Towards secure and scalable computation in peer-to-peer networks

被引:0
作者
King, Valerie [1 ]
Saia, Jared [2 ]
Sanwalani, Vishal [3 ]
Vee, Erik [4 ]
机构
[1] Univ Victoria, Dept Comp Sci, POB 3055, Victoria, BC V8W 3P6, Canada
[2] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[3] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON, Canada
[4] IBM Corp, Almaden Res Ctr, 650 Harry Rd, San Jose, CA 95120 USA
来源
47TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS | 2006年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem requires that all uncorrupted processors come to an agreement on a bit initially held by one of the uncorrupted processors; the second requires that the uncorrupted processors choose a leader who is uncorrupted. Motivated by the need for robust and scalable computation in peer-to-peer networks, we design the first scalable protocols for these problems for a network whose degree is polylogarithmic in its size. By scalable, we mean that each uncorrupted processor sends and processes a number of bits that is only polylogarithmic in n. We assume no limit on the number of messages sent by corrupted processors.) With high probability, our Byzantine Agreement protocol results in agreement among a 1-O(1/ln n) fraction of the uncorrupted processors. With constant probability, our Leader Election protocol elects an uncorrupted leader and ensures that a 1-O(1/ln n) fraction of the uncorrupt processors know this leader. We assume a full information model. Thus, the adversary is assumed to have unlimited computational power and has access to all communications, but does not have access to processors' private random bits.
引用
收藏
页码:87 / +
页数:2
相关论文
共 28 条
[1]  
ABRAMS Z, 2004, 2 WORKSH EC PEER PEE
[2]  
AWERBUCH B, 2004, 31 INT C AUT LANG PR
[3]  
Ben-Or M., 1994, Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, P183, DOI 10.1145/197917.198088
[4]  
BENOR M, 1993, P 25 ACM S THEOR COM
[5]  
BENOR M, 2006, P 38 ANN ACM S THEOR
[6]  
BENOR M, 1996, INFORMATION PROCESSI
[7]  
BERMAN P, 1990, 4 INT WORKSH DISTR A
[8]  
BERMAN P, 1989, P ICALP 89 16 INT C
[9]   Collaborative filtering with privacy [J].
Canny, J .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :45-57
[10]   FAST PERFECT-INFORMATION LEADER-ELECTION PROTOCOLS WITH LINEAR IMMUNITY [J].
COOPER, J ;
LINIAL, N .
COMBINATORICA, 1995, 15 (03) :319-332