TY - GEN
T1 - Flag
T2 - 18th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2023
AU - Bangalore, Laasya
AU - Sereshgi, Mohammad Hossein Faghihi
AU - Hazay, Carmit
AU - Venkitasubramaniam, Muthuramakrishnan
N1 - Publisher Copyright: © 2023 ACM.
PY - 2023/7/10
Y1 - 2023/7/10
N2 - In this work, we introduce a lightweight secure aggregation protocol that guarantees liveness (i.e., guaranteed output delivery), robust against faulty inputs and security against malicious clients. First, we improve upon prior works in the "star"-like topology network with a central coordinating (also output) party, Bonawitz et al. (ACM CCS 2017) and Bell et al. (ACM CCS 2020), which are not robust against faulty inputs. Recent works, RoFL (Burkhalter et al.) and (concurrent work) ACORN (Bell et al.) show how to rely on zero-knowledge proofs to address such attacks at expense of significantly high computation costs. We also compare our protocol against the PRIO system by Gibbs and Boneh (USENIX 2017) which achieves the same task in an incomparable security model. We benchmark our protocol with implementation and demonstrate its concrete efficiency. Our solution scales to 1000s of clients, requires only a constant number of rounds, outperforms prior work in computational cost, and has competitive communication cost.
AB - In this work, we introduce a lightweight secure aggregation protocol that guarantees liveness (i.e., guaranteed output delivery), robust against faulty inputs and security against malicious clients. First, we improve upon prior works in the "star"-like topology network with a central coordinating (also output) party, Bonawitz et al. (ACM CCS 2017) and Bell et al. (ACM CCS 2020), which are not robust against faulty inputs. Recent works, RoFL (Burkhalter et al.) and (concurrent work) ACORN (Bell et al.) show how to rely on zero-knowledge proofs to address such attacks at expense of significantly high computation costs. We also compare our protocol against the PRIO system by Gibbs and Boneh (USENIX 2017) which achieves the same task in an incomparable security model. We benchmark our protocol with implementation and demonstrate its concrete efficiency. Our solution scales to 1000s of clients, requires only a constant number of rounds, outperforms prior work in computational cost, and has competitive communication cost.
KW - Federated Learning
KW - Input Certification
KW - Secure Aggregation
KW - Secure Multi-Party Computation
UR - http://www.scopus.com/inward/record.url?scp=85168147030&partnerID=8YFLogxK
U2 - 10.1145/3579856.3595805
DO - 10.1145/3579856.3595805
M3 - منشور من مؤتمر
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 14
EP - 28
BT - ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
Y2 - 10 July 2023 through 14 July 2023
ER -