Information Spreading in Dynamic Networks Under Oblivious Adversaries

نویسندگان

  • John Augustine
  • Chen Avin
  • Mehraneh Liaee
  • Gopal Pandurangan
  • Rajmohan Rajaraman
چکیده

We study the problem of all-to-all information exchange, also known as gossip, in dynamic networks controlled by an adversary that can modify the network arbitrarily from one round to another, provided that the network is always connected. In the gossip problem, there are n tokens arbitrarily distributed among the n network nodes, and the goal is to disseminate all the n tokens to every node. Our focus is on token-forwarding algorithms, which do not manipulate tokens in any way other than storing, copying, and forwarding them. Gossip can be completed in linear time in any static network, but an important and basic open question for dynamic networks is the existence of a distributed protocol that can do significantly better than an easily achievable bound of O(n) rounds. In previous work, it has been shown that under adaptive adversaries —those that have full knowledge and control of the topology in every round and also have knowledge of the distributed protocol including its random choices—every token forwarding algorithm requires Ω(n/ log n) rounds to complete. In this paper, we study oblivious adversaries, which differ from adaptive adversaries in one crucial aspect— they are oblivious to the random choices made by the protocol. We consider RAND-DIFF, a natural distributed algorithm in which neighbors exchange a token chosen uniformly at random from the difference of their token sets. Previous work has shown that starting from a distribution in which each node has a random constant fraction of the tokens, RAND-DIFF completes in Õ(n) rounds. In contrast, we show that a polynomial slowdown is inevitable under more general distributions: we present an Ω̃(n) lower bound for RAND-DIFF under an oblivious adversary. We also present an Ω̃(n) lower bound under a stronger notion of oblivious adversary for a class of randomized distributed algorithms—symmetric knowledge-based algorithms— in which nodes make token transmission decisions based entirely on the sets of tokens they possess over time. On the positive side, we present a centralized algorithm that completes gossip in Õ(n) rounds with high probability, under any oblivious adversary. We also show an Õ(n) upper bound for RAND-DIFF in a restricted class of oblivious adversaries, which we call paths-respecting, that may be of independent interest.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some Lower Bounds in Dynamic Networks with Oblivious Adversaries

This paper considers several closely-related problems in synchronous dynamic networks with oblivious adversaries, and proves novel Ω(d + poly(m)) lower bounds on their time complexity (in rounds). Here d is the dynamic diameter of the dynamic network and m is the total number of nodes. Before this work, the only known lower bounds on these problems under oblivious adversaries were the trivial Ω...

متن کامل

A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries

Oblivious transfer plays a fundamental role in the area of secure distributed computation. In particular, this primitive is used to search items in decentralized databases. Using a variant of smooth projective hash previously presented by Zeng et al., we construct a practical framework for t-out-of-n oblivious transfer in the plain model without any set-up assumption. It can be implemented unde...

متن کامل

On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries

Noisy channels are a powerful resource for cryptography as they can be used to obtain information-theoretically secure key agreement, commitment and oblivious transfer protocols, among others. Oblivious transfer (OT) is a fundamental primitive since it is complete for secure multiparty computation, and the OT capacity characterizes how efficiently a channel can be used for obtaining string obli...

متن کامل

Practical Frameworks For h-Out-Of-n Oblivious Transfer With Security Against Covert and Malicious Adversaries

We present two practical frameworks for h-out-of-n oblivious transfer (OTn h ). The first one is secure against covert adversaries who are not always willing to cheat at any price. The security is proven under the ideal/real simulation paradigm (we call such security fullysimulatable security against covert adversaries). The second one is secure against malicious adversaries who are always will...

متن کامل

On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions

We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model for describing such primitives, called Weak Generic Transfer (WGT). This model includes as important special cases Weak Oblivious Transfer (WOT), where both the sender and receiver may learn too much about the other ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016