Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework with Privileged Parties

被引:0
|
作者
Song, Lushan [1 ]
Wang, Zhexuan [1 ]
Lin, Guopeng [1 ]
Han, Weili [1 ]
机构
[1] Fudan University, School of Computer Science, Shanghai,10246, China
基金
中国国家自然科学基金;
关键词
Contrastive Learning - Differential privacy - Federated learning - Privacy-preserving techniques - Self-supervised learning - Vector spaces;
D O I
10.1109/TIFS.2024.3488507
中图分类号
学科分类号
摘要
Secure multi-party learning (MPL) enables multiple parties to train machine learning models with privacy preservation. MPL frameworks typically follow the peer-to-peer architecture, where each party has the same chance to handle the results. However, the cooperative parties in business scenarios usually have unequal statuses. Thus, Song et al. (CCS'22) presented pMPL, a hierarchical MPL framework with a privileged party. Nonetheless, pMPL has two limitations: (i) it has limited configurability requiring manually finding a public matrix that satisfies four constraints, which is difficult when the number of parties increases, and (ii) it is inefficient due to the huge online communication overhead. In this paper, we are motivated to propose Ruyi, a configurable and efficient MPL framework with privileged parties. Firstly, we reduce the public matrix constraints from four to two while ensuring the same privileged guarantees by extending the standard resharing paradigm to vector space secret sharing in order to implement the share conversion protocol and performing all the computations over a prime field rather than a ring. This enhances the configurability so that the Vandermonde matrix can always satisfy the public matrix constraints when given the number of parties, including privileged parties, assistant parties, and assistant parties allowed to drop out. Secondly, we reduce the online communication overhead by adapting the masked evaluation paradigm to vector space secret sharing. Experimental results demonstrate that Ruyi is configurable with multiple parties and outperforms pMPL by up to 53.87 ×, 13.91 ×, and 2.76 × for linear regression, logistic regression, and neural networks, respectively. © 2005-2012 IEEE.
引用
下载
收藏
页码:10355 / 10370
相关论文
共 50 条
  • [41] Publicly Verifiable Secure Multi-Party Computation Framework Based on Bulletin Board
    Li, Xiaotong
    Wang, Hao
    Li, Zhi
    Wu, Lei
    Wei, Xiaochao
    Su, Ye
    Lu, Rongxing
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (04) : 1698 - 1711
  • [42] Secure k-skyband computation framework in distributed multi-party databases
    Qaosar, Mahboob
    Zaman, Asif
    Siddique, Md Anisuzzaman
    Li, Chen
    Morimoto, Yasuhiko
    INFORMATION SCIENCES, 2020, 515 : 388 - 403
  • [43] Multi-party privacy-preserving decision tree training with a privileged party
    Tong, Yiwen
    Feng, Qi
    Luo, Min
    He, Debiao
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (08)
  • [44] Garou: An Efficient and Secure Off-Blockchain Multi-Party Payment Hub
    Ye, Yongjie
    Ren, Zhifeng
    Luo, Xiapu
    Zhang, Jingjing
    Wu, Weigang
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (04): : 4450 - 4461
  • [45] Multi-party Quantum Secure Direct Communication
    Tan, Xiaoqing
    Zhang, Xiaoqian
    Liang, Cui
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 251 - 255
  • [46] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [47] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [48] SECURE MULTI-PARTY CONSENSUS GOSSIP ALGORITHMS
    Lazzeretti, Riccardo
    Horn, Steven
    Braca, Paolo
    Willett, Peter
    2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [49] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [50] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381