Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework with Privileged Parties

被引:0
|
作者
Song, Lushan [1 ]
Wang, Zhexuan [1 ]
Lin, Guopeng [1 ]
Han, Weili [1 ]
机构
[1] Fudan University, School of Computer Science, Shanghai,10246, China
基金
中国国家自然科学基金;
关键词
Contrastive Learning - Differential privacy - Federated learning - Privacy-preserving techniques - Self-supervised learning - Vector spaces;
D O I
10.1109/TIFS.2024.3488507
中图分类号
学科分类号
摘要
Secure multi-party learning (MPL) enables multiple parties to train machine learning models with privacy preservation. MPL frameworks typically follow the peer-to-peer architecture, where each party has the same chance to handle the results. However, the cooperative parties in business scenarios usually have unequal statuses. Thus, Song et al. (CCS'22) presented pMPL, a hierarchical MPL framework with a privileged party. Nonetheless, pMPL has two limitations: (i) it has limited configurability requiring manually finding a public matrix that satisfies four constraints, which is difficult when the number of parties increases, and (ii) it is inefficient due to the huge online communication overhead. In this paper, we are motivated to propose Ruyi, a configurable and efficient MPL framework with privileged parties. Firstly, we reduce the public matrix constraints from four to two while ensuring the same privileged guarantees by extending the standard resharing paradigm to vector space secret sharing in order to implement the share conversion protocol and performing all the computations over a prime field rather than a ring. This enhances the configurability so that the Vandermonde matrix can always satisfy the public matrix constraints when given the number of parties, including privileged parties, assistant parties, and assistant parties allowed to drop out. Secondly, we reduce the online communication overhead by adapting the masked evaluation paradigm to vector space secret sharing. Experimental results demonstrate that Ruyi is configurable with multiple parties and outperforms pMPL by up to 53.87 ×, 13.91 ×, and 2.76 × for linear regression, logistic regression, and neural networks, respectively. © 2005-2012 IEEE.
引用
下载
收藏
页码:10355 / 10370
相关论文
共 50 条
  • [21] CostCO: An automatic cost modeling framework for secure multi-party computation
    Fang, Vivian
    Brown, Lloyd
    Lin, William
    Zheng, Wenting
    Panda, Aurojit
    Popa, Raluca Ada
    2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 140 - 153
  • [22] Efficient Data Collaboration Using Multi-Party Privacy Preserving Machine Learning Framework
    Salam, Abdu
    Abrar, Mohammad
    Ullah, Faizan
    Khan, Izaz Ahmad
    Amin, Farhan
    Choi, Gyu Sang
    IEEE ACCESS, 2023, 11 : 138151 - 138164
  • [23] Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice
    Breuer, Malte
    Meyer, Ulrike
    Wetzel, Susanne
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [24] Secure Multi-party Differential Privacy
    Kairouz, Peter
    Oh, Sewoong
    Viswanath, Pramod
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 28 (NIPS 2015), 2015, 28
  • [25] Secure multi-party computational geometry
    Atallah, MJ
    Du, WL
    ALGORITHMS AND DATA STRUCTURES, 2001, 2125 : 165 - 179
  • [26] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [27] Nearly universal and efficient quantum secure multi-party computation protocol
    Han Yushan
    Che Bichen
    Liu Jiali
    Dou Zhao
    Di Junyu
    The Journal of China Universities of Posts and Telecommunications, 2022, 29 (04) : 51 - 68
  • [28] Concretely efficient secure multi-party computation protocols: survey and more
    Dengguo Feng
    Kang Yang
    Security and Safety, 2022, 1 (01) : 48 - 90
  • [29] Efficient Joint Random Number Generation for Secure Multi-party Computation
    Hoogerwerf, Erwin
    van Tetering, Daphne
    Bay, Asli
    Erkin, Zekeriya
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 436 - 443
  • [30] An efficient approach for secure multi-party computation without authenticated channel
    Duy-Hien Vu
    The-Dung Luong
    Tu-Bao Ho
    INFORMATION SCIENCES, 2020, 527 : 356 - 368