Chao Huang , Yanqing Yao , Xiaojun Zhang , Yuan Zhang , Zhoujun Li
{"title":"一个用于高维数据安全聚合的通用框架,具有对丢失的弹性","authors":"Chao Huang , Yanqing Yao , Xiaojun Zhang , Yuan Zhang , Zhoujun Li","doi":"10.1016/j.jisa.2025.104194","DOIUrl":null,"url":null,"abstract":"<div><div>Data secure aggregation (DSA) protocols play an important role in many applications with privacy preservation, e.g., medical data analysis, federated learning model aggregation, etc. In such protocols, the computation and communication complexity of clients and the aggregator heavily depend on two parameters, including the number of involved clients and the dimension of secret data. Besides, resilience to client dropouts is an crucial requirement in many applications. In this paper, we focus on the issue of high-dimension DSA (HDDSA) with resilience to dropouts. Based on a critical non-interactive masking method using lightweight computations over polynomials, we propose a DSA reduction framework to transform high-dimension DSA problem to secure aggregation over scalars. We also construct two efficient HDDSA protocol instantiations based on multiparty homomorphic encryption (MPHE) cryptosystems. The first one (HDDSA1) gives a 2-round DSA protocol based on a threshold Paillier’s cryptosystem which requires a trusted setup. The second one (HDDSA2) gives a 3-round DSA protocol based on a multiparty Brakerski–Fan–Vercauteren (MPBFV) cryptosystem, which by contrast does not need trusted setup. Both protocols are resilient to dropouts by design and do not introduce extra recovery overheads. In addition, both protocols are secure against semi-honest adversary and collusion adversary with up to <span><math><mrow><mi>min</mi><mrow><mo>(</mo><mi>t</mi><mo>−</mo><mn>1</mn><mo>,</mo><mi>n</mi><mo>−</mo><mn>2</mn><mo>)</mo></mrow></mrow></math></span> clients, given <span><math><mi>n</mi></math></span> clients involved in the protocols, <span><math><mi>t</mi></math></span> is a threshold parameter of underlying subprotocol. In terms of efficiency, the computation and communication complexity at client side are both <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mi>ℓ</mi><mo>)</mo></mrow></mrow></math></span>, where <span><math><mi>ℓ</mi></math></span> is the dimension, which is independent of the number of clients. Empirical experiments are also conducted to show the practical efficiency superiority of our framework and proposed protocols.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104194"},"PeriodicalIF":3.7000,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A general framework for high-dimension data secure aggregation with resilience to dropouts\",\"authors\":\"Chao Huang , Yanqing Yao , Xiaojun Zhang , Yuan Zhang , Zhoujun Li\",\"doi\":\"10.1016/j.jisa.2025.104194\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Data secure aggregation (DSA) protocols play an important role in many applications with privacy preservation, e.g., medical data analysis, federated learning model aggregation, etc. In such protocols, the computation and communication complexity of clients and the aggregator heavily depend on two parameters, including the number of involved clients and the dimension of secret data. Besides, resilience to client dropouts is an crucial requirement in many applications. In this paper, we focus on the issue of high-dimension DSA (HDDSA) with resilience to dropouts. Based on a critical non-interactive masking method using lightweight computations over polynomials, we propose a DSA reduction framework to transform high-dimension DSA problem to secure aggregation over scalars. We also construct two efficient HDDSA protocol instantiations based on multiparty homomorphic encryption (MPHE) cryptosystems. The first one (HDDSA1) gives a 2-round DSA protocol based on a threshold Paillier’s cryptosystem which requires a trusted setup. The second one (HDDSA2) gives a 3-round DSA protocol based on a multiparty Brakerski–Fan–Vercauteren (MPBFV) cryptosystem, which by contrast does not need trusted setup. Both protocols are resilient to dropouts by design and do not introduce extra recovery overheads. In addition, both protocols are secure against semi-honest adversary and collusion adversary with up to <span><math><mrow><mi>min</mi><mrow><mo>(</mo><mi>t</mi><mo>−</mo><mn>1</mn><mo>,</mo><mi>n</mi><mo>−</mo><mn>2</mn><mo>)</mo></mrow></mrow></math></span> clients, given <span><math><mi>n</mi></math></span> clients involved in the protocols, <span><math><mi>t</mi></math></span> is a threshold parameter of underlying subprotocol. In terms of efficiency, the computation and communication complexity at client side are both <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mi>ℓ</mi><mo>)</mo></mrow></mrow></math></span>, where <span><math><mi>ℓ</mi></math></span> is the dimension, which is independent of the number of clients. Empirical experiments are also conducted to show the practical efficiency superiority of our framework and proposed protocols.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"94 \",\"pages\":\"Article 104194\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625002315\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002315","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A general framework for high-dimension data secure aggregation with resilience to dropouts
Data secure aggregation (DSA) protocols play an important role in many applications with privacy preservation, e.g., medical data analysis, federated learning model aggregation, etc. In such protocols, the computation and communication complexity of clients and the aggregator heavily depend on two parameters, including the number of involved clients and the dimension of secret data. Besides, resilience to client dropouts is an crucial requirement in many applications. In this paper, we focus on the issue of high-dimension DSA (HDDSA) with resilience to dropouts. Based on a critical non-interactive masking method using lightweight computations over polynomials, we propose a DSA reduction framework to transform high-dimension DSA problem to secure aggregation over scalars. We also construct two efficient HDDSA protocol instantiations based on multiparty homomorphic encryption (MPHE) cryptosystems. The first one (HDDSA1) gives a 2-round DSA protocol based on a threshold Paillier’s cryptosystem which requires a trusted setup. The second one (HDDSA2) gives a 3-round DSA protocol based on a multiparty Brakerski–Fan–Vercauteren (MPBFV) cryptosystem, which by contrast does not need trusted setup. Both protocols are resilient to dropouts by design and do not introduce extra recovery overheads. In addition, both protocols are secure against semi-honest adversary and collusion adversary with up to clients, given clients involved in the protocols, is a threshold parameter of underlying subprotocol. In terms of efficiency, the computation and communication complexity at client side are both , where is the dimension, which is independent of the number of clients. Empirical experiments are also conducted to show the practical efficiency superiority of our framework and proposed protocols.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.