices.
These works primarily focus on applying unstructured pruning techniques within the federated learning framework. Although such methods can maintain high accuracy even at high compression rates, they rely on specialized computation libraries and hardware support, making them unfavorable for deployment on resource-constrained edge devices. Xu et al. [5] effectively reduced communication overhead by employing structured channel pruning to decrease model size, enabling pruned models to be trained directly using existing hardware and computation libraries. However, these studies generally adopt a one-time pruning strategy, performing only a single pruning operation on the model. In this process, selecting an appropriate pruning rate is crucial: if the rate is too low, the model retains significant redundancy; if too high, it may result in considerable accuracy loss.
Furthermore, recent research [6] has revealed significant privacy and security challenges in federated learning. These challenges include: inference attacks [7], where malicious participants analyze model parameters or gradient information to deduce training data from specific clients; model reverse engineering [8], where attackers use reverse engineering techniques to reconstruct local models or approximate original data, leading to privacy breaches; and model extraction attacks [9], where malicious actors may extract partial data samples from the global model to understand data characteristics and distribution, ultimately resulting in privacy leakage. To counter these threats, researchers have proposed various privacy protection techniques, primarily including differential privacy (DP) [10], homomorphic encryption (HE) [11], and secure multi-party computation (SMC) [12]. However, these methods still face numerous challenges: federated learning based on differential privacy requires striking a delicate balance between model accuracy and privacy protection, constituting a significant challenge; while federated learning based on secure multi-party computation typically demands multiple rounds of interaction between participants to achieve secure aggregation, resulting in substantial communication overhead.
In comparison, federated learning approaches based on homomorphic encryption, despite certain limitations in computational efficiency, effectively avoid model accuracy degradation and complex interactions between clients, while achieving relatively ideal privacy protection outcomes. However, current homomorphic encryption-based federated learning schemes predominantly employ a single key for encrypting and homomorphically computing model parameters, meaning all ciphertexts involved in computation correspond to the same key. This design cannot effectively resist data leakage attacks from curious internal devices, nor collusion attacks between internal devices and servers. At present, although several federated learning-related studies have separately focused on addressing privacy leakage [13] or communication overhead [14] issues, research that comprehensively tackles both challenges simultaneously remains relatively scarce.
Therefore, this research proposes an Adaptive Pruning Multi-Key Federated Learning (APMKFL) scheme based on the federated learning framework. In the pruning process of this scheme, edge devices apply various pruning rates for model pre-pruning and evaluate model accuracy on validation datasets. Subsequently, pre-pruned models are ranked according to their accuracy, and the pruning rate corresponding to the highest accuracy is automatically selected for final pruning operations. While network slimming [15] and multi-key BGV homomorphic encryption [16] are individually established techniques, their integration within a federated learning framework—with a feedback-driven adaptive threshold mechanism—constitutes the core novelty of this work. Three aspects distinguish APMKFL from a straightforward combination of prior methods: (1) Prior federated pruning works [1,3,5,17,18] apply static or one-time pruning. Network slimming [15] was designed for centralized training. We reformulate its BN-based channel scoring as a per-round adaptive decision mechanism within the FL communication protocol, where the pruning structure evolves with each gradient update—a non-trivial integration challenge not addressed by existing work. (2) Prior HE-based FL schemes [11, 12] use a single shared key, enabling honest-but-curious servers to decrypt individual updates. APMKFL employs multi-key BGV [16] with threshold decryption, so the server never holds a decryption key—achieving provable C-1 collusion resistance. (3) Unlike [19], which addresses both communication and privacy but uses differential privacy (degrading accuracy), APMKFL achieves communication efficiency and cryptographic privacy simultaneously with no accuracy trade-off. The main contributions of this research are as follows:
- 1). Proposed an adaptive iterative channel pruning method, enabling edge devices to dynamically adjust pruning thresholds based on the accuracy of pre-pruned models, thereby achieving optimal balance between model structural complexity and prediction accuracy.
- 2). Employed multi-key BGV homomorphic encryption technology, allowing edge devices to encrypt model parameters through jointly generated aggregation public keys, enabling servers to perform secure aggregation of local models from edge devices in ciphertext state to update the global model.
- 3). Conducted comprehensive experimental validation on standard MNIST and CIFAR-10 datasets, with results demonstrating that the proposed scheme significantly reduces communication overhead while maintaining high model accuracy, further enhancing data privacy and security protection.
Related works
This section discusses related research works based on two major challenges faced by federated learning: high communication overhead and data privacy security.
Addressing the limited computational and communication resources of edge devices in federated learning, an increasing number of studies have incorporated model compression techniques into the federated learning framework. Major model compression methods include model pruning [20], knowledge distillation [21], and parameter quantization [22]. Jeong et al. [23] proposed federated distillation, utilizing knowledge distillation to transfer knowledge from large teacher models to smaller student models in federated learning environments. Prakash et al. [24] suggested using parameter quantization techniques to reduce parameter bit-width representation, thereby effectively decreasing communication overhead. This paper primarily focuses on techniques combining federated learning with model pruning, achieving greater efficiency by directly pruning the original model. Model pruning aims to remove redundant neurons, weights, or connections to reduce model size, lower computational and storage costs, while minimizing accuracy loss. For instance, Caldas et al. [1] employed lossy compression in federated learning to compress model storage footprint, reducing communication burden between edge devices and central servers by disabling sets of low-importance parameters. Yu et al. [17] proposed using gating networks on edge devices to eliminate redundant neurons. Vahidian et al. [18] introduced a method combining structured and unstructured pruning approaches. However, these works generally adopt one-time pruning strategies. Research by Frankle et al. [25] demonstrated that iterative pruning approaches significantly reduce model accuracy loss compared to one-time pruning. Therefore, this paper conducts research from the perspective of iterative structural pruning.
Additionally, federated learning faces significant challenges in data privacy security. Within the federated learning framework, edge devices share only partial model parameters or gradients with the central server, rather than raw data. However, attackers may still exploit this shared information to infer private data from specific edge devices. To enhance data privacy protection in federated learning, researchers have proposed various solutions: Wei et al. [26] introduced a federated learning scheme incorporating differential privacy techniques, achieving edge device data privacy protection at the cost of significantly reduced model performance; Fang et al. [12] proposed using additive homomorphic encryption to protect model updates through the Paillier cryptosystem for privacy-preserving federated learning; Vedaraj et al. [27] presented a decentralized system that conducts secure statistical analysis on distributed datasets by applying the ElGamal elliptic curve additive homomorphic cryptosystem. Notably, in the aforementioned works, all participating edge devices utilize the same encryption and decryption keys. This design poses potential risks—private data information may leak between edge devices. More seriously, any curious edge device colluding with the server would compromise the data privacy of other edge devices.
Recently, some research has begun to simultaneously address the dual challenges of data privacy security and communication overhead in federated learning. Hu et al. [19] proposed an innovative approach that reduces communication rounds through periodic averaging while integrating secure aggregation with differential privacy techniques to effectively prevent data leakage. Drawing on the advantages of the method proposed by Hu et al. [19], our research scheme aims to tackle both fronts: reducing the communication frequency between edge devices and servers while decreasing the volume of transmitted data, thereby comprehensively lowering communication overhead while providing robust privacy protection mechanisms.
Reviewing existing works, we identify four critical gaps: (1) Pruning-only methods reduce communication but offer no privacy guarantees. (2) Single-key HE schemes protect privacy but are vulnerable to collusion and do not reduce communication volume. (3) Differential privacy methods sacrifice model accuracy due to noise injection. (4) Existing joint approaches either rely on trusted server-side data or inherit DP’s accuracy penalty. APMKFL is the first scheme to jointly address all three objectives—communication efficiency, collusion-resistant privacy, and accuracy preservation—without trusted server data or noise-based privacy.
Adaptive pruning multi-key federated learning framework
This section provides a detailed exposition of the proposed framework. First, it systematically introduces the technical principles and implementation process of the adaptive iterative channel pruning method. Next, it thoroughly analyzes the core mechanisms of the multi-key BGV homomorphic encryption method. Finally, it comprehensively presents the complete process and key stages of the joint model training performed by edge devices.
Adaptive iterative channel pruning
A natural baseline is to apply iterative pruning with a fixed rate throughout all communication rounds. However, this approach faces a fundamental dilemma: (1) If
is set too conservatively, communication savings are minimal. (2) If
is set aggressively, accuracy degrades significantly as the number of edge devices C increases, because higher C introduces more statistical heterogeneity, requiring greater model capacity to accommodate the distributional diversity across devices. (3) The optimal
differs across datasets, models, communication rounds, and device counts—making a universally good fixed choice impossible without per-experiment manual tuning. Our adaptive mechanism resolves this by automatically identifying the highest pruning rate satisfying the accuracy constraint in each round, eliminating manual selection entirely. As illustrated in Fig 1, this paper investigates a federated learning architecture comprising a central server S and a set of edge devices
. Each device
maintains a private local dataset
with
data samples. The global dataset is defined as
, containing a total of
samples. Under the standard federated learning framework, the central server S periodically aggregates local model parameters from all edge devices and learns the global model parameters w by minimizing the global empirical risk:
where denotes the global empirical risk function defined over the entire federated system, and fc(wc) represents the local objective function with parameters wc specific to device c.
For each edge device c, the accuracy constraint for channel pruning is formally defined as follows: Given an n-layer CNN model with parameters wc and original channel configuration where li denotes the number of output channels in the i-th layer, the channel pruning aims to find an optimized channel configuration
such that the pruned compact model
satisfies the target accuracy threshold Accg on the validation set
:
where represents the parameters of the pruned model
, and Accg is the predefined accuracy threshold. The core objective of model pruning can be formalized as a constrained optimization problem: to find the optimal channel configuration that minimizes the model’s structural complexity while satisfying the accuracy constraint.
In federated learning, the essence of model pruning lies in generating a mask structural binary matrix maskc for each edge device c, formally defined as:
where denotes the sparsified model parameters after pruning, and ⊙ represents the Hadamard product (element-wise multiplication).
During the model pruning phase, the proposed method incorporates the channel pruning strategy presented in [15] by applying an L1 regularization constraint to the scaling factor of the batch normalization layer. This allows for dynamic identification of non-critical channels during training, generating a corresponding binary mask matrix where each element indicates the presence or absence of the respective channel rather than directly representing parameter pruning. Within the federated learning framework, each edge device trains a local model using its private local data and engages in a total of T communication rounds with the central server for model aggregation.
Algorithm 1 proposes an adaptive threshold-based iterative channel pruning framework, which consists of two phases:
- 1). Local Model Training (Lines 1–3): During the t-th federated communication round, each edge device trains local model parameters
on its private dataset
, while simultaneously evaluating the model’s validation accuracy Acct.
- 2). Dynamic Channel Pruning (Lines 4–13): When Acct meet predefined accuracy constraints Accg, the pruning process proceeds through the following steps: Candidate pruning ratios
are uniformly sampled. During pre-pruning operations, the system first performs a complete sorting of scaling factors
in batch normalization layers. A pruning threshold is then calculated as
, where
denotes the total number of scaling factors. A binary mask matrix
is generated by comparing each channel’s
value against the threshold: channels exceeding the threshold are preserved (marked as 1) while others are pruned (marked as 0). Each candidate pruning ratio
undergoes validation set evaluation, with the corresponding inference accuracy recorded as
. Ultimately, the system selects the pruning configuration with the highest validation accuracy, determining the optimal mask matrix
and model architecture.
Algorithm 1. Adaptive Iterative Channel Pruning Algorithm.
1: for do
2: Train model on local dataset :
3: Calculate current model accuracy:
4: if Accg ≤ Acct then
5: ▷(y as the value of
, i: index)
6: for select pruning rate do
7: Calculate threshold:
8: Generate mask matrix:
9: Pre-pruning:
10: Evaluate pruned model:
11: end for
12: Select maximum accuracy:
13: Record optimal mask:
14: Save pruned model:
15: else
16: continue
17: end if
18: end for
It is important to clarify that the candidate pruning rate selection in Algorithm 1 is fundamentally different from a conventional offline hyperparameter search. In a standard hyperparameter search, a fixed set of candidate values is evaluated on a held-out validation set before training begins, and the best value is then applied statically throughout the entire training process. In contrast, our adaptive mechanism operates online, within each communication round, and its behavior changes dynamically as the model evolves. Specifically, the pruning threshold is not chosen from a pre-fixed discrete grid; rather, it is derived from the current model’s batch normalization scaling factors via sorted ranking. Since the distribution of
changes with every gradient update, the set of channels identified for pruning at a given rate
is unique to each round. This means that the same nominal rate
can preserve entirely different subsets of channels in round t versus round t + 1. Therefore, the mechanism is self-calibrating: the accuracy feedback in each round directly shapes the effective pruning structure, a property that offline hyperparameter search cannot replicate. Table 1 summarizes the key distinctions.
The extra computational cost introduced by the adaptive pruning decision in each communication round consists of two components. First, sorting the BN scaling factors incurs
time, where
denotes the total number of channels across all layers (a one-time operation per round regardless of k). Second, for each of the k candidate pruning rates, the algorithm performs one forward pass over the local validation set Dval to compute the pruned model’s accuracy. Each forward pass costs
, where
is the inference cost of the pruned model—which is smaller than the full model. The total additional cost per round is therefore
.
Multi-key BGV homomorphic encryption mechanism
Chen et al. [16] proposed the first BGV-based multi-key fully homomorphic encryption (MKFHE) methods, which operates on ring elements and derives its security from the ring learning with errors (RLWE) problem. This multi-key homomorphic encryption mechanism allows distinct edge devices to perform encryption using individual private keys, while requiring collaborative participation from all involved devices during decryption. In our federated learning framework, we specifically leverage the additive homomorphic property of MKFHE. By aggregating public keys from all edge devices to form a unified public key, the scheme achieves secure parameter aggregation. The specific implementation details of the sub-algorithm are described as follows:
- 1). Initialization Phase: Given a security parameter
and an edge device set
, the system establishes cryptographic parameters through the following steps: I) Algebraic Structure Definition: Construct the cyclotomic polynomial ring
with polynomial dimension n being a power of two, ensuring compatibility with NTT (Number Theoretic Transform) computations. II) Modulus Selection: Choose coprime integers q (ciphertext modulus) and p (plaintext modulus) such that
, which guarantees effective noise control in homomorphic operations. III) Noise Distribution: Define a bounded discrete Gaussian distribution
over R with noise bound B, governing the statistical properties of encryption noise terms. IV) Public Parameter Generation: Randomly sample a public vector
, where the quotient ring Rq is constructed via
. The complete public parameters are
.
- 2). Key Generation Phase: During the key generation process for edge device c, the core private parameter
is first randomly selected from the ternary polynomial ring
, forming a computationally efficient private key
. This structure fixes the leading coefficient as 1 to eliminate modular reduction in polynomial multiplication, thereby significantly reducing computational overhead. Next, a noise term
is sampled from a bounded noise distribution
, and combined with the predefined public parameter a to generate the public key component
. The public key is then defined as
, whose security relies on the hardness assumption of the RLWE problem. The resulting key pair
guarantees ciphertext consistency, where the public key is used for data encryption and the private key exclusively serves decryption purposes.
- 3). Encryption Phase: To encrypt a plaintext
using the public key
of edge device c, first sample a random polynomial
and independently draw noise terms
from a bounded noise distribution. The ciphertext
is computed as:
This encryption employs a dual-masking mechanism (via rc and e0, e1) to ensure semantic security, with its safety reduced to the hardness assumption of the RLWE problem.
- 4). Decryption Phase: Upon receiving ciphertext
, edge device c computes the inner product with private key
:
When the noise term e satisfies , the plaintext is accurately recovered via modulo-p operation:
The co-design of noise scaling factor p and parameter guarantees decryption robustness.
- 5). Homomorphic Addition: Let
and
be ciphertexts encrypting
for devices i and j, respectively. To perform homomorphic addition, construct an extended ciphertext
and generate an extended private key
, satisfying linear homomorphism:
The plaintext sum is obtained via
operation, enabling ciphertext arithmetic without decryption.
- 6). Threshold Decryption Mechanism: The proposed scheme supports threshold decryption, enabling collaborative decryption with partial private keys. The aggregated ciphertext after homomorphic operations takes the form
. The concrete procedure comprises:
- I). Partial Decryption: Each edge device c samples random noise
from the noise distribution
, then computes the local decryption share using its private key component:
- I). Partial Decryption: Each edge device c samples random noise
Here, serves to protect the confidentiality of zc against potential leakage.
- II). Decryption Fusion: Aggregate all local decryption shares
and recover the plaintext via two-step modular reduction:
Framework implementation and workflow
Inspired by the seminal work of Moore et al. [28], the proposed federated learning framework in this study represents a significant extension of the Federated Averaging (FedAvg) methodology. Within the system model, the total communication rounds between edge devices and the central server are specified as T iterations, with the collaborating edge device cohort formally defined as . As illustrated in Fig 1, the architectural design comprises seven critical operational phases, where Algorithm 2 provides a comprehensive procedural breakdown of the joint model training mechanism.
- (1). Parameter Initialization Protocol: The central server initializes and broadcasts cryptographic public parameters pp. Each edge device generates distinct cryptographic key pairs
based on pp. Subsequently, all edge devices collaboratively compute the aggregated public key through a secure multi-party computation protocol:
- (2). Privacy-Enhanced Local Training During the initialization phase of the t-th federated learning communication round, each edge node synchronizes the global model parameters W(t−1) through a secure parameter channel from the central coordinator. Utilizing local non-IID data
, every node implements differentially private SGD with adaptive gradient clipping (DP-AC-SGD) for E complete training epochs:
where denotes the randomly sampled data batch and
represents the dynamic gradient clipping threshold. After training, nodes perform adaptive pruning on parameters
according to Algorithm 1.
- (3). Model Parameter Encryption: Building upon the ring-element encoding scheme proposed by Dowlin et al. [29], our method initiates with structured encoding of local model parameters. For any rational number b, its binary expansion is expressed as
, where the integer part
contains n1 + 1 significant digits, and the fractional part
maintains n2-bit precision. The polynomial ring mapping mechanism defines the encoding formula as:
where n denotes the dimension parameter of the polynomial ring. A representative example is the value 3.5 with binary expansion (11.1)2, corresponding to the ring element representation .
During the parameter encryption phase, edge devices employ the aggregated public key to encrypt local model parameters
. The detailed procedure involves: randomly selecting parameters
from the noise distribution
, then computing the ciphertext pair:
Finally, edge devices transmit the encrypted result ctc to the central server.
- (4). Local Model Homomorphic Aggregation: The central server leverages homomorphic accumulation properties to perform ciphertext-space aggregation on C received edge device ciphertexts
, generating the global model ciphertext:
- (5). Distributed Partial Decryption: Each edge device c performs partial decryption on the global ciphertext ctsum using its private key zc, producing a decryption share:
- (6). Decryption Synthesis and Reconstruction: After collecting all partial decryption results
, the central server executes decryption synthesis:
This operation reconstructs the unencrypted aggregated model parameters.
- (7). Global Model Update: The server decodes the aggregation result and computes the weighted average to generate the next-generation global model:
- (8). Termination Criteria: The parameter initialization phase is executed only once before the first training round, with generated public parameters reused in subsequent iterations. The protocol terminates when either condition is met: 1) Global model loss function converges (
); 2) Preset maximum iteration count is reached.
Algorithm 2. Federated Training Model.
Input: Edge datasets where
is c-th device’s data; Initial global parameters W; Edge device set C; Communication rounds T
Output: Converged edge models
Server Protocol:
1: for round t = 1 to T do
2: Activate devices C = {1,2,...,C}
3: parallel for each :
4:
5: Aggregate
6: end for
ClientUpdate(c, ):
7: for epoch i = 1 to E do
8: for batch do
9: Update with mask:
10:
11: end for
12: Prune via Algorithm1:
13: Encrypt params:
14: end for
15: return
Scheme analysis
Security analysis
The proposed scheme in the federated learning scenario employs a multi-key homomorphic encryption method to safeguard data privacy, adhering to the security requirements of the semi-honest model. This implies that both the central server and all edge devices act honestly but remain curious. In other words, they strictly follow the protocol while attempting to infer private data of other devices from the shared information during protocol computation.
This section demonstrates the security of the proposed scheme from three perspectives.
Theorem 1: Security against honest-but-curious central server. An honest-but-curious central server cannot infer any private data from the edge devices.
Proof: In the APMKFL federated learning scheme, edge devices transmit two types of information to the server. First, in step 2, the edge devices send the ciphertext of local model parameters ctc to the central server, which is generated by multi-key BGV encryption. Then, in step 4, the edge devices send the partially decrypted global model result emc to the central server. The ciphertext and decryption result are expressed as follows:
According to the RLWE assumption, all shared information contains an additional error term to guarantee security. The RLWE ensures that c0 and emc are computationally indistinguishable from uniformly random elements of Rq. Therefore, these values do not disclose any information about the plaintext or the key (−zc) to the central server. After performing the final decryption, the central server can only obtain the sum of the local model parameters from all edge devices without revealing any individual parameter.
Consequently, the proposed scheme can ensure the security of individual model parameters, effectively protecting the data privacy on edge devices. The central server cannot infer any private information of the edge devices from the received data.
Theorem 2: Security against honest-but-curious edge devices. An honest-but-curious edge device cannot infer any private data from other edge devices by eavesdropping on shared information.
Proof: In the APMKFL scheme, the model parameters of each edge device are encrypted using multi-key BGV encryption based on RLWE. Each edge device possesses its own public and private keys and collaboratively computes an aggregated public key to encrypt its model parameters. The decryption of the global model ciphertext requires all edge devices to compute their respective partial decryption results and send them to the central server for final decryption.
To ensure the security of edge devices’ private keys, each edge device introduces an error term in its partial decryption result. This prevents private key leakage, ensuring that even an honest-but-curious edge device cannot infer any private information about another edge device’s local data by intercepting the uploaded information.
Theorem 3: Security against collusion between edge devices and the central server. The proposed scheme is secure against collusion between the central server and up to C − 1 edge devices, where C denotes the total number of edge devices.
Proof: In the APMKFL scheme, each edge device encrypts its model parameters using the aggregated public key before uploading them to the central server. The server then computes the sum of all edge devices’ local model parameters. The ciphertexts cti and the aggregated ciphertext ctsum can only be decrypted through collaborative partial decryption from all edge devices.
Type-I collusion attack: An edge device colludes with the central server to recover the plaintext model parameters from the ciphertext cti of a compromised edge device ci. In the worst-case scenario, C − 1 edge devices collude with the central server, leaving only ci uncompromised. The colluding parties compute
for
and combine with
:
The result remains a partially encrypted ciphertext under the public key bi of the compromised device ci. Even with access to the private keys sj of other edge devices, the colluding parties cannot decrypt cti and thus cannot access any private information.
Type-II collusion attack: Edge devices and the central server attempt to infer a single local model from the decrypted global model
. The scheme ensures that such inference is impossible as long as at least two edge devices do not participate in the collusion. In the worst case, C − 2 edge devices and the central server collude. By subtracting the known local models of these C − 2 devices from the global model, the colluding parties can only obtain the sum of the remaining two devices’ models, without identifying either individually.
Thus, the APMKFL scheme is resilient to collusion attacks involving up to C − 1 edge devices and the central server, ensuring the privacy and security of local model data.
Correctness analysis
This section analyzes and proves the correctness of the decryption process for the global model ciphertext in the proposed scheme.
Theorem 4: The global model ciphertext can be correctly decrypted with the collaboration of all edge devices.
Proof: After collecting the partial decryption results from all edge devices, the central server performs the final decryption as follows:
Hence, the final decryption result is the sum of the plaintext model parameters from all edge devices, which constitutes the global model. This completes the proof of correctness.
Experiments and results analysis
This section first provides a brief overview of the experimental setup. Then, it analyzes the model size after iterative pruning under different precision constraints in the APMKFL scheme and examines the impact of pruning on communication overhead. Finally, the performance of APMKFL is evaluated through comparisons with four popular federated learning schemes.
Experimental setup
This experiment was conducted on a Windows 11 operating system, using an Intel i7-12700F processor, GTX 3060Ti GPU, and 8GB RAM. All neural network models were built using Python’s PyTorch framework. We evaluated the performance of APMKFL on two classic image recognition tasks: MNIST digit recognition and CIFAR-10 image classification. The MNIST dataset consists of 10 classes, comprising 60,000 training images and 10,000 test images, with each image being a 28×28 pixel grayscale image. The CIFAR-10 dataset also contains 10 classes, comprising 50,000 training images and 10,000 test images, with each image being a 32×32 pixel color image.
For IID experiments, all training samples are randomly shuffled and uniformly distributed across C edge devices, such that each device holds an approximately equal number of samples from all classes. For Non-IID experiments, we adopt the Dirichlet distribution-based partitioning strategy, which is a widely used and principled method for simulating heterogeneous data in federated learning [30]. Specifically, for each class k, the proportion of samples allocated to device c is drawn from a Dirichlet distribution Dir(), where
is the concentration parameter controlling the degree of heterogeneity: smaller
induces more severe Non-IID distribution (fewer classes per device), while
approaches the IID case. In this study, we set
= 0.5, a standard value in the federated learning literature that produces moderate-to-strong non-IID conditions. In this setting, each edge device typically receives samples dominated by 1–3 classes. Table 2 below summarizes the resulting data distribution characteristics for each experimental configuration.
In the federated learning system, we configured experiments with 10, 20, and 30 edge devices for comparative analysis. Different neural network architectures were employed for different datasets: a simple network consisting of two convolutional layers and two fully connected layers (2NN) was used for the MNIST dataset, while the more complex VGG11 architecture was adopted for the CIFAR-10 dataset. The experimental parameter configurations are detailed in Table 3.
All edge devices utilized the Stochastic Gradient Descent algorithm for local model training. The specific parameter settings were as follows: 50 local iterations (Epochs), 20 total communication rounds (k) with the central server, a mini-batch size of 64, and an initial learning rate () of 0.01. Additionally, the selection of security parameters for multi-key homomorphic encryption required balancing efficiency and security. In this experiment, all edge devices shared global parameters (N, q, and p), with each client generating a unique public-private key pair based on these parameters. To ensure a 128-bit security strength, we set the security parameters as N = 4096, q = 218, and p = 128.
To ensure fair comparison, all methods share identical base hyperparameters. Method-specific parameters follow their respective original papers, as detailed in Table 4.
Performance evaluation
The performance of the APMKFL scheme is evaluated on the MNIST and CIFAR-10 datasets under both IID and non-IID settings, focusing on the model size after iterative pruning under different accuracy constraints, i.e., the model pruning rate. The accuracy constraints are set to 90%, 85%, and 80%, with the number of edge devices fixed at 10. The pruning rate variation at each edge device is recorded under different accuracy levels. Fig 2 illustrates the variation in the number of communication rounds and pruning rates for different datasets under the IID setting, while Fig 3 presents the corresponding results under the non-IID setting.
In both the MNIST and CIFAR-10 datasets, each edge device performs model pruning after local training and before communicating with the central server. At this stage, the model accuracy has already satisfied the predefined accuracy constraint, and the accuracy remains within the constraint even after pre-pruning. Each edge device selects the pruned model with the highest pruning rate that still satisfies the accuracy constraint for communication.
For IID data, as shown in Fig 2, after several rounds of iterative pruning, further pruning ceases, and the model accuracy gradually approaches the target constraint. Compared to the original unpruned model, the final pruning rates on the CIFAR-10 dataset are 79.2% (for 90% accuracy constraint), 86.4% (85%), and 92.8% (80%). On the MNIST dataset, the pruning rates are 60.2% (90%), 76.4% (85%), and 88.3% (80%), respectively. Moreover, the pruned models still satisfy the accuracy constraints, indicating that the 2NN and VGG11 models are overparameterized for the MNIST and CIFAR-10 classification tasks, respectively. Pruning redundant parameters does not degrade model accuracy; on the contrary, it can even improve accuracy by making the model structure more compact and better fitted to the data, thus enhancing training efficiency. Through iterative pruning, the model achieves a balance between communication cost and accuracy. Further pruning beyond this point would lead to performance degradation, as the model’s capacity would be overly reduced and fail to meet the accuracy constraint.
For non-IID data, the accuracy of the 2NN and VGG11 models is generally lower than in the IID setting. As shown in Fig 3, the number of pruning iterations is also reduced accordingly. Compared to the original unpruned models, the model sizes are significantly reduced. Specifically, in the CIFAR-10 dataset, the pruning rates under different accuracy constraints are 65.3% (90%), 74.7% (85%), and 86.2% (80%). In the MNIST dataset, the pruning rates are 56.2% (90%), 72.4% (85%), and 89.3% (80%). Therefore, under the premise of satisfying the accuracy constraint, APMKFL effectively compresses the model through iterative pruning, making the model more compact and significantly reducing the communication overhead.
Comparison with existing schemes
Functional analysis.
To address the high communication overhead and privacy concerns in federated learning, many innovative approaches have emerged in recent years. The ESFL scheme [32] integrates Top-k gradient sparsification with Paillier homomorphic encryption, allowing only partial gradients to be uploaded in each communication round, thereby reducing the communication overhead while ensuring gradient privacy through semi-homomorphic encryption. The CPFed scheme [33] combines sketch-based gradient compression with differential privacy, aiming to reduce transmission costs while enhancing privacy protection. The FedDUAP scheme [34] introduces a pruning strategy based on insensitive server-side data and decentralized edge device data to compress the global model and lower communication costs. In addition, the classic FedAvg [31] method serves as a baseline for comparison. FedAvg does not incorporate model pruning or homomorphic encryption, making it less efficient in communication and lacking privacy-preserving capabilities. Table 5 presents a functional comparison across four aspects: accuracy retention, communication cost reduction, model parameter protection, and resistance to collusion attacks.
Specifically, ESFL [32] applies semi-homomorphic encryption to protect gradient privacy, but since all edge devices use a shared key, it is vulnerable to collusion between the server and edge devices. CPFed [33], on the other hand, achieves resistance to collusion through differential privacy. However, the inherent trade-off between privacy and model accuracy—caused by the noise added to the gradients—poses a significant challenge. FedDUAP [34] employs layer-wise model pruning to reduce communication overhead, but it assumes the availability of a portion of training data on the server side, thereby failing to ensure data privacy.
Comparison of model accuracy and communication overhead.
This section evaluates the performance of APMKFL in terms of model accuracy and communication overhead, in comparison with other approaches under varying numbers of edge devices. In federated learning, there exists a trade-off between model accuracy and communication cost—reducing communication overhead typically involves transmitting fewer parameters, which may adversely affect model performance. Figs 4 and 5 illustrate the comparison of model accuracy and communication overhead on the CIFAR-10 and MNIST datasets, respectively, under different edge device settings (C = 10, 20, 30).
Top-k sparsification selects only the top-k gradient elements for transmission, reducing communication overhead. While [35] suggests k has limited effect on convergence speed in homogeneous (IID) settings, the appropriate k under Non-IID federated learning is non-trivial. To empirically justify k = 30%, we conduct a sensitivity analysis over k ∈ 10%, 20%, 30%, 40% on CIFAR-10 under both IID and Non-IID settings. Results are summarized in Table 6.
(1) k = 10% achieves near-FedAvg accuracy but yields only 10% communication reduction—insufficient for practical deployment. (2) k = 20% provides a favorable accuracy-communication trade-off but is slightly sensitive to device count under Non-IID. (3) k = 30% delivers a consistent 70% communication reduction with acceptable accuracy across all C values under both IID and Non-IID settings, corroborating [35]’s recommendation. (4) k = 40% offers only marginal accuracy improvement over k = 30% while reducing communication savings from 70% to 60%. Based on this analysis, k = 30% is adopted as the ESFL default in all experiments.
On the CIFAR-10 dataset, under different numbers of edge devices, the model accuracy of FedAvg fluctuates around 90% (C = 10), 91% (C = 20), and 91% (C = 30), but FedAvg does not reduce communication cost. ESFL [32], which employs Top-k gradient sparsification (k = 30%), reduces communication overhead by approximately 70%. Under IID settings, accuracy drops to 88% (C = 10), 81% (C = 20), and 73% (C = 30) as the number of devices increases. Under Non-IID settings, the degradation is more pronounced, with accuracy of 86% (C = 10), 79% (C = 20), and 70% (C = 30), highlighting ESFL’s sensitivity to data heterogeneity. CPFed [33] achieves about 20% communication reduction while maintaining accuracy at around 84% (C = 10), 86% (C = 20), and 85% (C = 30). FedDUAP [34], using a pruning ratio of 0.6, reduces communication by approximately 60% with accuracies of 76% (C = 10), 78% (C = 20), and 75% (C = 30). As shown in Fig 4, although achieves a significant reduction in communication, model accuracy drops sharply with more devices. In contrast, other methods show minimal accuracy changes. APMKFL maintains high accuracy of 91% (C = 10), 95% (C = 20), and 95% (C = 30) while reducing communication by 79%. Compared with APMKFL, the communication overhead of FedAvg is 4.9×, and that of
, CPFed, and FedDUAP is 1.5×, 3.8×, and 1.9×, respectively. APMKFL thus outperforms ESFL, FedAvg, CPFed, and FedDUAP by achieving the highest accuracy with significantly reduced communication costs.
On the MNIST dataset, FedAvg without compression achieves accuracy of 98% (C = 10), 97% (C = 20), and 98% (C = 30). ESFL, transmitting only 30% of parameters, reduces communication by 70%, but accuracy drops to 96% (C = 10), 87% (C = 20), and 78% (C = 30). CPFed reduces communication by 20% with accuracies of 87% (C = 10), 86% (C = 20), and 87% (C = 30). FedDUAP, under a pruning ratio of 0.6 and 60% communication reduction, achieves 77% (C = 10), 78% (C = 20), and 75% (C = 30). Fig 5 shows that ESFL’s accuracy declines significantly with more edge devices. In contrast, APMKFL maintains accuracy of 88% (C = 10), 87% (C = 20), and 87% (C = 30) while reducing communication overhead by 55.4%. In terms of raw upload bandwidth, ESFL transmits only 0.024 MB/round/device by sending 30% of gradients, which is lower than APMKFL’s 0.050 MB. However, ESFL’s Paillier encryption causes a 64× ciphertext expansion and server aggregation time of 142.4s, resulting in an end-to-end latency of 195s/round—2.2× higher than APMKFL’s 88s. Compared to APMKFL, the E2E latency of FedAvg, CPFed, and FedDUAP is 0.28×, 0.31×, and 0.30× respectively, but none of these provides collusion-resistant privacy guarantees. Overall, APMKFL outperforms CPFed in both accuracy and communication efficiency, and achieves higher accuracy than ESFL and FedDUAP.
Computational overhead.
This section evaluates the performance of APMKFL in terms of computational overhead by comparing it with other schemes. The experiments are conducted with 10 and 20 edge devices, using the 2NN model. Fig 6 presents the time required for local training of E epochs on edge devices under different schemes, while Fig 7 shows the time consumed by the cloud server to perform a single round of global model aggregation.
Based on the experimental comparison, Fig 6 shows that the computational overhead on edge clients in FedAvg, ESFL, and CPFed is higher than that of FedDUAP and APMKFL. This is because FedDUAP and APMKFL reduce the size of local models through pruning, thereby improving local training efficiency. Fig 7 illustrates that FedAvg, CPFed, and FedDUAP do not involve encryption operations, resulting in minimal computation overhead on the server side. In contrast, ESFL applies Paillier homomorphic encryption to each model parameter individually, which significantly increases the number of ciphertexts and computational cost as the number of edge devices grows. APMKFL, however, performs homomorphic computations over a polynomial ring, allowing up to 4,096 model parameters to be encapsulated within a single ciphertext, thus achieving more efficient encrypted computation than ESFL.
It is important to distinguish the respective roles of adaptive pruning and homomorphic encryption in reducing overall system overhead. Model pruning contributes to efficiency in two specific ways: (1) it reduces the computational cost of local training on edge devices by operating on a structurally smaller model with fewer active channels and parameters; and (2) it reduces the number of model parameters that must be encoded and transmitted to the server prior to aggregation. However, pruning does not directly reduce the per-operation cost of BGV homomorphic encryption, which is governed by the ring dimension N and ciphertext modulus q, fixed system-level cryptographic parameters. The primary reason APMKFL maintains lower server-side overhead than ESFL (as shown in Fig 7) is that the BGV polynomial packing scheme encapsulates up to N = 4,096 model parameters into a single ciphertext, and pruning reduces the total number of such ciphertexts. This indirect reduction is the key mechanism linking pruning efficiency to encryption overhead reduction. The two components are therefore complementary: pruning optimizes communication and local computation, while multi-key HE ensures security without sacrificing aggregation correctness.
In our experiments, k = 9 and , making this cost a small fraction of the main training cost
, where E = 50 and
. The adaptive pruning decision introduces a measurable but modest per-round computational overhead (Table 7). For the VGG11 model on CIFAR-10 with C = 10, the decision cost is approximately 18.4s per round, compared to a total edge-side per-round time of 76.5s (including local training, pruning decision, and encryption, as reported in Table 7. However, this cost is offset by a substantial reduction in communication overhead: APMKFL reduces per-round communication by 79.1% on CIFAR-10, achieved over T = 20 rounds. Concretely, assuming a per-parameter transmission cost of 4 bytes and a VGG11 model size of 35.2 MB, the per-round bandwidth saving is approximately 35.2 × 0.791 ≈ 27.8 MB per device. For a 20-round training process with C = 10 devices, the total communication saving is 27.8 × 20 × 10 = 5,560 MB, while the total extra decision cost amounts to only 18.4 × 20 = 368 additional seconds of local computation. In bandwidth-constrained edge environments (e.g., 1 Mbps uplink), 5,560 MB of transmission savings correspond to over 12 hours of saved transmission time—a trade-off ratio that overwhelmingly favors the adaptive pruning mechanism. This demonstrates that the decision cost is a negligible price for the communication benefits obtained.
To provide a comprehensive evaluation beyond per-round training time, we report four system-level metrics for all compared methods: (1) Peak GPU memory per edge device (MB), measured during local training; (2) Ciphertext expansion ratio: ratio of encrypted model size to plaintext size (applicable to HE-based methods); (3) Network bandwidth per round per device (MB), measuring total upload volume; (4) End-to-end (E2E) latency per round (s): wall-clock time including local training, encryption, transmission (assuming 10 Mbps uplink), server aggregation, and decryption. Results are reported in Table 8 (CIFAR-10/VGG11) and Table 9 (MNIST/2NN).
As shown in Tables 8 (CIFAR-10/VGG11) and 9 (MNIST/2NN). (1) ESFL’s Paillier encryption has a ciphertext expansion ratio of 64× (2048-bit key, 4-byte params), leading to server aggregation time of 277.2s/round on CIFAR-10 and E2E latency of 610s, despite transmitting only 30% of gradients. (2) APMKFL’s BGV polynomial packing (N = 4096 params per ciphertext) achieves an effective expansion ratio of 2.6× after pruning, yielding server aggregation time of 153.5s and E2E latency of 176s—3.5× faster than ESFL end-to-end. (3) APMKFL’s peak memory (210 MB/device on CIFAR-10) is lower than both ESFL (890 MB) and FedAvg (285 MB), because pruning reduces the number of active parameters and ciphertexts in GPU memory simultaneously.
In summary, APMKFL significantly reduces both communication and computational overhead while maintaining high model accuracy. By iteratively pruning the model, APMKFL achieves a more compact structure, which enhances generalization and accelerates training. Compared to FedAvg, it achieves substantial communication reduction without sacrificing accuracy. Compared to ESFL and CPFed, APMKFL not only reduces communication costs but also decreases model size, computing burden, and memory usage on local devices, accelerating convergence. Therefore, APMKFL demonstrates a superior overall advantage in federated learning scenarios.
Ablation study
To precisely isolate the respective contributions of adaptive pruning and multi-key homomorphic encryption in the APMKFL framework, we conduct a controlled ablation study with four configurations: (1) APMKFL (Full): The complete proposed framework with both adaptive pruning and multi-key BGV HE. (2) Pruning-only: Adaptive pruning is applied, but model parameters are aggregated in plaintext (no HE). This variant measures the isolated contribution of pruning to communication and computation efficiency. (3) HE-only: Multi-key BGV HE is applied to the full model (no pruning). This variant measures the isolated contribution of encryption to privacy with the full communication overhead. (4) FedAvg (Baseline): Standard federated averaging with no pruning and no encryption, serving as the reference.
Table 10 (CIFAR-10) and Table 11 (MNIST) summarize the ablation results. The key findings are: (i) Pruning alone achieves nearly the same accuracy as APMKFL while significantly reducing communication and local computation overhead. (ii) HE alone maintains high model accuracy (close to FedAvg) but does not reduce communication overhead, and substantially increases server-side computation cost. (iii) APMKFL combines both benefits: it achieves accuracy comparable to FedAvg, communication efficiency comparable to Pruning-only, and provides the full privacy guarantees of HE-only. This demonstrates that the two components are orthogonal and complementary in their contributions.
Table 12 comparing APMKFL against four fixed-rate baselines (=0.1, 0.3, 0.5, 0.7) on CIFAR-10 and MNIST across C = 10, 20, 30. Results confirm that no fixed rate simultaneously achieves APMKFL’s combination of 91−95% accuracy and 79.1% communication reduction on CIFAR-10. APMKFL’s adaptive mechanism consistently identifies the Pareto-optimal operating point each round.
Conclusion
Federated learning faces two critical and intertwined challenges: high communication overhead due to repeated parameter exchanges among resource-constrained edge devices, and privacy vulnerability arising from the exposure of model parameters to potentially curious or colluding participants. Existing approaches address these challenges in isolation, at the cost of model accuracy or with limited collusion resistance.
This paper proposes APMKFL, a federated learning framework that jointly addresses both challenges without accuracy sacrifice. The adaptive iterative channel pruning mechanism automatically identifies the optimal pruning rate each round via real-time BN scaling factor feedback, achieving channel pruning rates of up to 79.2% on CIFAR-10 and 60.2% on MNIST under the 90% accuracy constraint (IID, C = 10). After accounting for BGV ciphertext expansion (2.6×), this pruning rate translates to a net communication overhead reduction of 79.1% on CIFAR-10—since polynomial packing allows pruned parameters to be packed more efficiently into fewer ciphertexts, partially offsetting the per-ciphertext expansion cost—a 4.9× reduction compared to FedAvg—while maintaining 91–95% model accuracy across all device counts (C = 10, 20, 30). The multi-key BGV homomorphic encryption component enables ciphertext-domain aggregation without any plaintext exposure, providing provable resistance to collusion attacks involving up to C − 1 edge devices, a guarantee that single-key HE schemes fundamentally cannot provide. System-level profiling further shows that APMKFL’s BGV polynomial packing (4096 parameters per ciphertext) reduces server-side aggregation time to 153.5s/round on CIFAR-10 (Table 8)—a 1.8× improvement over ESFL’s Paillier-based approach (277.2s)—while maintaining a peak memory footprint of only 210 MB per device.
Despite these advantages, APMKFL has three limitations that motivate future work. First, BGV encryption introduces a ciphertext expansion ratio of 2.6× after pruning, partially offsetting byte-level communication savings; future work will explore tighter ciphertext compression or hybrid encryption schemes. Second, the framework currently assumes synchronous aggregation, making it sensitive to straggler devices; asynchronous aggregation with privacy-preserving partial decryption will be investigated. Third, incentive mechanisms for ensuring sustained active participation from edge devices remain an open challenge; we plan to integrate reputation-based or contract-theory approaches.
References
- 1.
Caldas S, Konečny J, McMahan HB, Talwalkar A. Expanding the reach of federated learning by reducing client resource requirements. arXiv. 2018.
- 2.
Li A, Sun J, Li P, Pu Y, Li H, Chen Y. Hermes: an efficient federated learning framework for heterogeneous mobile clients. In: Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. 2021. pp. 420–37.
- 3. Jiang Y, Wang S, Valls V, Ko BJ, Lee W-H, Leung KK, et al. Model pruning enables efficient federated learning on edge devices. IEEE Trans Neural Netw Learn Syst. 2023;34(12):10374–86. pmid:35468066
- 4. Munir MT, Saeed MM, Ali M, Qazi ZA, Qazi IA. Fedprune: Towards inclusive federated learning. arXiv preprint. 2021.
- 5. Xu W, Fang W, Ding Y, Zou M, Xiong N. Accelerating federated learning for IoT in big data analytics with pruning, quantization and selective updating. IEEE Access. 2021;9:38457–66.
- 6. Neto HNC, Hribar J, Dusparic I, Mattos DMF, Fernandes NC. A Survey on Securing Federated Learning: Analysis of Applications, Attacks, Challenges, and Trends. IEEE Access. 2023;11:41928–53.
- 7.
Olatunji IE, Nejdl W, Khosla M. Membership inference attack on graph neural networks. In: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE; 2021. pp. 11–20.
- 8.
Miura T, Shibahara T, Yanai N. Megex: Data-free model extraction attack against gradient-based explainable AI. In: Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems; 2024. pp. 56–66.
- 9. Li J, Rakin AS, Chen X, Yang L, He Z, Fan D, et al. Model extraction attacks on split federated learning. arXiv. 2023.
- 10.
Hao M, Li H, Xu G, Liu S, Yang H. Towards efficient and privacy-preserving federated deep learning. In: ICC 2019-2019 IEEE international conference on communications (ICC). IEEE; 2019. pp. 1–6.
- 11. Park J, Lim H. Privacy-preserving federated learning using homomorphic encryption. Appl Sci. 2022;12(2):734.
- 12. Fang C, Guo Y, Hu Y, Ma B, Feng L, Yin A. Privacy-preserving and communication-efficient federated learning in Internet of Things. Comput Security. 2021;103:102199.
- 13.
Horvóth S, Ho CY, Horvath L, Sahu AN, Canini M, Richtárik P. Natural compression for distributed deep learning. Mathematical and Scientific Machine Learning. PMLR; 2022. pp. 129–41.
- 14. Ma J, Naas S, Sigg S, Lyu X. Privacy‐preserving federated learning based on multi‐key homomorphic encryption. Int J of Intelligent Sys. 2022;37(9):5880–901.
- 15.
Liu Z, Li J, Shen Z, Huang G, Yan S, Zhang C. Learning efficient convolutional networks through network slimming. In: Proceedings of the IEEE international conference on computer vision; 2017. pp. 2736–44.
- 16.
Chen L, Zhang Z, Wang X. Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension. In: Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II 15. Springer; 2017. pp. 597–627.
- 17. Yu S, Nguyen P, Anwar A, Jannesari A. Adaptive dynamic pruning for non-iid federated learning. arXiv preprint. 2021. pp. 2.
- 18.
Vahidian S, Morafah M, Lin B. Personalized federated learning by structured and unstructured pruning under data heterogeneity. In: 2021 IEEE 41st international conference on distributed computing systems workshops (ICDCSW). IEEE; 2021. pp. 27–34.
- 19. Hu R, Gong Y, Guo Y. CPFed: Communication-efficient and privacy-preserving federated learning. arXiv preprint. 2020.
- 20.
Ruan X, Liu Y, Li B, Yuan C, Hu W. DPFPS: Dynamic and progressive filter pruning for compressing convolutional neural networks from scratch. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol. 35; 2021. pp. 2495–503.
- 21. Gao L, Zhang Z, Wu C. Feddtg: Federated data-free knowledge distillation via three-player generative adversarial networks. arXiv preprint. 2022.
- 22.
Kalali E, van Leuken R. A power-efficient parameter quantization technique for CNN accelerators. In: 2021 24th Euromicro Conference on Digital System Design (DSD). IEEE; 2021. pp. 18–23.
- 23. Jeong E, Oh S, Kim H, Park J, Bennis M, Kim SL. Communication-efficient on-device machine learning: Federated distillation and augmentation under non-iid private data. arXiv. 2018.
- 24. Prakash P, Ding J, Chen R, Qin X, Shu M, Cui Q, et al. IoT device friendly and communication-efficient federated learning via joint model pruning and quantization. IEEE Internet Things J. 2022;9(15):13638–50.
- 25. Frankle J, Carbin M. The lottery ticket hypothesis: Finding sparse, trainable neural networks. arXiv preprint. 2018.
- 26. Wei K, Li J, Ding M, Ma C, Yang HH, Farokhi F, et al. Federated learning with differential privacy: algorithms and performance analysis. IEEE TransInformForensic Secur. 2020;15:3454–69.
- 27. Ezhumalai P, et al. Enhanced privacy preservation of cloud data by using ElGamal elliptic curve (EGEC) homomorphic encryption scheme. KSII Transac Internet Inform Syst. 2020;14(11):4522–36.
- 28.
McMahan B, Moore E, Ramage D, Hampson S, Arcas BA. Communication-Efficient Learning of Deep Networks from Decentralized Data. In: Singh A, Zhu J, editors. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. vol. 54 of Proceedings of Machine Learning Research. PMLR; 2017. pp. 1273–82.
- 29. Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, Naehrig M, Wernsing J. Manual for using homomorphic encryption for bioinformatics. Proc IEEE. 2017:105(3):1–16.
- 30. Hsu TMH, Qi H, Brown M. Measuring the effects of non-identical data distribution for federated visual classification. arXiv. 2019.
- 31.
McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA. Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics. PMLR; 2017. pp. 1273–82.
- 32. Shengxing Y, Zhong C. Efficient secure federated learning aggregation framework based on homomorphic encryption. J Commun/Tongxin Xuebao. 2023;44(1).
- 33. Li T, Liu Z, Sekar V, Smith V. Privacy for free: Communication-efficient learning with differential privacy using sketches. arXiv. 2019.
- 34. Zhang H, Liu J, Jia J, Zhou Y, Dai H, Dou D. Fedduap: Federated learning with dynamic update and adaptive pruning using shared data on the server. arXiv. 2022.
- 35. Dong Y, Hou W, Chen X, Zeng S. Efficient and secure federated learning based on secret sharing and gradients selection. J Comput Res Dev. 2020;57:2241–50.