Improved fault tolerance and secure computation on sparse networks

19Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the problem of almost-everywhere agreement (denoted a.e. agreement), introduced by Dwork, Peleg, Pippenger, and Upfal [STOC '86], n parties want to reach agreement on an initially held value, despite the possible disruptive and malicious behavior of up to t of them. So far this is reminiscent of the classical Byzantine agreement problem, except that in the alternative formulation the underlying connectivity graph is sparse-i.e., not all parties share point-to-point reliable channels-thus modeling the actual connectivity of real communication networks. In this setting, one may not be able to guarantee agreement amongst all honest parties, and some of them, say x, must be given up. Thus, in this line of work the goal is to be able to tolerate a high value for t (a constant fraction of n is the best possible) while minimizing x. As shown in the original paper, the dependency on d, the degree of the network, to achieve this goal is paramount. Indeed, the best polynomial-time a.e. agreement protocol tolerating a constant fraction of corruptions t=αn, for some constant α>0 (presented in the original paper, over two decades ago) has parameters, d=n ε for constant ε>0 and x=μt for some constant μ>1. In this work, we significantly improve on the above parameters obtaining a protocol with t=αn, , for constant q>0 and . Our approach follows that of Dwork et al. of reducing the a.e. agreement problem to constructing a reliable transmission scheme between pairs of nodes for a large fraction of them; however, given our setting's more stringent conditions-poly-logarithmic degree and a linear number of corruptions, such a task is significantly harder. We also consider the problem of secure computation on partially connected networks, as formulated by Garay and Ostrovsky [Eurocrypt '08], and as a corollary to our main result obtain an almost-everywhere secure multi-party computation protocol with the same parameters as above, again significantly improving on the bound on the number of left-out parties-x=O(t/log n) for t ≤ αn corruptions, as opposed to x=O(t) in the original work. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Chandran, N., Garay, J., & Ostrovsky, R. (2010). Improved fault tolerance and secure computation on sparse networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6199 LNCS, pp. 249–260). https://doi.org/10.1007/978-3-642-14162-1_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free