Skip to main content

Improved Fault Tolerance and Secure Computation on Sparse Networks

  • Conference paper
Automata, Languages and Programming (ICALP 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6199))

Included in the following conference series:

  • 1254 Accesses

Abstract

In the problem of almost-everywhere agreement (denoted a.e. agreement), introduced by Dwork, Peleg, Pippenger, and Upfal [STOC ’86], n parties want to reach agreement on an initially held value, despite the possible disruptive and malicious behavior of up to t of them. So far this is reminiscent of the classical Byzantine agreement problem, except that in the alternative formulation the underlying connectivity graph is sparse—i.e., not all parties share point-to-point reliable channels—thus modeling the actual connectivity of real communication networks. In this setting, one may not be able to guarantee agreement amongst all honest parties, and some of them, say x, must be given up. Thus, in this line of work the goal is to be able to tolerate a high value for t (a constant fraction of n is the best possible) while minimizing x. As shown in the original paper, the dependency on d, the degree of the network, to achieve this goal is paramount.

Indeed, the best polynomial-time a.e. agreement protocol tolerating a constant fraction of corruptions t = αn, for some constant α> 0 (presented in the original paper, over two decades ago) has parameters, d = n ε for constant ε> 0 and x = μt for some constant μ> 1. In this work, we significantly improve on the above parameters obtaining a protocol with t = αn, \(d = \mathcal{O}(\log^q n)\), for constant q > 0 and \(x = \mathcal{O}(\frac{t}{\log n})\). Our approach follows that of Dwork et al. of reducing the a.e. agreement problem to constructing a reliable transmission scheme between pairs of nodes for a large fraction of them; however, given our setting’s more stringent conditions—poly-logarithmic degree and a linear number of corruptions, such a task is significantly harder.

We also consider the problem of secure computation on partially connected networks, as formulated by Garay and Ostrovsky [Eurocrypt ’08], and as a corollary to our main result obtain an almost-everywhere secure multi-party computation protocol with the same parameters as above, again significantly improving on the bound on the number of left-out parties—\(x = \mathcal{O}(\frac{t}{\log n})\) for t ≤ αn corruptions, as opposed to \(x = \mathcal{O}(t)\) in the original work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bagchi, A., Bhargava, A., Chaudhary, A., Eppstein, D., Scheideler, C.: The effect of faults on network expansion. Theory Comput. Syst. 39(6), 903–928 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  2. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: STOC 1988, pp. 1–10 (1988)

    Google Scholar 

  3. Ben-Or, M., Ron, D.: Agreement in the presence of faults, on networks of bounded degree. Information Processing Letters 57, 329–334 (1996)

    Article  MATH  Google Scholar 

  4. Berman, P., Garay, J.: Asymptotically optimal distributed consensus (extended abstract). In: Ronchi Della Rocca, S., Ausiello, G., Dezani-Ciancaglini, M. (eds.) ICALP 1989. LNCS, vol. 372, pp. 80–94. Springer, Heidelberg (1989)

    Chapter  Google Scholar 

  5. Berman, P., Garay, J.: Fast consensus in networks of bounded degree (extended abstract). In: van Leeuwen, J., Santoro, N. (eds.) WDAG 1990. LNCS, vol. 486, pp. 321–333. Springer, Heidelberg (1991)

    Google Scholar 

  6. Bracha, G.: An O(logn) expected rounds randomized Byzantine generals protocol. In: STOC 1985, pp. 316–326 (1985)

    Google Scholar 

  7. Chandran, N., Garay, J., Ostrovsky, R.: Improved fault tolerance and secure computation on sparse networks. CoRR (2010), http://arxiv.org/

  8. Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (abstract). In: STOC 1988, pp. 11–19 (1988)

    Google Scholar 

  9. Dolev, D., Reischuk, R.: Bounds on information exchange for byzantine agreement. In: PODC 1982, pp. 132–140 (1982)

    Google Scholar 

  10. Dwork, C., Peleg, D., Pippenger, N., Upfal, E.: Fault tolerance in networks of bounded degree (preliminary version). In: STOC 1986, pp. 370–379 (1986)

    Google Scholar 

  11. Fitzi, M., Franklin, M., Garay, J., Vardhan, S.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 311–322. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Fitzi, M., Garay, J.: Efficient player-optimal protocols for strong and differential consensus. In: PODC 2003, pp. 211–220 (2003)

    Google Scholar 

  13. Garay, J., Ostrovsky, R.: Almost-everywhere secure computation. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 307–323. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  14. Guruswami, V., Lee, J., Razborov, A.: Almost euclidean subspaces of \(\ell_1^{N}\) via expander codes. In: SODA 2008, pp. 353–362 (2008)

    Google Scholar 

  15. Hirt, M., Maurer, U.: Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology 13(1), 31–60 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  16. King, V., Saia, J.: From almost everywhere to everywhere: Byzantine agreement with Õ(n\(^{\mbox{3/2}}\)) bits. In: Keidar, I. (ed.) DISC 2009. LNCS, vol. 5805, pp. 464–478. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. King, V., Saia, J., Sanwalani, V., Vee, E.: Towards secure and scalable computation in peer-to-peer networks. In: FOCS 2006, pp. 87–98 (2006)

    Google Scholar 

  18. Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems 4(3), 382–401 (1982)

    Article  MATH  Google Scholar 

  19. Neiger, G.: Distributed consensus revisited. Information Processing Letters 49(4), 195–201 (1994)

    Article  MATH  Google Scholar 

  20. Ostrovsky, R., Rajagopalan, S., Vazirani, U.: Simple and efficient leader election in the full information model. In: STOC 1994, pp. 234–242 (1994)

    Google Scholar 

  21. Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM 27, 228–234 (1980)

    Article  MATH  MathSciNet  Google Scholar 

  22. Upfal, E.: Tolerating linear number of faults in networks of bounded degree. In: PODC 1992, pp. 83–89 (1992)

    Google Scholar 

  23. Zuckerman, D.: Randomness-optimal sampling, extractors, and constructive leader election. In: STOC 1996, pp. 286–295 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chandran, N., Garay, J., Ostrovsky, R. (2010). Improved Fault Tolerance and Secure Computation on Sparse Networks. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds) Automata, Languages and Programming. ICALP 2010. Lecture Notes in Computer Science, vol 6199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14162-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14162-1_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14161-4

  • Online ISBN: 978-3-642-14162-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics