Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/SansSerif/Regular/Main.js
On the Information Theoretic Secure Aggregation With Uncoded Groupwise Keys | IEEE Journals & Magazine | IEEE Xplore

On the Information Theoretic Secure Aggregation With Uncoded Groupwise Keys


Abstract:

Secure aggregation, which is a core component of federated learning, aggregates locally trained models from distributed users at a central server. The “secure” nature of ...Show More

Abstract:

Secure aggregation, which is a core component of federated learning, aggregates locally trained models from distributed users at a central server. The “secure” nature of such aggregation consists of the fact that no information about the local users’ data must be leaked to the server except the aggregated local models. In order to guarantee security, some keys may be shared among the users (this is referred to as the key sharing phase). After the key sharing phase, each user masks its trained model which is then sent to the server (this is referred to as the model aggregation phase). This paper follows the information theoretic secure aggregation problem originally formulated by Zhao and Sun, with the objective to characterize the minimum communication cost from the \mathsf K users in the model aggregation phase. Due to user dropouts, which are common in real systems, the server may not receive all messages from the users. A secure aggregation scheme should tolerate the dropouts of at most {\mathsf K}-{\mathsf U} users, where \mathsf U is a system parameter. The optimal communication cost is characterized by Zhao and Sun, but with the assumption that the keys stored by the users could be any random variables with arbitrary dependency. On the motivation that uncoded groupwise keys are more convenient to be shared and could be used in large range of applications besides federated learning, in this paper we add one constraint into the above problem, namely, that the key variables are mutually independent and each key is shared by a group of \mathsf S users, where \mathsf S is another system parameter. To the best of our knowledge, all existing secure aggregation schemes (with information theoretic security or computational security) assign coded keys to the users. We show that if {\mathsf S}\gt {\mathsf K}-{\mathsf U} , a new secure aggregation scheme with uncoded groupwise keys can achieve the same optimal communication cost as the best scheme w...
Published in: IEEE Transactions on Information Theory ( Volume: 70, Issue: 9, September 2024)
Page(s): 6596 - 6619
Date of Publication: 02 July 2024

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.