首页> 外文会议>Distributed Computing >Optimizing Threshold Protocols in Adversarial Structures
【24h】

Optimizing Threshold Protocols in Adversarial Structures

机译:在对抗结构中优化阈值协议

获取原文
获取原文并翻译 | 示例

摘要

Many replication protocols are using a threshold model in which failures are independent and identically distributed (IID). In this model, one assumes that no more than t out of n components can fail. In many real systems, however, failures are not IID, and a straightforward application of threshold protocols yields suboptimal results. Here, we examine the problem of optimally transforming threshold protocols into survivor-set protocols tolerating dependent failures. In particular, we are interested in threshold protocols where the number of components n and the number of failures t are related by n > k · t, where k is a positive integer constant k. We develop an optimal transformation that translates any such threshold protocol to a survivor-set dependent failure model, and hence, to adversarial structures. Our transformation does not require authentication, self-verification or encryption. We characterize equivalence classes of adversarial structures, regarding solvability, using certain hierarchical properties based on set intersection.
机译:许多复制协议都使用阈值模型,其中故障是独立且相同分布的(IID)。在此模型中,假设n个组件中最多只能有t个发生故障。但是,在许多实际系统中,失败不是IID,直接应用阈值协议会产生次优的结果。在这里,我们研究了将阈值协议最佳地转换为可耐受相关失败的幸存者协议的问题。特别是,我们对阈值协议感兴趣,其中组件数n和失败数t与n> k·t相关,其中k是正整数常数k。我们开发了一种最佳转换,可以将任何此类阈值协议转换为依赖于幸存者集的故障模型,从而转换为对抗性结构。我们的转换不需要身份验证,自我验证或加密。我们使用基于集合相交的某些层次属性,描述了与可解性有关的对抗结构的等价类。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号