Analysis: Privacy, Reliability, and Scaling

Proving the Sparse Graph Works

Section 12.2 specified the CCESA protocol: a sparse Erdős–Rényi random graph replaces Bonawitz's complete graph. The protocol reduces overhead from O(n2)O(n^2) to O(nn/logn)O(n\sqrt{n/\log n}). The analytical question is: does the privacy guarantee still hold?

Section 12.3 answers this in three parts:

  1. Privacy. With high probability over the random graph, no coalition of TT users can fragment the graph — i.e., every honest user retains at least one mask partner that is outside the coalition. This ensures Bonawitz- equivalent privacy.

  2. Reliability. The random graph is connected w.h.p. at CCESA's density, so the mask-cancellation structure is well-defined and the aggregate can always be computed.

  3. Scaling. Both the privacy and reliability guarantees hold for nn \to \infty at edge density p=clogn/np = c\sqrt{\log n/n} with c>1c > 1.

The tools are standard random-graph theory: Chernoff concentration, first-moment bounds on adverse events, and union bounds over subsets. Section 12.3 presents them in the CCESA context.

Theorem: CCESA Privacy: High-Probability Bonawitz-Equivalent

Let nn be the number of users, TT the collusion threshold, and p=clogn/np = c\sqrt{\log n/n} for some c>1c > 1. For the CCESA protocol with Erdős–Rényi graph G=G(n,p)G = G(n, p), define the event "privacy holds" as: for every honest user kk and every coalition U\mathcal{U} of TT users, kk has at least one neighbor outside U\mathcal{U}.

Then: Pr[privacy holds]    1nΘ(1).\Pr[\text{privacy holds}] \;\geq\; 1 - n^{-\Theta(1)}. When privacy holds, CCESA's guarantee is the same as Bonawitz: the adversary (server + TT colluders) learns only the aggregate and nothing about individual gradients.

Privacy holds iff the coalition of TT users cannot "isolate" any honest user from its neighbors — i.e., honest users always have at least one neighbor outside the coalition. In a random graph with edge probability pp, the probability of a specific user being isolated from a specific coalition decays exponentially in p(nT)p \cdot (n - T). Union-bounding over all coalitions and users gives the nΘ(1)n^{-\Theta(1)} failure probability at CCESA's density.

Operationally: the privacy failure probability is so small that in practice the guarantee is "Bonawitz-equivalent" — no production deployment sees a failure. The random-graph analysis is a formal way to justify this.

Theorem: CCESA Reliability: Aggregation Succeeds W.H.P.

Under the same CCESA setup (edge probability p=clogn/np = c\sqrt{\log n/n}, constant c>1c > 1), the event "reliability holds" is defined as: the graph G=G(n,p)G = G(n, p) is connected, so that the mask-cancellation structure is well-defined.

Then: Pr[reliability holds]    1nΘ(1).\Pr[\text{reliability holds}] \;\geq\; 1 - n^{-\Theta(1)}. When reliability holds, the server's aggregate G\mathbf{G} equals kgk\sum_k \mathbf{g}_k exactly (up to the self-mask contributions, which are handled as in §12.2).

A random graph G(n,p)G(n, p) is connected w.h.p. whenever p(1+ϵ)logn/np \geq (1 + \epsilon) \log n / n (Erdős–Rényi classical result). CCESA's density p=clogn/np = c\sqrt{\log n/n} is much higher than this threshold — essentially n\sqrt{n}-times denser. The reliability guarantee is therefore very robust.

In practice, the random graph is not just connected but highly connected — typical user degree nlogn\sim \sqrt{n \log n}. The reliability guarantee degrades gracefully as pp decreases toward the connectivity threshold.

Theorem: CCESA: Privacy + Reliability + Sub-Quadratic Scaling

The CCESA protocol with nn users, collusion threshold T=o(n)T = o(n), edge probability p=clogn/np = c\sqrt{\log n/n} (constant c>1c > 1), and model dimension dd satisfies:

  1. Privacy w.h.p.: Pr[privacy holds]1nΘ(1)\Pr[\text{privacy holds}] \geq 1 - n^{-\Theta(1)}. When it holds, the adversary's information-theoretic view is Bonawitz-equivalent.

  2. Reliability w.h.p.: Pr[reliability holds]1nΘ(1)\Pr[\text{reliability holds}] \geq 1 - n^{-\Theta(1)}. When it holds, the server's aggregate equals the honest sum exactly.

  3. Communication: O(nd+nnlogn)O(n \cdot d + n \sqrt{n \log n}) aggregate per round — sub-quadratic in nn. Per-user: O(d+nlogn)O(d + \sqrt{n \log n}).

Combined: with probability 12nΘ(1)\geq 1 - 2 n^{-\Theta(1)}, CCESA provides Bonawitz-level guarantees at sub-quadratic communication cost.

The combined result is the headline: Bonawitz-equivalent privacy and reliability at a fraction of the communication cost. The "with high probability" caveat is so strong (1nΘ(1)\geq 1 - n^{-\Theta(1)}) that it is operationally equivalent to deterministic.

The CCESA construction is the information- theoretic optimum for the random-graph class of secure-aggregation schemes. Within the deterministic class, Caire et al. (Chapter 10 §10.4) proved O(n2)O(n^2) is tight; CCESA moves outside this class to achieve sub-quadratic at minimal cost in guarantee strength.

Key Takeaway

CCESA delivers Bonawitz-equivalent privacy and reliability at O(nn/logn)O(n\sqrt{n/\log n}) communication. The random-graph-theoretic analysis gives tight nΘ(1)n^{-\Theta(1)} failure probabilities — so small that the guarantee is operationally deterministic. The n/logn\sim \sqrt{n/\log n}-factor communication saving over Bonawitz is the advantage. At n=105n = 10^5, this is a 50×\sim 50\times reduction.

Example: CCESA Failure Probabilities at n=104n = 10^4

For a CCESA deployment with n=104n = 10^4 users, T=200T = 200 collusion threshold, and edge probability c=2c = 2, compute approximate privacy and reliability failure probabilities.

CCESA Failure Probability vs. Edge Density

Plot the privacy and reliability failure probabilities as a function of the constant cc in the edge probability p=clogn/np = c\sqrt{\log n/n}, for various nn. Show that both failure probabilities decay rapidly with cc: at c=2c = 2, failure is 106\leq 10^{-6}; at c=3c = 3, 1012\leq 10^{-12}. Practical CCESA uses c=2c = 233 for comfortable margins.

Parameters
10000
5

Is CCESA Optimal?

Within the class of sparse-graph-based secure-aggregation schemes with information-theoretic privacy, CCESA achieves O(nn/logn)O(n\sqrt{n/\log n}) overhead. Is this tight?

Lower bound argument: any scheme requiring every honest user to have at least one honest neighbor (privacy requirement) under Erdős–Rényi edge distribution must have pΩ(logn/n)p \geq \Omega(\log n/n) — the classical connectivity threshold. Below this, the graph disconnects and privacy breaks.

CCESA uses p=clogn/np = c\sqrt{\log n/n}, which is n/logn\sqrt{n/\log n}-times larger than the connectivity threshold. The slack is used for the privacy margin (every user's neighborhood must contain 1\geq 1 honest node w.h.p.). Closing the gap between CCESA's rate and the classical connectivity threshold is an open problem.

The Choi et al. (2022) paper establishes that CCESA matches the lower bound for the non-adaptive random-graph class, up to a polylog factor. Adaptive constructions (graph depends on user identities) may achieve tighter bounds; this is one of the open problems of Chapter 18.

Theorem: Lower Bound for Random-Graph SecAgg

For any secure-aggregation protocol where the pairwise-mask graph is a random Erdős–Rényi G(n,p)G(n, p) and where the privacy guarantee holds with high probability, the edge probability pp must satisfy p  =  Ω ⁣(lognn).p \;=\; \Omega\!\left(\frac{\log n}{n}\right). Hence the aggregate DH-exchange overhead is Ω(nlogn)\Omega(n \log n), and any CCESA-variant achieving this bound is near-optimal in the sparse-graph class.

CCESA's p=clogn/np = c\sqrt{\log n/n} is at the information-theoretic optimum within an O(n/logn)O(\sqrt{n/\log n}) factor. Closing this factor is open.

The lower bound comes from the classical Erdős–Rényi connectivity threshold. Below plogn/np \sim \log n/n, the graph disconnects w.h.p., leaving isolated users whose masks don't cancel. Privacy would break (and reliability too).

CCESA's density sits above this threshold by a factor of n/logn\sqrt{n/\log n}. Whether this factor is necessary for the privacy margin (not just reliability) is a delicate analysis. The Choi et al. (2022) paper gives a tighter lower bound matching CCESA's rate; the gap is in the polylog factors.

Common Mistake: The Graph Seed Must Be Honestly Generated

Mistake:

Allow the server to unilaterally choose the CCESA graph seed.

Correction:

If the server controls the graph seed, it can adaptively choose a graph that isolates specific honest users (e.g., removes all their edges). This would break privacy even though the "graph is random" from the server's perspective.

Production CCESA uses a round-specific seed derived from an external randomness source: blockchain hashes, NIST beacon, or distributed coin-flipping. The seed must be unpredictable before user gradients are chosen; otherwise the adversary can adaptively shape the graph. The Choi et al. paper assumes honest seed generation as a protocol assumption.

⚠️Engineering Note

Honest Seed Generation in Production

CCESA's honest-seed assumption is handled in production via:

  • Blockchain randomness: seed derived from the hash of a recent block, publicly verifiable, hard to manipulate.
  • NIST Randomness Beacon: government-run public randomness source (limited by centralization concerns).
  • Distributed coin-flipping: multi-party protocol where users collectively generate the seed. Adds O(n)O(n) overhead but fully decentralizes.

The choice depends on deployment trust model: blockchain for trustless environments, distributed flipping for FL deployments with no external beacon. Production implementations use blockchain by default.

Practical Constraints
  • Blockchain seed: unpredictable, verifiable

  • Distributed flipping: O(n)O(n) overhead, fully decentralized

  • Server-chosen seed: insecure, must be avoided

📋 Ref: Choi et al. 2022 §III.D; NIST Randomness Beacon spec

Quick Check

For CCESA with n=104n = 10^4 users at edge density c=2c = 2, the failure probability of the privacy guarantee is approximately:

102\sim 10^{-2} (1% failure rate)

106\sim 10^{-6} or smaller (negligible in practice)

Exactly 0 (deterministic guarantee)

1/n1/n (linear decay)