Chapter Summary

Chapter Summary

Key Points

  • 1.

    Secure aggregation enables FL privacy against an honest-but-curious server. The threat model is: the server follows the protocol but analyzes messages; up to TT users may collude. The privacy guarantee is information-theoretic: the adversary learns only the aggregate mathbfG=sumkmathbfgk\\mathbf{G} = \\sum_k \\mathbf{g}_k and nothing else about individual gradients.

  • 2.

    The Bonawitz pairwise-masking protocol is the production standard. Each pair of users shares a random mask derived via Diffie–Hellman; the antisymmetric mask structure ensures exact cancellation when the server sums across users. Each user's upload is uniform modulo the aggregate constraint.

  • 3.

    User dropouts are handled via Shamir-shared seeds. Each pairwise seed is split via a (t,n1)(t, n-1)-Shamir scheme; surviving users' shares let the server reconstruct dropped-user seeds to cancel leftover masks. The threshold satisfies T+1leqtleqndeltanT + 1 \\leq t \\leq n - \\delta n — a feasibility constraint on collusion and dropout tolerance.

  • 4.

    Caire et al. (2022) proved Bonawitz is optimal. Within the class of secure-aggregation schemes with uncoded groupwise keys, the O(n2)O(n^2) communication overhead is information-theoretically tight. No cleverer arrangement of pairwise or small-group keys can reduce the cost. This is the second CommIT-group contribution of Part III.

  • 5.

    The O(n2)O(n^2) ceiling motivates CCESA. For large-nn deployments, Bonawitz's overhead is prohibitive. Chapter 12's CCESA (another CommIT contribution) uses a sparse random graph of pairwise masks to achieve O(nsqrtn/logn)O(n\\sqrt{n/\\log n}) — outside the uncoded groupwise-key class and below the Caire et al. bound. The price is a probabilistic (not deterministic) privacy guarantee.

Looking Ahead

Chapter 11 builds on this chapter's secure-aggregation framework to address the Byzantine adversary: users who actively send corrupted gradients rather than honest ones. The CommIT-group ByzSecAgg protocol (Jahani-Nezhad / Maddah-Ali / Caire 2023) combines pairwise masking (this chapter), ramp secret sharing (Chapter 3), coded matrix multiplication (Chapter 5), and vector commitments into a single protocol tolerating BB Byzantine users at O(nlogn+Bd)O(n \\log n + Bd) communication. This is the third CommIT contribution of Part III; readers who completed Chapter 10 will find Chapter 11's construction a natural extension.