Search papers, labs, and topics across Lattice.
This paper analyzes the security of threshold Ring Learning With Errors (RLWE)-based Homomorphic Encryption (HE) schemes, specifically BFV and CKKS, when used for private federated average aggregation. It addresses vulnerabilities arising from decryption oracle access in Federated Learning (FL) settings. The study finds that CKKS-based aggregations perform comparably to BFV-based solutions and examines the performance impact of using smudging noise as a defense.
Smudging noise with large variance can mitigate security vulnerabilities in threshold HE schemes for federated learning, but at a performance cost that needs careful consideration.
Threshold Homomorphic Encryption (Threshold HE) is a good fit for implementing private federated average aggregation, a key operation in Federated Learning (FL). Despite its potential, recent studies have shown that threshold schemes available in mainstream HE libraries can introduce unexpected security vulnerabilities if an adversary has access to a restricted decryption oracle. This oracle reflects the FL clients' capacity to collaboratively decrypt the aggregated result without knowing the secret key. This work surveys the use of threshold RLWE-based HE for federated average aggregation and examines the performance impact of using smudging noise with a large variance as a countermeasure. We provide a detailed comparison of threshold variants of BFV and CKKS, finding that CKKS-based aggregations perform comparably to BFV-based solutions.