Differentially Private Secure Multiplication with Erasures and Adversaries

📅 2025-04-29
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the challenge of secure distributed multiplication under the “honest minority” regime (N ≤ 2T), where conventional schemes like Shamir secret sharing fail due to their reliance on honest-majority assumptions. Method: We propose the first polynomial coding framework integrating Reed–Solomon (RS) codes with differential privacy, enabling robust computation against up to T colluding adversaries, data erasures, and Byzantine corruptions. Our approach embeds RS-based erasure and adversarial resilience into real-valued polynomial encoding, augmented by an enhanced Berlekamp–Welch decoding procedure and Shamir secret sharing to support dynamic detection and isolation of malicious nodes. Contribution/Results: The scheme achieves ε-differential privacy with low mean-squared error, breaking the honest-majority dependency while preserving computational efficiency. Theoretical analysis shows its privacy–utility trade-off asymptotically approaches the information-theoretic inverse bound. This establishes a new paradigm for robust, privacy-preserving secure computation under honest-minority assumptions.

Technology Category

Application Category

📝 Abstract
We consider a private distributed multiplication problem involving N computation nodes and T colluding nodes. Shamir's secret sharing algorithm provides perfect information-theoretic privacy, while requiring an honest majority, i.e., N ge 2T + 1. Recent work has investigated approximate computation and characterized privacy-accuracy trade-offs for the honest minority setting N le 2T for real-valued data, quantifying privacy leakage via the differential privacy (DP) framework and accuracy via the mean squared error. However, it does not incorporate the error correction capabilities of Shamir's secret-sharing algorithm. This paper develops a new polynomial-based coding scheme for secure multiplication with an honest minority, and characterizes its achievable privacy-utility tradeoff, showing that the tradeoff can approach the converse bound as closely as desired. Unlike previous schemes, the proposed scheme inherits the capability of the Reed-Solomon (RS) code to tolerate erasures and adversaries. We utilize a modified Berlekamp-Welch algorithm over the real number field to detect adversarial nodes.
Problem

Research questions and friction points this paper is trying to address.

Develops polynomial coding for secure multiplication with honest minority
Characterizes privacy-utility tradeoff approaching converse bound
Enables erasure/adversary tolerance via modified Berlekamp-Welch algorithm
Innovation

Methods, ideas, or system contributions that make the work stand out.

Polynomial-based coding for secure multiplication
Modified Berlekamp-Welch detects adversaries
Tolerates erasures and adversaries like RS codes
🔎 Similar Papers
No similar papers found.
Haoyang Hu
Haoyang Hu
Master Student at The University of Hong Kong
Trustworthy LLMAI for Security
V
V. Cadambe
School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, 30332 USA