Compressing Communication in Distributed Protocols
نویسندگان
چکیده
We show how to compress communication in distributed protocols in which parties do not have private inputs. More specifically, we present a generic method for converting any protocol in which parties do not have private inputs, into another protocol where each message is “short” while preserving the same number of rounds, the same communication pattern, the same output distribution, and the same resilience to error. Assuming that the output lies in some universe of size M , in our resulting protocol each message consists of only polylog(M,n, d) many bits, where n is the number of parties and d is the number of rounds. Our transformation works in the full information model, in the presence of either static or adaptive Byzantine faults. In particular, our result implies that for any such poly(n)-round distributed protocol which generates outputs in a universe of size poly(n), long messages are not needed, and messages of length polylog(n) suffice. In other words, in this regime, any distributed task that can be solved in the LOCAL model, can also be solved in the CONGEST model with the same round complexity and security guarantees. As a corollary, we conclude that for any poly(n)-round collective coin-flipping protocol, leader election protocol, or selection protocols, messages of length polylog(n) suffice (in the presence of either static or adaptive Byzantine faults).
منابع مشابه
Some Conversations Simply Cannot Be Concise: Separations between Information and Communication Complexity for Protocols
We survey the recent developments in the quantitative relation between communication and information complexity of interactive tasks. We briefly present state-of-the-art compression results, and then focus on an intuitive exposition of impossibility results for compressing protocols down to their information cost. We discuss which results and assumptions have room for improvement and pose a ser...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملCompression and Sieve: Reducing Communication in Parallel Breadth First Search on Distributed Memory Systems
For parallel breadth first search (BFS) algorithm on large-scale distributed memory systems, communication often costs significantly more than arithmetic and limits the scalability of the algorithm. In this paper we sufficiently reduce the communication cost in distributed BFS by compressing and sieving the messages. First, we leverage a bitmap compression algorithm to reduce the size of messag...
متن کاملCompressing Cryptographic Resources
A private-key cryptosystem may be viewed as a means by which a trusted dealer privately conveys a large, shared pseudo-random object to a pair of players, using little communication. Alternatively, the messages distributed by the dealer may be viewed as a secure compression of a pair of large identical random pads (or random functions) into a shorter shared “key” or “seed”. We pose the question...
متن کاملCommunicating object group and protocols for distributed systems
Distributed communicating object groups, relevant algorithms and object communication protocols are presented. The distributed communicating object group system (called DCO) is built on the basis of hierarchy group communication protocols for networks. The system can be used as a speci®cation and design environment for distributed fault-tolerant object-oriented (OO) applications. By combining d...
متن کامل