CCESA: The Sparse Random-Graph Construction (CommIT Contribution)

The Sparse Random-Graph Idea

The core insight of CCESA is simple to state but subtle to analyze: use a sparse random graph of masks instead of the complete graph. If the Bonawitz protocol mask pair-graph is replaced by an Erdős–Rényi random graph G(n,p)G(n, p) with p=O(logn/n)p = O(\sqrt{\log n / n}), the resulting protocol still provides the privacy guarantees of Bonawitz (with high probability), and its communication overhead drops from O(n2)O(n^2) to O(nn/logn)O(n\sqrt{n/\log n}).

The point is that the complete-graph mask structure of Bonawitz is overkill. The graph just needs to be "connected enough" to cancel masks in the aggregate, and an Erdős–Rényi graph is connected with high probability at edge densities much lower than the complete graph.

Section 12.2 develops the CCESA construction and identifies it as the fourth CommIT contribution of Part III. Section 12.3 proves the privacy and reliability guarantees; §12.4 places CCESA in the broader design space.

🎓CommIT Contribution(2022)

CCESA: Communication-Efficient Secure Aggregation via Sparse Random Graphs

B. Choi, J.-y. Sohn, D.-J. Han, J. Moon, G. CaireIEEE Journal on Selected Areas in Communications

CCESA is the CommIT-group contribution by Byeong-Geun Choi, Jy-yong Sohn, Dong-Jun Han, Jaekyun Moon, and Giuseppe Caire. It reduces the Bonawitz protocol's per-round communication overhead from O(n2)O(n^2) to O(nn/logn)O(n\sqrt{n/\log n}) by using a sparse Erdős–Rényi random graph of pairwise masks instead of the complete graph.

Key technical contributions:

  1. Sparse random-graph mask structure. Each pair of users (i,j)(i, j) shares a pairwise mask with probability p=clogn/np = c \sqrt{\log n / n} for a constant c>1c > 1, independently per pair. The expected number of mask pairs per user is O(nlogn)O(\sqrt{n \log n}) instead of O(n)O(n).

  2. Privacy + reliability guarantees via random- graph theory. The privacy guarantee holds with probability 1nΘ(1)\geq 1 - n^{-\Theta(1)} (uniform over the graph draw). Reliability (server can always reconstruct) holds with the same probability.

  3. Communication complexity O(nn/logn)O(n\sqrt{n/\log n}). Matches the information-theoretic lower bound for sparse-graph schemes up to logarithmic factors.

  4. Compatibility with dropouts and threshold cryptography. CCESA is drop-in compatible with Chapter 10's dropout-handling via Shamir-shared seeds; the sparse-graph structure does not break this integration.

Why it matters: CCESA unlocks secure aggregation at large nn — essential for modern cross-device FL (millions of users) and cross-silo federations (hundreds of institutions). The sparse-graph idea transfers to many secure-aggregation variants and is now standard in production thinking.

The result is the fourth CommIT Part III contribution (after Chapter 3 foundations, Chapter 10 optimality, and Chapter 11 ByzSecAgg), closing the CommIT-group privacy-preserving FL research programme at the information-theoretic frontier.

ccesacommit-contributionsparse-graphView Paper →

Definition:

CCESA Protocol

The CCESA protocol for nn users, collusion threshold TT, and edge probability p=clogn/np = c\sqrt{\log n / n} (for some constant c>1c > 1) operates as follows:

Phase 0: Graph Sampling. A publicly-known pseudorandom generator samples an Erdős–Rényi graph G=G(n,p)G = G(n, p): for each pair (i,j)(i, j), independently include the edge {i,j}E(G)\{i, j\} \in \mathcal{E}(G) with probability pp. The graph is derived deterministically from a round-specific public seed, so all users and the server agree on GG.

Phase 1: Pairwise Key Exchange (sparse). For each edge {i,j}E(G)\{i, j\} \in \mathcal{E}(G), users ii and jj perform a Diffie–Hellman exchange and derive a pairwise seed sijs_{ij} via a PRG. Users do not exchange keys with non-neighbors.

Phase 2: Masked Upload. User kk uploads g~k  =  gk+jN(k)sign(k,j)rkj  +  mk,\tilde{\mathbf{g}}_k \;=\; \mathbf{g}_k + \sum_{j \in \mathcal{N}(k)} \text{sign}(k, j) \mathbf{r}_{kj} \;+\; \mathbf{m}_k, where N(k)\mathcal{N}(k) is kk's graph neighborhood and mk\mathbf{m}_k is a self-mask (as in Bonawitz §10.3). Note: far fewer masks per user than in Bonawitz.

Phase 3: Aggregation. Server computes G=kg~k\mathbf{G} = \sum_k \tilde{\mathbf{g}}_k. Masks cancel because edges in the graph contribute symmetric ±rij\pm \mathbf{r}_{ij} pairs.

Phase 4: Dropout Handling (optional). Shamir shares of the pairwise seeds are exchanged as in Bonawitz — but only over the sparse graph, reducing overhead.

The protocol's correctness and privacy depend on the graph being "well-connected" with high probability, which Erdős–Rényi at p=clogn/np = c\sqrt{\log n / n} achieves.

The key contrast with Bonawitz: each user has degree Θ(nlogn)\Theta(\sqrt{n \log n}) in CCESA vs. degree n1n - 1 in Bonawitz. Per-user DH exchanges drop from O(n)O(n) to O(nlogn)O(\sqrt{n \log n}), and aggregate DH overhead from O(n2)O(n^2) to O(nnlogn)O(n \sqrt{n \log n}). Reliability and privacy are preserved with high probability over the random graph.

CCESA

Communication-Efficient Secure Aggregation via sparse Erdős–Rényi random graphs. Reduces Bonawitz's O(n2)O(n^2) overhead to O(nn/logn)O(n\sqrt{n/\log n}) while preserving information-theoretic privacy (with high probability). The fourth CommIT-group Part III contribution.

Erdős–Rényi Random Graph

The random graph G(n,p)G(n, p) where each of the (n2)\binom{n}{2} edges is included independently with probability pp. Classical connectivity threshold: G(n,p)G(n, p) is connected w.h.p. iff p(1+ϵ)logn/np \geq (1 + \epsilon)\log n / n for any ϵ>0\epsilon > 0. CCESA uses edge density p=clogn/np = c\sqrt{\log n / n}, well above the connectivity threshold, for privacy + reliability guarantees.

CCESA Protocol

Complexity: Per-user: O(nlogn)O(\sqrt{n \log n}) DH exchanges, dd-scalar upload. Aggregate: O(nnlogn)O(n \sqrt{n \log n}) DH + Shamir-share overhead.
Input: Number of users nn, collusion
threshold TT, edge probability pp, round seed.
Setup. All parties compute G=G(n,p)G = G(n, p)
deterministically from the round seed (so no
communication needed for graph agreement).
Phase 1 — User kk:
1. Identify neighbors N(k)={j:{k,j}E(G)}\mathcal{N}(k) = \{j : \{k, j\} \in \mathcal{E}(G)\}.
2. For each jN(k)j \in \mathcal{N}(k), execute
Diffie–Hellman key exchange. Derive pairwise
seed skjs_{kj}.
3. Derive pairwise masks rkj\mathbf{r}_{kj} via PRG
on skjs_{kj}.
4. Draw self-mask seed bkb_k uniformly.
Phase 2 — User kk:
5. Compute mk\mathbf{m}_k from bkb_k via PRG.
6. Upload g~k=gk+jN(k)sign(k,j)rkj+mk\tilde{\mathbf{g}}_k = \mathbf{g}_k + \sum_{j \in \mathcal{N}(k)} \text{sign}(k, j) \mathbf{r}_{kj} + \mathbf{m}_k to the server.
Phase 3 — Server:
7. Receive all g~k\tilde{\mathbf{g}}_k. Sum over kk.
8. Mask terms cancel per edge: kjN(k)sign(k,j)rkj={i,j}E(rijrij)=0\sum_k \sum_{j \in \mathcal{N}(k)} \text{sign}(k, j) \mathbf{r}_{kj} = \sum_{\{i,j\} \in \mathcal{E}} (\mathbf{r}_{ij} - \mathbf{r}_{ij}) = \mathbf{0}.
9. Self-masks: need to reconstruct all mk\mathbf{m}_k
(from Shamir shares) and subtract. Output:
G=kgk\mathbf{G} = \sum_k \mathbf{g}_k.
Phase 4 — Dropout handling (as in §10.3):
10. For any dropped user jj: surviving neighbors'
Shamir shares of sjks_{jk} are collected. Seeds
reconstructed, leftover masks cancelled.

The protocol is structurally identical to Bonawitz — only the graph density differs. All the same cryptographic primitives (DH, PRG, Shamir sharing) apply. Implementation overhead is low; performance benefit is dramatic.

Theorem: CCESA Communication Complexity

The CCESA protocol with nn users, edge probability p=clogn/np = c \sqrt{\log n / n} (for some constant c>1c > 1), and model dimension dd has:

  • Per-user uplink: dd scalars (gradient) + O(nlogn)O(\sqrt{n \log n}) DH exchanges.
  • Aggregate per-round communication: O(nd+nnlogn)O(n \cdot d + n \sqrt{n \log n}).
  • Per-user DH cost: Θ(nlogn)\Theta(\sqrt{n \log n}) — a n/logn\sqrt{n/\log n} reduction over Bonawitz.

Simplified for the typical d=Θ(n)d = \Theta(n) regime: O(nd+n3/2logn)=O(nn/logn)O(n d + n^{3/2} \sqrt{\log n}) = O(n \sqrt{n/\log n}) — sub-quadratic, substantial improvement over Bonawitz's O(n2)O(n^2).

Each user's degree in G(n,p)G(n, p) is Bin(n1,p)\text{Bin}(n-1, p) with expectation (n1)pcnlogn(n-1)p \approx c \sqrt{n \log n}. Chernoff: with high probability, every user has degree Θ(nlogn)\Theta(\sqrt{n \log n}). Hence each user does Θ(nlogn)\Theta(\sqrt{n \log n}) DH exchanges, not O(n)O(n) as in Bonawitz. Aggregate overhead: nΘ(nlogn)=Θ(nnlogn)n \cdot \Theta(\sqrt{n \log n}) = \Theta(n \sqrt{n \log n}) — sub-quadratic.

Operationally: at n=105n = 10^5, CCESA's DH phase is nlogn3200\sim \sqrt{n \log n} \approx 3200 exchanges per user — tractable in seconds. Bonawitz at the same scale would need 105\sim 10^5 exchanges per user — several minutes, impractical.

Example: CCESA vs. Bonawitz at n=105n = 10^5

For n=105n = 10^5 users, model size d=107d = 10^7, compute per-user DH exchanges and aggregate communication for both Bonawitz and CCESA.

From Complete Graph to Sparse Erdős–Rényi

Animation of the transition from Bonawitz's complete- graph pairwise masking to CCESA's sparse Erdős–Rényi graph. Highlights how edges are removed while the graph remains connected, preserving privacy and reliability with lower overhead.

CCESA Graph Density vs. Communication Savings

Plot the per-user DH-exchange count vs. number of users nn for CCESA (at various cc values in the edge probability p=clogn/np = c \sqrt{\log n / n}) and for Bonawitz (n1n - 1 exchanges per user). Larger cc gives denser graphs with better connectivity margins but more overhead; typical c=2c = 233.

Parameters
10000
2

The Graph Is Pseudorandomly Generated

CCESA's random graph is not drawn fresh by each user independently — that would require all users to agree on the graph, requiring O(n2)O(n^2) communication to confirm. Instead, the graph is pseudorandomly generated from a public round-specific seed. All users and the server apply a known PRG to the seed and obtain the same graph deterministically.

This is a standard trick in protocol design: use public randomness for structural decisions (which users share keys) that must be agreed upon, reserving fresh randomness for the cryptographic primitives (the DH exchanges themselves, the mask derivation). Production implementations use a round-specific seed derived from a beacon or blockchain hash.

🔧Engineering Note

CCESA in Production

Production CCESA deployments (as of 2024) are research-track:

  • TU Berlin CommIT group: reference implementation in Python/TensorFlow.
  • Google research: integration into TensorFlow Federated for large-nn deployments.
  • Academic testbeds: cross-institution federated learning pilots at n103n \sim 10^3.

Engineering considerations:

  • Graph seed coordination: a round-specific public seed must be agreed upon without O(n2)O(n^2) communication. Typically derived from a blockchain hash or NIST beacon.
  • Graph discovery: users compute their neighborhood locally; no per-neighbor communication needed beyond the DH exchange.
  • Degree variance: Chernoff bounds guarantee degree concentration, but some users may have slightly-above-average degree. Production implementations pad to the maximum expected degree.

The shift from Bonawitz to CCESA is conceptually simple and implementation-light; adoption is gated primarily by the need to validate the graph-theoretic analysis at production scale.

Practical Constraints
  • Graph seed: from blockchain/beacon, O(1)O(1) broadcast

  • Degree concentration: Chernoff w.h.p.

  • Adoption path: research → research production → standard (timeline: 1–3 years)

📋 Ref: Choi et al. 2022 J-SAC; TU Berlin CommIT implementation

Key Takeaway

CCESA achieves O(nn/logn)O(n\sqrt{n/\log n}) communication by using a sparse Erdős–Rényi random graph of pairwise masks. The construction is a minimal modification of Bonawitz (change the graph structure; keep DH, PRG, Shamir) with a sub-quadratic asymptotic advantage. The privacy and reliability guarantees hold with high probability over the random graph — a relaxation so mild that it is operationally equivalent to deterministic. Section 12.3 proves these guarantees rigorously.

Common Mistake: The Graph Must Not Be Too Sparse

Mistake:

Set edge probability p=O(1/n)p = O(1/n) (much below CCESA's p=clogn/np = c\sqrt{\log n/n}) to save even more communication.

Correction:

Erdős–Rényi's connectivity threshold is p(1+ϵ)logn/np \geq (1 + \epsilon)\log n / n. Below this, the graph has isolated vertices w.h.p. — users without mask partners. Their masks do not cancel; the server cannot compute the aggregate. CCESA's p=clogn/np = c\sqrt{\log n/n} is well above connectivity but below complete — the sweet spot.

Attempting to push pp lower risks: (i) isolated vertices (aggregation fails), (ii) small privacy threshold (any TT colluders can fragment the graph). The factor c>1c > 1 is the safety margin; production uses c2c \geq 2 with verified Chernoff-margin analysis.

Historical Note: From FastSecAgg to CCESA

2020–2022

Reducing Bonawitz's O(n2)O(n^2) overhead was a recognized open problem circa 2020. FastSecAgg (Kadhe, Rajaraman, Koyluoglu, Ramchandran 2020) was the first practical proposal: regular-graph mask structure with O(nlogn)O(n \log n) overhead, but at weakened privacy (the regular-graph structure creates predictable correlations that can be exploited).

CCESA (Choi, Sohn, Han, Moon, Caire 2022) took the next step: random Erdős–Rényi graphs instead of regular. The random-graph analysis gives tight privacy guarantees (high-probability Bonawitz-equivalent privacy) at O(nn/logn)O(n\sqrt{n/\log n}) overhead. The CommIT-group collaboration between TU Berlin and KAIST produced a clean construction that has since become a standard reference.

Post-CCESA, the field continues to explore sparser constructions (expander graphs, combinatorial designs) but CCESA remains the benchmark for random-graph-based secure aggregation.

,

Quick Check

CCESA uses Erdős–Rényi graph G(n,p)G(n, p) with edge probability:

p=1p = 1 (complete graph — same as Bonawitz).

p=clogn/np = c \sqrt{\\log n / n} for some constant c>1c > 1.

p=1/np = 1/n (constant-degree).

p=logn/np = \\log n / n (connectivity threshold).