Secret Sharing Sharing For Highly Scalable Secure Aggregation

01/03/2022
by   Timothy Stevens, et al.
0

Secure Multiparty Computation (MPC) can improve the security and privacy of data owners while allowing analysts to perform high quality analytics. Secure aggregation is a secure distributed mechanism to support federated deep learning without the need for trusted third parties. In this paper we present a highly performant secure aggregation protocol with sub-linear communication complexity. Our protocol achieves greater communication and computation efficiencies through a group-based approach. It is similar to secret sharing protocols extended to vectors of values-aka gradients-but within groups we add an additional layer of secret sharing of shares themselves-aka sharding. This ensures privacy of secret inputs in the standard real/ideal security paradigm, in both semi-honest and malicious settings where the server may collude with the adversary. In the malicious setting with 5 protocol can aggregate over a federation with 100,000,000 members and vectors of length 100 while requiring each client to communicate with only 350 other clients. The concrete computation cost for this aggregation is less than half a second for the server and less than 100ms for the client.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/23/2020

FastSecAgg: Scalable Secure Aggregation for Privacy-Preserving Federated Learning

Recent attacks on federated learning demonstrate that keeping the traini...
research
09/21/2021

STAR: Distributed Secret Sharing for Private Threshold Aggregation Reporting

In practice and research, threshold aggregation systems  –  that attempt...
research
10/28/2022

Machine Unlearning of Federated Clusters

Federated clustering is an unsupervised learning problem that arises in ...
research
09/23/2021

Secure PAC Bayesian Regression via Real Shamir Secret Sharing

Common approach of machine learning is to generate a model by using huge...
research
08/04/2022

A Forward-secure Efficient Two-factor Authentication Protocol

Two-factor authentication (2FA) schemes that rely on a combination of kn...
research
05/03/2021

From Fairness to Full Security in Multiparty Computation

In the setting of secure multiparty computation (MPC), a set of mutually...
research
10/29/2019

Secure and Efficient Federated Transfer Learning

Machine Learning models require a vast amount of data for accurate train...

Please sign up or login with your details

Forgot password? Click here to reset