VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning

被引:50
作者
Hahn, Changhee [1 ]
Kim, Hodong [2 ]
Kim, Minjae [2 ]
Hur, Junbeom [2 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Elect & Informat Engn, Seoul 01811, South Korea
[2] Korea Univ, Dept Comp Sci & Engn, Seoul 02841, South Korea
基金
新加坡国家研究基金会;
关键词
Computational modeling; Servers; Data models; Training; Cryptography; Codes; Data privacy; Federated learning; distributed machine learning; security; privacy; MULTIPARTY COMPUTATION; DEEP; INFERENCE; SYSTEM;
D O I
10.1109/TDSC.2021.3126323
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In privacy-preserving cross-device federated learning, users train a global model on their local data and submit encrypted local models, while an untrusted central server aggregates the encrypted models to obtain an updated global model. Prior work has demonstrated how to verify the correctness of aggregation in such a setting. However, such verification relies on strong assumptions, such as a trusted setup among all users under unreliable network conditions, or it suffers from expensive cryptographic operations, such as bilinear pairing. In this paper, we scrutinize the verification mechanism of prior work and propose a model recovery attack, demonstrating that most local models can be leaked within a reasonable time (e.g., 98% of encrypted local models are recovered within 21 h). Then, we propose VERSA, a verifiable secure aggregation protocol for cross-device federated learning. VERSA does not require any trusted setup for verification between users while minimizing the verification cost by enabling both the central server and users to utilize only a lightweight pseudorandom generator to prove and verify the correctness of model aggregation. We experimentally confirm the efficiency of VERSA under diverse datasets, demonstrating that VERSA is orders of magnitude faster than verification in prior work.
引用
收藏
页码:36 / 52
页数:17
相关论文
共 72 条
[1]  
Abadi M., 2016, P OSDI, P265
[2]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[3]  
Abe M, 2007, LECT NOTES COMPUT SC, V4392, P118
[4]   State-of-the-art in artificial neural network applications: A survey [J].
Abiodun, Oludare Isaac ;
Jantan, Aman ;
Omolara, Abiodun Esther ;
Dada, Kemi Victoria ;
Mohamed, Nachaat AbdElatif ;
Arshad, Humaira .
HELIYON, 2018, 4 (11)
[5]  
Bonawitz K, 2019, Arxiv, DOI arXiv:1902.01046
[6]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[7]  
Brendan M.H., 2016, arXiv, DOI [10.48550/arXiv.1602.05629, DOI 10.48550/ARXIV.1602.05629]
[8]  
McMahan HB, 2018, Arxiv, DOI arXiv:1710.06963
[9]   Elliptic curves suitable for pairing based cryptography [J].
Brezing, F ;
Weng, AG .
DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) :133-141
[10]  
Cachin C, 2018, LECT NOTES COMPUT SC, V10892, P637, DOI 10.1007/978-3-319-93387-0_33