Chapter Summary
Chapter Summary
Key Points
- 1.
Secure aggregation enables FL privacy against an honest-but-curious server. The threat model is: the server follows the protocol but analyzes messages; up to users may collude. The privacy guarantee is information-theoretic: the adversary learns only the aggregate and nothing else about individual gradients.
- 2.
The Bonawitz pairwise-masking protocol is the production standard. Each pair of users shares a random mask derived via Diffie–Hellman; the antisymmetric mask structure ensures exact cancellation when the server sums across users. Each user's upload is uniform modulo the aggregate constraint.
- 3.
User dropouts are handled via Shamir-shared seeds. Each pairwise seed is split via a -Shamir scheme; surviving users' shares let the server reconstruct dropped-user seeds to cancel leftover masks. The threshold satisfies — a feasibility constraint on collusion and dropout tolerance.
- 4.
Caire et al. (2022) proved Bonawitz is optimal. Within the class of secure-aggregation schemes with uncoded groupwise keys, the communication overhead is information-theoretically tight. No cleverer arrangement of pairwise or small-group keys can reduce the cost. This is the second CommIT-group contribution of Part III.
- 5.
The ceiling motivates CCESA. For large- deployments, Bonawitz's overhead is prohibitive. Chapter 12's CCESA (another CommIT contribution) uses a sparse random graph of pairwise masks to achieve — outside the uncoded groupwise-key class and below the Caire et al. bound. The price is a probabilistic (not deterministic) privacy guarantee.
Looking Ahead
Chapter 11 builds on this chapter's secure-aggregation framework to address the Byzantine adversary: users who actively send corrupted gradients rather than honest ones. The CommIT-group ByzSecAgg protocol (Jahani-Nezhad / Maddah-Ali / Caire 2023) combines pairwise masking (this chapter), ramp secret sharing (Chapter 3), coded matrix multiplication (Chapter 5), and vector commitments into a single protocol tolerating Byzantine users at communication. This is the third CommIT contribution of Part III; readers who completed Chapter 10 will find Chapter 11's construction a natural extension.