Privacy-preserving weighted federated learning within the secret sharing framework

This paper studies privacy-preserving weighted federated learning within the secret sharing framework, where individual private data is split into random shares which are distributed among a set of pre-defined computing servers. The contribution of this paper mainly comprises the following four-fold...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhu, Huafei, Goh, Rick Siow Mong, Ng, Wee Keong
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/145818
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:This paper studies privacy-preserving weighted federated learning within the secret sharing framework, where individual private data is split into random shares which are distributed among a set of pre-defined computing servers. The contribution of this paper mainly comprises the following four-fold: · In the first fold, the relationship between federated learning (FL) and multi-party computation (MPC) as well as that of secure federated learning (SFL) and secure multi-party computation (SMPC) is investigated. We show that FL is a subset of MPC from the m-ary functionality point of view. Furthermore, if the underlying FL instance privately computes the defined m-ary functionality in the simulation-based framework, then the simulation-based FL solution is an instance of SMPC. · In the second fold, a new notion which we call weighted federated learning (wFL) is introduced and formalized. Then an oracle-aided SMPC for computing wFL is presented and analysed by decoupling the security of FL from that of MPC. Our decoupling formulation of wFL benefits FL developers selecting their best security practices from the state-of-the-art security tools. · In the third-fold, a concrete implementation of wFL leveraging the random splitting technique in the framework of the 3-party computation is presented and analysed. The security of our implementation is guaranteed by the security composition theorem within the secret share framework. · In the fourth-fold, a complement to MASCOT is introduced and formalized in the framework of SPDZ, where a novel solution to the Beaver triple generator is constructed from the standard El Gamal encryption. Our solution is formalized as a three-party computation and a generation of the Beaver triple requires roughly 5 invocations of the El Gamal encryptions. We are able to show that the proposed implementation is secure against honest-but-curious adversary assuming that the underlying El Gamal encryption is semantically secure.