Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework with Privileged Parties

被引:0
|
作者
Song, Lushan [1 ]
Wang, Zhexuan [1 ]
Lin, Guopeng [1 ]
Han, Weili [1 ]
机构
[1] Fudan University, School of Computer Science, Shanghai,10246, China
基金
中国国家自然科学基金;
关键词
Contrastive Learning - Differential privacy - Federated learning - Privacy-preserving techniques - Self-supervised learning - Vector spaces;
D O I
10.1109/TIFS.2024.3488507
中图分类号
学科分类号
摘要
Secure multi-party learning (MPL) enables multiple parties to train machine learning models with privacy preservation. MPL frameworks typically follow the peer-to-peer architecture, where each party has the same chance to handle the results. However, the cooperative parties in business scenarios usually have unequal statuses. Thus, Song et al. (CCS'22) presented pMPL, a hierarchical MPL framework with a privileged party. Nonetheless, pMPL has two limitations: (i) it has limited configurability requiring manually finding a public matrix that satisfies four constraints, which is difficult when the number of parties increases, and (ii) it is inefficient due to the huge online communication overhead. In this paper, we are motivated to propose Ruyi, a configurable and efficient MPL framework with privileged parties. Firstly, we reduce the public matrix constraints from four to two while ensuring the same privileged guarantees by extending the standard resharing paradigm to vector space secret sharing in order to implement the share conversion protocol and performing all the computations over a prime field rather than a ring. This enhances the configurability so that the Vandermonde matrix can always satisfy the public matrix constraints when given the number of parties, including privileged parties, assistant parties, and assistant parties allowed to drop out. Secondly, we reduce the online communication overhead by adapting the masked evaluation paradigm to vector space secret sharing. Experimental results demonstrate that Ruyi is configurable with multiple parties and outperforms pMPL by up to 53.87 ×, 13.91 ×, and 2.76 × for linear regression, logistic regression, and neural networks, respectively. © 2005-2012 IEEE.
引用
下载
收藏
页码:10355 / 10370
相关论文
共 50 条
  • [1] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [2] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [3] Secure Multi-Party Computation Framework in Decentralized Federated Learning for Histopathology Images
    Hosseini, Seyedeh Maryam
    Babaie, Morteza
    Tizhoosh, Hamid
    LABORATORY INVESTIGATION, 2023, 103 (03) : S1293 - S1294
  • [4] A brief survey on secure multi-party computing in the presence of rational parties
    Wang, Yilei
    Li, Tao
    Qin, Hairong
    Li, Jin
    Gao, Wei
    Liu, Zhe
    Xu, Qiuliang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (06) : 807 - 824
  • [5] A brief survey on secure multi-party computing in the presence of rational parties
    Yilei Wang
    Tao Li
    Hairong Qin
    Jin Li
    Wei Gao
    Zhe Liu
    Qiuliang Xu
    Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 807 - 824
  • [6] An Efficient Protocol for the Secure Multi-party Quantum Summation
    Xiu-Bo Chen
    Gang Xu
    Yi-Xian Yang
    Qiao-Yan Wen
    International Journal of Theoretical Physics, 2010, 49 : 2793 - 2804
  • [7] Rabbit: Efficient Comparison for Secure Multi-Party Computation
    Makri, Eleftheria
    Rotaru, Dragos
    Vercauteren, Frederik
    Wagh, Sameer
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 249 - 270
  • [8] An efficient and secure protocol for multi-party key establishment
    Horng, G
    COMPUTER JOURNAL, 2001, 44 (05): : 463 - 470
  • [9] An Efficient Protocol for the Secure Multi-party Quantum Summation
    Chen, Xiu-Bo
    Xu, Gang
    Yang, Yi-Xian
    Wen, Qiao-Yan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2010, 49 (11) : 2793 - 2804
  • [10] Efficient secure multi-party computation - (Extended abstract)
    Hirt, M
    Maurer, U
    Przydatek, B
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 143 - 161