Journal ArticleDOI
A theoretical and empirical evaluation of an algorithm for self-healing computation
George Saad,Jared Saia +1 more
Reads0
Chats0
TLDR
A self-healing algorithm for the problem of reliable multiparty computation, in which n parties want to jointly compute a function f over n inputs, that can reduce message cost by a factor of 432 when compared with algorithms that are not self- healing.Abstract:
In the problem of reliable multiparty computation (RMC), there are n parties, each with an individual input, and the parties want to jointly compute a function f over n inputs; note that it is not required to keep the inputs private. The problem is complicated by the fact that an omniscient adversary controls a hidden fraction of the parties. We describe a self-healing algorithm for this problem. In particular, for a fixed function f, with n parties and m gates, we describe how to perform RMC repeatedly as the inputs to f change. Our algorithm maintains the following properties, even when an adversary controls up to $$t \le (\frac{1}{4} - \epsilon ) n$$
parties, for any constant $$\epsilon >0$$
. First, our algorithm performs each reliable computation with the following amortized resource costs: $$O(m + n \log n)$$
messages, $$O(m + n \log n)$$
computational operations, and $$O(\ell )$$
latency, where $$\ell $$
is the depth of the circuit that computes f. Second, the expected total number of corruptions is $$O(t (\log ^*{m})^2)$$
, after which the adversarially controlled parties are effectively quarantined so that they cause no more corruptions. Empirical results show that our algorithm can reduce message cost by a factor of 432 when compared with algorithms that are not self-healing.read more
Citations
More filters
Proceedings ArticleDOI
Random graphs
TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Posted Content
Resource Burning for Permissionless Systems.
TL;DR: This paper surveys the literature on resource burning; takes positions based on predictions of how the tool is likely to evolve; and proposes several open problems targeted at the theoretical distributed-computing research community.
Book ChapterDOI
Resource Burning for Permissionless Systems (Invited Paper)
TL;DR: Proof-of-work puzzles and CAPTCHAS are examples of resource burning: verifiable consumption of resources solely to convey information.
Proceedings ArticleDOI
Fully Compact Routing in Low Memory Self-Healing Trees
TL;DR: This paper devise the first self-healing compact routing algorithm that can be fully set up and executed in low memory and develops a local function which each node invokes to instantly compute and then relay its repair instructions in only O(1) time.
Posted Content
Some Problems in Compact Message Passing
TL;DR: The Compact Message Passing (CMP) model is introduced; an extension of the standard message passing model considered at a finer granularity where a node can interleave reads and writes with internal computations, using a port only once in a round.
References
More filters
Proceedings ArticleDOI
Random graphs
TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Proceedings ArticleDOI
Protocols for secure computations
TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Proceedings Article
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)
TL;DR: The above bounds on t , where t is the number of players in actors, are tight!
Proceedings ArticleDOI
Completeness theorems for non-cryptographic fault-tolerant distributed computation
TL;DR: In this article, the authors show that every function of n inputs can be efficiently computed by a complete network of n processors in such a way that if no faults occur, no set of size t can be found.