2020
DOI: 10.48550/arxiv.2012.05433
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Communication-Computation Efficient Secure Aggregation for Federated Learning

Abstract: Federated learning has been spotlighted as a way to train neural networks using data distributed over multiple nodes without the need for the nodes to share data. Unfortunately, it has also been shown that data privacy could not be fully guaranteed as adversaries may be able to extract certain information on local data from the model parameters transmitted during federated learning. A recent solution based on the secure aggregation primitive enabled privacypreserving federated learning, but at the expense of s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
51
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(52 citation statements)
references
References 24 publications
0
51
0
1
Order By: Relevance
“…This protocol incurs a significant communication cost due to exchanging and reconstructing the pairwise keys. Recently, several works have developed communication-efficient exchange protocols [6,7,9,14,15], which are complementary to and can be combined with our work. Another line of work focused on designing partial user selection strategies to overcome the communication bottleneck in FL while speeding up the convergence by selecting the users based on their local loss [10,11,12,13].…”
Section: Related Workmentioning
confidence: 99%
“…This protocol incurs a significant communication cost due to exchanging and reconstructing the pairwise keys. Recently, several works have developed communication-efficient exchange protocols [6,7,9,14,15], which are complementary to and can be combined with our work. Another line of work focused on designing partial user selection strategies to overcome the communication bottleneck in FL while speeding up the convergence by selecting the users based on their local loss [10,11,12,13].…”
Section: Related Workmentioning
confidence: 99%
“…A secure aggregation protocol for Federated Learning was first outlined in [2] with the full details published in [4] (referred to as the BON protocol below), and then extended in [6] and [5].…”
Section: Related Workmentioning
confidence: 99%
“…In [6] the authors also recognize the scalability and computational complexity of the BON protocol and improve on it by splitting up the aggregation across subgraphs. Such subgraph splitting could also be applied on top of our protocol, and our subgroup feature does exactly that.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations