Exercises
ex-ch10-01
EasyState the threat model for the Bonawitz secure-aggregation protocol. Specify the adversary, what it observes, and what it must not learn.
Adversary
The server (honest-but-curious) plus up to colluding users. They follow the protocol but pool all observed messages and inputs.
Observations
Server: all uploads + protocol-spec messages. Colluders: their own gradients, random coins, and received messages.
Must not learn
Anything about beyond what is implied by the aggregate . Information-theoretic equality: .
ex-ch10-02
EasyWhy do pairwise masks cancel in the server's aggregate?
Antisymmetry
Convention: . For each pair , user adds and user adds . The pair's contribution is zero.
Aggregate
Summing over all users: . All pairs cancel. β
ex-ch10-03
EasyFor the Bonawitz protocol with users, compute the per-round number of pairwise mask exchanges and the per-user upload size for at 32-bit precision.
Pairwise exchanges
pairs. Each requires one DH exchange.
Per-user upload
bits MB per user.
Total per-round
Aggregate uplink: MB = 2 GB. Plus 1225 DH messages of bits each: negligible compared to the gradient uplink.
ex-ch10-04
EasyState the feasibility constraint for the Bonawitz dropout-resilient protocol with collusion threshold and dropout rate on users.
Constraint
, equivalently . The Shamir threshold must satisfy .
Interpretation
Strict colluder threshold () plus tolerated dropouts () cannot together exceed the user pool minus one. This is a structural feasibility limit, not adjustable by clever engineering.
ex-ch10-05
MediumWhy is each user's upload uniform over to the server, given that pairwise seeds are independent?
Each upload is a sum of one gradient and independent uniform random vectors.
Sum of uniform random variables
. The server has no access to any (those are shared between and only). The sum of independent uniform random vectors over is itself uniform.
Conclusion
Adding to a uniform random vector gives a uniform random vector. Hence looks uniform to the server, revealing nothing about in the marginal distribution.
Joint constraint
The joint distribution of all uploads is constrained by β the aggregate is the only piece of information that leaks.
ex-ch10-06
MediumExplain why the Bonawitz protocol needs both pairwise seeds and self-mask seeds (for dropout handling).
Consider what happens if a user does not drop and the server reconstructs its pairwise seeds.
Without self-masks
If a user does not drop and the server reconstructs all of 's pairwise seeds (to cancel masks of dropped users), the server can compute β the sum of 's mask contributions to dropped users. Subtracting this from the server's aggregated sum reveals additional information about .
With self-masks
Each user adds an extra self-mask (Shamir-shared like the pairwise seeds). Even if all of 's pairwise seeds are reconstructed, remains private (under the threshold). Hence stays masked.
Symmetry
The self-mask is reconstructed by the server only if user also drops out (other surviving users provide their shares of ). For non-dropped , remains private and protects .
ex-ch10-07
MediumFor users, collusion threshold, and dropout rate, find a valid Shamir threshold .
.
Compute bounds
Lower: . Upper: .
Choose $t$
Any is valid. Production choice: β safe margin against further dropouts and collusion beyond design assumptions.
ex-ch10-08
MediumState the Caire et al. (2022) optimality theorem precisely and identify its scheme class.
Within the uncoded-groupwise-key class.
Statement
For any secure-aggregation scheme with uncoded groupwise keys, tolerating colluders and dropouts, the per-round communication is . For and : .
Scheme class
Uncoded groupwise keys: each user's upload is a linear combination of subsetwise random keys (no coding of gradients). Pairwise masking (Bonawitz) is the canonical instance.
Achievability
Bonawitz's pairwise-masking protocol achieves the bound. Within the uncoded class, is tight.
ex-ch10-09
MediumWhy does the Caire et al. (2022) optimality result not apply to CCESA (Chapter 12)?
CCESA uses sparse random graphs, not complete pairwise.
CCESA uses sparse random graph
CCESA's mask structure is a sparse random graph (ErdΕsβRΓ©nyi), not a complete pairwise graph. The masking still works because the pairwise cancellations sum out probabilistically, but the construction is coded: the masks are chosen to cancel under specific subset conditions.
Outside the class
The Caire et al. theorem is restricted to protocols where keys are unmodified (uncoded). CCESA's mask structure is coded via the random graph topology, putting it outside the class.
Achieved cost
CCESA achieves β strictly below the Caire et al. lower bound for the uncoded class. The CCESA paper (Chapter 12) provides the matching converse for the sparse-graph class.
ex-ch10-10
MediumCompose the Bonawitz protocol with -bit gradient quantization (Chapter 9 Β§9.3). What is the per-round communication cost?
Composition
Each user quantizes its gradient to bits per scalar before applying pairwise masks. The masks are over the same field, so the quantization is compatible with the protocol.
Per-round cost
Per-user upload: bits (gradient) + bits (DH messages). Aggregate: bits.
Comparison
At vs. : savings on gradient component. The key overhead is unchanged. For : β gradient dominates. Quantization helps when .
ex-ch10-11
HardProve (sketch) that Bonawitz's pairwise-masking protocol satisfies the privacy guarantee in the ideal information-theoretic model (uniform random seeds).
Use the joint distribution argument.
Setup
Server sees with . Pairwise seeds are uniform random over , independent.
Conditional distribution
Given the aggregate constraint , the joint distribution of is uniform over .
Information-theoretic equality
Conditional on , the server's view is uniform β independent of which specific summed to . By the chain rule, . The view adds nothing beyond the aggregate.
ex-ch10-12
HardSketch the proof of Caire et al.'s optimality theorem for (no collusion) and (no dropouts). What is the lower bound and how does it arise?
Cut-set / DOF argument over the key-sharing structure.
Cut-set setup
Consider the cut between any single user and the rest of the system. The user's upload must contribute its gradient to the aggregate, but the aggregate must reveal nothing else.
Key-counting
The server's view consists of uploads. For privacy, each user's upload must be masked by sufficient unique keys (in the uncoded class, this means subsetwise keys). Counting the constraints gives at least distinct keys for .
Aggregate cost
keys β each contributing at least bits to the protocol's communication. Total: key-related cost, plus gradient cost, giving the bound . Bonawitz matches this with equality.
ex-ch10-13
HardDiscuss the relationship between Bonawitz's secure-aggregation protocol and Maddah-Ali / Niesen coded caching (Chapter 4 Β§4.3). Identify the structural parallels.
Both involve subset-keyed broadcasts/uploads with cancellation properties.
Parallel
Both protocols use subset-indexed keys: in coded caching, each subset of users has a common cached chunk; in secure aggregation, each pair (or subset) shares a common mask. Both use the cancellation / constraint structure of the keys to achieve the protocol's goal (deliver content / aggregate gradient).
Difference
Coded caching delivers requests across subsets (one broadcast satisfies many users); secure aggregation conceals individual contributions (sum across subsets cancels masks). The algebraic mechanics are dual: caching uses XOR-aligned broadcasts; SecAgg uses subset-cancelled masks.
Analytical tools
Both fields use similar cut-set / IA arguments. The Caire et al. optimality proof (Β§10.4) reuses the Maddah-Ali / Niesen cut-set machinery. This algebraic kinship is one of the unifying themes of Part II.
ex-ch10-14
HardCompose Bonawitz's secure aggregation with - differential privacy (DP). What is the resulting privacy guarantee?
Composition
Each user adds Gaussian noise to its gradient before applying Bonawitz masks. The server receives masked noisy gradients; aggregating gives β noisy aggregate.
Privacy guarantee
- Information-theoretic (from Bonawitz): server learns only the (noisy) aggregate, not individual gradients.
- Differential (from DP noise): the noisy aggregate satisfies -DP for some depending on and the sensitivity of gradients.
Combined strength
Stronger than either alone: even if the information-theoretic guarantee were broken (e.g., by a powerful adversary), the DP noise bounds the aggregate-level leakage. Production FL deployments commonly use this composition.
ex-ch10-15
ChallengeOpen problem. Bonawitz's protocol is information-theoretically optimal within uncoded groupwise keys (Β§10.4). CCESA (Chapter 12) achieves via sparse random graphs, outside this class. Is there a deterministic sparse-key construction that achieves communication while preserving Bonawitz-style information-theoretic privacy?
Combinatorial designs (Steiner systems, expander graphs) might help.
Status
The CCESA construction (random sparse graph) gives the privacy guarantee with high probability β not deterministically. The natural question is whether deterministic sparse constructions can match this.
Candidate
Steiner systems, expander graphs, and other combinatorial structures have the right "any subset of users misses some key" property. Constructing such graphs with appropriate density would give a deterministic CCESA-like protocol.
Status (open)
No known explicit construction matches CCESA's bound deterministically. Some partial results exist (Kadhe et al. 2020 FastSecAgg) but with weaker scaling. The full characterization is open. Research-grade problem at the intersection of combinatorics and cryptography.