没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/221590203
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed
Computation (Extended Abstract)
Conference Paper · January 1988
DOI: 10.1145/62212.62213·Source: DBLP
CITATIONS
1,793
READS
1,078
3 authors:
Some of the authors of this publication are also working on these related projects:
Self testing/correcting programs View project
Michael Ben-Or
Hebrew University of Jerusalem
82 PUBLICATIONS9,823 CITATIONS
SEE PROFILE
Shafi Goldwasser
Massachusetts Institute of Technology
55 PUBLICATIONS5,710 CITATIONS
SEE PROFILE
Avi Wigderson
Institute for Advanced Study
346 PUBLICATIONS24,646 CITATIONS
SEE PROFILE
All content following this page was uploaded by Shafi Goldwasser on 28 May 2014.
The user has requested enhancement of the downloaded file.
Completeness Theorems for Non-Cryptographic
Fault-Tolerant Distributed Computation
(Extended Abstract)
Michael Ben-Or*
Shafi Goldwassert
Hebrew University
MIT
Avi Wigdemon*
Hebrew University
Abstract
Every function of n inputs can be efficiently computed
by a complete network of n processors in such a way
that:
1.
2.
If no faults occur, no set of size t < n/2 of players
gets any additional information (other than the
function value),
Even if Byzantine faults are allowed, no set of
size t < n/3 can either disrupt the computation
or get additional information.
Furthermore, the above bounds on t are tight!
Introduction
The rapid development of distributed systems raised
the natural question of what tasks can be performed
by them (especially when faults occur). A large body
of literature over the past ten years addressed this
question. There are two approaches to this question,
depending on whether a limit on the computational
power of processors
is assun or not.
The cryptographic approach, inaugurated by
Difiie
and Hellman [DH],
assumes the players are computa-
tionally bounded, and further assumes the existence
*Supported by Alon Fellowship.
tSupported in part by NSF grant 865727~CCR, AR0
grant DAALOWSK-017,
and US-Israel BSF grant 8640301,
Jerusalem, Israel.
:Supported by Alon Fellowship.
Permission to copy without fee all or part of this material is granted
provided that the copies are not made or distributed for direct
commercial advantage. the ACM copyright notice and the title of
-
the publication and its date appear, a&l notice is given that copying
is by permission of the Association for Computing Machinery. TO
copy otherwise. or to republish.
requires a fee and/or
specfk
permissiotl.
@ 1988 ACM-O-89791-264-O/88/0005/0001 $1.50
of certain (one-way) functions, that can be computed
but not inverted by the player.
This simple assumption was ppstulated in [DH] in
order to achieve the basic task of secure message ex-
change between two of the processors, but turned out
to be universal! In subsequent years ingenious pro-
tocols baaed on the same assumption were given for
increasingly harder tasks such as contract signing, se-
cret exchange, joint coin flipping, voting and playing
Poker. These results culminated, through the defini-
tion of zero-knowledge proofs [GMR], their existence
for NP-complete problems [GMWl] in completeness
theorems for two-party pl] and multi-party [GMW2]
cryptographic distributed computation. In particu-
lar the results of Goldreich, Micali and Wigdesrson
in [GMWB] were the main inspiration to our work.
They show, that if (non-uniform) one way functions
exist then every (probabilistic) function of n input,s
can be computed by n computationally bounded pro-
cessors in such a way that: (1) If no faults occur,
no subset of the players can compute any additional
information, and (2) Even if Byzantine faults are al-
lowed, no set of size t < n/2 can either disrupt the
computation or compute additional information.
The non-Cryptographic (or information-theoretic)
approach does not limit the computational power of
the processors. Here, the notion of privacy is much
stronger - for a piece of data to be unknown to a set of
players it does not suffice that they cannot compute
it within a certain time bound from what they know,
but simply that it cannot be computed at all!
To facilitate the basic primitive of secret message
exchange between a pair of players, we have secure
channels. (For an excellent source of results and prob-
lems in the case no secure channels exist, see [BL]).
Unlike the cryptographic case, very little was known
about the capabilities of this model. Two main basic
problems were studied and solved (in the synchronous
case): Byzantine agreement [LPS,DS,...] and collec-
tive coin flipping p2].
1
剩余10页未读,继续阅读
资源评论
奔跑的梅花Lu
- 粉丝: 662
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功