首页 > 最新文献

Proceedings of the 2014 ACM symposium on Principles of distributed computing最新文献

英文 中文
Distributing the setup in universally composable multi-party computation 将设置分布在普遍可组合的多方计算中
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611480
Jonathan Katz, A. Kiayias, Hong-Sheng Zhou, Vassilis Zikas
Universally composable (UC) protocols retain their security properties even when run concurrently alongside arbitrary other protocols. Unfortunately, it is known that UC multiparty computation (for general functionalities, and without assuming honest majority) is impossible without some form of setup. To circumvent this impossibility, various complete setup assumptions have been proposed. With only a few exceptions, past work has viewed these setup assumptions as being implemented by some ideal, incorruptible entity. Any such entity is thus a single point of failure, and security fails catastrophically in case the setup entity is subverted by an adversary. We propose here a clean, general, and generic approach for distributing trust among m arbitrary setups, by modeling potential corruption of setups within the UC framework, where such corruption might be fail-stop, passive, or arbitrary and is in addition to possible corruption of the parties themselves. We show several feasibility and impossibility results in this model, for different specifications of the corruptible sets. For example, we show that given m complete setups, up to t of which might be actively corrupted in an adaptive manner, general multiparty computation with no honest majority is possible if and only if t < m/2.
通用可组合(UC)协议即使在与任意其他协议并发运行时也保持其安全属性。不幸的是,众所周知,如果没有某种形式的设置,UC多方计算(对于一般功能,并且不假设诚实多数)是不可能的。为了规避这种不可能性,提出了各种完整的设置假设。除了少数例外,过去的工作将这些设定假设视为由一些理想的、不可破坏的实体实现的。因此,任何这样的实体都是单点故障,如果设置实体被攻击者破坏,安全性就会灾难性地失败。我们在这里提出了一种简洁、通用和通用的方法,通过对UC框架内设置的潜在腐败进行建模,在任意设置之间分配信任,其中这种腐败可能是故障停止、被动或任意的,并且除了双方本身可能存在的腐败之外。对于不同规格的可腐蚀集,给出了该模型的可行性和不可行性结果。例如,我们表明给定m个完整的设置,其中最多t可能以自适应方式主动损坏,当且仅当t < m/2时,没有诚实多数的一般多方计算是可能的。
{"title":"Distributing the setup in universally composable multi-party computation","authors":"Jonathan Katz, A. Kiayias, Hong-Sheng Zhou, Vassilis Zikas","doi":"10.1145/2611462.2611480","DOIUrl":"https://doi.org/10.1145/2611462.2611480","url":null,"abstract":"Universally composable (UC) protocols retain their security properties even when run concurrently alongside arbitrary other protocols. Unfortunately, it is known that UC multiparty computation (for general functionalities, and without assuming honest majority) is impossible without some form of setup. To circumvent this impossibility, various complete setup assumptions have been proposed. With only a few exceptions, past work has viewed these setup assumptions as being implemented by some ideal, incorruptible entity. Any such entity is thus a single point of failure, and security fails catastrophically in case the setup entity is subverted by an adversary. We propose here a clean, general, and generic approach for distributing trust among m arbitrary setups, by modeling potential corruption of setups within the UC framework, where such corruption might be fail-stop, passive, or arbitrary and is in addition to possible corruption of the parties themselves. We show several feasibility and impossibility results in this model, for different specifications of the corruptible sets. For example, we show that given m complete setups, up to t of which might be actively corrupted in an adaptive manner, general multiparty computation with no honest majority is possible if and only if t < m/2.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127860553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Signature-free asynchronous byzantine consensus with t < n/3 and o(n2) messages 具有t < n/3和o(n2)消息的无签名异步拜占庭一致性
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611468
A. Mostéfaoui, Moumen Hamouma, M. Raynal
This paper presents a new round-based asynchronous consensus algorithm that copes with up to t < n/3 Byzantine processes, where n is the total number of processes. In addition of not using signature, not assuming a computationally-limited adversary, while being optimal with respect to the value of t, this algorithm has several noteworthy properties: the expected number of rounds to decide is four, each round is composed of two or three communication steps and involves O(n2) messages, and a message is composed of a round number plus a single bit. To attain this goal, the consensus algorithm relies on a common coin as defined by Rabin, and a new extremely simple and powerful broadcast abstraction suited to binary values. The main target when designing this algorithm was to obtain a cheap and simple algorithm. This was motivated by the fact that, among the first-class properties, simplicity --albeit sometimes under-estimated or even ignored-- is a major one.
本文提出了一种新的基于轮的异步共识算法,该算法可以处理多达t < n/3个拜占庭进程,其中n为进程总数。除了不使用签名,不假设计算有限的对手之外,虽然相对于t的值是最优的,但该算法有几个值得注意的特性:要决定的预期轮数是4,每轮由两个或三个通信步骤组成,涉及O(n2)个消息,消息由一个整数加一个位组成。为了实现这一目标,共识算法依赖于Rabin定义的普通硬币,以及适合二进制值的新的极其简单而强大的广播抽象。设计该算法的主要目标是获得一种廉价、简单的算法。这样做的动机是,在一流的属性中,简单性(尽管有时被低估甚至忽略)是一个主要属性。
{"title":"Signature-free asynchronous byzantine consensus with t < n/3 and o(n2) messages","authors":"A. Mostéfaoui, Moumen Hamouma, M. Raynal","doi":"10.1145/2611462.2611468","DOIUrl":"https://doi.org/10.1145/2611462.2611468","url":null,"abstract":"This paper presents a new round-based asynchronous consensus algorithm that copes with up to t < n/3 Byzantine processes, where n is the total number of processes. In addition of not using signature, not assuming a computationally-limited adversary, while being optimal with respect to the value of t, this algorithm has several noteworthy properties: the expected number of rounds to decide is four, each round is composed of two or three communication steps and involves O(n2) messages, and a message is composed of a round number plus a single bit. To attain this goal, the consensus algorithm relies on a common coin as defined by Rabin, and a new extremely simple and powerful broadcast abstraction suited to binary values. The main target when designing this algorithm was to obtain a cheap and simple algorithm. This was motivated by the fact that, among the first-class properties, simplicity --albeit sometimes under-estimated or even ignored-- is a major one.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"1 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131450906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Session details: Session 7 会话详情:会话7
P. Fatourou
{"title":"Session details: Session 7","authors":"P. Fatourou","doi":"10.1145/3246721","DOIUrl":"https://doi.org/10.1145/3246721","url":null,"abstract":"","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balls-into-leaves: sub-logarithmic renaming in synchronous message-passing systems 球到叶:同步消息传递系统中的次对数重命名
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611499
Dan Alistarh, O. Denysyuk, L. Rodrigues, N. Shavit
We consider the following natural problem: n failure-prone servers, communicating synchronously through message passing, must assign themselves one-to-one to n distinct items. Existing literature suggests two possible approaches to this problem. First, model it as an instance of tight renaming in synchronous message-passing systems; for deterministic solutions, a tight bound of Θ(log n) communication rounds is known. Second, model the scenario as an instance of randomized load-balancing, for which elegant sub-logarithmic solutions exist. However, careful examination reveals that known load-balancing schemes do not apply to our scenario, because they either do not tolerate faults or do not ensure one-to-one allocation. It is thus natural to ask if sub-logarithmic solutions exist for this apparently simple but intriguing problem. In this paper, we combine the two approaches to provide a new randomized solution for tight renaming, which terminates in O(log log n) communication rounds with high probability, against a strong adaptive adversary. Our solution, called Balls-into-Leaves, combines the deterministic approach with a new randomized scheme to obtain perfectly balanced allocations. The algorithm arranges the items as leaves of a tree, and participants repeatedly perform random choices among the leaves. The algorithm exchanges information in each round to split the participants into progressively smaller groups whose random choices do not conflict. We then extend the algorithm to terminate early in O(log log f) rounds w.h.p., where f is the actual number of failures. These results imply an exponential separation between deterministic and randomized algorithms for the tight renaming problem in message-passing systems.
我们考虑以下自然问题:n个容易发生故障的服务器,通过消息传递进行同步通信,必须将自己一对一地分配给n个不同的项目。现有文献提出了两种可能的方法来解决这个问题。首先,将其建模为同步消息传递系统中的严格重命名实例;对于确定性解,已知Θ(log n)个通信回合的紧界。其次,将场景建模为随机负载平衡的实例,其中存在优雅的次对数解决方案。然而,仔细检查发现,已知的负载平衡方案并不适用于我们的场景,因为它们要么不能容忍错误,要么不能确保一对一的分配。因此,人们很自然地会问,对于这个看似简单但有趣的问题,是否存在次对数解。在本文中,我们将这两种方法结合起来,针对一个强自适应对手,提供了一种新的严格重命名随机化解决方案,该方案以高概率在O(log log n)轮通信中终止。我们的解决方案称为balls -into- leaf,它将确定性方法与一种新的随机方案相结合,以获得完全平衡的分配。该算法将项目安排为树的叶子,参与者反复在叶子中进行随机选择。该算法在每一轮中交换信息,将参与者逐渐分成更小的群体,这些群体的随机选择不冲突。然后,我们将算法扩展到在O(log log f)轮w.h.p.中提前终止,其中f是实际的故障数。这些结果暗示了消息传递系统中严格重命名问题的确定性算法和随机算法之间的指数分离。
{"title":"Balls-into-leaves: sub-logarithmic renaming in synchronous message-passing systems","authors":"Dan Alistarh, O. Denysyuk, L. Rodrigues, N. Shavit","doi":"10.1145/2611462.2611499","DOIUrl":"https://doi.org/10.1145/2611462.2611499","url":null,"abstract":"We consider the following natural problem: n failure-prone servers, communicating synchronously through message passing, must assign themselves one-to-one to n distinct items. Existing literature suggests two possible approaches to this problem. First, model it as an instance of tight renaming in synchronous message-passing systems; for deterministic solutions, a tight bound of Θ(log n) communication rounds is known. Second, model the scenario as an instance of randomized load-balancing, for which elegant sub-logarithmic solutions exist. However, careful examination reveals that known load-balancing schemes do not apply to our scenario, because they either do not tolerate faults or do not ensure one-to-one allocation. It is thus natural to ask if sub-logarithmic solutions exist for this apparently simple but intriguing problem. In this paper, we combine the two approaches to provide a new randomized solution for tight renaming, which terminates in O(log log n) communication rounds with high probability, against a strong adaptive adversary. Our solution, called Balls-into-Leaves, combines the deterministic approach with a new randomized scheme to obtain perfectly balanced allocations. The algorithm arranges the items as leaves of a tree, and participants repeatedly perform random choices among the leaves. The algorithm exchanges information in each round to split the participants into progressively smaller groups whose random choices do not conflict. We then extend the algorithm to terminate early in O(log log f) rounds w.h.p., where f is the actual number of failures. These results imply an exponential separation between deterministic and randomized algorithms for the tight renaming problem in message-passing systems.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130453533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fast and unconditionally secure anonymous channel 快速和无条件安全的匿名通道
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611494
J. Garay, Clint Givens, R. Ostrovsky, Pavel Raykov
In this paper we focus on sender-anonymous channels (a.k.a. Dining Cryptographers networks) and present a construction requiring a very low (constant) number of rounds of interaction while tolerating actively malicious behavior by some of the participants (up to less than half of them). Our construction is unconditionally secure (meaning that no bounds are placed on the computational power of the adversary), makes black-box use of a verifiable secret sharing (VSS) protocol, and is based on a special-purpose secure multiparty computation protocol implementing the method of "throwing darts;" its round complexity is essentially equal to that of the VSS protocol. In addition, since broadcast cannot be simulated in a point-to-point network when a third or more of the participants are corrupt, it is impossible to construct VSS (and, more generally, any other basic multiparty protocol) in this setting without using a "physical broadcast channel," and a recent line of research has sought to minimize the use of this expensive resource. Our anonymous channel protocol's reduction to VSS is broadcast-round-preserving, thus making the fewest (known to date) calls to the broadcast channel while running in an overall constant number of rounds. Finally, anonymous channels play an important role in the setup phase of an authentication technique known as pseudosignatures, which then may be used to simulate authenticated Byzantine agreement protocols in the information-theoretic setting. Plugging in our anonymous channel translates into a fast (and broadcast-efficient) pseudosignature construction.
在本文中,我们专注于发送者匿名通道(又名用餐密码学家网络),并提出了一种需要非常低(恒定)轮数交互的结构,同时容忍一些参与者(最多不到一半)的积极恶意行为。我们的构造是无条件安全的(意味着对对手的计算能力没有任何限制),使用了可验证的秘密共享(VSS)协议,并且基于实现“投掷飞镖”方法的专用安全多方计算协议;其回合复杂度本质上与VSS协议相等。此外,由于当三分之一或更多的参与者损坏时,无法在点对点网络中模拟广播,因此在不使用“物理广播通道”的情况下,不可能在这种设置中构建VSS(以及更一般地说,任何其他基本的多方协议),最近的一系列研究试图最大限度地减少这种昂贵资源的使用。我们的匿名通道协议对VSS的缩减是广播轮保留,因此在以恒定的轮数运行时,对广播通道的调用最少(迄今为止已知的)。最后,匿名通道在称为伪签名的身份验证技术的设置阶段起着重要作用,然后可以使用伪签名在信息论设置中模拟经过身份验证的拜占庭协议协议。插入我们的匿名通道可转换为快速(且广播效率高)的伪签名构造。
{"title":"Fast and unconditionally secure anonymous channel","authors":"J. Garay, Clint Givens, R. Ostrovsky, Pavel Raykov","doi":"10.1145/2611462.2611494","DOIUrl":"https://doi.org/10.1145/2611462.2611494","url":null,"abstract":"In this paper we focus on sender-anonymous channels (a.k.a. Dining Cryptographers networks) and present a construction requiring a very low (constant) number of rounds of interaction while tolerating actively malicious behavior by some of the participants (up to less than half of them). Our construction is unconditionally secure (meaning that no bounds are placed on the computational power of the adversary), makes black-box use of a verifiable secret sharing (VSS) protocol, and is based on a special-purpose secure multiparty computation protocol implementing the method of \"throwing darts;\" its round complexity is essentially equal to that of the VSS protocol. In addition, since broadcast cannot be simulated in a point-to-point network when a third or more of the participants are corrupt, it is impossible to construct VSS (and, more generally, any other basic multiparty protocol) in this setting without using a \"physical broadcast channel,\" and a recent line of research has sought to minimize the use of this expensive resource. Our anonymous channel protocol's reduction to VSS is broadcast-round-preserving, thus making the fewest (known to date) calls to the broadcast channel while running in an overall constant number of rounds. Finally, anonymous channels play an important role in the setup phase of an authentication technique known as pseudosignatures, which then may be used to simulate authenticated Byzantine agreement protocols in the information-theoretic setting. Plugging in our anonymous channel translates into a fast (and broadcast-efficient) pseudosignature construction.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"2200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130132282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares 分布式诞生和提升:具有短份额的完全分布式非交互式自适应安全阈值签名
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611498
Benoît Libert, M. Joye, M. Yung
Threshold cryptography is a fundamental distributed computational paradigm for enhancing the availability and the security of cryptographic public-key schemes. It does it by dividing private keys into n shares handed out to distinct servers. In threshold signature schemes, a set of at least t+1 ≤ n servers is needed to produce a valid digital signature. Availability is assured by the fact that any subset of t+1 servers can produce a signature when authorized. At the same time, the scheme should remain robust (in the fault tolerance sense) and unforgeable (cryptographically) against up to t corrupted servers; i.e., it adds quorum control to traditional cryptographic services and introduces redundancy. Originally, most practical threshold signatures have a number of demerits: They have been analyzed in a static corruption model (where the set of corrupted servers is fixed at the very beginning of the attack), they require interaction, they assume a trusted dealer in the key generation phase (so that the system is not fully distributed), or they suffer from certain overheads in terms of storage (large share sizes). In this paper, we construct practical fully distributed (the private key is born distributed), non-interactive schemes --- where the servers can compute their partial signatures without communication with other servers--- with adaptive security (i.e., the adversary corrupts servers dynamically based on its full view of the history of the system). Our schemes are very efficient in terms of computation, communication, and scalable storage (with private key shares of size O(1), where certain solutions incur O(n) storage costs at each server). Unlike other adaptively secure schemes, our schemes are erasure-free (reliable erasure is a hard to assure and hard to administer property in actual systems). To the best of our knowledge, such a fully distributed highly constrained scheme has been an open problem in the area. In particular, and of special interest, is the fact that Pedersen's traditional distributed key generation (DKG) protocol can be safely employed in the initial key generation phase when the system is born -- although it is well-known not to ensure uniformly distributed public keys. An advantage of this is that this protocol only takes one round optimistically (in the absence of faulty player).
阈值密码学是增强加密公钥方案可用性和安全性的一种基本的分布式计算范式。它将私钥分成n个共享,分发给不同的服务器。在阈值签名方案中,至少需要一组t+1≤n个服务器才能产生有效的数字签名。t+1服务器的任何子集在获得授权后都可以生成签名,这一事实保证了可用性。同时,该方案应该保持健壮(在容错意义上)和不可伪造(加密),以防止多达t个损坏的服务器;也就是说,它在传统的加密服务中增加了仲裁控制,并引入了冗余。最初,大多数实用的阈值签名都有许多缺点:它们是在静态损坏模型中分析的(其中损坏的服务器集在攻击开始时是固定的),它们需要交互,它们在密钥生成阶段假设一个受信任的经销商(因此系统不是完全分布式的),或者它们在存储方面存在一定的开销(大的共享大小)。在本文中,我们构建了实用的全分布式(私钥生来就是分布式的)、非交互式方案——其中服务器可以在不与其他服务器通信的情况下计算其部分签名——具有自适应安全性(即,对手基于其对系统历史的完整视图动态破坏服务器)。我们的方案在计算、通信和可扩展存储方面非常高效(私钥共享大小为0(1),其中某些解决方案在每个服务器上产生0 (n)的存储成本)。与其他自适应安全方案不同,我们的方案是无擦除的(在实际系统中,可靠的擦除是难以保证和难以管理的属性)。据我们所知,这种完全分布式的高约束方案一直是该领域的一个开放性问题。特别值得注意的是,Pedersen的传统分布式密钥生成(DKG)协议可以在系统诞生时的初始密钥生成阶段安全地使用——尽管众所周知,它不能确保统一分布的公钥。这样做的一个好处是,该协议乐观地只需要一轮(在没有错误玩家的情况下)。
{"title":"Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares","authors":"Benoît Libert, M. Joye, M. Yung","doi":"10.1145/2611462.2611498","DOIUrl":"https://doi.org/10.1145/2611462.2611498","url":null,"abstract":"Threshold cryptography is a fundamental distributed computational paradigm for enhancing the availability and the security of cryptographic public-key schemes. It does it by dividing private keys into n shares handed out to distinct servers. In threshold signature schemes, a set of at least t+1 ≤ n servers is needed to produce a valid digital signature. Availability is assured by the fact that any subset of t+1 servers can produce a signature when authorized. At the same time, the scheme should remain robust (in the fault tolerance sense) and unforgeable (cryptographically) against up to t corrupted servers; i.e., it adds quorum control to traditional cryptographic services and introduces redundancy. Originally, most practical threshold signatures have a number of demerits: They have been analyzed in a static corruption model (where the set of corrupted servers is fixed at the very beginning of the attack), they require interaction, they assume a trusted dealer in the key generation phase (so that the system is not fully distributed), or they suffer from certain overheads in terms of storage (large share sizes). In this paper, we construct practical fully distributed (the private key is born distributed), non-interactive schemes --- where the servers can compute their partial signatures without communication with other servers--- with adaptive security (i.e., the adversary corrupts servers dynamically based on its full view of the history of the system). Our schemes are very efficient in terms of computation, communication, and scalable storage (with private key shares of size O(1), where certain solutions incur O(n) storage costs at each server). Unlike other adaptively secure schemes, our schemes are erasure-free (reliable erasure is a hard to assure and hard to administer property in actual systems). To the best of our knowledge, such a fully distributed highly constrained scheme has been an open problem in the area. In particular, and of special interest, is the fact that Pedersen's traditional distributed key generation (DKG) protocol can be safely employed in the initial key generation phase when the system is born -- although it is well-known not to ensure uniformly distributed public keys. An advantage of this is that this protocol only takes one round optimistically (in the absence of faulty player).","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121809960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Concurrent updates with RCU: search tree as an example RCU并发更新:以搜索树为例
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611471
M. Arbel, H. Attiya
Read copy update (RCU) is a novel synchronization mechanism, in which the burden of synchronization falls completely on the updaters, by having them wait for all pre-existing readers to finish their read-side critical section. This paper presents citrus, a concurrent binary search tree (BST) with a wait-free Contains operation, using RCU synchronization and fine-grained locking for synchronization among updaters. This is the first RCU-based data structure that allows concurrent updaters. While there are methodologies for using RCU to coordinate between readers and updaters, they do not address the issue of coordination among updaters, and indeed, all existing RCU-based data structures rely on coarse-grained synchronization between updaters. Experimental evaluation shows that citrus beats previous RCU-based search trees, even under mild update contention, and compares well with the best-known concurrent dictionaries.
RCU (Read copy update)是一种新型的同步机制,在这种机制中,同步的负担完全落在了更新者身上,让他们等待所有已经存在的读端临界区完成。柑橘,一个并行二叉搜索树(BST),包含无等待操作,使用RCU同步和细粒度锁来同步更新。这是第一个允许并发更新的基于rcu的数据结构。虽然有一些方法可以使用RCU来协调reader和update,但是它们并没有解决update之间的协调问题,事实上,所有现有的基于RCU的数据结构都依赖于update之间的粗粒度同步。实验评估表明,即使在轻微的更新争用下,citrus也优于以前基于rcu的搜索树,并且与最著名的并发字典相媲美。
{"title":"Concurrent updates with RCU: search tree as an example","authors":"M. Arbel, H. Attiya","doi":"10.1145/2611462.2611471","DOIUrl":"https://doi.org/10.1145/2611462.2611471","url":null,"abstract":"Read copy update (RCU) is a novel synchronization mechanism, in which the burden of synchronization falls completely on the updaters, by having them wait for all pre-existing readers to finish their read-side critical section. This paper presents citrus, a concurrent binary search tree (BST) with a wait-free Contains operation, using RCU synchronization and fine-grained locking for synchronization among updaters. This is the first RCU-based data structure that allows concurrent updaters. While there are methodologies for using RCU to coordinate between readers and updaters, they do not address the issue of coordination among updaters, and indeed, all existing RCU-based data structures rely on coarse-grained synchronization between updaters. Experimental evaluation shows that citrus beats previous RCU-based search trees, even under mild update contention, and compares well with the best-known concurrent dictionaries.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125621381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Software-improved hardware lock elision 软件改进的硬件锁省略
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611482
Y. Afek, A. Levy, Adam Morrison
With hardware transactional memory (HTM) becoming available in mainstream processors, lock-based critical sections may now initiate a hardware transaction instead of taking the lock, enabling their concurrent execution unless a real data conflict occurs. However, just a few transactional aborts can cause the lock to be acquired non-transactionally resulting in the serialization of all the threads, severely degrading the amount of speedup obtained. In this paper we provide two software extension mechanisms that considerably improve the concurrency and speedup levels attained by lock based programs using HTM-based lock elision. The first sacrifices opacity to achieve higher levels of concurrency, and the second retains opacity while reaching slightly lower levels of concurrency. Evaluation on STAMP and on data structure benchmarks on an Intel Haswell processor shows that these techniques improve the speedup by up to 3.5 times and $10$ times respectively, compared to using Haswell's hardware lock elision as is.
随着硬件事务性内存(HTM)在主流处理器中变得可用,基于锁的临界区现在可以启动硬件事务而不是获取锁,从而支持它们的并发执行,除非发生真正的数据冲突。然而,只有少数事务性中止可能导致非事务性地获取锁,从而导致所有线程的序列化,从而严重降低获得的加速量。在本文中,我们提供了两种软件扩展机制,它们大大提高了使用基于html的锁省略的基于锁的程序所获得的并发性和加速级别。第一种方法牺牲不透明性来实现更高的并发性,第二种方法保留不透明性,同时达到稍低的并发性。对Intel Haswell处理器上的STAMP和数据结构基准测试的评估表明,与使用Haswell的硬件锁省略相比,这些技术分别将加速提高了3.5倍和10倍。
{"title":"Software-improved hardware lock elision","authors":"Y. Afek, A. Levy, Adam Morrison","doi":"10.1145/2611462.2611482","DOIUrl":"https://doi.org/10.1145/2611462.2611482","url":null,"abstract":"With hardware transactional memory (HTM) becoming available in mainstream processors, lock-based critical sections may now initiate a hardware transaction instead of taking the lock, enabling their concurrent execution unless a real data conflict occurs. However, just a few transactional aborts can cause the lock to be acquired non-transactionally resulting in the serialization of all the threads, severely degrading the amount of speedup obtained. In this paper we provide two software extension mechanisms that considerably improve the concurrency and speedup levels attained by lock based programs using HTM-based lock elision. The first sacrifices opacity to achieve higher levels of concurrency, and the second retains opacity while reaching slightly lower levels of concurrency. Evaluation on STAMP and on data structure benchmarks on an Intel Haswell processor shows that these techniques improve the speedup by up to 3.5 times and $10$ times respectively, compared to using Haswell's hardware lock elision as is.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115208898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Session details: Session 5 会话详情:会话5
M. Yung
{"title":"Session details: Session 5","authors":"M. Yung","doi":"10.1145/3246719","DOIUrl":"https://doi.org/10.1145/3246719","url":null,"abstract":"","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126588632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brief announcement: gracefully degrading consensus and k-set agreement under dynamic link failures 简要公告:动态链路故障下优雅地降级共识和k集协议
Pub Date : 2014-07-15 DOI: 10.1145/2611462.2611506
Manfred Schwarz, Kyrill Winkler, U. Schmid, M. Biely, Peter Robinson
We present a k-set agreement algorithm for synchronous dynamic distributed systems with unidirectional links controlled by an omniscient adversary. Our algorithm automatically adapts to the actual network properties: If the network is sufficiently well-connected, it solves consensus, while degrading gracefully to general k-set agreement in less well-behaved runs. The algorithm is oblivious to the maximum number of system-wide decision values k, which is bounded by the number of certain strongly connected components occurring in the dynamically changing network in a run. Related impossibility results reveal that this bound is close to the solvability border for k-set agreement. To the best of our knowledge, this is the first consensus algorithm that degrades in a graceful way in a dynamic network.
我们提出了一种k集协议算法,用于具有单向链路的同步动态分布式系统,该系统由全知对手控制。我们的算法自动适应实际的网络属性:如果网络连接得足够好,它就能解决共识问题,同时在行为不太好的运行中优雅地降级为一般的k集协议。该算法不关心系统范围内决策值k的最大数量,k受运行中动态变化的网络中出现的某些强连接组件的数量的限制。相关的不可能性结果表明,该边界接近k集一致性的可解边界。据我们所知,这是第一个在动态网络中以优雅的方式退化的共识算法。
{"title":"Brief announcement: gracefully degrading consensus and k-set agreement under dynamic link failures","authors":"Manfred Schwarz, Kyrill Winkler, U. Schmid, M. Biely, Peter Robinson","doi":"10.1145/2611462.2611506","DOIUrl":"https://doi.org/10.1145/2611462.2611506","url":null,"abstract":"We present a k-set agreement algorithm for synchronous dynamic distributed systems with unidirectional links controlled by an omniscient adversary. Our algorithm automatically adapts to the actual network properties: If the network is sufficiently well-connected, it solves consensus, while degrading gracefully to general k-set agreement in less well-behaved runs. The algorithm is oblivious to the maximum number of system-wide decision values k, which is bounded by the number of certain strongly connected components occurring in the dynamically changing network in a run. Related impossibility results reveal that this bound is close to the solvability border for k-set agreement. To the best of our knowledge, this is the first consensus algorithm that degrades in a graceful way in a dynamic network.","PeriodicalId":186800,"journal":{"name":"Proceedings of the 2014 ACM symposium on Principles of distributed computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127347165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Proceedings of the 2014 ACM symposium on Principles of distributed computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1