【24h】

Improved Fault Tolerance and Secure Computation on Sparse Networks

机译:稀疏网络上的改进的容错能力和安全计算

获取原文

摘要

In the problem of almost-everywhere agreement (denoted a.e. agreement), introduced by Dwork, Peleg, Pippenger, and Upfal [STOC '86], n parties want to reach agreement on an initially held value, despite the possible disruptive and malicious behavior of up to t of them. So far this is reminiscent of the classical Byzantine agreement problem, except that in the alternative formulation the underlying connectivity graph is sparse—i.e., not all parties share point-to-point reliable channels—thus modeling the actual connectivity of real communication networks. In this setting, one may not be able to guarantee agreement amongst all honest parties, and some of them, say x, must be given up. Thus, in this line of work the goal is to be able to tolerate a high value for t (a constant fraction of n is the best possible) while minimizing x. As shown in the original paper, the dependency on d, the degree of the network, to achieve this goal is paramount. Indeed, the best polynomial-time a.e. agreement protocol tolerating a constant fraction of corruptions t = an, for some constant a > 0 (presented in the original paper, over two decades ago) has parameters, d = n~ε for constant ε > 0 and x —μt for some constant μ > 1. In this work, we significantly improve on the above parameters obtaining a protocol with t = αn, d = O(log~q n), for constant q > 0 and x = O(t/lob n). Our approach follows that of Dwork et al. of reducing the a.e. agreement problem to constructing a reliable transmission scheme between pairs of nodes for a large fraction of them; however, given our setting's more stringent conditions—poly-logarithmic degree and a linear number of corruptions, such a task is significantly harder. We also consider the problem of secure computation on partially connected networks, as formulated by Garay and Ostrovsky [Eurocrypt '08], and as a corollary to our main result obtain an almost-everywhere secure multi-party computation protocol with the same parameters as above, again significantly improving on the bound on the number of left-out parties-x = O{t/log n) for t ≤ an corruptions, as opposed to x = O(t) in the original work.
机译:在Dwork,Peleg,Pippenger和Upfal [STOC '86]引入的几乎所有地方的协议(表示为ae协议)的问题中,n个参与者都希望就最初持有的价值达成协议,尽管最多t个。到目前为止,这让人回想起经典的拜占庭协议问题,除了在替代的表述中,底层的连通性图稀疏(即,并非所有参与方共享点对点的可靠通道),从而为真实通信网络的实际连通性建模。在这种情况下,可能无法保证所有诚实当事方之间的协议,因此必须放弃其中一些,例如x。因此,在这方面的工作目标是在最小化x的同时​​能够容忍t的高值(n的恒定分数是最好的)。如原始论文所示,对d的依赖(网络的程度)是至关重要的。确实,最佳多项式时间a.e.容忍恒定数量的破坏的协议协议t = an,对于某个常数a> 0(在二十年前的原始论文中已经提出)具有参数,d = n〜ε表示常数ε> 0,x-μt表示某些常数μ> 1.在这项工作中,我们对上述参数进行了显着改进,获得了对于常数q> 0和x = O(t / lob n)的t =αn,d = O(log〜qn)的协议。我们的方法遵循Dwork等人的方法。减少a.e.在很大一部分节点对之间构造可靠的传输方案时存在协议问题;但是,鉴于我们设置的条件更加严格-多对数度和线性数量的腐败,这样的任务要困难得多。我们还考虑了由Garay和Ostrovsky [Eurocrypt '08]提出的部分连接的网络上的安全计算问题,作为对我们主要结果的推论,获得了具有与上述相同参数的几乎所有地方的安全多方计算协议,相对于原始工作中的x = O(t),对于t≤a损坏,再次显着改善了遗弃方的数量范围-x = O {t / log n)。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号