scispace - formally typeset
Open AccessPosted Content

Security, fault tolerance, and communication complexity in distributed systems

Reads0
Chats0
TLDR
This work addresses the problem of computing a general function of several private inputs distributed among the processors of a network, while ensuring the correctness of the results and the privacy of the inputs, despite accidental or malicious faults in the system.
Abstract
We present efficient and practical algorithms for a large, distributed system of processors to achieve reliable computations in a secure manner Specifically, we address the problem of computing a general function of several private inputs distributed among the processors of a network, while ensuring the correctness of the results and the privacy of the inputs, despite accidental or malicious faults in the system Communication is often the most significant bottleneck in distributed computing Our algorithms maintain a low cost in local processing time, are the first to achieve optimal levels of fault-tolerance, and most importantly, have low communication complexity In contrast to the best known previous methods, which require large numbers of rounds even for fairly simple computations, we devise protocols that use small messages and a constant number of rounds regardless of the complexity of the function to be computed Through direct algebraic approaches, we separate the communication complexity of secure computing from the computational complexity of the function to be computed We examine security under both the modern approach of computational complexity-based cryptography and the classical approach of unconditional, information-theoretic security We develop a clear and concise set of definitions that support formal proofs of claims to security, addressing an important deficiency in the literature Our protocols are provably secure In the realm of information-theoretic security, we characterize those functions which two parties can compute jointly with absolute privacy We also characterize those functions which a weak processor can compute using the aid of powerful processors without having to reveal the instances of the problem it would like to solve Our methods include a promising new technique called a locally random reduction, which has given rise not only to efficient solutions for many of the problems considered in this work but to several powerful new results in complexity theory

read more

Citations
More filters
Book ChapterDOI

Efficient Multiparty Protocols Using Circuit Randomization

TL;DR: This protocol replaces each secret multiplication -- multiplication that requires further sharing, addition, zero-knowledge proofs, and secret reconstruction -- that is used during the body of a standard protocol by a simple reconstruction of secretly shared values, thereby reducing rounds by an order of magnitude.
Proceedings ArticleDOI

The round complexity of secure protocols

TL;DR: It is shown that a rigorously-specified and extremely strong notion of secure function evaluation can be achieved by a protocol which requires only a fixed constant number of rounds of interaction, and this result assumes only the existence of a one-way function.
Proceedings ArticleDOI

Fair exchange with a semi-trusted third party (extended abstract)

TL;DR: New protocols for two parties to exchange documents with fairness are presented, such that no party can gain an advantage by quitting prematurely or otherwise misbehaving, and a third party that is L‘semi-trusted is used, in the sense that it may misbehave on its own but will not conspire with either of the main parties.
Journal ArticleDOI

Efficient generation of shared RSA keys

TL;DR: Efficient techniques for a number of parties to jointly generate an RSA key are described and each party holds a share of the private exponent that enables threshold decryption.
Book ChapterDOI

Foundations of Secure Interactive Computing

TL;DR: Relative resilience provides modular proof techniques that other approaches lack: one may compare a sequence of protocols ranging from the real-world protocol to the ideal protocol, proving the relative resilience of each successive protocol with greater clarity and less complexity.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations

TL;DR: In this paper, it was shown that the likelihood ratio test for fixed sample size can be reduced to this form, and that for large samples, a sample of size $n$ with the first test will give about the same probabilities of error as a sample with the second test.
Proceedings ArticleDOI

Protocols for secure computations

TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Related Papers (5)