Secure Multi-Party Computation (SMC) takes a cryptographic approach to achieving privacy, contrasting with methods like Differential Privacy which add noise. The primary goal of SMC in federated learning is to allow the central server to compute the aggregate of client updates (typically the sum or weighted average) without learning any individual client's update. Imagine multiple parties, each holding a private input (their model update ), wanting to compute a joint function (the sum ) without revealing their inputs to each other or to the aggregating server.
Many practical SMC protocols for secure aggregation rely on the concept of secret sharing. The general idea is to split each client's private update vector into multiple pieces, called shares. These shares are distributed in such a way that:
A common and relatively efficient technique for secure summation is additive secret sharing. Let's walk through a simplified protocol involving clients and a server, designed to compute without the server learning any .
Pairwise Mask Generation: Before sending updates, each pair of clients with needs to agree on a large random number (or vector) . This mask must be known only to clients and . This can be achieved using techniques like Diffie-Hellman key exchange to establish pairwise symmetric keys, which then seed pseudo-random number generators (PRNGs) on both clients to generate the same independently.
Client-Side Masking: Each client masks its update vector using the pairwise masks it shares with other clients. It computes a masked update :
Here, is a large integer defining the finite field or ring over which the computations are performed. The additions and subtractions are typically element-wise for vectors. Essentially, client adds masks it generated with clients having higher indices and subtracts masks generated by clients with lower indices.
Sending to Server: Each client sends only its masked update to the server.
Server-Side Aggregation: The server simply sums the masked updates it receives:
Mask Cancellation: Let's examine the sum . When the server sums the , every mask (where ) appears exactly twice: once positively in (from the term ) and once negatively in (from the term ). Therefore, all masks cancel each other out in the final sum:
Since every appears once positively and once negatively, the sum simplifies to:
The server obtains the exact sum without ever seeing any individual .
Interaction flow for secure aggregation using additive secret sharing. Clients establish pairwise secrets (dashed lines), mask their updates locally, and send masked updates (blue arrows) to the server. The server sums these, and the masks cancel out, revealing only the aggregate sum (yellow arrow).
This additive sharing scheme provides security against an honest-but-curious server. The server follows the protocol correctly but might try to infer information from the messages it receives (the ). Since is effectively plus a sum/difference of random values unknown to the server (as each involves a client ), reveals no information about to the server, assuming the masks are cryptographically random.
However, this basic scheme has limitations:
Shamir's Secret Sharing (SSS) is another foundational technique adaptable for SMC. In -SSS, a secret is split into shares such that any shares can reconstruct the secret, but shares reveal nothing. This can be used for aggregation by having clients share their updates using SSS. Aggregation can be performed on the shares (due to the homomorphic properties of polynomial interpolation used in SSS). SSS provides inherent robustness against up to dropouts (if clients successfully submit shares) and security against collusion of up to parties. However, SSS typically involves more complex operations (polynomial evaluation/interpolation) compared to simple additive sharing.
"Designing practical SMC-based FL systems involves carefully balancing security guarantees against computational and communication costs, and handling practical issues like client dropouts."
Was this section helpful?
© 2026 ApX Machine LearningEngineered with