Multi-Message Secure Aggregation with Demand Privacy

📅 2025-04-29
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This paper addresses privacy-preserving secure aggregation in distributed learning, where a server must robustly compute $K_c$ linear combinations of user inputs despite up to $K-U$ users dropping out unexpectedly (with unknown identities), while simultaneously guaranteeing input confidentiality (security) and concealing the computation specification (demand privacy). It is the first work to jointly achieve security, demand privacy, and crash-fault robustness. The authors propose a two-round asynchronous protocol based on multiplicative encryption and offline encoded key sharing, and introduce the Robust Symmetric Private Computation (RSPC) framework. Theoretically, the scheme achieves information-theoretic optimal communication rate when $K_c = 1$, and order-optimal rate (with at most a factor-of-2 gap between upper and lower bounds) for $2 leq K_c leq U-1$, significantly outperforming existing single-message or non-private aggregation schemes.

Technology Category

Application Category

📝 Abstract
This paper considers a multi-message secure aggregation with privacy problem, in which a server aims to compute $sf K_cgeq 1$ linear combinations of local inputs from $sf K$ distributed users. The problem addresses two tasks: (1) security, ensuring that the server can only obtain the desired linear combinations without any else information about the users' inputs, and (2) privacy, preventing users from learning about the server's computation task. In addition, the effect of user dropouts is considered, where at most $sf{K-U}$ users can drop out and the identity of these users cannot be predicted in advance. We propose two schemes for $sf K_c$ is equal to (1) and $sf 2leq K_cleq U-1$, respectively. For $sf K_c$ is equal to (1), we introduce multiplicative encryption of the server's demand using a random variable, where users share coded keys offline and transmit masked models in the first round, followed by aggregated coded keys in the second round for task recovery. For $sf{2leq K_c leq U-1}$, we use robust symmetric private computation to recover linear combinations of keys in the second round. The objective is to minimize the number of symbols sent by each user during the two rounds. Our proposed schemes have achieved the optimal rate region when $ sf K_c $ is equal to (1) and the order optimal rate (within 2) when $sf{2leq K_c leq U-1}$.
Problem

Research questions and friction points this paper is trying to address.

Secure aggregation of user inputs without revealing extra information
Privacy preservation against users learning server's computation task
Robust handling of unpredictable user dropouts during aggregation
Innovation

Methods, ideas, or system contributions that make the work stand out.

Multiplicative encryption for server demand privacy
Robust symmetric private computation for key recovery
Optimal rate region for secure aggregation
🔎 Similar Papers
No similar papers found.