Secure Aggregation with Uncoded Groupwise Keys Against User Collusion

Ziting Zhang, Kai Wan, Hua Sun, Mingyue Ji, G. Caire
{"title":"Secure Aggregation with Uncoded Groupwise Keys Against User Collusion","authors":"Ziting Zhang, Kai Wan, Hua Sun, Mingyue Ji, G. Caire","doi":"10.1109/ICCCS57501.2023.10151414","DOIUrl":null,"url":null,"abstract":"In this paper, we study the information theoretic secure aggregation problem, where the server node aims to aggregate K users' locally trained models, without revealing any other information about the users' local data. To ensure security, some keys are shared among the users, which is referred to as the key sharing phase. Uncoded groupwise keys are considered, where each key is shared by a subset of S users and is independent from other keys. After the key sharing phase, each user masks its trained model and sends to the server, which is referred to as the model aggregation phase. In the presence of users' dropouts (i.e., up to K – U user may drop during the model aggregation phase and the identity of the dropped users cannot be predicted), to guarantee the information theoretic security, two-round transmissions are necessary. Our objective is to characterize the capacity region of the transmission rates (i.e., the normalized numbers of two-round transmissions by each user) in the two rounds. When $\\mathsf{S}\\geq \\mathsf{K}- \\mathsf{U}+1$, the capacity region was recently characterized. In this paper, we additionally consider the potential effect of user collusion, where there may exist up to T users colluding with the server. With the presence of the colluding users, the security constraint becomes that, except the sum of trained models, the server cannot learn any information about the other users' local data even if it colludes with any set of up to T users. For this new problem, we propose two secure aggregation schemes, which work for the cases of $\\mathsf{S} = \\mathsf{K}-\\mathsf{U}+1$ and of $\\mathsf{K}-\\mathsf{U}+1\\leq \\mathsf{S}\\leq \\mathsf{K} - \\mathsf{T}$, respectively. The first scheme is then proven to achieve the capacity region.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCS57501.2023.10151414","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In this paper, we study the information theoretic secure aggregation problem, where the server node aims to aggregate K users' locally trained models, without revealing any other information about the users' local data. To ensure security, some keys are shared among the users, which is referred to as the key sharing phase. Uncoded groupwise keys are considered, where each key is shared by a subset of S users and is independent from other keys. After the key sharing phase, each user masks its trained model and sends to the server, which is referred to as the model aggregation phase. In the presence of users' dropouts (i.e., up to K – U user may drop during the model aggregation phase and the identity of the dropped users cannot be predicted), to guarantee the information theoretic security, two-round transmissions are necessary. Our objective is to characterize the capacity region of the transmission rates (i.e., the normalized numbers of two-round transmissions by each user) in the two rounds. When $\mathsf{S}\geq \mathsf{K}- \mathsf{U}+1$, the capacity region was recently characterized. In this paper, we additionally consider the potential effect of user collusion, where there may exist up to T users colluding with the server. With the presence of the colluding users, the security constraint becomes that, except the sum of trained models, the server cannot learn any information about the other users' local data even if it colludes with any set of up to T users. For this new problem, we propose two secure aggregation schemes, which work for the cases of $\mathsf{S} = \mathsf{K}-\mathsf{U}+1$ and of $\mathsf{K}-\mathsf{U}+1\leq \mathsf{S}\leq \mathsf{K} - \mathsf{T}$, respectively. The first scheme is then proven to achieve the capacity region.
使用未编码组密钥的安全聚合防止用户合谋
在本文中,我们研究了信息论的安全聚合问题,其中服务器节点的目标是聚合K个用户的局部训练模型,而不泄露用户的本地数据的任何其他信息。为了保证安全性,用户之间会共享一些密钥,这个阶段称为密钥共享阶段。考虑未编码的分组密钥,其中每个密钥由S个用户的子集共享,并且独立于其他密钥。在密钥共享阶段之后,每个用户屏蔽其训练过的模型并将其发送到服务器,这被称为模型聚合阶段。在存在用户退出的情况下(即在模型聚合阶段可能会有多达K - U个用户退出,并且无法预测被退出用户的身份),为了保证信息理论上的安全性,需要进行两轮传输。我们的目标是表征两轮中传输速率的容量区域(即每个用户的两轮传输的标准化数量)。当$\mathsf{S}\geq \mathsf{K}- \mathsf{U}+1$时,容量区域最近被表征。在本文中,我们还考虑了用户串通的潜在影响,其中可能存在多达T个用户与服务器串通。由于存在串通用户,安全约束就变成,除了训练模型的总和之外,即使服务器与任何一组至多T个用户串通,服务器也无法了解有关其他用户本地数据的任何信息。针对这一新问题,我们提出了两种安全聚合方案,分别适用于$\mathsf{S} = \mathsf{K}-\mathsf{U}+1$和$\mathsf{K}-\mathsf{U}+1\leq \mathsf{S}\leq \mathsf{K} - \mathsf{T}$的情况。然后证明了第一种方案可以实现容量区域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信