Unity Network
  • Unity Network
    • Introduction
    • Unity Network FL Architecture
    • Data Security
    • Case Study
      • Flashback Overview
      • Registration
      • Integration
      • Model Training
      • Objectives and Outcomes
  • Unity Network SDK
    • Key Features
    • Registration
    • Node Setup
    • SDK Integration
      • Wallet Module
      • Node Module
  • Permissions Management
    • User Permissions
  • Model Training
    • Organization registration
    • Model Training Requests
    • Secure Training and Updates
      • Model Training
        • Model Loading and Initialization
        • Data Loading
        • Training
      • Secure Transmission of Encrypted Updates
        • ECDH Key Exchange for Secure Encryption Key Generation
        • Encrypt and Transmit Model Updates
        • Secure Aggregation and Decryption at Central Server
        • Distribute Updated Model and Continue Training
      • Sharing Model Updates with the Model Owner and Verifying Authenticity of Training
        • Construct the Merkle Tree and Commit to the Merkle Root
        • Log Hashes of Accessed Dataset Chunks During Training
        • Transmission of Model Updates, Merkle Proofs, and Hash Log to the Model Owner
        • Verification by the Model Owner
  • Training rewards
    • Incentivization Process
Powered by GitBook
On this page
  1. Model Training
  2. Secure Training and Updates
  3. Secure Transmission of Encrypted Updates

Encrypt and Transmit Model Updates

  1. Model Update Generation:

    • Each node generates model updates (gradients or weights) after completing an epoch of training on local data.

  2. Encryption of Model Updates:

    • The model updates are encrypted using the symmetric encryption key derived from the ECDH shared secret. This encryption step ensures that updates remain secure in transit.

  3. Metadata for Secure Aggregation:

    • Along with the encrypted updates, metadata (e.g., node ID, epoch number) is transmitted to ensure the server can properly track and aggregate updates.

  4. Transmission of Encrypted Updates:

    • The encrypted model updates, along with metadata and initialization vector (IV), are securely transmitted to Unity Network’s central server.

PreviousECDH Key Exchange for Secure Encryption Key GenerationNextSecure Aggregation and Decryption at Central Server

Last updated 7 months ago