Byzantine agreement protocols are essential components in distributed systems and hold significant relevance for blockchain networks. However, the communication complexity of these protocols remains a major obstacle w...
详细信息
ISBN:
(纸本)9783031649479;9783031649486
Byzantine agreement protocols are essential components in distributed systems and hold significant relevance for blockchain networks. However, the communication complexity of these protocols remains a major obstacle when considering their application in large-scale blockchain systems. Recently, several elegant Byzantine protocols in the synchronous authenticated setting have been proposed to enjoy expected constant round complexity or optimal good-case latency. However, their overall communication complexity is still Omega(n(2)l) bits for an l-bit message to be agreed by a set of n replicas. This quadratic communication complexity makes them unsuitable for large-scale applications. In this paper, we systematically aim to reduce the communication complexity of these protocols. In particular, we show how these protocols can be extended to have a complexity of O(nl + n(2)kappa) bits, where. is determined by the security parameter lambda. This communication complexity is optimal when l reaches Omega(kappa n).
We study query-to-communication lifting. The major open problem in this area is to prove a lifting theorem for gadgets of constant size. The recent paper [2] introduces semi-structured communication complexity, in whi...
详细信息
While deterministic finite automata seem to be well understood, surprisingly many important problems concerning nondeterministic finite automata (nfa's) remain open, One such problem area is the study of different...
详细信息
While deterministic finite automata seem to be well understood, surprisingly many important problems concerning nondeterministic finite automata (nfa's) remain open, One such problem area is the study of different measures of nondeterminism in finite automata and the estimation of the sizes of minimal nondeterministic finite automata. In this paper the concept of communication complexity is applied in order to achieve progress in this problem area. The main results are as follows: 1. Deterministic communication complexity provides lower bounds on the size of nfa's with bounded unambiguity. Applying this fact, the proofs of several results about nfa's with limited ambiguity can be simplified and presented in a uniform way. 2. There is a family of languages KONk2 with an exponential size gap between nfa's with polynomial leaf number/ambiguity and nfa's with ambiguity k. This partially provides an answer to the open problem posed by B. Ravikumar and O. Ibarra (1989, SIAM J. Comput. 18, 1263-1282) and H. Leung (1998, SIAM J. Comput. 27, 1073-1082). (C) 2002 Elsevier Science (USA).
In the multiparty communication game (CFL game) of Chandra, Furst, and Lipton [Proceedings of the 15th Annual ACM Symposium on Theory of Computing, Boston, MA, 1983, pp. 94-99] k players collaboratively evaluate a fun...
详细信息
In the multiparty communication game (CFL game) of Chandra, Furst, and Lipton [Proceedings of the 15th Annual ACM Symposium on Theory of Computing, Boston, MA, 1983, pp. 94-99] k players collaboratively evaluate a function f(x(0),...,x(k-1)) in which player i knows all inputs except x(i). The players have unlimited computational power. The objective is to minimize communication. In this paper, we study the Simultaneous Messages (SM) model of multiparty communication complexity. The SM model is a restricted version of the CFL game in which the players are not allowed to communicate with each other. Instead, each of the k players simultaneously sends a message to a referee, who sees none of the inputs. The referee then announces the function value. We prove lower and upper bounds on the SM complexity of several classes of explicit functions. Our lower bounds extend to randomized SM complexity via an entropy argument. A lemma establishing a tradeoff between average Hamming distance and range size for transformations of the Boolean cube might be of independent interest. Our lower bounds on SM complexity imply an exponential gap between the SM model and the CFL model for up to (log n)(1-epsilon) players for any epsilon > 0. This separation is obtained by comparing the respective complexities of the Generalized Addressing Function, GAF(G,k), where G is a group of order n. We also combine our lower bounds on SM complexity with the ideas of Hastad and Goldmann [Comput. complexity, 1 (1991), pp. 113-129] to derive superpolynomial lower bounds for certain depth-2 circuits computing a function related to the GAF function. We prove some counterintuitive upper bounds on SM complexity. We show that GAF(Zt 2,3) has SM complexity O(n(0.92)). When the number of players is at least c log n, for some constant c > 0, our SM protocol for GAF(Zt2,k) has polylog(n) complexity. We also examine a class of functions defined by certain depth-2 circuits. This class includes the Generalized Inn
A natural way to interpret a cellular automaton (CA) is as a mechanism that computes, in a distributed way, some function f. In other words, from a computer science point of view, CAs can be seen as distributed system...
详细信息
A natural way to interpret a cellular automaton (CA) is as a mechanism that computes, in a distributed way, some function f. In other words, from a computer science point of view, CAs can be seen as distributed systems where the cells of the CAs are nodes of a network linked by communication channels. A classic measure of efficiency in such distributed systems is the number of bits exchanged during the computation process. A typical approach is to look for bottlenecks: channels through which the nature of the function f forces the exchange of a significant number of bits. In practice, a widely used way to understand such congestion phenomena is to partition the system into two subsystems and try to find bounds for the number of bits that must pass through the channels that join them. Finding these bounds is the focus of communication complexity theory. Measuring the communication complexity of some problems induced by a CA phi turned out to be tremendously useful to give clues regarding the intrinsic universality of phi (a CA is said to be intrinsically universal if it is capable of emulating any other). In fact, there exist particular problems P's for which the following key property holds: if phi is intrinsically universal, then the communication complexity of P(phi) must be maximal. In this tutorial, we intend to explain the connections that were found, through a series of papers, between intrinsic universality and communication complexity in CAs.
One third of the elementary cellular automata (CAs) are either number-conserving (NCCAs) or monotone (increasing or decreasing). In this paper we prove that, for all of them, we can find linear or constant communicati...
详细信息
One third of the elementary cellular automata (CAs) are either number-conserving (NCCAs) or monotone (increasing or decreasing). In this paper we prove that, for all of them, we can find linear or constant communication protocols for the prediction problem. In other words, we are able to give a succinct description for their dynamics. This is not necessarily true for general NCCAs. In fact, we also show how to explicitly construct, from any CA, a new NCCA which preserves the original communication complexity. (C) 2011 Elsevier B.V. All rights reserved.
A simple model of a multiprocessor system with the k processors connected via a common bus is used to generalize the bounds known for 2-processor systems. Each processor has unlimited computational power and initiall...
详细信息
A simple model of a multiprocessor system with the k processors connected via a common bus is used to generalize the bounds known for 2-processor systems. Each processor has unlimited computational power and initially knows only one of the inputs in a function with k variables. Three rank-functions are used to directly derive a lower bound for Las Vegas protocols: 1. tensor-rank, 2. d and d subscript y, with d defined as the smallest number of monochromatic submatrixes necessary to cover M entirely and d subscript y denoting the smallest number of pairwise disjoint y-monochromatic submatrixes necessary to cover all y-entries of M, and 3. the magnitude of the greatest foolingset. This final rank-function is used to prove maximal complexity for a specific function. The nondeterministic complexity is shown to be, at most, quadratically better than the deterministic complexity. A rather tight lower bound is found for the nondeterministic complexity.
As Byzantine Agreement (BA) protocols find application in large-scale decentralized cryptocurrencies, an increasingly important problem is to design BA protocols with improved communication complexity. A few existing ...
详细信息
As Byzantine Agreement (BA) protocols find application in large-scale decentralized cryptocurrencies, an increasingly important problem is to design BA protocols with improved communication complexity. A few existing works have shown how to achieve subquadratic BA under an adaptive adversary. Intriguingly, they all make a common relaxation about the adaptivity of the attacker, that is, if an honest node sends a message and then gets corrupted in some round, the adversary cannot erase the message that was already sent-henceforth we say that such an adversary cannot perform "after-the-fact removal". By contrast, many (super-)quadratic BA protocols in the literature can tolerate after-the-fact removal. In this paper, we first prove that disallowing after-the-fact removal is necessary for achieving subquadratic-communication BA. Next, we show new subquadratic binary BA constructions (of course, assuming no after-the-fact removal) that achieve near-optimal resilience and expected constant rounds under standard cryptographic assumptions and a public-key infrastructure (PKI) in both synchronous and partially synchronous settings. In comparison, all known subquadratic protocols make additional strong assumptions such as random oracles or the ability of honest nodes to erase secrets from memory, and even with these strong assumptions, no prior work can achieve the above properties. Lastly, we show that some setup assumption is necessary for achieving subquadratic multicast-based BA.
Byzantine reliable broadcast is a fundamental problem in distributed computing, which has been studied extensively over the past decades. State-of-the-art algorithms are predominantly based on the approach to share en...
详细信息
暂无评论