Secure Summation: Capacity Region, Groupwise Key, and Feasibility

05/17/2022
by   Yizhou Zhao, et al.
0

The secure summation problem is considered, where K users, each holds an input, wish to compute the sum of their inputs at a server securely, i.e., without revealing any information beyond the sum even if the server may collude with any set of up to T users. First, we prove a folklore result for secure summation - to compute 1 bit of the sum securely, each user needs to send at least 1 bit to the server, each user needs to hold a key of at least 1 bit, and all users need to hold collectively some key variables of at least K-1 bits. Next, we focus on the symmetric groupwise key setting, where every group of G users share an independent key. We show that for symmetric groupwise keys with group size G, when G > K-T, the secure summation problem is not feasible; when G ≤ K-T, to compute 1 bit of the sum securely, each user needs to send at least 1 bit to the server and the size of each groupwise key is at least (K-T-1)/K-TG bits. Finally, we relax the symmetry assumption on the groupwise keys and the colluding user sets; we allow any arbitrary group of users to share an independent key and any arbitrary group of users to collude with the server. For such a general groupwise key and colluding user setting, we show that secure summation is feasible if and only if the hypergraph, where each node is a user and each edge is a group of users sharing the same key, is connected after removing the nodes corresponding to any colluding set of users and their incident edges.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/25/2023

Secure Aggregation with an Oblivious Server

Secure aggregation usually aims at securely computing the sum of the inp...
research
04/19/2023

Weakly Secure Summation with Colluding Users

In secure summation, K users, each holds an input, wish to compute the s...
research
11/02/2022

MDS Variable Generation and Secure Summation with User Selection

A collection of K random variables are called (K,n)-MDS if any n of the ...
research
01/23/2018

Shake-n-Shack: Enabling Secure Data Exchange Between Smart Wearables via Handshakes

Since ancient Greece, handshaking has been commonly practiced between tw...
research
01/19/2021

Information Theoretic Secure Aggregation with User Dropouts

In the robust secure aggregation problem, a server wishes to learn and o...
research
04/24/2022

Information Theoretic Secure Aggregation with Uncoded Groupwise Keys

Secure aggregation, which is a core component of federated learning, agg...
research
02/07/2023

Multiple Key-cast over Networks

The multicast key-dissemination problem over noiseless networks, introdu...

Please sign up or login with your details

Forgot password? Click here to reset