Multi-Party Private Set Intersection in Vertical Federated Learning

被引:24
|
作者
Lu, Linpeng [1 ]
Ding, Ning [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
来源
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) | 2020年
基金
中国国家自然科学基金;
关键词
Vertical Federated Learning; Private Set Intersection; Multi-party Computation; COMPUTATION;
D O I
10.1109/TrustCom50675.2020.00098
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vertical federated learning (VFL) is a privacy-preserving machine learning framework in which the training dataset is vertically partitioned and distributed over multiple parties, i.e., for each sample each party only possesses some attributes of it. In this paper we address the problem of computing private set intersection (PSI) in VLF, in which a private set denotes the data possessed by a party satisfying some distinguishing constraint. This problem actually asks how the parties jointly compute the common IDs of their private sets, which plays a key role in many learning tasks such as Decision Tree Learning. Currently all known PSI protocols, to our knowledge, either involve expensive cryptographic operations, or are designed for the two-party scenario originally which will leak privacy-sensitive information in multi-party scenario if applied to each pair of parties gradually. In this paper we propose a new multi-party PSI protocol in VFL, which can even handle the case that some parties drop out in the running of the protocol. Our protocol achieves the security that any coalition of corrupted parties, which number is less than a threshold, cannot learn any secret information of honest parties, thus realizing the goal of preserving the privacy of the involved parties. Moreover, it only relies on light cryptographic primitives (i.e. PRGs) and thus works more efficiently compared to the known protocols, especially when the sample number of dataset gets larger and larger. Our starting point to solve the PSI problem in VFL is to reduce it to computing the AND operation of multiple bit-vectors, each held by one party, which are used to identify parties' private sets in their data. Then our main technical contribution is to present an efficient protocol for summing up these vectors, called MulSUM, and then adapt it to a desired protocol, called MulAND, to compute the AND of these vectors, which result actually identifies the intersection of private sets of all (online) parties, thus accomplishing the PSI issue.
引用
收藏
页码:707 / 714
页数:8
相关论文
共 50 条
  • [41] A Differentially Private Blockchain-Based Approach for Vertical Federated Learning
    Tran, Linh
    Chari, Sanjay
    Khan, Md Saikat Islam
    Zachariah, Aaron
    Patterson, Stacy
    Seneviratne, Oshani
    2024 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES, DAPPS 2024, 2024, : 86 - 92
  • [42] Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning
    Chen, Hongbin
    Fu, Chaohao
    Ruan, Na
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 : 583 - 604
  • [43] Practical and malicious private set intersection with improved efficiency
    Zhu, Yizhao
    Chen, Lanxiang
    Mu, Yi
    THEORETICAL COMPUTER SCIENCE, 2024, 991
  • [44] Faster Unbalanced Private Set Intersection
    Davi Resende, Amanda C.
    Aranha, Diego F.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 203 - 221
  • [45] Laconic updatable private set intersection
    Kong, Xiangqian
    Chen, Lanxiang
    Zhu, Yizhao
    Mu, Yi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [46] Multi-party computation with hybrid security
    Fitzi, M
    Holenstein, T
    Wullschleger, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 419 - 438
  • [47] Multi-Party Computation with Omnipresent Adversary
    Ghodosi, Hossein
    Pieprzyk, Josef
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 180 - +
  • [48] Graceful Degradation in Multi-Party Computation
    Hirt, Martin
    Lucas, Christoph
    Maurer, Ueli
    Raub, Dominik
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 163 - 180
  • [49] Multi-keyword Searchable Encryption Based on Paillier and Private Set Intersection
    Zhou F.-C.
    Zhang Z.-Y.
    Wang K.-X.
    Li Y.-X.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (03): : 321 - 326
  • [50] Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler
    Zhang, Yihua
    Blanton, Marina
    Almashaqbeh, Ghada
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2018, 21 (02)