Information Spreading in Dynamic Networks Under Oblivious Adversaries
نویسندگان
چکیده
We study the problem of all-to-all information exchange, also known as gossip, in dynamic networks controlled by an adversary that can modify the network arbitrarily from one round to another, provided that the network is always connected. In the gossip problem, there are n tokens arbitrarily distributed among the n network nodes, and the goal is to disseminate all the n tokens to every node. Our focus is on token-forwarding algorithms, which do not manipulate tokens in any way other than storing, copying, and forwarding them. Gossip can be completed in linear time in any static network, but an important and basic open question for dynamic networks is the existence of a distributed protocol that can do significantly better than an easily achievable bound of O(n) rounds. In previous work, it has been shown that under adaptive adversaries —those that have full knowledge and control of the topology in every round and also have knowledge of the distributed protocol including its random choices—every token forwarding algorithm requires Ω(n/ log n) rounds to complete. In this paper, we study oblivious adversaries, which differ from adaptive adversaries in one crucial aspect— they are oblivious to the random choices made by the protocol. We consider RAND-DIFF, a natural distributed algorithm in which neighbors exchange a token chosen uniformly at random from the difference of their token sets. Previous work has shown that starting from a distribution in which each node has a random constant fraction of the tokens, RAND-DIFF completes in Õ(n) rounds. In contrast, we show that a polynomial slowdown is inevitable under more general distributions: we present an Ω̃(n) lower bound for RAND-DIFF under an oblivious adversary. We also present an Ω̃(n) lower bound under a stronger notion of oblivious adversary for a class of randomized distributed algorithms—symmetric knowledge-based algorithms— in which nodes make token transmission decisions based entirely on the sets of tokens they possess over time. On the positive side, we present a centralized algorithm that completes gossip in Õ(n) rounds with high probability, under any oblivious adversary. We also show an Õ(n) upper bound for RAND-DIFF in a restricted class of oblivious adversaries, which we call paths-respecting, that may be of independent interest.
منابع مشابه
Some Lower Bounds in Dynamic Networks with Oblivious Adversaries
This paper considers several closely-related problems in synchronous dynamic networks with oblivious adversaries, and proves novel Ω(d + poly(m)) lower bounds on their time complexity (in rounds). Here d is the dynamic diameter of the dynamic network and m is the total number of nodes. Before this work, the only known lower bounds on these problems under oblivious adversaries were the trivial Ω...
متن کاملA Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries
Oblivious transfer plays a fundamental role in the area of secure distributed computation. In particular, this primitive is used to search items in decentralized databases. Using a variant of smooth projective hash previously presented by Zeng et al., we construct a practical framework for t-out-of-n oblivious transfer in the plain model without any set-up assumption. It can be implemented unde...
متن کاملOn the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries
Noisy channels are a powerful resource for cryptography as they can be used to obtain information-theoretically secure key agreement, commitment and oblivious transfer protocols, among others. Oblivious transfer (OT) is a fundamental primitive since it is complete for secure multiparty computation, and the OT capacity characterizes how efficiently a channel can be used for obtaining string obli...
متن کاملPractical Frameworks For h-Out-Of-n Oblivious Transfer With Security Against Covert and Malicious Adversaries
We present two practical frameworks for h-out-of-n oblivious transfer (OTn h ). The first one is secure against covert adversaries who are not always willing to cheat at any price. The security is proven under the ideal/real simulation paradigm (we call such security fullysimulatable security against covert adversaries). The second one is secure against malicious adversaries who are always will...
متن کاملOn the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model for describing such primitives, called Weak Generic Transfer (WGT). This model includes as important special cases Weak Oblivious Transfer (WOT), where both the sender and receiver may learn too much about the other ...
متن کامل