Table 3 Comparison of privacy-preserving schemes features.
From: Group verifiable secure aggregate federated learning based on secret sharing
Function | Data privacy | Verifiability | Robustness to Dropout | Efficiency |
|---|---|---|---|---|
G-VCFL37 | \(\checkmark\) | \(\checkmark\) | Â | \(\checkmark\) |
PPML27 | \(\checkmark\) | Â | \(\checkmark\) | Â |
VerifyNet33 | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | Â |
EPPDA30 | \(\checkmark\) | Â | \(\checkmark\) | \(\checkmark\) |
VerSA36 | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | Â |
GVSA | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |