私有信道下多方交互通信的可扩展算法

Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia
{"title":"私有信道下多方交互通信的可扩展算法","authors":"Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia","doi":"10.1145/3369740.3369771","DOIUrl":null,"url":null,"abstract":"A group of n players wants to run a distributed protocol ρ over a network where communication occurs via private point-to-point channels. Unfortunately, an adversary, who knows P, is able to maliciously flip bits on the channels. Can we efficiently simulate ρ in the presence of such an adversary? We show that this is possible, even when L, the number of bits sent in ρ, and T, the number of bits flipped by the adversary are not known in advance. In particular, we show how to create a robust version of ρ, ρ' such that 1) ρ' fails with probability at most δ, for any δ > 0; and 2) ρ' sends Õ (L + T) bits, where the Õ notation hides a log(nL/δ) term multiplying L. Critically, our result requires that ρ be a protocol that runs correctly in an asynchronous network; in contrast, our protocol ρ' must run in a synchronous network. Additionally, we show how to improve this result when the average message size is not constant. In particular, we show how to create a protocol ρ' that sends O(L(1 + (1/α) log(nL/δ)) + T) bits, where α is the average message size. This new ρ' is adaptive in that it does not require a priori knowledge of α. We note that if α is Ω (log(nL/δ)), then this improved algorithm sends only O(L + T) bits, and is therefore within a constant factor of optimal.","PeriodicalId":240048,"journal":{"name":"Proceedings of the 21st International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Scalable Algorithm for Multiparty Interactive Communication with Private Channels\",\"authors\":\"Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia\",\"doi\":\"10.1145/3369740.3369771\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A group of n players wants to run a distributed protocol ρ over a network where communication occurs via private point-to-point channels. Unfortunately, an adversary, who knows P, is able to maliciously flip bits on the channels. Can we efficiently simulate ρ in the presence of such an adversary? We show that this is possible, even when L, the number of bits sent in ρ, and T, the number of bits flipped by the adversary are not known in advance. In particular, we show how to create a robust version of ρ, ρ' such that 1) ρ' fails with probability at most δ, for any δ > 0; and 2) ρ' sends Õ (L + T) bits, where the Õ notation hides a log(nL/δ) term multiplying L. Critically, our result requires that ρ be a protocol that runs correctly in an asynchronous network; in contrast, our protocol ρ' must run in a synchronous network. Additionally, we show how to improve this result when the average message size is not constant. In particular, we show how to create a protocol ρ' that sends O(L(1 + (1/α) log(nL/δ)) + T) bits, where α is the average message size. This new ρ' is adaptive in that it does not require a priori knowledge of α. We note that if α is Ω (log(nL/δ)), then this improved algorithm sends only O(L + T) bits, and is therefore within a constant factor of optimal.\",\"PeriodicalId\":240048,\"journal\":{\"name\":\"Proceedings of the 21st International Conference on Distributed Computing and Networking\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 21st International Conference on Distributed Computing and Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3369740.3369771\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 21st International Conference on Distributed Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3369740.3369771","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

一组n个玩家想要在网络上运行一个分布式协议ρ,其中通信通过私有点对点通道进行。不幸的是,一个知道P的对手能够恶意地翻转信道上的比特。我们能在这样一个对手存在的情况下有效地模拟ρ吗?我们证明了这是可能的,即使当L,输入ρ的比特数,和T,对手翻转的比特数事先不知道。特别地,我们展示了如何创建一个鲁棒版本的ρ, ρ'使得1)ρ'失效的概率不超过δ,对于任何δ > 0;2) ρ'发送Õ (L + T)位,其中Õ符号隐藏了log(nL/δ)项乘以L。关键的是,我们的结果要求ρ是一个在异步网络中正确运行的协议;相反,我们的协议ρ'必须在同步网络中运行。此外,我们还展示了在平均消息大小不恒定时如何改进此结果。特别是,我们展示了如何创建一个协议ρ',它发送O(L(1 + (1/α) log(nL/δ)) + T)位,其中α是平均消息大小。这个新的ρ'是自适应的,因为它不需要先验的α知识。我们注意到,如果α是Ω (log(nL/δ)),那么这种改进的算法只发送O(L + T)位,因此在最优的常数因子内。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Scalable Algorithm for Multiparty Interactive Communication with Private Channels
A group of n players wants to run a distributed protocol ρ over a network where communication occurs via private point-to-point channels. Unfortunately, an adversary, who knows P, is able to maliciously flip bits on the channels. Can we efficiently simulate ρ in the presence of such an adversary? We show that this is possible, even when L, the number of bits sent in ρ, and T, the number of bits flipped by the adversary are not known in advance. In particular, we show how to create a robust version of ρ, ρ' such that 1) ρ' fails with probability at most δ, for any δ > 0; and 2) ρ' sends Õ (L + T) bits, where the Õ notation hides a log(nL/δ) term multiplying L. Critically, our result requires that ρ be a protocol that runs correctly in an asynchronous network; in contrast, our protocol ρ' must run in a synchronous network. Additionally, we show how to improve this result when the average message size is not constant. In particular, we show how to create a protocol ρ' that sends O(L(1 + (1/α) log(nL/δ)) + T) bits, where α is the average message size. This new ρ' is adaptive in that it does not require a priori knowledge of α. We note that if α is Ω (log(nL/δ)), then this improved algorithm sends only O(L + T) bits, and is therefore within a constant factor of optimal.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信