Distributed CONGEST Algorithms against Mobile Adversaries

Orr Fischer, Merav Parter

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

In their seminal PODC 1991 paper, Ostrovsky and Yung introduced the study of distributed computation in the presence of mobile adversaries which can dynamically appear throughout the network, analogous to a spread of a virus. Over the years, this setting has been studied mostly under the assumption that the communication graph is fully-connected. Resilient CONGEST algorithms for general graphs, on the other hand, are currently known only for the classical static setting, i.e., where the set of corrupted edges (or nodes) is fixed throughout the entire computation.We fill this missing gap by providing round-efficient simulations that translate given CONGEST algorithms into equivalent algorithms that are resilient against f-mobile edge adversaries, i.e., where the adversary controls a (possibly distinct) subset of f edges Fi in each round i. Our main results are:•Perfect-Security with Mobile Eavesdroppers. A translation of any r-round f-static-secure algorithm into an equivalent ω(f)-mobile-secure algorithm with ω(r) rounds. We also show that the f-static-secure algorithms of [Hitron, Parter and Yogev, DISC 2022 & ITCS 2023] can be modified into f-mobile-secure algorithms with the same number of rounds.•Resilience with Mobile Byzantine Adversaries. An f-mobile-byzantine simulation which is based on a decomposition of the graph into low-diameter edge-disjoint spanning trees. This provides us with near-optimal CONGEST compilers for expander graphs. It also leads to near-optimal compilers in the congested-clique model against ω(n)-mobile adversaries. For general (2f + 1) edge-connected graphs with f-mobile adversary, we almost match the bounds known for the f-static setting, when provided a trusted pre-processing phase.Our results are based on a collection of tools borrowed from the area of interactive coding [Gelles, Found. Trends Theor. Comput. Sci. 2017], linear sketches and low-congestion graph decomposition. The introduced toolkit might have further applications for resilient computation.

Original languageEnglish
Title of host publicationPODC 2023 - Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing
EditorsAlexandre Nolin
Pages262-273
Number of pages12
ISBN (Electronic)9798400701214
DOIs
Publication statusPublished - 19 Jun 2023
Event42nd ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC 2023 - Orlando, United States
Duration: 19 Jun 202323 Jun 2023

Publication series

SeriesProceedings of the Annual ACM Symposium on Principles of Distributed Computing

Conference

Conference42nd ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC 2023
Country/TerritoryUnited States
CityOrlando
Period19/6/2323/6/23

Funding

We are very grateful to Yannic Maus for his extremely valuable comments and suggestions, and for the time and effort he invested in carefully reading our paper. This project is funded by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 949083), and by the Israeli Science Foundation (ISF), grant No. 2084/18.

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Distributed CONGEST Algorithms against Mobile Adversaries'. Together they form a unique fingerprint.

Cite this