Privacy-Preserving QGen Protocol
- The protocol achieves end-to-end encrypted projected dual ascent for strictly convex quadratic programs using Paillier and DGK methods.
- It ensures simulation-based composable security in a semi-honest model with encrypted inputs that remain computationally indistinguishable from random.
- The methodology integrates secure iterative gradient computation and multi-party protocols, balancing privacy guarantees with computational efficiency.
Privacy-preserving QGen denotes a cloud-based protocol for quadratic optimization in distributed control systems where sensitive inputs must remain confidential, blending projected gradient ascent with additively homomorphic encryption and secure multi-party computation. The approach ensures that private data held by multiple parties is computationally indistinguishable from random, aside from what can be inferred through prescribed inputs and outputs, as formalized via simulation-based composable security in the semi-honest model. The protocol achieves end-to-end encrypted projected dual ascent for strictly convex quadratic programs with linear constraints, utilizing the Paillier cryptosystem and DGK secure comparison methods (Alexandru et al., 2018).
1. Mathematical Formulation and Lagrange Dual Structure
The protocol targets strict convex quadratic programs of the form
with , , , and . Provided Slater’s condition, strong duality is assured. The associated Lagrange dual problem is
with dual gradient
and primal solution at the dual optimum (Alexandru et al., 2018).
2. Encrypted Dual Projected Gradient Ascent
Projected gradient ascent is implemented by iterating
where applies coordinatewise projection , and is typically set as . Linear convergence ensues when is positive definite. All vector arithmetic is performed in Paillier-encrypted form, denoted (Alexandru et al., 2018).
At each iteration, encrypted agent inputs , are held by the cloud alongside . The cloud computes
where and denote homomorphic scalar multiplication and addition, respectively, under Paillier (Alexandru et al., 2018).
3. Homomorphic Cryptosystem and Secure Subroutines
Encryption employs Paillier keys with semantic security; for message , ciphertext is . Homomorphic operations support:
- Addition:
- Scalar multiplication:
Additionally, one-time-pad masking (with random ) offers statistical privacy (Alexandru et al., 2018).
The critical non-linear projection step is performed in encrypted domain using multi-party protocols:
- Protocol 1 (Randomization): Permutes randomly so parties cannot distinguish order.
- Protocol 2 (DGK Comparison): DGK cryptosystem allows the cloud and target to securely compare encrypted values; target learns bit .
- Protocol 3 (Secure Update): Cloud blinds , target re-encrypts the correct value (chosen by ), cloud unblinds to get .
Each coordinate is updated securely, preventing leakage of unencrypted intermediate results (Alexandru et al., 2018).
4. Multi-party Protocol Workflow and End-to-End Flow
The protocol involves agents () supplying encrypted to a non-colluding cloud () equipped with . The target () generates and distributes Paillier and DGK keys. Iterative protocol steps are:
- Setup: Target creates keys; public parameters disseminated.
- Input Encryption: Each agent encrypts under and forwards to cloud.
- Initialization: Cloud selects random and step-size .
- Encrypted Iterations: For , cloud and target execute randomized comparison and update protocols for each coordinate.
- Primal Reconstruction: Cloud computes using , transmits to target, which decrypts (Alexandru et al., 2018).
All communications are authenticated. Parties are assumed semi-honest, i.e., honest-but-curious.
5. Simulation-based Privacy Definition and Security Analysis
Privacy is formalized using simulation-based security against semi-honest adversaries following Goldreich (2004): for any coalition , there exists probabilistic polynomial time simulator yielding a view indistinguishable from the real protocol—given only coalition's private inputs and prescribed outputs.
- Messages exchanged between cloud and target are Paillier-encrypted or masked.
- Ciphertexts re-randomized at each iteration, preventing linkage across rounds.
- DGK comparison leaks only a single comparison bit per coordinate.
- Proofs detail indistinguishability conditioned on cryptosystem security and proper blinding, establishing two-party and agent-coalition security when cloud and target do not collude (Alexandru et al., 2018).
6. Computational and Communication Complexity
Let be problem dimension, constraints, bit-length, Paillier key size. Per iteration, computational costs involve:
- scalar-encrypted multiplications, ciphertext additions for dual gradient.
- DGK comparisons per constraint, Paillier ops for secure update.
- Three cryptographic/messaging rounds per iteration.
Communication per iteration is ciphertexts (each size) between cloud and target. Total runtime scales with ($20$–$50$ iterations typical), , and homomorphic cost (Alexandru et al., 2018).
A lightweight protocol variant omits secure comparison: cloud masks and sends in plaintext (with random multiplier), target applies local , returns re-encrypted result. Privacy is reduced (target learns sign of ), but resource overheads decrease to a single round and ciphertexts/iter (Alexandru et al., 2018).
7. Pseudocode and Numerical Example
A stepwise protocol, labeled "Protocol 4: Privacy-Preserving QGen," covers setup, encryption, iteration, and reconstruction steps. A toy numerical example (, , , , , ) demonstrates encrypted gradient updates and secure comparisons over two rounds, resulting in correct encrypted decryption for (Alexandru et al., 2018).
| Step | Main Operations | Privacy Guarantees |
|---|---|---|
| Input setup | Key generation, data encryption | Paillier/DGK semantic security |
| Iteration | Encrypted gradient eval, randomized compare/update | Masking, indistinguishability |
| Reconstruction | Encrypted output recovery, final decryption | Inputs not revealed |
This tabular summary encapsulates the principal workflow and privacy features.
8. Limitations and Extensions
The protocol’s privacy holds against non-colluding parties and semi-honest adversaries, with cryptographic leakage bounded to comparison bits. A trade-off exists between privacy and computational efficiency in lightweight variants. Extending to malicious adversaries or reducing reliance on trust assumptions remains an open direction. Applications include large-scale distributed control, encrypted quadratic optimization, and other privacy-critical multi-agent settings (Alexandru et al., 2018).