Secure Multiplicative Aggregation and Key-Reuse Optimization: Achieving Dropout Resilience with Amortized Efficiency
Abstract
1. Introduction
Our Main Contribution
2. Preliminaries
2.1. Secret Sharing
2.2. Key Agreement
2.3. Bilinear Map
3. Model Statement
4. Secure Multiplicative Aggregation
4.1. Intuition
4.2. Secure Multiplicative Aggregation Protocol




4.3. Analysis of Theoretical Overhead
- –
- The computation cost for a user, u, of our protocol contains: (i) computing two vectors and associated with a private input vector, (ii) performing key agreements with other users, (iii) creating t-out-of-n secret sharing of and , (iv) generating and using and , and also computing and . Each user’s total computation cost is .
- –
- The communication cost for a user u contains: (i) sending their public keys, , and receiving (from the server) other users’ public keys, (ii) sending encrypted secret shares, , and receiving from the server, (iii) sending masked input vectors, and , to the server, and (iv) sending the server decrypted secret shares and . Each user’s total communication cost is .
- –
- The storage cost for a user u contains: (i) storing private input vector and two vectors derived from it and (ii) storing all users’ public keys, their own private keys and encrypted secret shares . Each user’s total storage cost is .
- –
- The computation cost for the server of our protocol contains: (i) reconstructing t-out-of-n secrets (one for each user) using Lagrange interpolation, (ii) computing the masks and , obtaining and , and finally outputting . The server’s total computation cost is . Note that, in general, the reconstructions of secrets by Lagrange interpolation require computation, as, for any secret reconstruction , the server needs to computewhich costs computation. Actually, in our protocol, where every user has identity fixed at the very beginning, the total time to reconstruct all secrets can be reduced, as the set is always . The server only needs to precompute the Lagrange basis polynomials (values at 0 of the polynomials)which costs in computation, and then perform linear computation to reconstruct secrets. In this way, reconstructions take time.
- –
- The communication cost for the server contains: (i) sending and receiving messages between users as the mediation, (ii) receiving the masked input vectors and sent by user u, and also the decrypted secret shares. The server’s total communication cost is .
- –
- The storage cost for the server contains: (i) storing all users’ public keys, (ii) storing decrypted secret shares sent by users, and (iii) storing masked input vectors and , so as to do addition or multiplication. The server’s total storage cost is .
5. Key Reusable Secure Aggregation
5.1. Key Reusable Secure Additive Aggregation




5.2. Key Reusable Secure Multiplicative Aggregation
5.3. Discussion
6. Experimental
- Key Agreement: The Elliptic Curve Diffie–Hellman (ECDH) protocol was implemented using the NIST P-256 curve.
- Hash Function: SHA-256 was employed to hash the shared key.
- Secret Sharing Scheme: A t-out-of-n Shamir Secret Sharing scheme was utilized, where .
- Authenticated Encryption: AES-GCM with 128-bit keys was applied.
- Pseudo-Random Number Generator: AES-128 in counter mode was used.
- Bilinear map: Type A pairing implemented in the PBC library (https://pkg.go.dev/github.com/nik-u/pbc, accessed date 3 February 2026).
- User Data: Each user’s private data was represented as a vector of dimension m.
- Module: The modulus R is defined as the smallest prime greater than , which is 1,048,583, and the modulus q is the smallest prime greater than , namely 1,099,511,627,791.
6.1. Secure Multiplicative Aggregation Protocol
- Scenario 1:
- In this scenario, the size of the user input privacy data is fixed at while the number of users increases. We measured the average computation time overhead and communication overhead for each user and server, with the number of users set to and user dropout rate to .
- Scenario 2:
- In this scenario, the number of users was fixed at 300. We evaluated the average computation time and communication overhead for each user and the server by varying the size of privacy-sensitive data inputs. The input sizes were set to , and the user dropout rates were set to .
6.2. Key Reusable Secure Additive Aggregation
- Scenario 1:
- Each user’s private input was fixed at . The number of users ranged from 100 to 500 in increments of 50, under dropout rates of . We measured the average computation time and communication overhead per-user and server.
- Scenario 2:
- In this scenario, the number of users is fixed at 100, with each input again sized at . Dropout rates were set to . We conducted a comparative experiment between reusable and non-reusable additive aggregation protocols, with each protocol performing secure aggregation iterations. The reusable protocol executes Round 1 only once in the first iteration (i.e., ) and reuses subsequent Round 2–4 in the remaining iterations (i.e., ), whereas the non-reusable protocol repeats the full protocol each iteration. We also evaluated the average computation time and communication overhead for per-user and server.
6.3. Practical Implications and Applicability
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Appendix A. Preliminaries
Appendix A.1. Authenticated Encryption
Appendix A.2. Pseudorandom Generator
Appendix B. Lemmas Used in Security Proofs
Appendix C. Proof of Theorem 2
Appendix D. Proof of Theorem 4
Appendix E. Proof of Theorem 5
Appendix F. Proof of Theorem 7
Appendix G. Key Reusable Secure Multiplicative Aggregation




References
- Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical secure aggregation for federated learning on user-held data. arXiv 2016, arXiv:1611.04482. [Google Scholar] [CrossRef]
- Yao, A.C.C. How to generate and exchange secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (Sfcs 1986); IEEE: Piscataway, NJ, USA, 1986; pp. 162–167. [Google Scholar]
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Ben-Or, M.; Goldwasser, S.; Wigderson, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali; ACM: New York, NY, USA, 2019; pp. 351–371. [Google Scholar]
- Goldreich, O.; Micali, S.; Wigderson, A. How to play any mental game, or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali; ACM: New York, NY, USA, 2019; pp. 307–328. [Google Scholar]
- Nielsen, J.B.; Nordholt, P.S.; Orlandi, C.; Burra, S.S. A new approach to practical active-secure two-party computation. In Proceedings of the Annual Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 2012; pp. 681–700. [Google Scholar]
- Damgård, I.; Pastro, V.; Smart, N.; Zakarias, S. Multiparty computation from somewhat homomorphic encryption. In Proceedings of the Annual Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 2012; pp. 643–662. [Google Scholar]
- Beaver, D.; Micali, S.; Rogaway, P. The round complexity of secure protocols. In Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing; ACM: New York, NY, USA, 1990; pp. 503–513. [Google Scholar]
- Beerliová-Trubíniová, Z.; Hirt, M. Perfectly-secure MPC with linear communication complexity. In Proceedings of the Theory of Cryptography Conference; Springer: Berlin/Heidelberg, Germany, 2008; pp. 213–230. [Google Scholar]
- Joye, M.; Libert, B. A scalable scheme for privacy-preserving aggregation of time-series data. In Proceedings of the International Conference on Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2013; pp. 111–125. [Google Scholar]
- Leontiadis, I.; Elkhiyaoui, K.; Molva, R. Private and dynamic time-series data aggregation with trust relaxation. In Proceedings of the International Conference on Cryptology and Network Security; Springer: Berlin/Heidelberg, Germany, 2014; pp. 305–320. [Google Scholar]
- Halevi, S.; Lindell, Y.; Pinkas, B. Secure computation on the web: Computing without simultaneous interaction. In Proceedings of the Annual Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 2011; pp. 132–150. [Google Scholar]
- Gentry, C. A Fully Homomorphic Encryption Scheme; Stanford University: Stanford, CA, USA, 2009. [Google Scholar]
- Dwork, C.; McSherry, F.; Nissim, K.; Smith, A. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Theory of Cryptography Conference; Springer: Berlin/Heidelberg, Germany, 2006; pp. 265–284. [Google Scholar]
- McMahan, H.B.; Ramage, D.; Talwar, K.; Zhang, L. Learning Differentially Private Recurrent Language Models. In Proceedings of the International Conference on Learning Representations, Singapore, 24–28 April 2018. [Google Scholar]
- Geyer, R.C.; Klein, T.; Nabi, M. Differentially private federated learning: A client level perspective. arXiv 2017, arXiv:1712.07557. [Google Scholar]
- Wei, K.; Li, J.; Ding, M.; Ma, C.; Yang, H.H.; Farokhi, F.; Jin, S.; Quek, T.Q.; Poor, H.V. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3454–3469. [Google Scholar] [CrossRef]
- Shi, E.; Chan, T.H.H.; Rieffel, E.; Chow, R.; Song, D. Privacy-Preserving Aggregation of Time-Series Data. In Annual Network and Distributed System Security Symposium; Internet Society: Reston, VA, USA, 2011. [Google Scholar]
- Chan, T.H.H.; Shi, E.; Song, D. Privacy-preserving stream aggregation with fault tolerance. In Proceedings of the International Conference on Financial Cryptography and Data Security; Springer: Berlin/Heidelberg, Germany, 2012; pp. 200–214. [Google Scholar]
- Corrigan-Gibbs, H.; Wolinsky, D.I.; Ford, B. Proactively accountable anonymous messaging in verdict. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 13); European Commission: Brussel, Belgium, 2013; pp. 147–162. [Google Scholar]
- Kwon, Y.H. Riffle: An efficient communication system with strong anonymity. In Proceedings on Privacy Enhancing Technologies; Walter de Gruyter GmbH: Berlin, Germany, 2015. [Google Scholar]
- Ács, G.; Castelluccia, C. I have a dream!(differentially private smart metering). In Proceedings of the International Workshop on Information Hiding; Springer: Berlin/Heidelberg, Germany, 2011; pp. 118–132. [Google Scholar]
- Diffie, W.; Hellman, M.E. New directions in cryptography. In Secure Communications and Asymmetric Cryptosystems; Routledge: London, UK, 2019; pp. 143–180. [Google Scholar]
- Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; ACM: New York, NY, USA, 2017; pp. 1175–1191. [Google Scholar]
- So, J.; Güler, B.; Avestimehr, A.S. Turbo-aggregate: Breaking the quadratic aggregation barrier in secure federated learning. IEEE J. Sel. Areas Inf. Theory 2021, 2, 479–489. [Google Scholar] [CrossRef]
- Bell, J.H.; Bonawitz, K.A.; Gascón, A.; Lepoint, T.; Raykova, M. Secure single-server aggregation with (poly) logarithmic overhead. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security; ACM: New York, NY, USA, 2020; pp. 1253–1269. [Google Scholar]
- Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 2001; pp. 213–229. [Google Scholar]
- Bellare, M.; Namprempre, C. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security; Springer: Berlin/Heidelberg, Germany, 2000; pp. 531–545. [Google Scholar]
- Blum, M.; Micali, S. How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput. 1984, 13, 850–864. [Google Scholar] [CrossRef]








| Parameters | Description |
|---|---|
| n | the number of online users at the beginning of protocol execution |
| t | threshold parameter of secret sharing |
| security parameter | |
| correctness parameter | |
| the space of users’ private input vectors | |
| the field of secret sharing, the space of secret keys in key agreement scheme | |
| the space of auxiliary vectors (which are used as inputs in secure aggregation) | |
| a cyclic group with order p and a generator g, the space of public keys in key agreement scheme | |
| a cyclic group with order p and a generator , the output space of bilinear map | |
| U | the set of original users |
| the set of users whose message has been received by the server in ith round of the aggregation protocol | |
| the set of users whose message has been received by the server in ith round of jth secure additive/multiplicative aggregation protocol |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Cai, H.; Liang, B.; Qin, Y.; Ding, J. Secure Multiplicative Aggregation and Key-Reuse Optimization: Achieving Dropout Resilience with Amortized Efficiency. Entropy 2026, 28, 358. https://doi.org/10.3390/e28030358
Cai H, Liang B, Qin Y, Ding J. Secure Multiplicative Aggregation and Key-Reuse Optimization: Achieving Dropout Resilience with Amortized Efficiency. Entropy. 2026; 28(3):358. https://doi.org/10.3390/e28030358
Chicago/Turabian StyleCai, Hongyuan, Bei Liang, Yue Qin, and Jintai Ding. 2026. "Secure Multiplicative Aggregation and Key-Reuse Optimization: Achieving Dropout Resilience with Amortized Efficiency" Entropy 28, no. 3: 358. https://doi.org/10.3390/e28030358
APA StyleCai, H., Liang, B., Qin, Y., & Ding, J. (2026). Secure Multiplicative Aggregation and Key-Reuse Optimization: Achieving Dropout Resilience with Amortized Efficiency. Entropy, 28(3), 358. https://doi.org/10.3390/e28030358

