skip to main content
10.1145/3583668.3594578acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
research-article

Distributed CONGEST Algorithms against Mobile Adversaries

Published: 16 June 2023 Publication History

Abstract

In their seminal PODC 1991 paper, Ostrovsky and Yung introduced the study of distributed computation in the presence of mobile adversaries which can dynamically appear throughout the network, analogous to a spread of a virus. Over the years, this setting has been studied mostly under the assumption that the communication graph is fully-connected. Resilient CONGEST algorithms for general graphs, on the other hand, are currently known only for the classical static setting, i.e., where the set of corrupted edges (or nodes) is fixed throughout the entire computation.
We fill this missing gap by providing round-efficient simulations that translate given CONGEST algorithms into equivalent algorithms that are resilient against f-mobile edge adversaries, i.e., where the adversary controls a (possibly distinct) subset of f edges Fi in each round i. Our main results are:
Perfect-Security with Mobile Eavesdroppers. A translation of any r-round f-static-secure algorithm into an equivalent Θ(f)-mobile-secure algorithm with Θ(r) rounds. We also show that the f-static-secure algorithms of [Hitron, Parter and Yogev, DISC 2022 & ITCS 2023] can be modified into f-mobile-secure algorithms with the same number of rounds.
Resilience with Mobile Byzantine Adversaries. An f-mobile-byzantine simulation which is based on a decomposition of the graph into low-diameter edge-disjoint spanning trees. This provides us with near-optimal CONGEST compilers for expander graphs. It also leads to near-optimal compilers in the congested-clique model against Θ(n)-mobile adversaries. For general (2f + 1) edge-connected graphs with f-mobile adversary, we almost match the bounds known for the f-static setting, when provided a trusted pre-processing phase.
Our results are based on a collection of tools borrowed from the area of interactive coding [Gelles, Found. Trends Theor. Comput. Sci. 2017], linear sketches and low-congestion graph decomposition. The introduced toolkit might have further applications for resilient computation.

References

[1]
Baruch Awerbuch, Oded Goldreich, David Peleg, and Ronen Vainish. 1990. A Trade-Off between Information and Communication in Broadcast Protocols. J. ACM 37, 2 (1990), 238--256.
[2]
Anindo Bagchi and S. Louis Hakimi. 1994. Information dissemination in distributed systems with faulty units. IEEE Trans. Comput. 43, 6 (1994), 698--710.
[3]
Joshua Baron, Karim El Defrawy, Joshua Lampkins, and Rafail Ostrovsky. 2014. How to withstand mobile virus attacks, revisited. In ACM Symposium on Principles of Distributed Computing, PODC '14, Paris, France, July 15--18, 2014, Magnús M. Halldórsson and Shlomi Dolev (Eds.). ACM, 293--302.
[4]
Zuzana Beerliová-Trubíniová and Martin Hirt. 2008. Perfectly-Secure MPC with Linear Communication Complexity. In Theory of Cryptography, Fifth Theory of Cryptography Conference (TCC) (Lecture Notes in Computer Science, Vol. 4948), Ran Canetti (Ed.). Springer, 213--230.
[5]
Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. 1988. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract). In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, May 2--4, 1988, Chicago, Illinois, USA. 1--10.
[6]
Piotr Berman and Juan A. Garay. 1993. Cloture Votes: n/4-Resilient Distributed Consensus in t+1 Rounds. Math. Syst. Theory 26, 1 (1993), 3--19.
[7]
Piotr Berman, Juan A. Garay, and Kenneth J. Perry. 1989. Towards Optimal Distributed Consensus (Extended Abstract). In 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October -- 1 November 1989. IEEE Computer Society, 410--415.
[8]
Douglas M Blough and Andrzej Pelc. 1993. Optimal communication in networks with randomly distributed Byzantine faults. Networks 23, 8 (1993), 691--701.
[9]
Fran�ois Bonnet, Xavier D�fago, Thanh Dang Nguyen, and Maria Potop-Butucaru. 2016. Tight bound on mobile Byzantine Agreement. Theor. Comput. Sci. 609 (2016), 361--373.
[10]
Gabriel Bracha. 1987. Asynchronous Byzantine agreement protocols. Information and Computation 75, 2 (1987), 130--143.
[11]
Gabriel Bracha and Sam Toueg. 1985. Asynchronous Consensus and Broadcast Protocols. J. ACM 32, 4 (1985), 824--840.
[12]
Ran Canetti and Amir Herzberg. 1994. Maintaining Security in the Presence of Transient Faults. In Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21--25, 1994, Proceedings (Lecture Notes in Computer Science, Vol. 839), Yvo Desmedt (Ed.). Springer, 425--438.
[13]
Keren Censor-Hillel, Ran Gelles, and Bernhard Haeupler. 2018. Making Asynchronous Distributed Computations Robust to Channel Noise. In 9th Innovations in Theoretical Computer Science Conference, ITCS 2018, January 11--14, 2018, Cambridge, MA, USA (LIPIcs, Vol. 94), Anna R. Karlin (Ed.). Schloss Dagstuhl - Leibniz-Zentrum f�r Informatik, 50:1--50:20.
[14]
Keren Censor-Hillel and Tariq Toukan. 2017. On fast and robust information spreading in the vertex-congest model. Theoretical Computer Science (2017).
[15]
Benny Chor, Oded Goldreich, Johan H�stad, Joel Friedman, Steven Rudich, and Roman Smolensky. 1985. The Bit Extraction Problem of t-Resilient Functions (Preliminary Version). In 26th Annual Symposium on Foundations of Computer Science, Portland, Oregon, USA, 21--23 October 1985. IEEE Computer Society, 396--407.
[16]
Julia Chuzhoy, Merav Parter, and Zihan Tan. 2020. On Packing Low-Diameter Spanning Trees. In 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020, July 8--11, 2020, Saarbr�cken, Germany (Virtual Conference). 33:1--33:18.
[17]
Brian A. Coan and Jennifer L. Welch. 1992. Modular Construction of a Byzantine Agreement Protocol with Optimal Message Bit Complexity. Inf. Comput. 97, 1 (1992), 61--85.
[18]
Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, and Alex Samorodnitsky. 2019. On the Round Complexity of Randomized Byzantine Agreement. In 33rd International Symposium on Distributed Computing, DISC 2019, October 14--18, 2019, Budapest, Hungary. 12:1--12:17.
[19]
Graham Cormode and Donatella Firmani. 2014. A unifying framework for l0-sampling algorithms. Distributed Parallel Databases 32, 3 (2014), 315--335.
[20]
Danny Dolev. 1982. The Byzantine Generals Strike Again. J. Algorithms 3, 1 (1982), 14--30.
[21]
Danny Dolev, Cynthia Dwork, Orli Waarts, and Moti Yung. 1990. Perfectly Secure Message Transmission. In 31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22--24, 1990, Volume I. IEEE Computer Society, 36--45.
[22]
Danny Dolev, Michael J. Fischer, Robert J. Fowler, Nancy A. Lynch, and H. Raymond Strong. 1982. An Efficient Algorithm for Byzantine Agreement without Authentication. Information and Control 52, 3 (1982), 257--274.
[23]
Danny Dolev and Ezra N. Hoch. 2008. Constant-Space Localized Byzantine Consensus. In Distributed Computing, 22nd International Symposium, DISC 2008, Arcachon, France, September 22--24, 2008. Proceedings. 167--181.
[24]
Shlomi Dolev, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky, and Moti Yung. 2016. Proactive Secret Sharing with a Dishonest Majority. In Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 -- September 2, 2016, Proceedings (Lecture Notes in Computer Science, Vol. 9841), Vassilis Zikas and Roberto De Prisco (Eds.). Springer, 529--548.
[25]
Karim Eldefrawy, Rafail Ostrovsky, and Moti Yung. 2018. Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. In From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Lecture Notes in Computer Science, Vol. 11170), Pierangela Samarati, Indrajit Ray, and Indrakshi Ray (Eds.). Springer, 470--486.
[26]
Pesech Feldman and Silvio Micali. 1997. An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement. SIAM J. Comput. 26, 4 (1997), 873--933.
[27]
Michael J Fischer. 1983. The consensus problem in unreliable distributed systems (a brief survey). In International Conference on Fundamentals of Computation Theory. Springer, 127--140.
[28]
Orr Fischer and Merav Parter. 2023. Distributed CONGEST Algorithms against Mobile Adversaries. CoRR abs/2305.14300 (2023).
[29]
Mattias Fitzi and Ueli Maurer. 2000. From partial consistency to global broadcast. In Proceedings of the thirty-second annual ACM symposium on Theory of computing. 494--503.
[30]
Matthew K. Franklin, Zvi Galil, and Moti Yung. 2000. Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. J. ACM 47, 2 (2000), 225--243.
[31]
Juan A. Garay. 1994. Reaching (and Maintaining) Agreement in the Presence of Mobile Faults (Extended Abstract). In Distributed Algorithms, 8th International Workshop, WDAG '94, Terschelling, The Netherlands, September 29 -- October 1, 1994, Proceedings (Lecture Notes in Computer Science, Vol. 857), Gerard Tel and Paul M. B. Vit�nyi (Eds.). Springer, 253--264.
[32]
Juan A. Garay and Yoram Moses. 1998. Fully Polynomial Byzantine Agreement for n > 3t Processors in t + 1 Rounds. SIAM J. Comput. 27, 1 (1998), 247--290.
[33]
Ran Gelles. 2017. Coding for Interactive Communication: A Survey. Found. Trends Theor. Comput. Sci. 13, 1--2 (2017), 1--157.
[34]
Ran Gelles, Ankur Moitra, and Amit Sahai. 2011. Efficient and Explicit Coding for Interactive Communication. In IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, Palm Springs, CA, USA, October 22--25, 2011, Rafail Ostrovsky (Ed.). IEEE Computer Society, 768--777.
[35]
Mohsen Ghaffari. 2015. Distributed Broadcast Revisited: Towards Universal Optimality. In Automata, Languages, and Programming - 42nd International Colloquium, (ICALP), Vol. 9135. Springer, 638--649.
[36]
Oded Goldreich, Silvio Micali, and Avi Wigderson. 1987. How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, New York, New York, USA, Alfred V. Aho (Ed.). ACM, 218--229.
[37]
Yael Hitron and Merav Parter. 2021. Broadcast CONGEST Algorithms against Adversarial Edges. In 35th International Symposium on Distributed Computing, DISC 2021, October 4--8, 2021, Freiburg, Germany (Virtual Conference) (LIPIcs, Vol. 209), Seth Gilbert (Ed.). Schloss Dagstuhl - Leibniz-Zentrum f�r Informatik, 23:1--23:19.
[38]
Yael Hitron and Merav Parter. 2021. General CONGEST Compilers against Adversarial Edges. In 35th International Symposium on Distributed Computing, DISC 2021, October 4--8, 2021, Freiburg, Germany (Virtual Conference) (LIPIcs, Vol. 209), Seth Gilbert (Ed.). Schloss Dagstuhl - Leibniz-Zentrum f�r Informatik, 24:1--24:18.
[39]
Yael Hitron, Merav Parter, and Eylon Yogev. 2022. Broadcast CONGEST Algorithms Against Eavesdroppers. In 36th International Symposium on Distributed Computing, DISC 2022, October 25--27, 2022, Augusta, Georgia, USA (LIPIcs, Vol. 246), Christian Scheideler (Ed.). Schloss Dagstuhl - Leibniz-Zentrum f�r Informatik, 27:1--27:19.
[40]
Yael Hitron, Merav Parter, and Eylon Yogev. 2023. Secure Distributed Network Optimization Against Eavesdroppers. In 14th Innovations in Theoretical Computer Science Conference, ITCS 2023, January 10--13, 2023, Cambridge, Massachusetts, USA.
[41]
William M. Hoza and Leonard J. Schulman. 2016. The Adversarial Noise Threshold for Distributed Protocols. In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10--12, 2016, Robert Krauthgamer (Ed.). SIAM, 240--258.
[42]
Damien Imbs and Michel Raynal. 2015. Simple and efficient reliable broadcast in the presence of byzantine processes. arXiv preprint arXiv:1510.06882 (2015).
[43]
Kamal Jain. 2004. Security based on network topology against the wiretapping attack. IEEE Wirel. Commun. 11, 1 (2004), 68--71.
[44]
David R. Karger. 1994. Random sampling in cut, flow, and network design problems. In Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 23--25 May 1994, Montr�al, Qu�bec, Canada, Frank Thomson Leighton and Michael T. Goodrich (Eds.). ACM, 648--657.
[45]
Jonathan Katz and Chiu-Yuen Koo. 2006. On expected constant-round protocols for Byzantine agreement. In Annual International Cryptology Conference. Springer, 445--462.
[46]
Muhammad Samir Khan, Syed Shalan Naqvi, and Nitin H. Vaidya. 2019. Exact Byzantine Consensus on Undirected Graphs under Local Broadcast Model. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, PODC 2019, Toronto, ON, Canada, July 29 -- August 2, 2019. 327--336.
[47]
Chiu-Yuen Koo. 2004. Broadcast in radio networks tolerating byzantine adversarial behavior. In Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, PODC 2004, St. John's, Newfoundland, Canada, July 25--28, 2004, Soma Chaudhuri and Shay Kutten (Eds.). ACM, 275--282.
[48]
Leslie Lamport, Robert E. Shostak, and Marshall C. Pease. 1982. The Byzantine Generals Problem. ACM Trans. Program. Lang. Syst. 4, 3 (1982), 382--401.
[49]
Zvi Lotker, Boaz Patt-Shamir, Elan Pavlov, and David Peleg. 2005. Minimum-Weight Spanning Tree Construction in O(log log n) Communication Rounds. SIAM J. Comput. 35, 1 (2005), 120--131.
[50]
Alexandre Maurer and S�bastien Tixeuil. 2012. On Byzantine Broadcast in Loosely Connected Networks. In Distributed Computing - 26th International Symposium, DISC 2012, Salvador, Brazil, October 16--18, 2012. Proceedings. 253--266.
[51]
CSJA Nash-Williams. 1961. Edge-disjoint spanning trees of finite graphs. Journal of the London Mathematical Society 1, 1 (1961), 445--450.
[52]
Rafail Ostrovsky and Moti Yung. 1991. How to Withstand Mobile Virus Attacks (Extended Abstract). In Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, August 19--21, 1991, Luigi Logrippo (Ed.). ACM, 51--59.
[53]
Merav Parter. 2019. Small Cuts and Connectivity Certificates: A Fault Tolerant Approach. In 33rd International Symposium on Distributed Computing (DISC 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
[54]
Merav Parter and Eylon Yogev. 2019. Distributed Algorithms Made Secure: A Graph Theoretic Approach. In Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2019, San Diego, California, USA, January 6--9, 2019, Timothy M. Chan (Ed.). SIAM, 1693--1710.
[55]
Merav Parter and Eylon Yogev. 2019. Low Congestion Cycle Covers and Their Applications. In Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2019, San Diego, California, USA, January 6--9, 2019. 1673--1692.
[56]
Merav Parter and Eylon Yogev. 2019. Secure Distributed Computing Made (Nearly) Optimal. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, PODC 2019, Toronto, ON, Canada, July 29 - August 2, 2019. 107--116.
[57]
Arpita Patra, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan, and Prasad Raghavendra. 2009. Perfectly reliable and secure message transmission tolerating mobile adversary. Int. J. Appl. Cryptogr. 1, 3 (2009), 200--224.
[58]
Marshall Pease, Robert Shostak, and Leslie Lamport. 1980. Reaching agreement in the presence of faults. Journal of the ACM (JACM) 27, 2 (1980), 228--234.
[59]
Andrzej Pelc. 1992. Reliable communication in networks with Byzantine link failures. Networks 22, 5 (1992), 441--459.
[60]
Andrzej Pelc and David Peleg. 2005. Broadcasting with locally bounded Byzantine faults. Inf. Process. Lett. 93, 3 (2005), 109--115.
[61]
David Peleg. 2000. Distributed Computing: A Locality-sensitive Approach. SIAM.
[62]
Sridhar Rajagopalan and Leonard J. Schulman. 1994. A coding theorem for distributed computation. In Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 23--25 May 1994, Montr�al, Qu�bec, Canada, Frank Thomson Leighton and Michael T. Goodrich (Eds.). ACM, 790--799.
[63]
Irving S. Reed and Gustave Solomon. 1960. Polynomial Codes over Certain Finite Fields. Journal of the Society for Industrial and Applied Mathematics (SIAM) 8, 2 (1960), 300 -- 304.
[64]
Nicola Santoro and Peter Widmayer. 1989. Time is not a healer. In Annual Symposium on Theoretical Aspects of Computer Science. Springer, 304--313.
[65]
Nicola Santoro and Peter Widmayer. 1990. Distributed Function Evaluation in the Presence of Transmission Faults. In Algorithms, International Symposium SIGAL '90, Tokyo, Japan, August 16--18, 1990, Proceedings. 358--367.
[66]
Leonard J. Schulman. 1992. Communication on Noisy Channels: A Coding Theorem for Computation. In 33rd Annual Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society, 724--733.
[67]
Kannan Srinathan, Prasad Raghavendra, and C. Pandu Rangan. 2007. On Proactive Perfectly Secure Message Transmission. In Information Security and Privacy, 12th Australasian Conference, ACISP (Lecture Notes in Computer Science, Vol. 4586). Springer, 461--473.
[68]
Sam Toueg, Kenneth J Perry, and TK Srikanth. 1987. Fast distributed agreement. SIAM J. Comput. 16, 3 (1987), 445--457.
[69]
Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets (Extended Abstract). In FOCS.
[70]
Moti Yung. 2015. The "Mobile Adversary" Paradigm in Distributed Computation and Systems. In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, PODC 2015, Donostia-San Sebasti�n, Spain, July 21 -- 23, 2015, Chryssis Georgiou and Paul G. Spirakis (Eds.). ACM, 171--172.

Cited By

View all
  • (2024)Fast Broadcast in Highly Connected NetworksProceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3626183.3659959(331-343)Online publication date: 17-Jun-2024

Index Terms

  1. Distributed CONGEST Algorithms against Mobile Adversaries

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    PODC '23: Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing
    June 2023
    392 pages
    ISBN:9798400701214
    DOI:10.1145/3583668
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 June 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CONGEST
    2. fault tolerance
    3. interactive coding

    Qualifiers

    • Research-article

    Funding Sources

    • Union's Horizon 2020 research and innovation programme
    • Israeli Science Foundation

    Conference

    PODC '23
    Sponsor:

    Acceptance Rates

    PODC '23 Paper Acceptance Rate 29 of 110 submissions, 26%;
    Overall Acceptance Rate 740 of 2,477 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)37
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 22 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Fast Broadcast in Highly Connected NetworksProceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3626183.3659959(331-343)Online publication date: 17-Jun-2024

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media