pith. sign in

arxiv: 2604.23437 · v2 · pith:T3XG2TU4new · submitted 2026-04-25 · 💻 cs.CR · cs.LG

Scalable and Verifiable Federated Learning for Cross-Institution Financial Fraud Detection

Pith reviewed 2026-05-21 00:14 UTC · model grok-4.3

classification 💻 cs.CR cs.LG
keywords federated learningsecure aggregationfinancial fraud detectiondynamic shardingintegrity tagsdropout recoverycross-institution collaboration
0
0 comments X

The pith

Dynamic sharded federated learning cuts secure aggregation latency by 34 times while verifying updates for cross-bank fraud detection.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper presents Dynamic Sharded Federated Learning to let multiple banks train a shared fraud detection model without exchanging raw transaction data. It replaces expensive homomorphic encryption and O(N squared) key exchanges with dynamic stochastic sharding that splits participants into small fixed-size clusters plus linear integrity tags that verify update consistency without decryption. Experiments extrapolated from 10 simulated nodes to 1000 participants claim 34 times lower aggregation latency, 99 percent recovery under 20 percent dropouts, and 91.2 percent global fraud recall, well above the 68 percent average of local models. A sympathetic reader would care because fraud networks routinely cross bank boundaries yet current privacy methods remain too slow or unverifiable for real deployment. If the claims hold, collaborative detection becomes practical at institutional scale.

Core claim

DSFL partitions participants into cryptographically ephemeral clusters of fixed size m via Dynamic Stochastic Sharding, reducing communication complexity to O(N times m). Within each cluster, participants attach Linear Integrity Tags, additive-homomorphic commitments that let the server check update consistency without decrypting gradients. An Active Neighborhood Recovery protocol reconstructs masks for mid-round dropouts. On the ULB Credit Card Fraud Detection dataset with 10 simulated banking nodes, analytical extrapolation shows 34 times lower aggregation latency than Paillier-based secure aggregation at N=1000, 99 percent recovery fidelity under 20 percent dropout, and 91.2 percent plus

What carries the argument

Dynamic Stochastic Sharding, which partitions participants into small cryptographically ephemeral clusters of fixed size m, together with Linear Integrity Tags that serve as additive-homomorphic commitments for verifying update consistency without decryption.

If this is right

  • Aggregation at N=1000 becomes feasible in real time where prior secure methods were too slow.
  • Global fraud recall improves to 91.2 percent compared with 68 percent for isolated local models.
  • Inconsistent or malformed updates are detected by the server without decrypting the gradients.
  • 20 percent mid-round dropouts are handled with 99 percent mask recovery fidelity.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The O(N times m) scaling could extend the same sharding pattern to other privacy-sensitive federated tasks such as medical record analysis.
  • Verification that works without full decryption may reduce the need for trusted hardware in future cross-institution protocols.
  • If the linear tags catch consistency attacks reliably, they could be combined with existing differential privacy mechanisms without compounding overhead.

Load-bearing premise

The analytical extrapolation from empirical baselines on only 10 simulated nodes accurately predicts latency, recovery, and model performance at N=1000, and the proposed Linear Integrity Tags plus dynamic sharding deliver the claimed verification and security properties without hidden costs or failure modes.

What would settle it

Measure actual aggregation latency, recovery fidelity, and fraud recall when running the full DSFL protocol end-to-end with 1000 simulated or real nodes under 20 percent dropout and compare directly against a Paillier baseline on the same hardware and dataset.

Figures

Figures reproduced from arXiv: 2604.23437 by Nishant Nigam, Prajwal Panth.

Figure 1
Figure 1. Figure 1: Protocol Execution Workflow. A decision-logic view of the ag￾gregation round. The “Active Recovery” branch triggers only upon detecting network instability. A. Phase I: Dynamic Stochastic Sharding The fundamental bottleneck of traditional Secure Aggrega￾tion is the requirement for every user to establish a shared secret with every other user (N(N − 1)/2 keys). To achieve linear scalability, we introduce Dy… view at source ↗
Figure 2
Figure 2. Figure 2: DSFL System Architecture. The framework separates trusted Banking Nodes (Tier 1) from the untrusted Aggregation Middleware (Tier 2) via a strict network boundary. Client-side sharding (Ci) ensures linear scalability, while server-side Active Recovery handles node failures without accessing private survivor data. V. SECURITY PROOFS A. Soundness of Consistency-Based Integrity Verification Theorem V-A (Collis… view at source ↗
Figure 3
Figure 3. Figure 3: Security Audit: Malformed Update Detection. Impact of a malicious gradient injection at Round 10. The unprotected model (Red) is permanently degraded. DSFL (Green) detects inconsistencies in malformed updates, rejects invalid payloads, and resumes learning. VII. PERFORMANCE EVALUATION A. Experimental Setup We implemented the full DSFL protocol in Python 3.9 using a NumPy backend optimized for vectorized fi… view at source ↗
Figure 4
Figure 4. Figure 4: Resilience Analysis. Model utility (AUPRC) under a hostile 20% dropout regime. Standard SecAgg fails to converge (Red) due to uncancelled masks. DSFL (Green) utilizes Active Recovery to restore the gradient sum, tracking the ideal baseline perfectly view at source ↗
Figure 6
Figure 6. Figure 6: Scalability Validation. End-to-end latency vs. network size N (empirical at N = 10; extrapolated for N > 10). Paillier HE (Red) and Google SecAgg (Blue) exhibit polynomial growth; DSFL (Green) maintains linear scaling view at source ↗
Figure 7
Figure 7. Figure 7: The Data Sovereignty Deadlock. Recall of isolated local models (Blue) vs. the global DSFL model (Green) across ten banking partitions of the Kaggle dataset. Local models exhibit high variance and poor detection of rare fraud patterns; the global model stabilizes performance across the consortium. VIII. CONCLUSION AND FUTURE WORK DSFL advances Secure Aggregation toward a practi￾cal, audit-oriented financial… view at source ↗
read the original abstract

Financial fraud increasingly exploits institutional boundaries: laundering networks distribute transactions across multiple banks because no single institution can observe the full pattern. Federated Learning (FL) enables collaborative detection without raw data sharing, yet practical deployment in banking environments remains constrained by three pressures. First, homomorphic encryption schemes impose high computational costs that limit real-time aggregation at scale. Second, mask-based protocols such as Google's SecAgg require O(N^2) pairwise key exchanges, which become inefficient as participant count grows. Third, existing protocols provide limited verification that submitted gradient updates are well-formed, leaving aggregation vulnerable to consistency attacks. This paper presents Dynamic Sharded Federated Learning (DSFL), a secure aggregation framework for cross-institution fraud detection. DSFL introduces Dynamic Stochastic Sharding, which partitions participants into small cryptographically ephemeral clusters of fixed size m, reducing communication complexity to O(N*m). Within each cluster, participants submit Linear Integrity Tags, additive-homomorphic commitments that allow the server to verify update consistency without decryption. The mechanism detects inconsistent updates rather than malicious gradients. An Active Neighborhood Recovery protocol handles mid-round dropouts by reconstructing orphaned masks. Experiments on the ULB Credit Card Fraud Detection dataset (284,807 transactions across 10 simulated banking nodes) show that DSFL achieves approximately 34x lower aggregation latency than Paillier-based secure aggregation at N=1000, based on analytical extrapolation from empirical baselines, while maintaining 99% recovery fidelity under a 20% dropout regime. Global fraud recall reached 91.2% (+/-0.8%), above the 68% average of locally trained models.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 1 minor

Summary. The paper proposes Dynamic Sharded Federated Learning (DSFL) for cross-institution financial fraud detection. It uses Dynamic Stochastic Sharding to partition participants into clusters of size m (reducing communication to O(N*m)), Linear Integrity Tags as additive-homomorphic commitments for verifying update consistency without decryption, and Active Neighborhood Recovery to handle dropouts via mask reconstruction. On the ULB Credit Card Fraud dataset with 10 simulated nodes, the work reports 91.2% (+/-0.8%) global fraud recall and claims, via analytical extrapolation, approximately 34x lower aggregation latency than Paillier-based secure aggregation at N=1000 together with 99% recovery fidelity under 20% dropout.

Significance. If the extrapolation and security properties hold, DSFL would offer a practical advance over mask-based and homomorphic-encryption secure aggregation for large-scale financial FL by lowering communication and adding lightweight verification; the use of a real fraud dataset and the explicit O(N*m) complexity reduction are positive elements.

major comments (2)
  1. [Abstract] Abstract: the headline scalability result (34x lower aggregation latency at N=1000 and 99% recovery fidelity) rests entirely on analytical extrapolation from empirical baselines measured on only 10 simulated nodes; no direct measurements, larger-scale simulations, error bounds on the cost model, or ablation of unmodeled terms (quadratic sharding overhead, dropout-induced recomputation, tag verification time) are reported, which is load-bearing for the central claim.
  2. [Abstract] The description of Linear Integrity Tags and Active Neighborhood Recovery provides no formal security argument or proof sketch showing that the mechanisms achieve the stated verification and recovery properties against the consistency attacks mentioned in the introduction; this omission weakens the verifiability contribution.
minor comments (1)
  1. [Abstract] The abstract states the recall improvement relative to locally trained models but does not report the corresponding precision or F1 scores, which would help assess the practical utility of the 91.2% recall figure.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive comments on our manuscript. We provide point-by-point responses to the major comments below and outline the revisions we plan to make.

read point-by-point responses
  1. Referee: [Abstract] Abstract: the headline scalability result (34x lower aggregation latency at N=1000 and 99% recovery fidelity) rests entirely on analytical extrapolation from empirical baselines measured on only 10 simulated nodes; no direct measurements, larger-scale simulations, error bounds on the cost model, or ablation of unmodeled terms (quadratic sharding overhead, dropout-induced recomputation, tag verification time) are reported, which is load-bearing for the central claim.

    Authors: The scalability claim is indeed derived from analytical extrapolation using a cost model based on the O(N*m) complexity and empirical measurements from the 10-node setup. We recognize the limitations of this approach and will revise the manuscript to include a more detailed cost model with error bounds estimated from the experimental variance. Additionally, we will add an ablation study discussing the impact of unmodeled terms like sharding overhead and tag verification. While direct experiments at N=1000 are resource-intensive, we will include results from simulations with N=100 to better support the extrapolation. This addresses the concern while maintaining the validity of our reported results. revision: partial

  2. Referee: [Abstract] The description of Linear Integrity Tags and Active Neighborhood Recovery provides no formal security argument or proof sketch showing that the mechanisms achieve the stated verification and recovery properties against the consistency attacks mentioned in the introduction; this omission weakens the verifiability contribution.

    Authors: We agree that a formal argument would strengthen the verifiability claims. In the revised version, we will add a security analysis section with a proof sketch for Linear Integrity Tags, showing how their additive-homomorphic property enables consistency verification without revealing the updates, thereby mitigating the consistency attacks described. For Active Neighborhood Recovery, the sketch will demonstrate that mask reconstruction maintains privacy and achieves the reported recovery fidelity under the dropout model. These additions will be based on standard cryptographic primitives and directly tie back to the introduction's threat model. revision: yes

Circularity Check

0 steps flagged

No significant circularity in derivation chain

full rationale

The paper presents DSFL as a framework with Dynamic Stochastic Sharding reducing complexity to O(N*m), Linear Integrity Tags for verification, and Active Neighborhood Recovery for dropouts. Performance numbers at N=1000 are explicitly described as analytical extrapolation from empirical measurements on 10 simulated nodes, with no equations, fitted parameters, or self-citations shown that reduce the reported latency gains, recovery fidelity, or recall to quantities defined by the authors' own inputs by construction. The central claims rest on experimental outcomes and asymptotic complexity arguments that remain independent of the target results.

Axiom & Free-Parameter Ledger

1 free parameters · 2 axioms · 0 invented entities

The abstract relies on unstated assumptions about the cryptographic security of ephemeral sharding and the correctness of linear integrity tags under dropout; no free parameters are explicitly fitted in the provided text beyond the implicit choice of cluster size m.

free parameters (1)
  • cluster size m
    Fixed shard size chosen to achieve O(N*m) communication; value not numerically specified in abstract.
axioms (2)
  • domain assumption Participants can be randomly partitioned into cryptographically ephemeral clusters of size m while preserving security and correctness of aggregation.
    Invoked by the Dynamic Stochastic Sharding description.
  • domain assumption Linear Integrity Tags allow the server to detect inconsistent updates without decryption.
    Central to the verification claim.

pith-pipeline@v0.9.0 · 5822 in / 1484 out tokens · 57241 ms · 2026-05-21T00:14:25.815239+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

9 extracted references · 9 canonical work pages

  1. [1]

    L. Zhu, Z. Liu, and S. Han,Deep leakage from gradients. Red Hook, NY , USA: Curran Associates Inc., 2019

  2. [2]

    Inverting gradients - how easy is it to break privacy in federated learning?

    J. Geiping, H. Bauermeister, H. Dr ¨oge, and M. Moeller, “Inverting gradients - how easy is it to break privacy in federated learning?” in Proceedings of the 34th International Conference on Neural Information Processing Systems, ser. NIPS ’20. Red Hook, NY , USA: Curran Associates Inc., 2020

  3. [3]

    Public-key cryptosystems based on composite degree residu- osity classes,

    P. Paillier, “Public-key cryptosystems based on composite degree residu- osity classes,” inAdvances in Cryptology — EUROCRYPT ’99, J. Stern, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999, pp. 223–238

  4. [4]

    Practical secure aggregation for privacy-preserving machine learning,

    K. Bonawitz, V . Ivanov, B. Kreuter, A. Marcedone, H. B. McMahan, S. Patel, D. Ramage, A. Segal, and K. Seth, “Practical secure aggregation for privacy-preserving machine learning,” inProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’17. New York, NY , USA: Association for Computing Machinery, 2017, p. 1175–1...

  5. [5]

    How to backdoor federated learning,

    E. Bagdasaryan, A. Veit, Y . Hua, D. Estrin, and V . Shmatikov, “How to backdoor federated learning,” inProceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, ser. Proceedings of Machine Learning Research, vol

  6. [6]

    2938–2948

    PMLR, 2020, pp. 2938–2948. [Online]. Available: https: //proceedings.mlr.press/v108/bagdasaryan20a.html

  7. [7]

    How to share a secret,

    A. Shamir, “How to share a secret,”Commun. ACM, vol. 22, no. 11, p. 612–613, Nov. 1979. [Online]. Available: https://doi.org/10.1145/ 359168.359176

  8. [8]

    Communication theory of secrecy systems,

    C. E. Shannon, “Communication theory of secrecy systems,”The Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949

  9. [9]

    Credit card fraud detection dataset,

    Machine Learning Group - ULB, Y .-A. L. Borgne, A. D. Pozzolo, O. Caelen, and G. Bontempi, “Credit card fraud detection dataset,” https://www.kaggle.com/datasets/mlg-ulb/creditcardfraud, 2018, transac- tions made by European cardholders in September 2013; 284,807 trans- actions with 492 fraud cases