Local Distributed Verification

نویسندگان

  • Alkida Balliu
  • Gianlorenzo D'Angelo
  • Pierre Fraigniaud
  • Dennis Olivetti
چکیده

In the framework of distributed network computing, it is known that, for every network predicate, each network configuration that satisfies this predicate can be proved using distributed certificates which can be verified locally. However, this requires to leak information about the identities of the nodes in the certificates, which might not be applicable in a context in which privacy is desirable. Unfortunately, it is known that if one insists on certificates independent of the node identities, then not all network predicates can be proved using distributed certificates that can be verified locally. In this paper, we prove that, for every network predicate, there is a distributed protocol satisfying the following two properties: (1) for every network configuration that is legal w.r.t. the predicate, and for any attempt by an adversary to prove the illegality of that configuration using distributed certificates, there is a locally verifiable proof that the adversary is wrong, also using distributed certificates; (2) for every network configuration that is illegal w.r.t. the predicate, there is a proof of that illegality, using distributed certificates, such that no matter the way an adversary assigns its own set of distributed certificates in an attempt to prove the legality of the configuration, the actual illegality of the configuration will be locally detected. In both cases, the certificates are independent of the identities of the nodes. These results are achieved by investigating the so-called local hierarchy of complexity classes in which the certificates do not exploit the node identities. Indeed, we give a characterization of such a hierarchy, which is of its own interest ∗The first, third and fourth authors received additional supports from the ANR project DISPLEXITY. †Additional supports from the INRIA project GANG. ar X iv :1 60 5. 03 89 2v 1 [ cs .D C ] 1 2 M ay 2 01 6

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Entanglement verification protocols for distributed systems based on the Quantum Recursive Network Architecture

In distributed systems based on the Quantum Recursive Network Architecture, quantum channels and quantum memories are used to establish entangled quantum states between node pairs. Such systems are robust against attackers that interact with the quantum channels. Conversely, weaknesses emerge when an attacker takes full control of a node and alters the configuration of the local quantum memory,...

متن کامل

Partial Observation in Distributed Supervisory Control of Discrete-Event Systems

Distributed supervisory control is a method to synthesize local controllers in discrete-eventsystems with a systematic observation of the plant. Some works were reported on extending this methodby which local controllers are constructed so that observation properties are preserved from monolithic todistributed supervisory control, in an up-down approach. In this paper, we find circumstances in ...

متن کامل

2190 - 4782 Formal Verification of Object - Oriented Software

s of Invited Talks Local Reasoning for Verification of Object-Based Programs Using First-Order Assertions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Anindya Banerjee Using Kilim’s Isolation Types for Multicore Efficiency . . . . . . . . . . . . . . . . . 1 Alan Mycroft The Practical Application of Formal Methods: Where is the Benefit for Industry...

متن کامل

A Verification System for Distributed Objects with Asynchronous Method Calls

We present a verification system for Creol, an object-oriented modeling language for concurrent distributed applications. The system is an instance of KeY, a framework for object-oriented software verification, which has so far been applied foremost to sequential Java. Building on KeY characteristic concepts, like dynamic logic, sequent calculus, explicit substitutions, and the taclet rule lang...

متن کامل

Verification of Distributed Systems: From Specification to Implementation

This paper describes a methodology for developing and verifying a class of distributed systems in which states and state transitions may be continuous or discrete. We focus on systems where changes are local in that a small number of components change state while the remainder of the system is unchanged. A proof methodology is developed that ensures global properties, such as invariants and con...

متن کامل

Local Verification Using a Distributed State Space

This paper deals with the modular analysis of distributed concurrent systems modelled by Petri nets. The main analysis techniques of such systems suffer from the well-known problem of the combinatory explosion of state space. In order to cope with this problem, we use a modular representation of the state space instead of the ordinary one. The modular representation, namely modular state space,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1605.03892  شماره 

صفحات  -

تاریخ انتشار 2016