On the Probabilistic Omission Adversary

نویسندگان

  • Taisuke Izumi
  • Koichi Wada
چکیده

This paper newly proposes a novel round-based synchronous system suffering crash and probabilistic omission failures. In this model, a novel class of adversaries, called p-probabilistic omission adversary (pPOA) is introduced. In addition to the ability of complete control of the crash-failure behavior, p-POA can select any subset of all transmitted messages as omission candidates. Then, each message in the omission candidates is lost with probability p. This paper investigates the feasiblity and complexity of the consensus problem under p-POA. We first show two impossibility results that (1) for any p > 0, there exists no uniform consensus algorithm tolerating more than or equal to n/2 crash failures, and that (2) for any p > 0, any uniform consensus algorithm cannot halt. We also show two consensus algorithms CPO and F-CPO. Both algorithms work under (1/2)-POA and respectively have distinct advantages. The algorithm CPO can tolerate at most n/2− 1 crash failures and achieves O(f) expected round complexity, where f is the actual number of crash failures. This implies that CPO has maximum crashfailure resiliency. While the second algorithm F-CPO assumes the maximum number of crash failures less than n/3, it achieves f +O(1) round compexity in expectation. Since it is known that the lower bound for crash-tolerant consensus is f +1, this result implies that only a constant number of extra rounds is nessesary to tolerate a drastic number of message omissions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality

In this paper, we study the problem of probabilistic perfectly reliable message transmission (PPRMT) and probabilistic perfectly secure message transmission (PPSMT) between a sender S and a receiver R in a synchronous network, where S and R are connected by n vertex disjoint paths called wires. Some of these n wires may be corrupted by a mixed adversary (tb, to, tf , tp), having unbounded compu...

متن کامل

Realistic Failures in Secure Multi-party Computation

In secure multi-party computation, the different ways in which the adversary can control the corrupted players are described by different corruption types. The three most common corruption types are active corruption (the adversary has full control over the corrupted player), passive corruption (the adversary sees what the corrupted player sees) and fail-corruption (the adversary can force the ...

متن کامل

Robust and private computations of mobile agent alliances

ly spoken, error behaviour is one aspect of the adversary behaviour as errors can be assigned to the adversary. It defines the way an adversary influences a protocol, the methods it can use. A categorisation is done by [HH91], where crash failures, sending omission, receiving omission, general omission failures, and, finally, arbitrary failures are differentiated. In case errors occur arbitrari...

متن کامل

Robust Synchronous P2P Primitives Using SGX Enclaves

Peer-to-peer (P2P) systems such as BitTorrent and Bitcoin are susceptible to serious attacks from byzantine nodes that join as peers. Due to well-known impossibility results for designing P2P primitives in unrestricted byzantine settings, research has explored many adversarial models with additional assumptions, ranging from mild (such as pre-established PKI) to strong (such as the existence of...

متن کامل

A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA

In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007