2,602 Hits in 5.4 sec

Reliable Broadcast with Respect to Topology Knowledge [chapter]

Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2014 Lecture Notes in Computer Science  
To the best of our knowledge this is the first optimal algorithm for Reliable Broadcast in generic topology ad hoc networks against general adversaries.  ...  We examine the problem under the locally bounded adversary model of Koo (2004) and the general adversary model of Hirt and Maurer (1997) and explore the tradeoff between the level of topology knowledge  ...  This line of work has yielded results on Broadcast against a general adversary in complete networks [4] but, to the best of our knowledge, the case of Broadcast against general adversaries in incomplete  ... 
doi:10.1007/978-3-662-45174-8_8 fatcat:mu43bnhnxnf23lhqfskbf6qcgu

Reliable broadcast with respect to topology knowledge

Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
2016 Distributed computing  
To the best of our knowledge this is the first optimal algorithm for Reliable Broadcast in generic topology ad hoc networks against general adversaries.  ...  We examine the problem under the locally bounded adversary model of Koo (2004) and the general adversary model of Hirt and Maurer (1997) and explore the tradeoff between the level of topology knowledge  ...  This line of work has yielded results on Broadcast against a general adversary in complete networks [4] but, to the best of our knowledge, the case of Broadcast against general adversaries in incomplete  ... 
doi:10.1007/s00446-016-0279-6 fatcat:zcgrj45w7bfyboovk75h23ensm

Validated Asynchronous Byzantine Agreement with Optimal Resilience and Asymptotically Optimal Time and Word Communication [article]

Ittai Abraham, Dahlia Malkhi, Alexander Spiegelman
2018 arXiv   pre-print
The best previous result of Cachin et al. from 2001 solves Validated Byzantine Agreement with optimal resilience and O(1) expected time but with O(n^3) expected word communication.  ...  Our protocol can withstand the optimal number f<n/3 of Byzantine failures and reaches agreement in the asymptotically optimal expected O(1) running time.  ...  VABA with Optimal Resilience and Asymptotically Optimal time and Communication In this section we give a protocol for asynchronous Byzantine agreement, secure against an adaptive adversary that controls  ... 
arXiv:1811.01332v1 fatcat:6aer543eeng25ofkscy2zaitoi

The Internet of Things: Secure Distributed Inference

Yuan Chen, Soummya Kar, Jose M.F. Moura
2018 IEEE Signal Processing Magazine  
Adversaries may hijack devices and compromise their data. As a result, reactive countermeasures, such as intrusion detection and resilient analytics, become vital components of security.  ...  The integrity and trustworthiness of data and data analytics are increasingly important concerns in IoT applications.  ...  This method may not identify which sensors have been attacked but nevertheless provides resilience against adversarial devices and ensures that the remaining sensors successfully estimate global pollutant  ... 
doi:10.1109/msp.2018.2842097 fatcat:ws7ss5vc6nbj3fi2lbk4lgyjdi

Efficient Secure Multi-party Computation [chapter]

Martin Hirt, Ueli Maurer, Bartosz Przydatek
2000 Lecture Notes in Computer Science  
The proposed techniques are generic and apply to other protocols for robust distributed computations.  ...  In this protocol, the number of invocations of the broadcast primitive is independent of the size of the circuit to be computed.  ...  Protocols with optimal resilience (i.e., t < n/3) were proposed in [FY92] and in [GRR98] .  ... 
doi:10.1007/3-540-44448-3_12 fatcat:6cnw5u2bd5fhrg4v6wyicyy3u4

Event-Triggered Resilient Average Consensus with Adversary Detection in the Presence of Byzantine Agents

Peng Zhang, Changqing Hu, Sentang Wu, Ruiyan Gong, Ziming Luo
2021 IEEE Access  
We analyze the conditions for such a fully distributed algorithm to succeed in the f-local adversarial model.  ...  INDEX TERMS Multi-agent networks, resilient consensus, adversary detection, event-triggered, Byzantine agents.  ...  Recent remarkable advances made in resilient consensus include a novel definition of network robustness, termed r-robustness, which facilitates purely local interaction rules against adversarial nodes  ... 
doi:10.1109/access.2021.3108639 fatcat:rbupfwpqvng67ojieom6aesbve

Optimal Clock Synchronization with Signatures [article]

Christoph Lenzen, Julian Loss
2022 arXiv   pre-print
So far, it is only known that clock pulses of skew d can be generated with (trivially optimal) resilience of ⌈ n/2⌉-1 (PODC '19), improving over the tight bound of ⌈ n/3⌉-1 holding without signatures for  ...  Cryptographic signatures can be used to increase the resilience of distributed systems against adversarial attacks, by increasing the number of faulty parties that can be tolerated.  ...  Adversary and Executions. The adversary is in full control of message delays and hardware clocks within the bounds specified by the model.  ... 
arXiv:2203.02553v1 fatcat:allmmb5twvadrnb4kuzzlno7ju

Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation [chapter]

Martin Hirt, Jesper Buus Nielsen
2005 Lecture Notes in Computer Science  
We consider evaluating an n-party randomized function and show that if f can be computed by a circuit of size c, then O(cn 2 κ) is an upper bound for active security with optimal resilience t < n/2 and  ...  We give improved upper bounds on the communication complexity of optimally-resilient secure multiparty computation in the cryptographic model.  ...  Acknowledgments We would like to thank Ivan Damgård, Serge Fehr and Matthias Fitzi for many fruitful discussions, and the anonymous referees for their helpful comments.  ... 
doi:10.1007/11593447_5 fatcat:gxihtxac7zbtpfzxied5eayc7y

Resilient asymptotic consensus in asynchronous robust networks

Heath J. LeBlanc, Xenofon Koutsoukos
2012 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
The asynchronous consensus algorithm studied here uses local strategies to ensure resilience against the adversary nodes. The class of topologies studied are those that are robust.  ...  In this paper, we study the problem of reaching consensus asymptotically in the presence of adversary nodes whenever the network is asynchronous under a local broadcast model of communication.  ...  On the other hand, a local bound on the number of faulty nodes has been considered in fault-tolerant broadcasting [22] - [24] and consensus [24] , [25] , where it is assumed that at most F of any  ... 
doi:10.1109/allerton.2012.6483432 dblp:conf/allerton/LeBlancK12 fatcat:6byfcq3lofcelo6ifwe52pzqla

The do-all problem in broadcast networks

Bogdan S. Chlebus, Dariusz R. Kowalski, Andrzej Lingas
2001 Proceedings of the twentieth annual ACM symposium on Principles of distributed computing - PODC '01  
It is proved to be optimal if the number of faults is the only restriction on the adversary.  ...  Finally we consider the question if randomization helps for the channel without collision detection against weaker adversaries.  ...  Now it could happen that if we wanted to optimize our solutions against weaker adversaries then part O(p. min{f, t}) in the performance bound could be decreased.  ... 
doi:10.1145/383962.384000 dblp:conf/podc/ChlebusKL01 fatcat:m74s2zy4xzdlpmfsqbfla33yja

Broadcast CONGEST Algorithms against Adversarial Edges [article]

Yael Hitron, Merav Parter
2022 arXiv   pre-print
Since the influential work of [Pease, Shostak and Lamport, JACM'80], broadcast algorithms against plentiful adversarial models have been studied in both theory and practice for over more than four decades  ...  For expander graphs with minimum degree of Ω(t^2log n), there is an improved broadcast algorithm with O(t log ^2 n) rounds against t adversarial edges.  ...  We are very grateful to David Peleg and Eylon Yogev for many useful discussions.  ... 
arXiv:2004.06436v4 fatcat:bvferw2nlranjfqwekcupl3p2a

A Survey on Fault-tolerance in Distributed Optimization and Machine Learning [article]

Shuo Liu
2021 arXiv   pre-print
With the rapid expansion of the scale of distributed systems, resilient distributed algorithms for optimization are needed, in order to mitigate system failures, communication issues, or even malicious  ...  The robustness of distributed optimization is an emerging field of study, motivated by various applications of distributed optimization including distributed machine learning, distributed sensing, and  ...  Based on resilient consensus with trusted agents [2] , research shows that trusted agents in the system can be crucial against adversarial agents [4, 34, 126] .  ... 
arXiv:2106.08545v2 fatcat:g6fys4icrbbr5k3bd3ycylaptu

Not a COINcidence: Sub-Quadratic Asynchronous Byzantine Agreement WHP

Shir Cohen, Idit Keidar, Alexander Spiegelman, Hagit Attiya
2020 International Symposium on Distributed Computing  
King and Saia were the first to break the quadratic word complexity bound for Byzantine Agreement in synchronous systems against an adaptive adversary, and Algorand broke this bound with near-optimal resilience  ...  Our algorithms work against a delayed-adaptive adversary, which cannot perform after-the-fact removals but has full control of Byzantine processes and full information about communication in earlier rounds  ...  [13] were the first to use a shared coin to solve BA with O(n 2 ) communication and optimal resilience. Mostefaoui et al.  ... 
doi:10.4230/lipics.disc.2020.25 dblp:conf/wdag/CohenKS20 fatcat:vsonx35wcbfuhfxrizsbbpxviu

Computational Verifiable Secret Sharing Revisited [chapter]

Michael Backes, Aniket Kate, Arpita Patra
2011 Lecture Notes in Computer Science  
We present the first two-round VSS scheme for n ≥ 2t+1 and lower-bound the result tightly by proving the impossibility of oneround computational VSS for t ≥ 2 or n ≤ 3t.  ...  Interestingly, for the optimal resiliency conditions, the least possible round complexity in the known computational VSS schemes is identical to that in the (statistical or perfect) unconditional setting  ...  We thank Jonathan Katz and our anonymous reviewers for their comments and suggestions on an earlier draft.  ... 
doi:10.1007/978-3-642-25385-0_32 fatcat:oiqswlvckjaungjgjgov4sxx6y

Trading correctness for privacy in unconditional multi-party computation [chapter]

Matthias Fitzi, Martin Hirt, Ueli Maurer
1998 Lecture Notes in Computer Science  
In the active case, every function can be computed securely if and only if ta < n/3; when a broadcast channel is available, then this bound is ta < n/2. These bounds are tight.  ...  We further show that the bound t < n/2 for passive corruption holds even if the adversary is additionally allowed to make the passively corrupted players fail.  ...  Acknowledgments We would like to thank Ran Canetti for sending us early versions of [Can97, Can98] and David Chaum, Ronald Cramer, Ivan Damgård, Rosario Gennaro, Tal Rabin, Markus Stadler, and Michael  ... 
doi:10.1007/bfb0055724 fatcat:x7kmzt7xdfdijeymfgn65bfbca
« Previous Showing results 1 — 15 out of 2,602 results