首页 > 最新文献

Proceedings of the 2014 ACM symposium on Principles of distributed computing最新文献

英文 中文
Session details: Session 12 会话详情:会话12
J. Sifakis
{"title":"Session details: Session 12","authors":"J. Sifakis","doi":"10.1145/3246726","DOIUrl":"https://doi.org/10.1145/3246726","url":null,"abstract":"","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114657846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 11 会话详情:会话11
P. Kuznetsov
{"title":"Session details: Session 11","authors":"P. Kuznetsov","doi":"10.1145/3246725","DOIUrl":"https://doi.org/10.1145/3246725","url":null,"abstract":"","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121829665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brief announcement: a generic construction for nonblocking dual containers 简短声明:非阻塞双容器的通用结构
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611510
Joseph Izraelevitz, M. Scott
A dual container has the property that when it is empty, the remove method will insert an explicit reservation (antidata) into the container, rather than returning an error flag. This convention gives the container explicit control over the order in which pending requests will be satisfied once data becomes available. The dual pattern also allows the method's caller to spin on a thread-local flag, avoiding memory contention. In this paper we introduce a new nonblocking construction that allows any nonblocking container for data to be paired with almost any nonblocking container for antidata. This construction provides a composite ordering discipline - e.g., it can satisfy pending pops from a stack in FIFO order, or satisfy pending dequeues in order of thread priority.
双容器具有这样的属性:当容器为空时,remove方法将向容器插入一个显式保留(反数据),而不是返回一个错误标志。这种约定使容器可以显式地控制数据可用时满足挂起请求的顺序。双重模式还允许方法的调用者在线程本地标志上旋转,从而避免内存争用。在本文中,我们引入了一种新的非阻塞结构,它允许任何数据的非阻塞容器与几乎任何反数据的非阻塞容器配对。这个结构提供了一个复合的排序规则——例如,它可以满足FIFO顺序从堆栈中取出待处理的pop,或者满足线程优先级顺序的待处理dequeues。
{"title":"Brief announcement: a generic construction for nonblocking dual containers","authors":"Joseph Izraelevitz, M. Scott","doi":"10.1145/2611462.2611510","DOIUrl":"https://doi.org/10.1145/2611462.2611510","url":null,"abstract":"A dual container has the property that when it is empty, the remove method will insert an explicit reservation (antidata) into the container, rather than returning an error flag. This convention gives the container explicit control over the order in which pending requests will be satisfied once data becomes available. The dual pattern also allows the method's caller to spin on a thread-local flag, avoiding memory contention. In this paper we introduce a new nonblocking construction that allows any nonblocking container for data to be paired with almost any nonblocking container for antidata. This construction provides a composite ordering discipline - e.g., it can satisfy pending pops from a stack in FIFO order, or satisfy pending dequeues in order of thread priority.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122728290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Session details: Session 10 会话详情:会话10
P. Spirakis
{"title":"Session details: Session 10","authors":"P. Spirakis","doi":"10.1145/3246724","DOIUrl":"https://doi.org/10.1145/3246724","url":null,"abstract":"","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114294253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The future(s) of shared data structures 共享数据结构的未来
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611496
Alex Kogan, M. Herlihy
This paper considers how to use futures, a well-known mechanism to manage parallel computations, to improve the performance of long-lived, mutable shared data structures in large-scale multicore systems. We show that futures can enable type-specific optimizations such as combining and elimination, improve cache locality and reduce contention. To exploit these benefits in an effective way, however, it is important to define clear notions of correctness. We propose new extensions to linearizability appropriate for method calls that return futures as results. To illustrate the utility and trade-offs of these extensions, we describe implementations of three common data structures: stacks, queues, and linked lists, designed to exploit futures. Our experimental results show that optimizations enabled by futures lead to substantial performance improvements, in some cases up to two orders of magnitude, compared to well-known lock-free alternatives.
本文考虑了如何使用期货机制(一种众所周知的管理并行计算的机制)来提高大规模多核系统中长期可变共享数据结构的性能。我们展示了future可以实现特定类型的优化,例如组合和消除,提高缓存局域性并减少争用。然而,为了有效地利用这些好处,定义清楚的正确性概念是很重要的。我们对线性化提出了新的扩展,适用于返回期货作为结果的方法调用。为了说明这些扩展的效用和利弊,我们描述了三种常见数据结构的实现:堆栈、队列和链表,它们旨在利用未来。我们的实验结果表明,与众所周知的无锁替代方案相比,由期货实现的优化导致了实质性的性能改进,在某些情况下高达两个数量级。
{"title":"The future(s) of shared data structures","authors":"Alex Kogan, M. Herlihy","doi":"10.1145/2611462.2611496","DOIUrl":"https://doi.org/10.1145/2611462.2611496","url":null,"abstract":"This paper considers how to use futures, a well-known mechanism to manage parallel computations, to improve the performance of long-lived, mutable shared data structures in large-scale multicore systems. We show that futures can enable type-specific optimizations such as combining and elimination, improve cache locality and reduce contention. To exploit these benefits in an effective way, however, it is important to define clear notions of correctness. We propose new extensions to linearizability appropriate for method calls that return futures as results. To illustrate the utility and trade-offs of these extensions, we describe implementations of three common data structures: stacks, queues, and linked lists, designed to exploit futures. Our experimental results show that optimizations enabled by futures lead to substantial performance improvements, in some cases up to two orders of magnitude, compared to well-known lock-free alternatives.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Brief announcement: Super-fast t-ruling sets 简短声明:超快的t-ruling sets
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611512
Tushar Bisht, Kishore Kothapalli, S. Pemmaraju
A t-ruling set of a graph G = (V, E) is a vertex-subset S ⊆ V that is independent and satisfies the property that every vertex v ∈ V is at a distance of at most t hops from some vertex in S. A maximal independent set (MIS) is a 1-ruling set. Extending results from Kothapalli et al. (FSTTCS 2012) this note presents a randomized algorithm for computing, with high probability, a t-ruling set in O(t ⋅ log1/(t-1)n) rounds for 2 < t ≤ √(log log n) and in (O(√(log log n))) rounds for t > √(log log n).
图G = (V, E)的t-统治集是一个独立的、满足每个顶点V∈V与S中的某个顶点相距不超过t跳的性质的顶点子集S。最大独立集(MIS)是一个1统治集。本文扩展了Kothapalli et al. (FSTTCS 2012)的结果,提出了一种随机算法,用于高概率地计算t-统治集,对于2 < t≤√(log log n),在O(t·log1/(t-1)n)轮中,对于t >√(log log n),在(O(√(log log n)))轮中。
{"title":"Brief announcement: Super-fast t-ruling sets","authors":"Tushar Bisht, Kishore Kothapalli, S. Pemmaraju","doi":"10.1145/2611462.2611512","DOIUrl":"https://doi.org/10.1145/2611462.2611512","url":null,"abstract":"A t-ruling set of a graph G = (V, E) is a vertex-subset S ⊆ V that is independent and satisfies the property that every vertex v ∈ V is at a distance of at most t hops from some vertex in S. A maximal independent set (MIS) is a 1-ruling set. Extending results from Kothapalli et al. (FSTTCS 2012) this note presents a randomized algorithm for computing, with high probability, a t-ruling set in O(t ⋅ log1/(t-1)n) rounds for 2 < t ≤ √(log log n) and in (O(√(log log n))) rounds for t > √(log log n).","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Complexity tradeoffs for read and update operations 读取和更新操作的复杂性权衡
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611472
Danny Hendler, V. Khait
Recent work established that some restricted-use objects, such as max registers, counters and atomic snapshots, admit polylogarithmic step-/complexity wait-free implementations using only reads and writes: when only polynomially-many updates are allowed, reading the object (by performing a ReadMax, CounterRead or Scan operation, depending on the object's type) incurs O(log N) steps (where N is the number of processes), which was shown to be optimal. But what about the step-/complexity of update operations? With these implementations, updating the object's state (by performing a WriteMax, Counter Increment or Update operation, depending on the object's type) requires Ω(log N) steps. The question that we address in this work is the following: are there read-optimal implementations of these restricted-use objects for which the asymptotic step-/complexity of update operations is sub-logarithmic? We present tradeoffs between the step-/complexity of read and update operations on these objects, establishing that updating a read-optimal counter or snapshot incurs Ω(log N) steps. These tradeoffs hold also if compare-and-swap (CAS) operations may be used, in addition to reads and writes. We also derive a tradeoff between the step-complexities of read and update operations of M-bounded max registers: if the step-/complexity of the Read-Max operation is O(f(min(N,M))), then the step-/complexity of the Write-Max operation is Ω(log log min(N,M)/log f(min(N,M))). It follows from this tradeoff that the step-/complexity of Write-Max in any read-/optimal implementation of a max register from read, write and CAS is Ω(log log min(N,M)). On the positive side, we present a wait-free implementation of an M-bounded max register from read, write and CAS for which the step complexities of Read-Max and Write-Max operations are O(1) and O(log min(N,M)), respectively.
最近的研究表明,一些限制使用的对象,如最大寄存器、计数器和原子快照,允许只使用读和写的多对数步骤/复杂度无等待实现:当只允许多项式多次更新时,读取对象(通过执行ReadMax、CounterRead或Scan操作,取决于对象的类型)会导致O(log N)步(其中N是进程数),这被证明是最优的。但是更新操作的步骤/复杂性如何呢?使用这些实现,更新对象的状态(通过执行WriteMax、Counter Increment或Update操作,取决于对象的类型)需要Ω(log N)个步骤。我们在这项工作中解决的问题是:是否存在这些限制使用对象的读取最佳实现,其更新操作的渐近步长/复杂性是次对数的?我们在这些对象上的读取和更新操作的步长/复杂度之间进行了权衡,确定了更新读取最优计数器或快照需要Ω(log N)个步骤。除了读和写之外,如果可能使用比较和交换(CAS)操作,这些权衡也会保持不变。我们还得出了M-bounded max寄存器的读取和更新操作的步长复杂度之间的权衡:如果read - max操作的步长复杂度为O(f(min(N,M))),那么Write-Max操作的步长复杂度为Ω(log log min(N,M)/log f(min(N,M)))。从这种权衡中可以得出,在从读、写和CAS实现最大寄存器的任何读/最优实现中,write - max的步长/复杂度为Ω(log log min(N,M))。在积极的方面,我们提出了一个无等待的实现,从读,写和CAS的M有界最大寄存器,其中读-最大和写-最大操作的步骤复杂性分别为O(1)和O(log min(N,M))。
{"title":"Complexity tradeoffs for read and update operations","authors":"Danny Hendler, V. Khait","doi":"10.1145/2611462.2611472","DOIUrl":"https://doi.org/10.1145/2611462.2611472","url":null,"abstract":"Recent work established that some restricted-use objects, such as max registers, counters and atomic snapshots, admit polylogarithmic step-/complexity wait-free implementations using only reads and writes: when only polynomially-many updates are allowed, reading the object (by performing a ReadMax, CounterRead or Scan operation, depending on the object's type) incurs O(log N) steps (where N is the number of processes), which was shown to be optimal. But what about the step-/complexity of update operations? With these implementations, updating the object's state (by performing a WriteMax, Counter Increment or Update operation, depending on the object's type) requires Ω(log N) steps. The question that we address in this work is the following: are there read-optimal implementations of these restricted-use objects for which the asymptotic step-/complexity of update operations is sub-logarithmic? We present tradeoffs between the step-/complexity of read and update operations on these objects, establishing that updating a read-optimal counter or snapshot incurs Ω(log N) steps. These tradeoffs hold also if compare-and-swap (CAS) operations may be used, in addition to reads and writes. We also derive a tradeoff between the step-complexities of read and update operations of M-bounded max registers: if the step-/complexity of the Read-Max operation is O(f(min(N,M))), then the step-/complexity of the Write-Max operation is Ω(log log min(N,M)/log f(min(N,M))). It follows from this tradeoff that the step-/complexity of Write-Max in any read-/optimal implementation of a max register from read, write and CAS is Ω(log log min(N,M)). On the positive side, we present a wait-free implementation of an M-bounded max register from read, write and CAS for which the step complexities of Read-Max and Write-Max operations are O(1) and O(log min(N,M)), respectively.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Brief announcement: towards security and privacy for outsourced data in the multi-party setting 简短声明:多方环境下外包数据的安全和隐私
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611508
Matteo Maffei, Giulio Malavolta, M. Reinert, Dominique Schröder
Cloud storage has rapidly acquired popularity among users, constituting a seamless solution for the backup, synchronization, and sharing of large amounts of data. This technology, however, puts user data in the direct control of cloud service providers, which raises increasing security and privacy concerns related to the integrity of outsourced data, the accidental or intentional leakage of sensitive information, the profiling of user activities and so on. We present GORAM, a cryptographic system that protects the secrecy and integrity of the data outsourced to an untrusted server and guarantees the anonymity and unlinkability of consecutive accesses to such data. GORAM allows the database owner to share outsourced data with other clients, selectively granting them read and write permissions. GORAM is the first system to achieve such a wide range of security and privacy properties for outsourced storage. Technically, GORAM builds on a combination of ORAM to conceal data accesses, attribute-based encryption to rule the access to outsourced data, and zero-knowledge proofs to prove read and write permissions in a privacy-preserving manner. We implemented GORAM and conducted an experimental evaluation to demonstrate its feasibility.
云存储迅速受到用户的欢迎,为海量数据的备份、同步和共享提供了无缝解决方案。然而,这项技术将用户数据置于云服务提供商的直接控制之下,这引起了越来越多的安全和隐私问题,涉及外包数据的完整性、敏感信息的意外或故意泄露、用户活动的分析等。我们提出了GORAM,一个加密系统,保护外包给不受信任的服务器的数据的保密性和完整性,并保证连续访问这些数据的匿名性和不可链接性。GORAM允许数据库所有者与其他客户端共享外包数据,选择性地授予他们读写权限。GORAM是第一个为外包存储实现如此广泛的安全和隐私属性的系统。从技术上讲,GORAM建立在ORAM的组合之上,以隐藏数据访问,基于属性的加密以规则对外包数据的访问,零知识证明以保护隐私的方式证明读写权限。我们实现了GORAM并进行了实验评估以证明其可行性。
{"title":"Brief announcement: towards security and privacy for outsourced data in the multi-party setting","authors":"Matteo Maffei, Giulio Malavolta, M. Reinert, Dominique Schröder","doi":"10.1145/2611462.2611508","DOIUrl":"https://doi.org/10.1145/2611462.2611508","url":null,"abstract":"Cloud storage has rapidly acquired popularity among users, constituting a seamless solution for the backup, synchronization, and sharing of large amounts of data. This technology, however, puts user data in the direct control of cloud service providers, which raises increasing security and privacy concerns related to the integrity of outsourced data, the accidental or intentional leakage of sensitive information, the profiling of user activities and so on. We present GORAM, a cryptographic system that protects the secrecy and integrity of the data outsourced to an untrusted server and guarantees the anonymity and unlinkability of consecutive accesses to such data. GORAM allows the database owner to share outsourced data with other clients, selectively granting them read and write permissions. GORAM is the first system to achieve such a wide range of security and privacy properties for outsourced storage. Technically, GORAM builds on a combination of ORAM to conceal data accesses, attribute-based encryption to rule the access to outsourced data, and zero-knowledge proofs to prove read and write permissions in a privacy-preserving manner. We implemented GORAM and conducted an experimental evaluation to demonstrate its feasibility.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134551378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Asynchronous MPC with a strict honest majority using non-equivocation 异步MPC与严格诚实的大多数使用非模棱两可
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611490
M. Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate
Multiparty computation (MPC) among n parties can tolerate up to t < n/2 active corruptions in a synchronous communication setting; however, in an asynchronous communication setting, the resiliency bound decreases to only t < n/3 active corruptions. We improve the resiliency bound for asynchronous MPC (AMPC) to match synchronous MPC using non-equivocation. Non-equivocation is a message authentication mechanism to restrict a corrupted sender from making conflicting statements to different (honest) parties. It can be implemented using an increment-only counter and a digital signature oracle, realizable with trusted hardware modules readily available in commodity computers and smartphone devices. A non-equivocation mechanism can also be transferable and allows a receiver to verifiably transfer the authenticated statement to other parties. In this work, using transferable non-equivocation, we present an AMPC protocol tolerating t < n/2 faults. From a practical point of view, our AMPC protocol requires fewer setup assumptions than the previous AMPC protocol with t < n/2 by Beerliova-Trubiniova, Hirt and Nielsen [PODC 2010]: unlike their AMPC protocol, it does not require any synchronous broadcast round at the beginning of the protocol and avoids the threshold homomorphic encryption setup assumption. Moreover, our AMPC protocol is also efficient and provides a gain of Θ(n) in the communication complexity per multiplication gate, over the AMPC protocol of Beerliova-Trubiniova et al. In the process, using non-equivocation, we also define the first asynchronous verifiable secret sharing (AVSS) scheme with t < n/2, which is of independent interest to threshold cryptography.
在同步通信设置中,n方之间的多方计算(MPC)可以容忍多达t < n/2的主动损坏;然而,在异步通信设置中,弹性界限降低到只有t < n/3个活动损坏。我们改进了异步MPC (AMPC)的弹性边界,使其与同步MPC相匹配。不含糊其辞是一种消息验证机制,用于限制损坏的发送方向不同(诚实)方发表冲突声明。它可以使用仅增量计数器和数字签名oracle来实现,可以使用商用计算机和智能手机设备中现成的可信硬件模块来实现。非模棱两可机制也可以是可转移的,并允许接收方可验证地将经过验证的声明传输给其他方。在这项工作中,我们使用可转移的非模棱两可,提出了一个允许t < n/2故障的AMPC协议。从实用的角度来看,我们的AMPC协议比之前由Beerliova-Trubiniova, Hirt和Nielsen [PODC 2010]提出的t < n/2的AMPC协议需要更少的设置假设:与他们的AMPC协议不同,它不需要在协议开始时进行任何同步广播轮,并且避免了阈值同态加密设置假设。此外,我们的AMPC协议也很高效,与Beerliova-Trubiniova等人的AMPC协议相比,每个乘法门的通信复杂度增加了Θ(n)。在此过程中,我们还定义了第一个t < n/2的异步可验证秘密共享(AVSS)方案,该方案对阈值密码学具有独立的意义。
{"title":"Asynchronous MPC with a strict honest majority using non-equivocation","authors":"M. Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate","doi":"10.1145/2611462.2611490","DOIUrl":"https://doi.org/10.1145/2611462.2611490","url":null,"abstract":"Multiparty computation (MPC) among n parties can tolerate up to t < n/2 active corruptions in a synchronous communication setting; however, in an asynchronous communication setting, the resiliency bound decreases to only t < n/3 active corruptions. We improve the resiliency bound for asynchronous MPC (AMPC) to match synchronous MPC using non-equivocation. Non-equivocation is a message authentication mechanism to restrict a corrupted sender from making conflicting statements to different (honest) parties. It can be implemented using an increment-only counter and a digital signature oracle, realizable with trusted hardware modules readily available in commodity computers and smartphone devices. A non-equivocation mechanism can also be transferable and allows a receiver to verifiably transfer the authenticated statement to other parties. In this work, using transferable non-equivocation, we present an AMPC protocol tolerating t < n/2 faults. From a practical point of view, our AMPC protocol requires fewer setup assumptions than the previous AMPC protocol with t < n/2 by Beerliova-Trubiniova, Hirt and Nielsen [PODC 2010]: unlike their AMPC protocol, it does not require any synchronous broadcast round at the beginning of the protocol and avoids the threshold homomorphic encryption setup assumption. Moreover, our AMPC protocol is also efficient and provides a gain of Θ(n) in the communication complexity per multiplication gate, over the AMPC protocol of Beerliova-Trubiniova et al. In the process, using non-equivocation, we also define the first asynchronous verifiable secret sharing (AVSS) scheme with t < n/2, which is of independent interest to threshold cryptography.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127431032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Spanners and sparsifiers in dynamic streams 动态流中的扳手和稀疏器
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611497
M. Kapralov, David P. Woodruff
Linear sketching is a popular technique for computing in dynamic streams, where one needs to handle both insertions and deletions of elements. The underlying idea of taking randomized linear measurements of input data has been extremely successful in providing space-efficient algorithms for classical problems such as frequency moment estimation and computing heavy hitters, and was very recently shown to be a powerful technique for solving graph problems in dynamic streams [AGM'12]. Ideally, one would like to obtain algorithms that use one or a small constant number of passes over the data and a small amount of space (i.e. sketching dimension) to preserve some useful properties of the input graph presented as a sequence of edge insertions and edge deletions. In this paper, we concentrate on the problem of constructing linear sketches of graphs that (approximately) preserve the spectral information of the graph in a few passes over the stream. We do so by giving the first sketch-based algorithm for constructing multiplicative graph spanners in only two passes over the stream. Our spanners use ~O(n1+1/k) bits of space and have stretch 2k. While this stretch is larger than the conjectured optimal 2k-1 for this amount of space, we show for an appropriate k that it implies the first 2-pass spectral sparsifier with n1+o(1) bits of space. Previous constructions of spectral sparsifiers in this model with a constant number of passes would require n1+c bits of space for a constant c > 0. We also give an algorithm for constructing spanners that provides an additive approximation to the shortest path metric using a single pass over the data stream, also achieving an essentially best possible space/approximation tradeoff.
线性草图是动态流计算中的一种流行技术,其中需要处理元素的插入和删除。对输入数据进行随机线性测量的基本思想在为经典问题(如频率矩估计和计算重击值)提供节省空间的算法方面非常成功,并且最近被证明是解决动态流中的图形问题的强大技术[AGM'12]。理想情况下,人们希望获得这样的算法,即使用一次或少量常数次传递数据和少量空间(即素描维度)来保留作为边缘插入和边缘删除序列呈现的输入图的一些有用属性。在本文中,我们专注于构造图的线性草图的问题,这些图(近似地)保留了图在几次经过流中的光谱信息。为此,我们给出了第一个基于草图的算法,用于在流上只经过两次就构造乘法图生成器。我们的扳手使用~O(n1+1/k)位空间,拉伸2k。虽然对于这个空间量,这个拉伸比推测的最优2k-1要大,但我们表明,对于一个适当的k,它意味着具有n1+o(1)位空间的第一个2通频谱稀疏器。对于常数c > 0,该模型中具有常数通过次数的光谱稀疏器的先前构造将需要n1+c位空间。我们还给出了一个构造扳手的算法,该算法使用数据流上的单次传递提供了最短路径度量的加性近似值,也实现了本质上最好的空间/近似值权衡。
{"title":"Spanners and sparsifiers in dynamic streams","authors":"M. Kapralov, David P. Woodruff","doi":"10.1145/2611462.2611497","DOIUrl":"https://doi.org/10.1145/2611462.2611497","url":null,"abstract":"Linear sketching is a popular technique for computing in dynamic streams, where one needs to handle both insertions and deletions of elements. The underlying idea of taking randomized linear measurements of input data has been extremely successful in providing space-efficient algorithms for classical problems such as frequency moment estimation and computing heavy hitters, and was very recently shown to be a powerful technique for solving graph problems in dynamic streams [AGM'12]. Ideally, one would like to obtain algorithms that use one or a small constant number of passes over the data and a small amount of space (i.e. sketching dimension) to preserve some useful properties of the input graph presented as a sequence of edge insertions and edge deletions. In this paper, we concentrate on the problem of constructing linear sketches of graphs that (approximately) preserve the spectral information of the graph in a few passes over the stream. We do so by giving the first sketch-based algorithm for constructing multiplicative graph spanners in only two passes over the stream. Our spanners use ~O(n1+1/k) bits of space and have stretch 2k. While this stretch is larger than the conjectured optimal 2k-1 for this amount of space, we show for an appropriate k that it implies the first 2-pass spectral sparsifier with n1+o(1) bits of space. Previous constructions of spectral sparsifiers in this model with a constant number of passes would require n1+c bits of space for a constant c > 0. We also give an algorithm for constructing spanners that provides an additive approximation to the shortest path metric using a single pass over the data stream, also achieving an essentially best possible space/approximation tradeoff.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"67 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133750848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
期刊
Proceedings of the 2014 ACM symposium on Principles of distributed computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1