Towards secure and scalable computation in peer-to-peer networks

被引:0
|
作者
King, Valerie [1 ]
Saia, Jared [2 ]
Sanwalani, Vishal [3 ]
Vee, Erik [4 ]
机构
[1] Univ Victoria, Dept Comp Sci, POB 3055, Victoria, BC V8W 3P6, Canada
[2] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[3] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON, Canada
[4] IBM Corp, Almaden Res Ctr, 650 Harry Rd, San Jose, CA 95120 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem requires that all uncorrupted processors come to an agreement on a bit initially held by one of the uncorrupted processors; the second requires that the uncorrupted processors choose a leader who is uncorrupted. Motivated by the need for robust and scalable computation in peer-to-peer networks, we design the first scalable protocols for these problems for a network whose degree is polylogarithmic in its size. By scalable, we mean that each uncorrupted processor sends and processes a number of bits that is only polylogarithmic in n. We assume no limit on the number of messages sent by corrupted processors.) With high probability, our Byzantine Agreement protocol results in agreement among a 1-O(1/ln n) fraction of the uncorrupted processors. With constant probability, our Leader Election protocol elects an uncorrupted leader and ensures that a 1-O(1/ln n) fraction of the uncorrupt processors know this leader. We assume a full information model. Thus, the adversary is assumed to have unlimited computational power and has access to all communications, but does not have access to processors' private random bits.
引用
收藏
页码:87 / +
页数:2
相关论文
共 50 条
  • [1] Scalable and secure peer-to-peer systems with support for QoS
    Shukla, J
    FIRST INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, 2002, : 47 - 47
  • [2] Secure peer-to-peer networks for trusted collaboration
    Hamlen, Kevin W.
    Thuraisingham, Bhavani
    2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 58 - 63
  • [3] Rhubarb: a tool for developing scalable and secure peer-to-peer applications
    Wierzbicki, A
    Strzelecki, R
    Swierczewski, D
    Znojek, M
    SECOND INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2002, : 144 - 151
  • [4] Towards a Secure Peer-to-Peer Federated Learning Framework
    Piotrowski, Tim
    Nochta, Zoltan
    ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING, ESOCC 2022, 2022, 1617 : 19 - 31
  • [5] Peer-to-Peer Secure Multi-Party Numerical Computation
    Bickson, Danny
    Dolev, Danny
    Bezman, Genia
    Pinkas, Benny
    P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, : 257 - +
  • [6] Scalable Video Streaming in Wireless Peer-to-Peer Networks
    Oezbilgin, Tugba
    Sunay, M. Oguz
    2008 IEEE 16TH SIGNAL PROCESSING, COMMUNICATION AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2008, : 372 - 375
  • [7] On scalable multimedia messaging services in peer-to-peer networks
    Shim, Eunsoo
    Narayanan, Sathya
    2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 319 - 324
  • [8] PACKETIZING SCALABLE STREAMS IN HETEROGENUS PEER-TO-PEER NETWORKS
    Sentinelli, Alexandro
    Anselmo, Tea
    Fragneto, Pasqualina
    Kumar, Amit
    Rossi, Beatrice
    2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2011,
  • [9] Scalable blind search and broadcasting in peer-to-peer networks
    Vishnevsky, Vladimir
    Safonov, Alexander
    Yakimov, Mikhail
    Shim, Eunsoo
    Gelman, Alexander D.
    SIXTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2006, : 259 - +
  • [10] Scalable and continuous media streaming on peer-to-peer networks
    Sasabe, M
    Wakamiya, N
    Murata, M
    Miyahara, H
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 92 - 99