Secure End-To-End Communication With Optimal Throughput And Resilience Against Malicious Adversary

Lecture Notes in Computer Science(2013)

引用 0|浏览26
暂无评分
摘要
We demonstrate the feasibility of end-to-end communication in highly unreliable networks. Modeling a network as a graph with vertices representing nodes and edges representing the links between them, we consider two forms of unreliability: unpredictable edge-failures, and deliberate deviation from protocol specifications by corrupt and maliciously controlled nodes.We present a routing protocol for end-to-end communication that is simultaneously resilient to both forms of unreliability. In particular, we prove that our protocol is secure against arbitrary actions of the corrupt nodes controlled by a polynomial-time adversary, achieves correctness (Receiver gets all of the messages from Sender, in-order and without modification), and enjoys provably optimal throughput performance, as measured using competitive analysis. Competitive analysis is utilized to provide protocol guarantees again malicious behavior without placing limits on the number of the corrupted nodes in the network.Furthermore, our protocol does not incur any asymptotic memory overhead as compared to other protocols that are unable to handle malicious interference of corrupt nodes. In particular, our protocol requires O(n(2)) memory per processor, where n is the size of the network. This represents an O(n(2)) improvement over all existing protocols that have been designed for this network model.
更多
查看译文
关键词
Network Routing,Asynchronous Protocols,Multi-Party Computation with Dishonest Majority,Fault Localization,End-to-End Communication,Competitive Analysis,Communication Complexity
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要