Practical Secure Aggregation by Combining Cryptography and Trusted Execution Environments

📅 2025-04-11
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Pure cryptographic approaches—such as fully homomorphic encryption (FHE)—for secure aggregation in mutually distrustful multi-party settings suffer from prohibitive computational overhead, hindering practical deployment. Method: This paper proposes a hybrid secure aggregation architecture integrating cryptography and trusted execution environments (TEEs), systematically designing and analyzing a layered, end-to-end trustworthy computing pipeline that synergistically combines secure multi-party computation (MPC), secret sharing, zero-knowledge proofs, and Intel SGX/ARM TrustZone. The scheme is rigorously formulated under the malicious adversary model. Contribution/Results: It achieves provably balanced security-performance trade-offs: over 100× faster than state-of-the-art FHE-based aggregation, while supporting real-time federated aggregation over million-scale datasets. Extensive experiments validate its practicality, robustness, and feasibility for real-world deployment.

Technology Category

Application Category

📝 Abstract
Secure aggregation enables a group of mutually distrustful parties, each holding private inputs, to collaboratively compute an aggregate value while preserving the privacy of their individual inputs. However, a major challenge in adopting secure aggregation approaches for practical applications is the significant computational overhead of the underlying cryptographic protocols, e.g. fully homomorphic encryption. This overhead makes secure aggregation protocols impractical, especially for large datasets. In contrast, hardware-based security techniques such as trusted execution environments (TEEs) enable computation at near-native speeds, making them a promising alternative for reducing the computational burden typically associated with purely cryptographic techniques. Yet, in many scenarios, parties may opt for either cryptographic or hardware-based security mechanisms, highlighting the need for hybrid approaches. In this work, we introduce several secure aggregation architectures that integrate both cryptographic and TEE-based techniques, analyzing the trade-offs between security and performance.
Problem

Research questions and friction points this paper is trying to address.

Reducing computational overhead in secure aggregation
Integrating cryptographic and TEE-based security methods
Balancing security and performance in hybrid approaches
Innovation

Methods, ideas, or system contributions that make the work stand out.

Combines cryptography with trusted execution environments
Reduces computational overhead via hybrid approach
Balances security and performance in aggregation
🔎 Similar Papers
No similar papers found.
R
Romain de Laage
University of Neuchâtel, Switzerland
P
Peterson Yuhala
University of Neuchâtel, Switzerland
F
Franccois-Xavier Wicht
University of Bern, Switzerland
Pascal Felber
Pascal Felber
Professor of Computer Science, University of Neuchâtel
Distributed SystemsDependabilityConcurrent Programming
Christian Cachin
Christian Cachin
University of Bern, Cryptology and Data Security Group
cryptographydistributed systemssecurity
V
V. Schiavoni
University of Neuchâtel, Switzerland