Chapter Summary
Chapter Summary
Key Points
- 1.
Bonawitz's communication overhead is the scalability bottleneck for large- FL. At , the protocol's pairwise-DH-exchange phase alone takes hours per round. Caire et al. (2022) proved this is information-theoretically optimal within the uncoded groupwise-key class — so any improvement requires leaving the class.
- 2.
CCESA breaks the barrier with a sparse Erdős–Rényi random graph. Edge probability instead of (Bonawitz). Communication overhead drops to , sub-quadratic. Privacy and reliability guarantees hold with high probability ( failure) — operationally equivalent to deterministic Bonawitz.
- 3.
The four CommIT-group Part III contributions form a coherent stack. Bonawitz baseline (2017), Caire et al. optimality within uncoded class (2022, Chapter 10), ByzSecAgg with Byzantine resilience (2023, Chapter 11), and CCESA with sub-quadratic scaling (2022, Chapter 12). Together they define the information-theoretic frontier of privacy-preserving FL.
- 4.
Protocol choice depends on and threat model. Bonawitz for small (up to 500) and simple threat models; ByzSecAgg for Byzantine resilience; CCESA for large with passive threats; differential-privacy variants for unlimited scaling at weaker guarantees. The decision tree of §12.4 makes the choice precise.
- 5.
Open problems remain. Closing the polylog gap in CCESA's bound, combining privacy + Byzantine + scaling in a single protocol, adaptive Byzantine resilience in the random-graph setting, asynchronous variants — all active research directions. Chapter 18 surveys these.
Looking Ahead
Part III closes here. Part IV (Chapters 13–15) pivots to Private Information Retrieval (PIR) — a related but distinct privacy-preserving problem: retrieving one item from a database without revealing which item, vs. aggregating gradients without revealing contributors. The algebraic machinery (finite-field interference alignment from Chapter 4, secret sharing from Chapter 3) is largely shared. Chapter 13 develops the classical Sun-Jafar PIR capacity; Chapter 14 extends to coded storage; Chapter 15 carries another CommIT contribution on cache-aided PIR. Reading Part IV after Part III reveals the structural kinship between the privacy-preserving primitives that make modern FL and ML privacy possible.