Skip to main content

Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF

  • Conference paper
  • First Online:
Artificial Intelligence Security and Privacy (AIS&P 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14509))

  • 213 Accesses

Abstract

Machine learning has greatly improved the convenience of modern life. As the deployment scale of machine learning grows larger, the corresponding data scale also increases, leading to a large number of small and medium-sized organizations wishing to use their respective data to train models together, even though this may bring risks of violating data privacy regulations and privacy leakage. To meet this demand, federated learning was proposed, which can satisfy the needs of various organizations to expand the training data scale without directly sharing data, while avoiding violations of data privacy regulations and privacy leakage. General federated learning usually allows clients to train local models independently, and then aggregate them on a central server to build a global model in a privacy-preserving manner. There are various ways to protect privacy, such as homomorphic encryption, differential privacy, etc. Among these methods, one type of federated learning scheme is based on homomorphic pseudorandom functions. This type of scheme is relatively simple to construct, has a smaller communication scale, is more resilient to disconnections, and has high scalability. However, the security aggregation with cryptographic primitives based on classic assumptions such as DDH cannot resist quantum attacks, and since the protected gradient vectors are usually tens of thousands of dimensions, obtaining the aggregation results requires solving tens of thousands of discrete logarithms, which leads to some loss of efficiency. In this paper, we proposed a secure aggregation scheme based on HPRG over lattice, which has practical efficiency and resilience to dropout and can resist quantum attacks due to the hardness of the RLWE assumption. Moreover, our scheme only requires polynomial multiplication and addition (usually treated as vectors in implements), thus significantly improving computational efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chandnani, N., Khairnar, C.N.: A reliable protocol for data aggregation and optimized routing in IoT WSNs based on machine learning. Wirel. Pers. Commun. 130(4), 2589–2622 (2023)

    Google Scholar 

  2. Long, Guodong, Tan, Yue, Jiang, Jing, Zhang, Chengqi: Federated Learning for Open Banking. In: Yang, Qiang, Fan, Lixin, Yu, Han (eds.) Federated Learning. LNCS (LNAI), vol. 12500, pp. 240–254. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-63076-8_17

    Chapter  Google Scholar 

  3. Nguyen, D.C., Ding, M., Pathirana, P.N., Seneviratne, A., Li, J., Poor, H.V.: Federated learning for internet of things: a comprehensive survey. IEEE Commun. Surv. Tutorials 23(3), 1622–1658 (2021)

    Google Scholar 

  4. Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 12:1–12:19 (2019). https://doi.org/10.1145/3298981

  5. Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Wallach, H.M., Larochelle, H., Beygelzimer, A., d’Alché-Buc, F., Fox, E.B., Garnett, R. (eds.) Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8–14, 2019, Vancouver, BC, Canada, pp. 14747–14756 (2019). https://proceedings.neurips.cc/paper/2019/hash/60a6c4002cc7b29142def8871531281a-Abstract.html

  6. Oded, G.: Secure multi-party computation. manuscript. preliminary version 78(110) (1998)

    Google Scholar 

  7. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Mitzenmacher, M. (ed.) Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 169–178. ACM (2009). https://doi.org/10.1145/1536414.1536440

  8. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)

    Google Scholar 

  9. Stevens, T., Skalka, C., Vincent, C., Ring, J., Clark, S., Near, J.P.: Efficient differentially private secure aggregation for federated learning via hardness of learning with errors. In: Butler, K.R.B., Thomas, K. (eds.) 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10–12, 2022, pp. 1379–1395. USENIX Association (2022), https://www.usenix.org/conference/usenixsecurity22/presentation/stevens

  10. Gehlhar, T., Marx, F., Schneider, T., Suresh, A., Wehrle, T., Yalame, H.: SAFEFL: MPC-friendly framework for private and robust federated learning. In: 2023 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023, pp. 69–76. IEEE (2023). https://doi.org/10.1109/SPW59333.2023.00012

  11. Jaehyoung, P., Hyuk, L.: Privacy-preserving federated learning using homomorphic encryption. Appl. Sci. 12(2) (2022). https://doi.org/10.3390/app12020734,https://www.mdpi.com/2076-3417/12/2/734

  12. Yang, T., et al.: Applied federated learning: Improving google keyboard query suggestions. CoRR abs/1812.02903 (2018). https://arxiv.org/abs/1812.02903

  13. Bonawitz, K.A., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Thuraisingham, B., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 1175–1191. ACM (2017). https://doi.org/10.1145/3133956.3133982

  14. Kalikinkar, M., Guang, G.: PrivFL: Practical privacy-preserving federated regressions on high-dimensional data over mobile networks. In: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, pp. 57–68 (2019)

    Google Scholar 

  15. Guo, Jiale, Liu, Ziyao, Lam, Kwok-Yan., Zhao, Jun, Chen, Yiqiang: Privacy-Enhanced Federated Learning with Weighted Aggregation. In: Lin, Limei, Liu, Yuhong, Lee, Chia-Wei. (eds.) SocialSec 2021. CCIS, vol. 1495, pp. 93–109. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-7913-1_7

    Chapter  Google Scholar 

  16. Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. In: Goldreich, O. (ed.) providing sound foundations for cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 241–264. ACM (2019). https://doi.org/10.1145/3335741.3335752

  17. Liu, Z., Guo, J., Lam, K., Zhao, J.: Efficient dropout-resilient aggregation for privacy-preserving machine learning. IEEE Trans. Inf. Forensics Secur. 18, 1839–1854 (2023)

    Google Scholar 

  18. Yang, S., Chen, Y., Tu, S., Yang, Z.: A post-quantum secure aggregation for federated learning. In: Proceedings of the 12th International Conference on Communication and Network Security, ICCNS 2022, Beijing, China, December 1–3, 2022, pp. 117–124. ACM (2022). https://doi.org/10.1145/3586102.3586120

  19. Elaine, S., T-H. Hubert, C., Eleanor, R., Richard, C., Dawn, S.: Privacy-preserving aggregation of time-series data. ACM Trans. Sen. Netw 5(3), 1–36 (2009)

    Google Scholar 

  20. Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. Electron. Colloquium Comput. Complex. TR11-111 (2011). https://eccc.weizmann.ac.il/report/2011/111

  21. Brakerski, Zvika: Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. In: Safavi-Naini, Reihaneh, Canetti, Ran (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 868–886. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_50

    Chapter  Google Scholar 

  22. Cheon, Jung Hee, Han, Kyoohyung, Kim, Andrey, Kim, Miran, Song, Yongsoo: Bootstrapping for Approximate Homomorphic Encryption. In: Nielsen, Jesper Buus, Rijmen, Vincent (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 360–384. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78381-9_14

    Chapter  Google Scholar 

  23. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Google Scholar 

  24. So, J., Güler, B., Avestimehr, A.S.: Turbo-aggregate: Breaking the quadratic aggregation barrier in secure federated learning. IEEE J. Sel. Areas Inf. Theory 2(1), 479–489 (2021)

    Google Scholar 

  25. Bell, J.H., Bonawitz, K.A., Gascón, A., Lepoint, T., Raykova, M.: Secure single-server aggregation with (poly)logarithmic overhead. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9–13, 2020, pp. 1253–1269. ACM (2020). https://doi.org/10.1145/3372297.3417885

  26. Lyubashevsky, Vadim, Peikert, Chris, Regev, Oded: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, Henri (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1–23. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_1

    Chapter  Google Scholar 

  27. Banerjee, Abhishek, Fuchsbauer, Georg, Peikert, Chris, Pietrzak, Krzysztof, Stevens, Sophie: Key-Homomorphic Constrained Pseudorandom Functions. In: Dodis, Yevgeniy, Nielsen, Jesper Buus (eds.) TCC 2015. LNCS, vol. 9015, pp. 31–60. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46497-7_2

    Chapter  Google Scholar 

  28. Tian, H., Wen, Y., Zhang, F., Shao, Y., Li, B.: A distributed threshold additive homomorphic encryption for federated learning with dropout resiliency based on lattice. In: Chen, X., Shen, J., Susilo, W. (eds.) Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi’an, China, October 16–18, 2022, Proceedings. Lecture Notes in Computer Science, vol. 13547, pp. 277–292. Springer (2022). https://doi.org/10.1007/978-3-031-18067-5_20

  29. von zur Gathen, J., Gerhard, J.: Modern Computer Algebra (3. ed.). Cambridge University Press (2013)

    Google Scholar 

  30. Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symp. on Secur. and Priv., SP 2017, San Jose, CA, USA, May 22–26, 2017. pp. 3–18. IEEE Comput. Soc. (2017). https://doi.org/10.1109/SP.2017.41

  31. Froelicher, D., et al.: Scalable privacy-preserving distributed learning. Proc. Priv. Enhancing Technol. 2021(2), 323–347 (2021)

    Google Scholar 

  32. Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: Chiappa, S., Calandra, R. (eds.) The 23rd International Conference on Artificial Intelligence and Statistics, AISTATS 2020, 26–28 August 2020, Online [Palermo, Sicily, Italy]. Proceedings of Machine Learning Research, vol. 108, pp. 2938–2948. PMLR (2020). https://proceedings.mlr.press/v108/bagdasaryan20a.html

  33. Tian, H., Li, M., Ren, S.: ESE: Efficient security enhancement method for the secure aggregation protocol in federated learning. Chinese J. Electron. 32(3), 542–555 (2023). 10.23919/CJE.2021.00.370

    Google Scholar 

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China (No. 62272491) and Guangdong Major Project of Basic and Applied Basic Research(2019B030302008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangguo Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zuo, R., Tian, H., Zhang, F. (2024). Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14509. Springer, Singapore. https://doi.org/10.1007/978-981-99-9785-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9785-5_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9784-8

  • Online ISBN: 978-981-99-9785-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics