Security, Fault Tolerance, and Communication Complexity in Distributed Systems

01/28/2021
by   Donald Rozinak Beaver, et al.
0

We present efficient and practical algorithms for a large, distributed system of processors to achieve reliable computations in a secure manner. Specifically, we address the problem of computing a general function of several private inputs distributed among the processors of a network, while ensuring the correctness of the results and the privacy of the inputs, despite accidental or malicious faults in the system. [...] Our algorithms maintain a low cost in local processing time, are the first to achieve optimal levels of fault-tolerance, and most importantly, have low communication complexity. In contrast to the best known previous methods, which require large numbers of rounds even for fairly simple computations, we devise protocols that use small messages and a constant number of rounds regardless of the complexity of the function to be computed. Through direct algebraic approaches, we separate the communication complexity of secure computing from the computational complexity of the function to be computed. We examine security under both the modern approach of computational complexity-based cryptography and the classical approach of unconditional, information-theoretic security. We [...] support formal proofs of claims to security, addressing an important deficiency in the literature. Our protocols are provably secure. In the realm of information-theoretic security, we characterize those functions which two parties can compute jointly with absolute privacy. We also characterize those functions which a weak processor can compute using the aid of powerful processors without having to reveal the instances of the problem it would like to solve. Our methods include a promising new technique called a locally random reduction, which has given rise not only to efficient solutions for many of the problems considered in this work but to several powerful new results in complexity theory.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/28/2021

Efficient Quantum Voting with Information-Theoretic Security

Ensuring security and integrity of elections constitutes an important ch...
research
10/16/2020

Barrington Plays Cards: The Complexity of Card-based Protocols

In this paper we study the computational complexity of functions that ha...
research
11/05/2018

The distributed complexity of locally checkable problems on paths is decidable

Consider a computer network that consists of a path with n nodes. The no...
research
08/10/2019

Efficient Three-party Computation: An Information-theoretic Approach from Cut-and-Choose

As far as we know, the literature on secure computation from cut-and-cho...
research
05/03/2021

From Fairness to Full Security in Multiparty Computation

In the setting of secure multiparty computation (MPC), a set of mutually...
research
07/14/2022

Secure Network Function Computation for Linear Functions – Part I: Source Security

In this paper, we put forward secure network function computation over a...
research
11/16/2020

Secured Distributed Algorithms without Hardness Assumptions

We study algorithms in the distributed message-passing model that produc...

Please sign up or login with your details

Forgot password? Click here to reset