Privacy-Preserving Weighted Federated Learning Within the Secret Sharing Framework
This paper studies privacy-preserving weighted federated learning within the secret sharing framework, where individual private data is split into random shares which are distributed among a set of pre-defined computing servers. The contribution of this paper mainly comprises the following four-fold...
Saved in:
Published in | IEEE access Vol. 8; pp. 198275 - 198284 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This paper studies privacy-preserving weighted federated learning within the secret sharing framework, where individual private data is split into random shares which are distributed among a set of pre-defined computing servers. The contribution of this paper mainly comprises the following four-fold: <list list-type="ordered"><list-item> *
In the first fold, the relationship between federated learning (FL) and multi-party computation (MPC) as well as that of secure federated learning (SFL) and secure multi-party computation (SMPC) is investigated. We show that FL is a subset of MPC from the m-ary functionality point of view. Furthermore, if the underlying FL instance privately computes the defined m-ary functionality in the simulation-based framework, then the simulation-based FL solution is an instance of SMPC.
</list-item><list-item> *
In the second fold, a new notion which we call weighted federated learning (wFL) is introduced and formalized. Then an oracle-aided SMPC for computing wFL is presented and analysed by decoupling the security of FL from that of MPC. Our decoupling formulation of wFL benefits FL developers selecting their best security practices from the state-of-the-art security tools.
</list-item><list-item> *
In the third-fold, a concrete implementation of wFL leveraging the random splitting technique in the framework of the 3-party computation is presented and analysed. The security of our implementation is guaranteed by the security composition theorem within the secret share framework.
</list-item><list-item> *
In the fourth-fold, a complement to MASCOT is introduced and formalized in the framework of SPDZ, where a novel solution to the Beaver triple generator is constructed from the standard El Gamal encryption. Our solution is formalized as a three-party computation and a generation of the Beaver triple requires roughly 5 invocations of the El Gamal encryptions. We are able to show that the proposed implementation is secure against honest-but-curious adversary assuming that the underlying El Gamal encryption is semantically secure.
</list-item> |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2020.3034602 |