Compressing Communication in Distributed Protocols

نویسندگان

  • Yael Tauman Kalai
  • Ilan Komargodski
چکیده

We show how to compress communication in distributed protocols in which parties do not have private inputs. More specifically, we present a generic method for converting any protocol in which parties do not have private inputs, into another protocol where each message is “short” while preserving the same number of rounds, the same communication pattern, the same output distribution, and the same resilience to error. Assuming that the output lies in some universe of size M , in our resulting protocol each message consists of only polylog(M,n, d) many bits, where n is the number of parties and d is the number of rounds. Our transformation works in the full information model, in the presence of either static or adaptive Byzantine faults. In particular, our result implies that for any such poly(n)-round distributed protocol which generates outputs in a universe of size poly(n), long messages are not needed, and messages of length polylog(n) suffice. In other words, in this regime, any distributed task that can be solved in the LOCAL model, can also be solved in the CONGEST model with the same round complexity and security guarantees. As a corollary, we conclude that for any poly(n)-round collective coin-flipping protocol, leader election protocol, or selection protocols, messages of length polylog(n) suffice (in the presence of either static or adaptive Byzantine faults).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some Conversations Simply Cannot Be Concise: Separations between Information and Communication Complexity for Protocols

We survey the recent developments in the quantitative relation between communication and information complexity of interactive tasks. We briefly present state-of-the-art compression results, and then focus on an intuitive exposition of impossibility results for compressing protocols down to their information cost. We discuss which results and assumptions have room for improvement and pose a ser...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Compression and Sieve: Reducing Communication in Parallel Breadth First Search on Distributed Memory Systems

For parallel breadth first search (BFS) algorithm on large-scale distributed memory systems, communication often costs significantly more than arithmetic and limits the scalability of the algorithm. In this paper we sufficiently reduce the communication cost in distributed BFS by compressing and sieving the messages. First, we leverage a bitmap compression algorithm to reduce the size of messag...

متن کامل

Compressing Cryptographic Resources

A private-key cryptosystem may be viewed as a means by which a trusted dealer privately conveys a large, shared pseudo-random object to a pair of players, using little communication. Alternatively, the messages distributed by the dealer may be viewed as a secure compression of a pair of large identical random pads (or random functions) into a shorter shared “key” or “seed”. We pose the question...

متن کامل

Communicating object group and protocols for distributed systems

Distributed communicating object groups, relevant algorithms and object communication protocols are presented. The distributed communicating object group system (called DCO) is built on the basis of hierarchy group communication protocols for networks. The system can be used as a speci®cation and design environment for distributed fault-tolerant object-oriented (OO) applications. By combining d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015