Journal of the ACM最新文献

筛选
英文 中文
Faster high-accuracy log-concave sampling via algorithmic warm starts 通过热启动算法实现更快的高精度对数凹采样
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-03-20 DOI: 10.1145/3653446
Jason M. Altschuler, Sinho Chewi
{"title":"Faster high-accuracy log-concave sampling via algorithmic warm starts","authors":"Jason M. Altschuler, Sinho Chewi","doi":"10.1145/3653446","DOIUrl":"https://doi.org/10.1145/3653446","url":null,"abstract":"<p>It is a fundamental problem to understand the complexity of high-accuracy sampling from a strongly log-concave density <i>π</i> on (mathbb {R}^d ). Indeed, in practice, high-accuracy samplers such as the Metropolis-adjusted Langevin algorithm (MALA) remain the de facto gold standard; and in theory, via the proximal sampler reduction, it is understood that such samplers are key for sampling even beyond log-concavity (in particular, for sampling under isoperimetric assumptions). This paper improves the dimension dependence of this sampling problem to (widetilde{O}(d^{1/2}) ). The previous best result for MALA was (widetilde{O}(d) ). This closes the long line of work on the complexity of MALA, and moreover leads to state-of-the-art guarantees for high-accuracy sampling under strong log-concavity and beyond (thanks to the aforementioned reduction). Our starting point is that the complexity of MALA improves to (widetilde{O}(d^{1/2}) ), but only under a <i>warm start</i> (an initialization with constant Rényi divergence w.r.t. <i>π</i>). Previous algorithms for finding a warm start took <i>O</i>(<i>d</i>) time and thus dominated the computational effort of sampling. Our main technical contribution resolves this gap by establishing the first (widetilde{O}(d^{1/2}) ) Rényi mixing rates for the discretized underdamped Langevin diffusion. For this, we develop new differential-privacy-inspired techniques based on Rényi divergences with Orlicz–Wasserstein shifts, which allow us to sidestep longstanding challenges for proving fast convergence of hypocoercive differential equations.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"43 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR 精细密码分析:密集 k-SUM 和 k-XOR 的严格条件约束
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-03-17 DOI: 10.1145/3653014
Itai Dinur, Nathan Keller, Ohad Klein
{"title":"Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR","authors":"Itai Dinur, Nathan Keller, Ohad Klein","doi":"10.1145/3653014","DOIUrl":"https://doi.org/10.1145/3653014","url":null,"abstract":"<p>An average-case variant of the <i>k</i>-SUM conjecture asserts that finding <i>k</i> numbers that sum to 0 in a list of <i>r</i> random numbers, each of the order <i>r<sup>k</sup></i>, cannot be done in much less than <i>r</i><sup>⌈<i>k</i>/2⌉</sup> time. On the other hand, in the <i>dense regime</i> of parameters, where the list contains more numbers and many solutions exist, the complexity of finding one of them can be significantly improved by Wagner’s <i>k</i>-tree algorithm. Such algorithms for <i>k</i>-SUM in the dense regime have many applications, notably in cryptanalysis. </p><p>In this paper, assuming the average-case <i>k</i>-SUM conjecture, we prove that known algorithms are essentially optimal for <i>k</i> = 3, 4, 5. For <i>k</i> &gt; 5, we prove the optimality of the <i>k</i>-tree algorithm for a limited range of parameters. We also prove similar results for <i>k</i>-XOR, where the sum is replaced with exclusive or. </p><p>Our results are obtained by a self-reduction that, given an instance of <i>k</i>-SUM which has a few solutions, produces from it many instances in the dense regime. We solve each of these instances using the dense <i>k</i>-SUM oracle, and hope that a solution to a dense instance also solves the original problem. We deal with potentially malicious oracles (that repeatedly output correlated useless solutions) by an obfuscation process that adds noise to the dense instances. Using discrete Fourier analysis, we show that the obfuscation eliminates correlations among the oracle’s solutions, even though its inputs are highly correlated.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"13 26 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140147826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twin-width IV: ordered graphs and matrices 双宽 IV:有序图和矩阵
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-03-11 DOI: 10.1145/3651151
Édouard Bonnet, Ugo Giocanti, Patrice Ossona de Mendez, Pierre Simon, Stéphan Thomassé, Szymon Toruńczyk
{"title":"Twin-width IV: ordered graphs and matrices","authors":"Édouard Bonnet, Ugo Giocanti, Patrice Ossona de Mendez, Pierre Simon, Stéphan Thomassé, Szymon Toruńczyk","doi":"10.1145/3651151","DOIUrl":"https://doi.org/10.1145/3651151","url":null,"abstract":"<p>We establish a list of characterizations of bounded twin-width for hereditary classes of totally ordered graphs: as classes of at most exponential growth studied in enumerative combinatorics, as monadically NIP classes studied in model theory, as classes that do not transduce the class of all graphs studied in finite model theory, and as classes for which model checking first-order logic is fixed-parameter tractable studied in algorithmic graph theory. </p><p>This has several consequences. First, it allows us to show that every hereditary class of ordered graphs either has at most exponential growth, or has at least factorial growth. This settles a question first asked by Balogh, Bollobás, and Morris [Eur. J. Comb. ’06] on the growth of hereditary classes of ordered graphs, generalizing the Stanley-Wilf conjecture/Marcus-Tardos theorem. Second, it gives a fixed-parameter approximation algorithm for twin-width on ordered graphs. Third, it yields a full classification of fixed-parameter tractable first-order model checking on hereditary classes of ordered binary structures. Fourth, it provides a model-theoretic characterization of classes with bounded twin-width. Finally, it settles the small conjecture [SODA ’21] in the case of ordered graphs.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"42 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140106050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Normalization of Linear Temporal Logic 线性时态逻辑的高效归一化
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-03-06 DOI: 10.1145/3651152
Javier Esparza, Rubén Rubio, Salomon Sickert
{"title":"Efficient Normalization of Linear Temporal Logic","authors":"Javier Esparza, Rubén Rubio, Salomon Sickert","doi":"10.1145/3651152","DOIUrl":"https://doi.org/10.1145/3651152","url":null,"abstract":"<p>In the mid 80s, Lichtenstein, Pnueli, and Zuck proved a classical theorem stating that every formula of Past LTL (the extension of LTL with past operators) is equivalent to a formula of the form (bigwedge _{i=1}^n mathbf {G}mathbf {F} varphi _i vee mathbf {F}mathbf {G} psi _i ), where φ<sub><i>i</i></sub> and <i>ψ<sub>i</sub></i> contain only past operators. Some years later, Chang, Manna, and Pnueli built on this result to derive a similar normal form for LTL. Both normalization procedures have a non-elementary worst-case blow-up, and follow an involved path from formulas to counter-free automata to star-free regular expressions and back to formulas. We improve on both points. We present direct and purely syntactic normalization procedures for LTL, yielding a normal form very similar to the one by Chang, Manna, and Pnueli, that exhibit only a single exponential blow-up. As an application, we derive a simple algorithm to translate LTL into deterministic Rabin automata. The algorithm normalizes the formula, translates it into a special very weak alternating automaton, and applies a simple determinization procedure, valid only for these special automata.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"270 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140044322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sketching approximability of all finite CSPs 所有有限 CSP 的草图近似性
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-02-29 DOI: 10.1145/3649435
Chi-Ning Chou, Alexander Golovnev, Madhu Sudan, Santhoshini Velusamy
{"title":"Sketching approximability of all finite CSPs","authors":"Chi-Ning Chou, Alexander Golovnev, Madhu Sudan, Santhoshini Velusamy","doi":"10.1145/3649435","DOIUrl":"https://doi.org/10.1145/3649435","url":null,"abstract":"<p>A constraint satisfaction problem (CSP), (mathsf {Max-CSP}(mathcal {F}) ), is specified by a finite set of constraints (mathcal {F} subseteq lbrace [q]^k rightarrow lbrace 0,1rbrace rbrace ) for positive integers <i>q</i> and <i>k</i>. An instance of the problem on <i>n</i> variables is given by <i>m</i> applications of constraints from (mathcal {F} ) to subsequences of the <i>n</i> variables, and the goal is to find an assignment to the variables that satisfies the maximum number of constraints. In the (<i>γ</i>, <i>β</i>)-approximation version of the problem for parameters 0 ≤ <i>β</i> &lt; <i>γ</i> ≤ 1, the goal is to distinguish instances where at least <i>γ</i> fraction of the constraints can be satisfied from instances where at most <i>β</i> fraction of the constraints can be satisfied. </p><p>In this work, we consider the approximability of this problem in the context of sketching algorithms and give a dichotomy result. Specifically, for every family (mathcal {F} ) and every <i>β</i> &lt; <i>γ</i>, we show that either a linear sketching algorithm solves the problem in polylogarithmic space, or the problem is not solvable by any sketching algorithm in (o(sqrt {n}) ) space. In particular, we give non-trivial approximation algorithms using polylogarithmic space for infinitely many constraint satisfaction problems. </p><p>We also extend previously known lower bounds for general streaming algorithms to a wide variety of problems, and in particular the case of <i>q</i> = <i>k</i> = 2, where we get a dichotomy, and the case when the satisfying assignments of the constraints of (mathcal {F} ) support a distribution on [<i>q</i>]<sup><i>k</i></sup> with uniform marginals. </p><p>Prior to this work, other than sporadic examples, the only systematic classes of CSPs that were analyzed considered the setting of Boolean variables <i>q</i> = 2, binary constraints <i>k</i> = 2, singleton families (|mathcal {F}|=1 ) and only considered the setting where constraints are placed on literals rather than variables. </p><p>Our positive results show wide applicability of bias-based algorithms used previously by [47] and [41], which we extend to include richer norm estimation algorithms, by giving a systematic way to discover biases. Our negative results combine the Fourier analytic methods of [56], which we extend to a wider class of CSPs, with a rich collection of reductions among communication complexity problems that lie at the heart of the negative results. In particular, previous works used Fourier analysis over the Boolean cube to initiate their results and the results seemed particularly tailored to functions on Boolean literals (i.e., with negations). Our techniques surprisingly allow us to get to general <i>q</i>-ary CSPs without negations by appealing to the same Fourier analytic starting point over Boolean hypercubes.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"67 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140003885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Choiceless Polynomial Time with Witnessed Symmetric Choice 带见证对称选择的无选择多项式时间
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-02-13 DOI: 10.1145/3648104
Moritz Lichter, Pascal Schweitzer
{"title":"Choiceless Polynomial Time with Witnessed Symmetric Choice","authors":"Moritz Lichter, Pascal Schweitzer","doi":"10.1145/3648104","DOIUrl":"https://doi.org/10.1145/3648104","url":null,"abstract":"<p>We extend Choiceless Polynomial Time (CPT), the currently only remaining promising candidate in the quest for a logic capturing <span>Ptime</span>, so that this extended logic has the following property: for every class of structures for which isomorphism is definable, the logic automatically captures <span>Ptime</span>. </p><p>For the construction of this logic we extend CPT by a witnessed symmetric choice operator. This operator allows for choices from definable orbits. But, to ensure polynomial-time evaluation, automorphisms have to be provided to certify that the choice set is indeed an orbit. </p><p>We argue that, in this logic, definable isomorphism implies definable canonization. Thereby, our construction removes the non-trivial step of extending isomorphism definability results to canonization. This step was a part of proofs that show that CPT or other logics capture <span>Ptime</span> on a particular class of structures. The step typically required substantial extra effort.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"16 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139771267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence of Datalog over (Pre-) Semirings 数据模型在(前)语义上的收敛性
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-01-30 DOI: 10.1145/3643027
Mahmoud Abo Khamis, Hung Q. Ngo, Reinhard Pichler, Dan Suciu, Yisu Remy Wang
{"title":"Convergence of Datalog over (Pre-) Semirings","authors":"Mahmoud Abo Khamis, Hung Q. Ngo, Reinhard Pichler, Dan Suciu, Yisu Remy Wang","doi":"10.1145/3643027","DOIUrl":"https://doi.org/10.1145/3643027","url":null,"abstract":"<p>Recursive queries have been traditionally studied in the framework of datalog, a language that restricts recursion to monotone queries over sets, which is guaranteed to converge in polynomial time in the size of the input. But modern big data systems require recursive computations beyond the Boolean space. In this paper we study the convergence of datalog when it is interpreted over an arbitrary semiring. We consider an ordered semiring, define the semantics of a datalog program as a least fixpoint in this semiring, and study the number of steps required to reach that fixpoint, if ever. We identify algebraic properties of the semiring that correspond to certain convergence properties of datalog programs. Finally, we describe a class of ordered semirings on which one can use the semi-naïve evaluation algorithm on any datalog program.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"59 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139580540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Compositional Theory of Linearizability 线性化组合理论
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-01-27 DOI: 10.1145/3643668
Arthur Oliveira Vale, Zhong Shao, Yixuan Chen
{"title":"A Compositional Theory of Linearizability","authors":"Arthur Oliveira Vale, Zhong Shao, Yixuan Chen","doi":"10.1145/3643668","DOIUrl":"https://doi.org/10.1145/3643668","url":null,"abstract":"<p>Compositionality is at the core of programming languages research and has become an important goal toward scalable verification of large systems. Despite that, there is no compositional account of <i>linearizability</i>, the gold standard of correctness for concurrent objects. </p><p>In this paper, we develop a compositional semantics for linearizable concurrent objects. We start by showcasing a common issue, which is independent of linearizability, in the construction of compositional models of concurrent computation: interaction with the neutral element for composition can lead to emergent behaviors, a hindrance to compositionality. Category theory provides a solution for the issue in the form of the Karoubi envelope. Surprisingly, and this is the main discovery of our work, this abstract construction is deeply related to linearizability and leads to a novel formulation of it. Notably, this new formulation neither relies on atomicity nor directly upon happens-before ordering and is only possible <i>because</i> of compositionality, revealing that linearizability and compositionality are intrinsically related to each other. </p><p>We use this new, and compositional, understanding of linearizability to revisit much of the theory of linearizability, providing novel, simple, algebraic proofs of the <i>locality</i> property and of an analogue of the equivalence with <i>observational refinement</i>. We show our techniques can be used in practice by connecting our semantics with a simple program logic that is nonetheless sound concerning this generalized linearizability.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"216 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139580404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fitting Distances by Tree Metrics Minimizing the Total Error within a Constant Factor 用树指标拟合距离,将总误差降至常数范围内最小
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-01-02 DOI: 10.1145/3639453
Vincent Cohen-Addad, Debarati Das, Evangelos Kipouridis, Nikos Parotsidis, Mikkel Thorup
{"title":"Fitting Distances by Tree Metrics Minimizing the Total Error within a Constant Factor","authors":"Vincent Cohen-Addad, Debarati Das, Evangelos Kipouridis, Nikos Parotsidis, Mikkel Thorup","doi":"10.1145/3639453","DOIUrl":"https://doi.org/10.1145/3639453","url":null,"abstract":"<p>We consider the numerical taxonomy problem of fitting a positive distance function ({mathcal {D}:{Schoose 2}rightarrow mathbb {R}_{gt 0}} ) by a tree metric. We want a tree <i>T</i> with positive edge weights and including <i>S</i> among the vertices so that their distances in <i>T</i> match those in (mathcal {D} ). A nice application is in evolutionary biology where the tree <i>T</i> aims to approximate the branching process leading to the observed distances in (mathcal {D} ) [Cavalli-Sforza and Edwards 1967]. We consider the total error, that is the sum of distance errors over all pairs of points. We present a deterministic polynomial time algorithm minimizing the total error within a constant factor. We can do this both for general trees, and for the special case of ultrametrics with a root having the same distance to all vertices in <i>S</i>. </p><p>The problems are APX-hard, so a constant factor is the best we can hope for in polynomial time. The best previous approximation factor was <i>O</i>((log <i>n</i>)(log log <i>n</i>)) by Ailon and Charikar [2005] who wrote “Determining whether an <i>O</i>(1) approximation can be obtained is a fascinating question”.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"25 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139082390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection 通过统计欺诈检测实现具有最佳复原力的拜占庭协议
IF 2.5 2区 计算机科学
Journal of the ACM Pub Date : 2024-01-02 DOI: 10.1145/3639454
Shang-En Huang, Seth Pettie, Leqi Zhu
{"title":"Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection","authors":"Shang-En Huang, Seth Pettie, Leqi Zhu","doi":"10.1145/3639454","DOIUrl":"https://doi.org/10.1145/3639454","url":null,"abstract":"<p>Since the mid-1980s it has been known that Byzantine Agreement can be solved with probability 1 asynchronously, even against an omniscient, computationally unbounded adversary that can adaptively <i>corrupt</i> up to <i>f</i> &lt; <i>n</i>/3 parties. Moreover, the problem is insoluble with <i>f</i> ≥ <i>n</i>/3 corruptions. However, Bracha’s [13] 1984 protocol (see also Ben-Or [8]) achieved <i>f</i> &lt; <i>n</i>/3 resilience at the cost of <i>exponential</i> expected latency 2<sup><i>Θ</i>(<i>n</i>)</sup>, a bound that has <i>never</i> been improved in this model with <i>f</i> = ⌊(<i>n</i> − 1)/3⌋ corruptions. </p><p>In this paper, we prove that Byzantine Agreement in the asynchronous, full information model can be solved with probability 1 against an adaptive adversary that can corrupt <i>f</i> &lt; <i>n</i>/3 parties, while incurring only <i>polynomial latency with high probability</i>. Our protocol follows an earlier polynomial latency protocol of King and Saia [33,34], which had <i>suboptimal</i>\u0000resilience, namely <i>f</i> ≈ <i>n</i>/10<sup>9</sup> [33,34]. </p><p>Resilience <i>f</i> = (<i>n</i> − 1)/3 is uniquely difficult, as this is the point at which the influence of the Byzantine and honest players are of roughly equal strength. The core technical problem we solve is to design a collective coin-flipping protocol that <i>eventually</i>\u0000lets us flip a coin with an unambiguous outcome. In the beginning, the influence of the Byzantine players is too powerful to overcome, and they can essentially fix the coin’s behavior at will. We guarantee that after just a polynomial number of executions of the coin-flipping protocol, either (a) the Byzantine players fail to fix the behavior of the coin (thereby ending the game) or (b) we can “blacklist” players such that the blacklisting rate for Byzantine players is at least as large as the blacklisting rate for good players. The blacklisting criterion is based on a simple statistical test of <i>fraud detection</i>.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"6 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139095927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信