Abstract
In the problem of almost-everywhere agreement (denoted a.e. agreement), introduced by Dwork, Peleg, Pippenger, and Upfal [STOC ’86], n parties want to reach agreement on an initially held value, despite the possible disruptive and malicious behavior of up to t of them. So far this is reminiscent of the classical Byzantine agreement problem, except that in the alternative formulation the underlying connectivity graph is sparse—i.e., not all parties share point-to-point reliable channels—thus modeling the actual connectivity of real communication networks. In this setting, one may not be able to guarantee agreement amongst all honest parties, and some of them, say x, must be given up. Thus, in this line of work the goal is to be able to tolerate a high value for t (a constant fraction of n is the best possible) while minimizing x. As shown in the original paper, the dependency on d, the degree of the network, to achieve this goal is paramount.
Indeed, the best polynomial-time a.e. agreement protocol tolerating a constant fraction of corruptions t = αn, for some constant α> 0 (presented in the original paper, over two decades ago) has parameters, d = n ε for constant ε> 0 and x = μt for some constant μ> 1. In this work, we significantly improve on the above parameters obtaining a protocol with t = αn, \(d = \mathcal{O}(\log^q n)\), for constant q > 0 and \(x = \mathcal{O}(\frac{t}{\log n})\). Our approach follows that of Dwork et al. of reducing the a.e. agreement problem to constructing a reliable transmission scheme between pairs of nodes for a large fraction of them; however, given our setting’s more stringent conditions—poly-logarithmic degree and a linear number of corruptions, such a task is significantly harder.
We also consider the problem of secure computation on partially connected networks, as formulated by Garay and Ostrovsky [Eurocrypt ’08], and as a corollary to our main result obtain an almost-everywhere secure multi-party computation protocol with the same parameters as above, again significantly improving on the bound on the number of left-out parties—\(x = \mathcal{O}(\frac{t}{\log n})\) for t ≤ αn corruptions, as opposed to \(x = \mathcal{O}(t)\) in the original work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bagchi, A., Bhargava, A., Chaudhary, A., Eppstein, D., Scheideler, C.: The effect of faults on network expansion. Theory Comput. Syst. 39(6), 903–928 (2006)
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: STOC 1988, pp. 1–10 (1988)
Ben-Or, M., Ron, D.: Agreement in the presence of faults, on networks of bounded degree. Information Processing Letters 57, 329–334 (1996)
Berman, P., Garay, J.: Asymptotically optimal distributed consensus (extended abstract). In: Ronchi Della Rocca, S., Ausiello, G., Dezani-Ciancaglini, M. (eds.) ICALP 1989. LNCS, vol. 372, pp. 80–94. Springer, Heidelberg (1989)
Berman, P., Garay, J.: Fast consensus in networks of bounded degree (extended abstract). In: van Leeuwen, J., Santoro, N. (eds.) WDAG 1990. LNCS, vol. 486, pp. 321–333. Springer, Heidelberg (1991)
Bracha, G.: An O(logn) expected rounds randomized Byzantine generals protocol. In: STOC 1985, pp. 316–326 (1985)
Chandran, N., Garay, J., Ostrovsky, R.: Improved fault tolerance and secure computation on sparse networks. CoRR (2010), http://arxiv.org/
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (abstract). In: STOC 1988, pp. 11–19 (1988)
Dolev, D., Reischuk, R.: Bounds on information exchange for byzantine agreement. In: PODC 1982, pp. 132–140 (1982)
Dwork, C., Peleg, D., Pippenger, N., Upfal, E.: Fault tolerance in networks of bounded degree (preliminary version). In: STOC 1986, pp. 370–379 (1986)
Fitzi, M., Franklin, M., Garay, J., Vardhan, S.: Towards optimal and efficient perfectly secure message transmission. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 311–322. Springer, Heidelberg (2007)
Fitzi, M., Garay, J.: Efficient player-optimal protocols for strong and differential consensus. In: PODC 2003, pp. 211–220 (2003)
Garay, J., Ostrovsky, R.: Almost-everywhere secure computation. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 307–323. Springer, Heidelberg (2008)
Guruswami, V., Lee, J., Razborov, A.: Almost euclidean subspaces of \(\ell_1^{N}\) via expander codes. In: SODA 2008, pp. 353–362 (2008)
Hirt, M., Maurer, U.: Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology 13(1), 31–60 (2000)
King, V., Saia, J.: From almost everywhere to everywhere: Byzantine agreement with Õ(n\(^{\mbox{3/2}}\)) bits. In: Keidar, I. (ed.) DISC 2009. LNCS, vol. 5805, pp. 464–478. Springer, Heidelberg (2009)
King, V., Saia, J., Sanwalani, V., Vee, E.: Towards secure and scalable computation in peer-to-peer networks. In: FOCS 2006, pp. 87–98 (2006)
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems 4(3), 382–401 (1982)
Neiger, G.: Distributed consensus revisited. Information Processing Letters 49(4), 195–201 (1994)
Ostrovsky, R., Rajagopalan, S., Vazirani, U.: Simple and efficient leader election in the full information model. In: STOC 1994, pp. 234–242 (1994)
Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM 27, 228–234 (1980)
Upfal, E.: Tolerating linear number of faults in networks of bounded degree. In: PODC 1992, pp. 83–89 (1992)
Zuckerman, D.: Randomness-optimal sampling, extractors, and constructive leader election. In: STOC 1996, pp. 286–295 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chandran, N., Garay, J., Ostrovsky, R. (2010). Improved Fault Tolerance and Secure Computation on Sparse Networks. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds) Automata, Languages and Programming. ICALP 2010. Lecture Notes in Computer Science, vol 6199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14162-1_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-14162-1_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14161-4
Online ISBN: 978-3-642-14162-1
eBook Packages: Computer ScienceComputer Science (R0)