scispace - formally typeset
Journal ArticleDOI

A theoretical and empirical evaluation of an algorithm for self-healing computation

George Saad, +1 more
- 01 Dec 2017 - 
- Vol. 30, Iss: 6, pp 391-412
Reads0
Chats0
TLDR
A self-healing algorithm for the problem of reliable multiparty computation, in which n parties want to jointly compute a function f over n inputs, that can reduce message cost by a factor of 432 when compared with algorithms that are not self- healing.
Abstract
In the problem of reliable multiparty computation (RMC), there are n parties, each with an individual input, and the parties want to jointly compute a function f over n inputs; note that it is not required to keep the inputs private. The problem is complicated by the fact that an omniscient adversary controls a hidden fraction of the parties. We describe a self-healing algorithm for this problem. In particular, for a fixed function f, with n parties and m gates, we describe how to perform RMC repeatedly as the inputs to f change. Our algorithm maintains the following properties, even when an adversary controls up to $$t \le (\frac{1}{4} - \epsilon ) n$$ parties, for any constant $$\epsilon >0$$ . First, our algorithm performs each reliable computation with the following amortized resource costs: $$O(m + n \log n)$$ messages, $$O(m + n \log n)$$ computational operations, and $$O(\ell )$$ latency, where $$\ell $$ is the depth of the circuit that computes f. Second, the expected total number of corruptions is $$O(t (\log ^*{m})^2)$$ , after which the adversarially controlled parties are effectively quarantined so that they cause no more corruptions. Empirical results show that our algorithm can reduce message cost by a factor of 432 when compared with algorithms that are not self-healing.

read more

Citations
More filters
Proceedings ArticleDOI

Random graphs

TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Posted Content

Resource Burning for Permissionless Systems.

TL;DR: This paper surveys the literature on resource burning; takes positions based on predictions of how the tool is likely to evolve; and proposes several open problems targeted at the theoretical distributed-computing research community.
Book ChapterDOI

Resource Burning for Permissionless Systems (Invited Paper)

TL;DR: Proof-of-work puzzles and CAPTCHAS are examples of resource burning: verifiable consumption of resources solely to convey information.
Proceedings ArticleDOI

Fully Compact Routing in Low Memory Self-Healing Trees

TL;DR: This paper devise the first self-healing compact routing algorithm that can be fully set up and executed in low memory and develops a local function which each node invokes to instantly compute and then relay its repair instructions in only O(1) time.
Posted Content

Some Problems in Compact Message Passing

TL;DR: The Compact Message Passing (CMP) model is introduced; an extension of the standard message passing model considered at a finer granularity where a node can interleave reads and writes with internal computations, using a port only once in a round.
References
More filters
Proceedings ArticleDOI

Random graphs

TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Proceedings ArticleDOI

Protocols for secure computations

TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Proceedings Article

Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)

TL;DR: The above bounds on t, where t is the number of players in actors, are tight!
Proceedings ArticleDOI

Completeness theorems for non-cryptographic fault-tolerant distributed computation

TL;DR: In this article, the authors show that every function of n inputs can be efficiently computed by a complete network of n processors in such a way that if no faults occur, no set of size t can be found.
Related Papers (5)