Privacy, Misalignment, and Tradeoffs

The Privacy of the Superposition

Part III (Chapters 10–12) built up secure aggregation with pairwise masks, Shamir sharing, and sparse graphs β€” all to hide individual gradients from an honest-but-curious server. The resulting schemes pay O(n)O(n) to O(n2)O(n^2) per-round communication.

AirComp's MAC superposition already hides individual contributions β€” with no cryptographic machinery. The receiver sees βˆ‘khkbksk+w\sum_k h_k b_k s_k + \mathbf{w} and has no direct algebraic inverse. But how much privacy does the MAC really provide? The golden thread β€” privacy, robustness, communication efficiency β€” reappears sharply. AirComp gets privacy for free in communication, but at the cost of a specific threat model (single-antenna receiver, random channel fading, tight synchronization) that must be carefully stated. This section quantifies.

,

Theorem: Native AirComp Privacy

Consider AirComp over a Gaussian MAC with nn users, independent Gaussian source values sk∼N(0,Οƒs2)s_k \sim \mathcal{N}(0, \sigma_s^2), channel gains hkh_k with ∣hk∣>0|h_k| > 0, and a single-antenna receiver observing r=βˆ‘khkbksk+wr = \sum_k h_k b_k s_k + \mathbf{w} with w∼CN(0,Οƒ2)\mathbf{w} \sim \mathcal{CN}(0, \sigma^2). Under magnitude alignment (bkhk=Ξ·b_k h_k = \eta) and i.i.d.\ sources, for any individual gradient sjs_j, I(sj; r)β€…β€Šβ‰€β€…β€Š12log⁑ ⁣(1+∣η∣2Οƒs2(nβˆ’1)∣η∣2Οƒs2+Οƒ2).I(s_j;\, r) \;\leq\; \frac{1}{2}\log\!\left(1 + \frac{|\eta|^2 \sigma_s^2}{(n-1)|\eta|^2\sigma_s^2 + \sigma^2}\right). As nβ†’βˆžn \to \infty (with Οƒs2\sigma_s^2 fixed), the mutual information β†’0\to 0 β€” the server's observation becomes asymptotically independent of any individual sjs_j.

What AirComp Privacy Does and Does Not Guarantee

Theorem 16.4.1's privacy guarantee is conditional on several assumptions:

  • Single-antenna receiver. A multi-antenna receiver can beamform to extract individual sks_k β€” it effectively performs MIMO decoding. Privacy collapses.

  • I.i.d.\ Gaussian sources. The bound uses Gaussian MI. Structured or correlated sources can leak more.

  • Honest-but-curious receiver. An active receiver that injects its own signal or manipulates the channel violates the model.

  • No prior on sks_k. If the server has a strong prior on sjs_j (e.g., from auxiliary data), the posterior p(sj∣r)p(s_j | r) can concentrate even when I(sj;r)I(s_j; r) is small.

  • Symmetric power control. Asymmetric power allocation (PkP_k uneven) disturbs the anonymity β€” the high-power users dominate the superposition.

The pragmatic picture: AirComp provides weak-asymptotic privacy in a single-antenna honest-but-curious setting. For stronger guarantees, stack additional mechanisms β€” differential privacy via Gaussian dither (see below), pairwise masking (Chapter 10), or SPIR-style protocols (Chapter 14). AirComp is not a cryptographic silver bullet; it is a communication-efficient privacy primitive with a well-defined threat model.

,

Theorem: Differential-Privacy Amplification by AirComp

Suppose each user perturbs their pre-processed symbol with i.i.d.\ Gaussian dither zk∼CN(0,Οƒz2)z_k \sim \mathcal{CN}(0, \sigma_z^2) before transmission. The receiver observes r=Ξ·βˆ‘ksk+Ξ·βˆ‘kzk+wr = \eta \sum_k s_k + \eta \sum_k z_k + \mathbf{w}. The effective dither seen by the post-processor has variance ∣η∣2nΟƒz2|\eta|^2 n \sigma_z^2 β€” amplified by nn. Any single-user Gaussian dither scheme that achieves (Ξ΅,Ξ΄)(\varepsilon, \delta)-DP at a single user achieves (Ξ΅/n,Ξ΄)(\varepsilon/\sqrt{n}, \delta)-DP after AirComp summation.

,

Theorem: MSE Under Carrier-Phase Misalignment

Suppose users have imperfect CSIT, so bkhk=Ξ·ejΟ•kb_k h_k = \eta e^{j\phi_k} for random phases Ο•k∼Uniform[βˆ’Ο•max⁑,Ο•max⁑]\phi_k \sim \text{Uniform}[-\phi_{\max}, \phi_{\max}]. The aggregation MSE with zero-forcing post-processing is MSEmisβ€…β€Š=β€…β€ŠΟƒ2∣η∣2⏟noiseβ€…β€Š+β€…β€ŠΟƒs2(1βˆ’(sin⁑ϕmax⁑ϕmax⁑)2)⏟misalignment.\mathsf{MSE}_{\text{mis}} \;=\; \underbrace{\frac{\sigma^2}{|\eta|^2}}_{\text{noise}} \;+\; \underbrace{\sigma_s^2 \left(1 - \left(\frac{\sin\phi_{\max}}{\phi_{\max}}\right)^2\right)}_{\text{misalignment}}. The misalignment term is SNR-independent: it does not vanish as Pβ†’βˆžP \to \infty. It is an irreducible MSE floor.

AirComp Trade-offs: Power, MSE, Privacy

Jointly explore how AirComp MSE, per-user mutual-information leakage, and misalignment MSE depend on transmit power and user count. Three curves: (i) zero-forcing MSE with aligned channels, (ii) per-user MI leakage bound (Theorem 16.4.1), (iii) misalignment MSE floor for a given phase spread Ο•max⁑\phi_{\max}. The golden thread β€” privacy vs. communication efficiency β€” is visible: as nn grows, MSE increases but privacy strengthens.

Parameters
50
20
10

AirComp vs. Classical Secure Aggregation

PropertyClassical SecAgg (Ch. 10)AirComp (Ch. 16)
Communication per roundO(n2)O(n^2) key exchanges + O(n)O(n) uploadsO(1)O(1) MAC channel uses
Aggregate fidelityExact (digital)MSE =Οƒ2/∣η∣2= \sigma^2/|\eta|^2
Privacy guaranteeIT-secure under TT-collusionWeak-asymptotic; requires single-antenna RX
DP compositionPost-processed digital noisen\sqrt{n}-factor amplification
Byzantine robustnessNone (needs extension)None (needs extension; Ch. 17)
SynchronizationSymbol-levelSymbol + carrier-phase
CSIT requirementNoneYes
🚨Critical Engineering Note

Deploying AirComp in an FL System

A production AirComp-enabled FL deployment should specify:

  • Threat model. Is the server honest-but-curious with a single RX antenna? If the RX is MIMO, AirComp gives no inherent privacy. Plan accordingly.

  • Synchronization budget. Target carrier-phase error below 17Β°17Β° (for 33-dB MSE floor). Use GPS-disciplined oscillators or network-time-protocol aided clocks.

  • CSIT accuracy. Each user needs channel estimates within 10%10\% of the true gain to stay within 0.50.5 dB of ideal MSE. Use pilot-based estimation; budget ∼5\sim 5-1010% of the round for pilots.

  • Power control policy. Zero-forcing (bk=Ξ·/hkb_k = \eta/h_k) is the default. MMSE gives a small (∼1\sim 1 dB) improvement at low SNR and introduces bias that may confuse downstream FL optimization. Threshold-drop weak users for heterogeneous channels.

  • DP dither level. Add Gaussian dither zk∼CN(0,Οƒz2)z_k \sim \mathcal{CN}(0, \sigma_z^2) at each user for aggregate (Ξ΅,Ξ΄)(\varepsilon, \delta)-DP. The AirComp amplification gives n\sqrt{n} reduction in per-user dither vs. digital FL.

  • Integrity. AirComp gives no integrity: a malicious user's bogus sks_k simply adds to the superposition with no way to detect it. Pair with ByzSecAgg (Chapter 11) or with robust aggregation (Chapter 17) for Byzantine tolerance.

Practical Constraints
  • β€’

    Single-antenna RX for privacy claim

  • β€’

    Carrier-phase error ≀17Β°\leq 17Β° for 33 dB floor

  • β€’

    CSIT error ≀10%\leq 10\% for 0.50.5 dB MSE loss

  • β€’

    DP dither: per-user Οƒzagg/n\sigma_z^{\text{agg}}/\sqrt{n}

  • β€’

    No integrity β€” pair with Byzantine protection

πŸ“‹ Ref: Yang-Jiang-Shi 2020; Liu-Yang 2021; Β§16.4 model
,

Common Mistake: 'The Channel Adds; Therefore It's Secure'

Mistake:

Deploy AirComp and claim information-theoretic privacy without explicitly stating the threat model and verifying each assumption.

Correction:

AirComp's privacy is specific: single receive antenna, Gaussian sources, honest-but-curious server, tight synchronization. Any deviation from these β€” MIMO receiver, active adversary, non-Gaussian sources, prior information β€” weakens or breaks the guarantee. Always write the threat model explicitly in the deployment document. When in doubt, stack a cryptographic aggregation layer (Bonawitz, ByzSecAgg) on top of AirComp for defense in depth.

Key Takeaway

AirComp offers a structured trade-off: Θ(1)\Theta(1) channel uses and weak-asymptotic privacy against a single-antenna honest-but-curious receiver, at the cost of tight synchronization, CSIT, and a specific threat model. The MAC superposition also naturally amplifies Gaussian dither by n\sqrt{n}, enabling communication-efficient differential privacy. Misalignment produces an irreducible MSE floor. Chapter 17 combines these ingredients for wireless federated learning β€” the end-to-end FL problem over real channels.

Why This Matters: Looking Ahead: AirComp in Wireless FL

AirComp is the enabling physical-layer aggregation primitive for wireless federated learning (Chapter 17). The Wan-Tuninetti-Caire group's CommIT contribution on information-theoretically secure federated representation learning combines AirComp-style aggregation with an additional IT-privacy layer β€” Chapter 17 Β§17.3 develops this. Chapter 18 then surveys the open problems at the intersection of coded computing, secure aggregation, PIR, and wireless FL β€” closing the book by marking the frontier.

Quick Check

The per-user mutual-information leak bound in Theorem 16.4.1 decays how with the number of users nn?

Not at all β€” privacy is independent of nn.

As 1/n1/n in the leading term.

Exponentially in nn.

As 1/n1/\sqrt{n}.