On hierarchical secure aggregation against relay and user collusion
By: Min Xu , Xuejiao Han , Kai Wan and more
Potential Business Impact:
Keeps private data safe when computers learn together.
Secure aggregation (SA) is fundamental to privacy preservation in federated learning (FL), enabling model aggregation while preventing disclosure of individual user updates. This paper addresses hierarchical secure aggregation (HSA) against relay and user collusion in homogeneous networks, where each user connects to $n$ relays and each relay serves $m$ users. In the two-phase communication framework, users transmit masked data to relays, which then process and forward compiled messages to the server for exact sum recovery. The primary objective is to devise a transmission scheme such that the server can finish the aggregation task, while any group of $T_h$ colluding relays and $T_u$ colluding users cannot reveal any information about the data owned by the non-colluding users. In this study, we establish fundamental limits on the communication load, defined as the ratio of transmitted information size to original data size, for each user-relay link and each relay-server link. Achievable thresholds for collusion resilience are also derived. When the number of colluding relays and users falls below certain critical thresholds, we construct communication-optimal schemes using methods from network function computation. A limitation of these schemes is their reliance on large random keys. To address this, we derive a lower bound on the required key size and prove its achievability in cyclic networks, where users are connected to relays in a cyclic wrap-around manner. By establishing a connection between HSA and network function computation, this work advances the theoretical limits of communication efficiency and information-theoretic security in secure aggregation.
Similar Papers
Collusion-Resilient Hierarchical Secure Aggregation with Heterogeneous Security Constraints
Information Theory
Protects some user data from other users.
Fundamental Limits of Hierarchical Secure Aggregation with Cyclic User Association
Information Theory
Keeps private data safe when sharing computer learning.
Information-Theoretic Decentralized Secure Aggregation with Collusion Resilience
Information Theory
Secures shared computer learning without sharing private data.