Privary Preserving Distributed Average Consensus via Homomorphic Encryption

We develop and analyze a distributed nonlinear iterative algorithm that enables the components of a multicomponent system, each with some integer initial value, to asymptotically reach average consensus on their initial values, without having to reveal to other components the specific value they contribute to the average calculation. In particular, we assume an arbitrary communication topology captured by a strongly connected digraph, in which certain nodes (components) might be curious but not malicious (i.e., they execute the proposed protocol correctly, but try to identify the initial values of other nodes). We first discuss how a distributed algorithm that operates exclusively on integer values can be used to obtain the average of the node values. We then describe how this algorithm can be adjusted using homomorphic encryption to allow the nodes to obtain the average of their initial values while ensuring their privacy, at least assuming the presence of a trusted node.

[1]  Shreyas Sundaram,et al.  Distributed function calculation and consensus using linear iterative strategies , 2008, IEEE Journal on Selected Areas in Communications.

[2]  M. Degroot Reaching a Consensus , 1974 .

[3]  Nitin H. Vaidya,et al.  Robust Distributed Average Consensus via Exchange of Running Sums , 2016, IEEE Transactions on Automatic Control.

[4]  Christoforos N. Hadjicostis,et al.  Distributed Averaging and Balancing in Network Systems , 2018 .

[5]  Geir E. Dullerud,et al.  Differentially private iterative synchronous consensus , 2012, WPES '12.

[6]  Paolo Braca,et al.  Secure multi-party consensus gossip algorithms , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[7]  George J. Pappas,et al.  Differential privacy in control and network systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[8]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[9]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[10]  B.H. Khalaj,et al.  Secure consensus averaging in sensor networks using random offsets , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[11]  Xiaoqiang Ren,et al.  Secure and privacy preserving average consensus , 2017, 2017 11th Asian Control Conference (ASCC).

[12]  Christoforos N. Hadjicostis,et al.  Distributed Averaging and Balancing in Network Systems: with Applications to Coordination and Control , 2018, Found. Trends Syst. Control..

[13]  John N. Tsitsiklis,et al.  Weighted Gossip: Distributed Averaging using non-doubly stochastic matrices , 2010, 2010 IEEE International Symposium on Information Theory.

[14]  Jonathan Katz,et al.  Privacy in Distributed Average Consensus , 2017 .

[15]  Johannes Gehrke,et al.  Gossip-based computation of aggregate information , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[16]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[17]  Christoforos N. Hadjicostis,et al.  Privacy-preserving asymptotic average consensus , 2013, 2013 European Control Conference (ECC).

[18]  Christoforos N. Hadjicostis,et al.  Average Consensus in the Presence of Delays in Directed Graph Topologies , 2014, IEEE Transactions on Automatic Control.

[19]  Jorge Cortes,et al.  Dynamic average consensus under limited control authority and privacy requirements , 2014, 1401.6463.

[20]  Ιωαννησ Τσιτσικλησ,et al.  PROBLEMS IN DECENTRALIZED DECISION MAKING AND COMPUTATION , 1984 .

[21]  Richard M. Murray,et al.  Privacy preserving average consensus , 2014, 53rd IEEE Conference on Decision and Control.

[22]  E. Seneta Non-negative Matrices and Markov Chains , 2008 .

[23]  Panagiotis Patrinos,et al.  Distributed computing over encrypted data , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[24]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.