On hierarchical secure aggregation against relay and user collusion

📅 2025-11-25
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work investigates hierarchical secure aggregation (HSA) in federated learning over homogeneous networks, focusing on information-theoretic security against colluding relays and users. For a two-phase communication architecture (users → relay → server), we propose a communication-optimal scheme based on network function computation: users transmit masked local data; the relay encodes and forwards aggregated intermediate values; the server reconstructs the exact global sum without error. We establish fundamental lower bounds on communication loads for both the user–relay and relay–server links, derive the collusion-tolerance threshold, and prove achievability of the minimum key size under ring topology. The scheme achieves theoretical optimality simultaneously in aggregation accuracy, information-theoretic security, and communication/key overhead—thereby significantly advancing the fundamental limits of secure aggregation.

Technology Category

Application Category

📝 Abstract
Secure aggregation (SA) is fundamental to privacy preservation in federated learning (FL), enabling model aggregation while preventing disclosure of individual user updates. This paper addresses hierarchical secure aggregation (HSA) against relay and user collusion in homogeneous networks, where each user connects to $n$ relays and each relay serves $m$ users. In the two-phase communication framework, users transmit masked data to relays, which then process and forward compiled messages to the server for exact sum recovery. The primary objective is to devise a transmission scheme such that the server can finish the aggregation task, while any group of $T_h$ colluding relays and $T_u$ colluding users cannot reveal any information about the data owned by the non-colluding users. In this study, we establish fundamental limits on the communication load, defined as the ratio of transmitted information size to original data size, for each user-relay link and each relay-server link. Achievable thresholds for collusion resilience are also derived. When the number of colluding relays and users falls below certain critical thresholds, we construct communication-optimal schemes using methods from network function computation. A limitation of these schemes is their reliance on large random keys. To address this, we derive a lower bound on the required key size and prove its achievability in cyclic networks, where users are connected to relays in a cyclic wrap-around manner. By establishing a connection between HSA and network function computation, this work advances the theoretical limits of communication efficiency and information-theoretic security in secure aggregation.
Problem

Research questions and friction points this paper is trying to address.

Develops hierarchical secure aggregation against relay-user collusion in federated learning
Establishes communication limits and collusion resilience thresholds for secure aggregation
Constructs optimal schemes using network computation while minimizing key size requirements
Innovation

Methods, ideas, or system contributions that make the work stand out.

Hierarchical secure aggregation for collusion resilience
Network function computation for communication-optimal schemes
Cyclic networks achieve key size lower bounds
🔎 Similar Papers
No similar papers found.
M
Min Xu
Institute of Mathematics and Interdisciplinary Sciences, Xidian University, Xi’an 710126, China
X
Xuejiao Han
School of Mathematical Sciences, Capital Normal University, Beijing 100048, China
K
Kai Wan
School of Electronic Information and Communications, Huazhong University of Science and Technology, 430074 Wuhan, China
Gennian Ge
Gennian Ge
Capital Normal University
CombinatoricsCoding theoryInformation Security