defense 2025

EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable Secret-sharing in Distributed Privacy-preserving Machine Learning

Zhen Li 1, Zijian Zhang 1, Wenjin Yang 1, Pengbo Wang 1, Zhaoqi Wang 1, Yan Wu 1, Xuyang Liu 1,2, Jing Sun 2

0 citations

α

Published on arXiv

2509.12899

Data Poisoning Attack

OWASP ML Top 10 — ML02

Key Finding

EByFTVeS provably eliminates the ACuMPA attack vector and achieves superior computational efficiency compared to state-of-the-art VSS-based DPML schemes in empirical evaluations.

EByFTVeS / ACuMPA

Novel technique introduced


Verifiable Secret Sharing (VSS) has been widespread in Distributed Privacy-preserving Machine Learning (DPML), because invalid shares from malicious dealers or participants can be recognized by verifying the commitment of the received shares for honest participants. However, the consistency and the computation and communitation burden of the VSS-based DPML schemes are still two serious challenges. Although Byzantine Fault Tolerance (BFT) system has been brought to guarantee the consistency and improve the efficiency of the existing VSS-based DPML schemes recently, we explore an Adaptive Share Delay Provision (ASDP) strategy, and launch an ASDP-based Customized Model Poisoning Attack (ACuMPA) for certain participants in this paper. We theoretically analyzed why the ASDP strategy and the ACuMPA algorithm works to the existing schemes. Next, we propose an [E]fficient [By]zantine [F]ault [T]olerant-based [Ve]rifiable [S]ecret-sharing (EByFTVeS) scheme. Finally, the validity, liveness, consistency and privacy of the EByFTVeS scheme are theoretically analyzed, while the efficiency of the EByFTVeS scheme outperforms that of the-state-of-art VSS scheme according to comparative experiment results.


Key Contributions

  • Formally defines the Adaptive Share Delay Provision (ASDP) timing-based vulnerability in BFT-integrated VSS schemes, proving fabricated shares are accepted by honest participants
  • Introduces ACuMPA, a customized model poisoning attack that exploits ASDP to inject tailored malicious gradients that evade cosine-similarity filtering defenses
  • Proposes EByFTVeS, a BFT consensus-driven VSS scheme that enforces strict temporal locking of share commitments, eliminating the timing window required for ACuMPA while outperforming state-of-the-art VSS in computational efficiency

🛡️ Threat Analysis

Data Poisoning Attack

ACuMPA is a Byzantine poisoning attack where a malicious dealer exploits timing asymmetry (ASDP) to inject crafted gradient shares during distributed training, corrupting global model aggregation while bypassing cosine-similarity defenses. EByFTVeS defends via BFT consensus-enforced synchronization of share commitments — a robust aggregation defense against malicious participants in distributed/federated ML training.


Details

Domains
federated-learning
Model Types
federated
Threat Tags
training_timewhite_boxtargeted
Applications
distributed privacy-preserving machine learningsecure gradient aggregation