VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning

被引:33
作者
Hahn, Changhee [1 ]
Kim, Hodong [2 ]
Kim, Minjae [2 ]
Hur, Junbeom [2 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Elect & Informat Engn, Seoul 01811, South Korea
[2] Korea Univ, Dept Comp Sci & Engn, Seoul 02841, South Korea
基金
新加坡国家研究基金会;
关键词
Computational modeling; Servers; Data models; Training; Cryptography; Codes; Data privacy; Federated learning; distributed machine learning; security; privacy; MULTIPARTY COMPUTATION; DEEP; INFERENCE; SYSTEM;
D O I
10.1109/TDSC.2021.3126323
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In privacy-preserving cross-device federated learning, users train a global model on their local data and submit encrypted local models, while an untrusted central server aggregates the encrypted models to obtain an updated global model. Prior work has demonstrated how to verify the correctness of aggregation in such a setting. However, such verification relies on strong assumptions, such as a trusted setup among all users under unreliable network conditions, or it suffers from expensive cryptographic operations, such as bilinear pairing. In this paper, we scrutinize the verification mechanism of prior work and propose a model recovery attack, demonstrating that most local models can be leaked within a reasonable time (e.g., 98% of encrypted local models are recovered within 21 h). Then, we propose VERSA, a verifiable secure aggregation protocol for cross-device federated learning. VERSA does not require any trusted setup for verification between users while minimizing the verification cost by enabling both the central server and users to utilize only a lightweight pseudorandom generator to prove and verify the correctness of model aggregation. We experimentally confirm the efficiency of VERSA under diverse datasets, demonstrating that VERSA is orders of magnitude faster than verification in prior work.
引用
收藏
页码:36 / 52
页数:17
相关论文
共 72 条
  • [1] Abadi M, 2016, P OSDI, P265, DOI DOI 10.1016/0076-6879(83)01039-3
  • [2] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [3] Abe M, 2007, LECT NOTES COMPUT SC, V4392, P118
  • [4] State-of-the-art in artificial neural network applications: A survey
    Abiodun, Oludare Isaac
    Jantan, Aman
    Omolara, Abiodun Esther
    Dada, Kemi Victoria
    Mohamed, Nachaat AbdElatif
    Arshad, Humaira
    [J]. HELIYON, 2018, 4 (11)
  • [5] [Anonymous], 2002, P 9 ACM C COMP COMM
  • [6] Avent B., 2019, arXiv
  • [7] Bonawitz K, 2019, Arxiv, DOI arXiv:1902.01046
  • [8] Practical Secure Aggregation for Privacy-Preserving Machine Learning
    Bonawitz, Keith
    Ivanov, Vladimir
    Kreuter, Ben
    Marcedone, Antonio
    McMahan, H. Brendan
    Patel, Sarvar
    Ramage, Daniel
    Segal, Aaron
    Seth, Karn
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1175 - 1191
  • [9] McMahan HB, 2018, Arxiv, DOI arXiv:1710.06963
  • [10] Elliptic curves suitable for pairing based cryptography
    Brezing, F
    Weng, AG
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 133 - 141