Multi-Party Private Set Intersection in Vertical Federated Learning

被引:24
|
作者
Lu, Linpeng [1 ]
Ding, Ning [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
基金
中国国家自然科学基金;
关键词
Vertical Federated Learning; Private Set Intersection; Multi-party Computation; COMPUTATION;
D O I
10.1109/TrustCom50675.2020.00098
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vertical federated learning (VFL) is a privacy-preserving machine learning framework in which the training dataset is vertically partitioned and distributed over multiple parties, i.e., for each sample each party only possesses some attributes of it. In this paper we address the problem of computing private set intersection (PSI) in VLF, in which a private set denotes the data possessed by a party satisfying some distinguishing constraint. This problem actually asks how the parties jointly compute the common IDs of their private sets, which plays a key role in many learning tasks such as Decision Tree Learning. Currently all known PSI protocols, to our knowledge, either involve expensive cryptographic operations, or are designed for the two-party scenario originally which will leak privacy-sensitive information in multi-party scenario if applied to each pair of parties gradually. In this paper we propose a new multi-party PSI protocol in VFL, which can even handle the case that some parties drop out in the running of the protocol. Our protocol achieves the security that any coalition of corrupted parties, which number is less than a threshold, cannot learn any secret information of honest parties, thus realizing the goal of preserving the privacy of the involved parties. Moreover, it only relies on light cryptographic primitives (i.e. PRGs) and thus works more efficiently compared to the known protocols, especially when the sample number of dataset gets larger and larger. Our starting point to solve the PSI problem in VFL is to reduce it to computing the AND operation of multiple bit-vectors, each held by one party, which are used to identify parties' private sets in their data. Then our main technical contribution is to present an efficient protocol for summing up these vectors, called MulSUM, and then adapt it to a desired protocol, called MulAND, to compute the AND of these vectors, which result actually identifies the intersection of private sets of all (online) parties, thus accomplishing the PSI issue.
引用
收藏
页码:707 / 714
页数:8
相关论文
共 50 条
  • [21] Federated K-Private Set Intersection
    Elkordy, Ahmed Roushdy
    Ezzeldin, Yahya H.
    Avestimehr, Salman
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 436 - 445
  • [22] Multi-Party Private Set Intersection: A Circuit-Based Protocol with Jaccard Similarity for Secure and Efficient Anomaly Detection in Network Traffic
    Su, Jiuheng
    Chen, Zhili
    Yang, Xiaomin
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 361 - 366
  • [23] Multi-Party Private Function Evaluation for RAM
    Ji, Keyu
    Zhang, Bingsheng
    Lu, Tianpei
    Ren, Kui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1252 - 1267
  • [24] CE-Fed: Communication efficient multi-party computation enabled federated learning
    Kanagavelu, Renuga
    Wei, Qingsong
    Li, Zengxiang
    Zhang, Haibin
    Samsudin, Juniarto
    Yang, Yechao
    Goh, Rick Siow Mong
    Wang, Shangguang
    ARRAY, 2022, 15
  • [25] Two-party Private Set Intersection with an Untrusted Third Party
    Le, Phi Hung
    Ranellucci, Samuel
    Gordon, S. Dov
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2403 - 2420
  • [26] Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
    Narayanan, G. Sathya
    Aishwarya, T.
    Agrawal, Anugrah
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 21 - +
  • [27] Verifiable Private Multi-party Computation: Ranging and Ranking
    Zhang, Lan
    Li, Xiang-Yang
    Liu, Yunhao
    Jung, Taeho
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 605 - 609
  • [28] Secure Multi-Party Quantum Private Information Query
    Tao, Hong
    Tan, Xiaoqing
    Song, Tingting
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (04) : 1099 - 1108
  • [29] Two-Phase Multi-Party Computation Enabled Privacy-Preserving Federated Learning
    Kanagavelu, Renuga
    Li, Zengxiang
    Samsudin, Juniarto
    Yang, Yechao
    Yang, Feng
    Goh, Rick Siow Mong
    Cheah, Mervyn
    Wiwatphonthana, Praewpiraya
    Akkarajitsakul, Khajonpong
    Wang, Shangguang
    2020 20TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2020), 2020, : 410 - 419
  • [30] A federated learning system with data fusion for healthcare using multi-party computation and additive secret sharing
    Muazu, Tasiu
    Yingchi, Mao
    Muhammad, Abdullahi Uwaisu
    Ibrahim, Muhammad
    Kumshe, Umar Muhammad Mustapha
    Samuel, Omaji
    COMPUTER COMMUNICATIONS, 2024, 216 : 168 - 182