{"title":"针对对抗边的一般拥塞编译器","authors":"Yael Hitron, M. Parter","doi":"10.4230/LIPIcs.DISC.2021.24","DOIUrl":null,"url":null,"abstract":"We consider the adversarial CONGEST model of distributed computing in which a fixed number of edges (or nodes) in the graph are controlled by a computationally unbounded adversary that corrupts the computation by sending malicious messages over these (a-priori unknown) controlled edges. As in the standard CONGEST model, communication is synchronous, where per round each processor can send O ( log n ) bits to each of its neighbors. This paper is concerned with distributed algorithms that are both time efficient (in terms of the number of rounds), as well as, robust against a fixed number of adversarial edges. Unfortunately, the existing algorithms in this setting usually assume that the communication graph is complete ( n -clique), and very little is known for graphs with arbitrary topologies. We fill in this gap by extending the methodology of [Parter and Yogev, SODA 2019] and provide a compiler that simulates any CONGEST algorithm A (in the reliable setting) into an equivalent algorithm A ′ in the adversarial CONGEST model. Specifically, we show the following for every ( 2 f + 1 ) edge-connected graph of diameter D :","PeriodicalId":89463,"journal":{"name":"Proceedings of the ... International Symposium on High Performance Distributed Computing","volume":"76 1","pages":"24:1-24:18"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"General CONGEST Compilers against Adversarial Edges\",\"authors\":\"Yael Hitron, M. Parter\",\"doi\":\"10.4230/LIPIcs.DISC.2021.24\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider the adversarial CONGEST model of distributed computing in which a fixed number of edges (or nodes) in the graph are controlled by a computationally unbounded adversary that corrupts the computation by sending malicious messages over these (a-priori unknown) controlled edges. As in the standard CONGEST model, communication is synchronous, where per round each processor can send O ( log n ) bits to each of its neighbors. This paper is concerned with distributed algorithms that are both time efficient (in terms of the number of rounds), as well as, robust against a fixed number of adversarial edges. Unfortunately, the existing algorithms in this setting usually assume that the communication graph is complete ( n -clique), and very little is known for graphs with arbitrary topologies. We fill in this gap by extending the methodology of [Parter and Yogev, SODA 2019] and provide a compiler that simulates any CONGEST algorithm A (in the reliable setting) into an equivalent algorithm A ′ in the adversarial CONGEST model. Specifically, we show the following for every ( 2 f + 1 ) edge-connected graph of diameter D :\",\"PeriodicalId\":89463,\"journal\":{\"name\":\"Proceedings of the ... International Symposium on High Performance Distributed Computing\",\"volume\":\"76 1\",\"pages\":\"24:1-24:18\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... International Symposium on High Performance Distributed Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4230/LIPIcs.DISC.2021.24\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... International Symposium on High Performance Distributed Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/LIPIcs.DISC.2021.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
摘要
我们考虑分布式计算的对抗性CONGEST模型,其中图中固定数量的边(或节点)由计算无界的对手控制,该对手通过在这些(先验未知的)控制边上发送恶意消息来破坏计算。在标准的CONGEST模型中,通信是同步的,每轮每个处理器可以向每个邻居发送O (log n)位。本文关注的分布式算法既具有时间效率(就轮数而言),又具有对固定数量的对抗性边的鲁棒性。不幸的是,在这种情况下,现有的算法通常假设通信图是完整的(n -clique),并且对于具有任意拓扑的图知之甚少。我们通过扩展[partner and Yogev, SODA 2019]的方法来填补这一空白,并提供一个编译器,将任何CONGEST算法a(在可靠设置中)模拟为对抗性CONGEST模型中的等效算法a '。具体来说,我们对每一个直径为D的(2f + 1)边连通图表示如下:
General CONGEST Compilers against Adversarial Edges
We consider the adversarial CONGEST model of distributed computing in which a fixed number of edges (or nodes) in the graph are controlled by a computationally unbounded adversary that corrupts the computation by sending malicious messages over these (a-priori unknown) controlled edges. As in the standard CONGEST model, communication is synchronous, where per round each processor can send O ( log n ) bits to each of its neighbors. This paper is concerned with distributed algorithms that are both time efficient (in terms of the number of rounds), as well as, robust against a fixed number of adversarial edges. Unfortunately, the existing algorithms in this setting usually assume that the communication graph is complete ( n -clique), and very little is known for graphs with arbitrary topologies. We fill in this gap by extending the methodology of [Parter and Yogev, SODA 2019] and provide a compiler that simulates any CONGEST algorithm A (in the reliable setting) into an equivalent algorithm A ′ in the adversarial CONGEST model. Specifically, we show the following for every ( 2 f + 1 ) edge-connected graph of diameter D :