Swiper and Dora: efficient solutions to weighted distributed problems

07/28/2023
by   Luciano Freitas, et al.
0

The majority of fault-tolerant distributed algorithms are designed assuming a nominal corruption model, in which at most a fraction f_n of parties can be corrupted by the adversary. However, due to the infamous Sybil attack, nominal models are not sufficient to express the trust assumptions in open (i.e., permissionless) settings. Instead, permissionless systems typically operate in a weighted model, where each participant is associated with a weight and the adversary can corrupt a set of parties holding at most a fraction f_w of total weight. In this paper, we suggest a simple way to transform a large class of protocols designed for the nominal model into the weighted model. To this end, we formalize and solve three novel optimization problems, which we collectively call the weight reduction problems, that allow us to map large real weights into small integer weights while preserving the properties necessary for the correctness of the protocols. In all cases, we manage to keep the sum of the integer weights to be at most linear in the number of parties, resulting in extremely efficient protocols for the weighted model. Moreover, we demonstrate that, on weight distributions that emerge in practice, the sum of the integer weights tends to be far from the theoretical worst-case and, often even smaller than the number of participants. While, for some protocols, our transformation requires an arbitrarily small reduction in resilience (i.e., f_w = f_n - ϵ), surprisingly, for many important problems we manage to obtain weighted solutions with the same resilience (f_w = f_n) as nominal ones. Notable examples include asynchronous consensus, verifiable secret sharing, erasure-coded distributed storage and broadcast protocols.

READ FULL TEXT

page 12

page 17

page 18

page 19

research
02/09/2020

Network-Agnostic State Machine Replication

We study the problem of state machine replication (SMR) – the underlying...
research
06/05/2023

How Hard is Asynchronous Weight Reassignment? (Extended Version)

The performance of distributed storage systems deployed on wide-area net...
research
09/25/2021

Good-case and Bad-case Latency of Unauthenticated Byzantine Broadcast: A Complete Categorization

This paper studies the good-case latency of unauthenticated Byzantine fa...
research
11/29/2017

Inner Product and Set Disjointness: Beyond Logarithmically Many Parties

A basic goal in complexity theory is to understand the communication com...
research
02/16/2019

Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead

In this work we present hbAVSS, the Honey Badger of Asynchronous Verifia...
research
11/19/2021

Non asymptotic bounds in asynchronous sum-weight gossip protocols

This paper focuses on non-asymptotic diffusion time in asynchronous goss...
research
04/15/2021

Fast Private Parameter Learning and Evaluation for Sum-Product Networks

A sum-product network (SPN) is a graphical model that allows several typ...

Please sign up or login with your details

Forgot password? Click here to reset