Abstract
Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended to computations solely based on functions in one input in which redundant hardware or software (servers) are used to compute intermediate and end results. However, almost all practical computation systems consist of components which are based on computations with multiple inputs. Wang, Desmedt, and Burmester have used AND/OR graphs to model this scenario. Roughly speaking, an AND/OR graph is a directed graph with two types of vertices, labeled ∧ -vertices and ∀ -vertices. In this case, processors which need all their inputs in order to operate could be represented by ∧-vertices, whereas processors which can choose one of their “redundant” inputs could be represented by ∧-vertices. In this paper, using the results for hardness of approximation and optimization problems, we will design dependable computation systems which could defeat as many malicious faults as possible. Specifically, assuming certain approximation hardness result, we will construct k-connected AND/OR graphs which could defeat a ck-active adversary (therefore a ck-passive adversary also) where > 1 is any given constant. This result improves a great deal on the results for the equivalent communication problems.
Research supported by DARPA F30602-97-1-0205. However the views and conclusions contained in this paper are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Defense Advance Research Projects Agency (DARPA), the Air Force, of the US Government.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
S. Arora. Probabilistic Checking of Proofs and Hardness of Approximation Problems. PhD Thesis, CS Division, UC Berkeley, August, 1994.
S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and intractability of approximation problems. In: Proceedings of 33rd IEEE Symposium on Foundations of Computer Science, pp. 13–22, 1992.
S. Arora and S. Safra. Probabilistic checking of proofs: a new characterization of NP. In: Proceedings of 33rd IEEE Symposium on Foundations of Computer Science, pp. 2–13, 1992.
A. Beimel and M. Franklin. Reliable communication over partially authenticated networks. In. Proceedings of the WDAG’ 97, Lecture Notes in Computer Science 1320, pp. 245–259, Springer Verlag, 1997.
M. Bellare. Proof checking and approximation: towards tight results. In: Complexity Theory Column 12, SIGACT News. 27(1), March 1996.
R. Boppana and M. Halldorsson. Approximating maximum independent sets by excluding subgraphs. BIT, 32(2), pp. 180–196, 1992.
M. Burmester, Y. Desmedt, and G. Kabatianski. Trust and security: a new look at the Byzantine general problems. In: R. N. Wright and P. G. Neumann, Eds, Network Threats, DIM ACS, Series in Discrete Mathematics and Theoretical Computer Science, AMS, Vol. 38, 1997.
R. Canetti, E. Kushilevitz, R. Ostrovsky, and A. Rosen. Randomness vs. faulttolerance. In: Proceedings of the PODC’ 97, pp. 35–44, Springer Verlag, 1997.
D. Chaum. Untraceable electronic mail, return addresses and digital pseudonyms. Communication of the ACM, Vol. 24, pp. 84–88, 1981.
D. Dolev. The Byzantine generals strike again. J. of Algorithms, 3, pp. 14–30, 1982.
D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. J. of the ACM, 40(1), pp. 17–47, 1993.
S. Dolev and R. Ostrovsky. Efficient anonymous multicast and reception. In: Advances in Cryptology, Crypto’97, pp. 395–409, Springer Verlag, 1997.
U. Feige, S. Goldwasser, L. Lovasz, S. Safra, and M. Szegedy. Approximating clique is almost NP-complete. In: Proceedings of 32nd IEEE Symposium on Foundations of Computer Science, pp. 2–11, 1991.
M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, San Francisco, 1979.
V. Hadzilacos. Issues of Fault Tolerance in Concurrent Computations. PhD thesis, Harvard University, Cambridge, MA, 1984.
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. J. of the ACM, 32(2), pp. 374–382, 1982.
N. J. Nilsson. Principles of Artificial Intelligence. Tioga, 1980.
C. Papadimitriou and M. Yannakakis. Optimization, approximation and complexity classes. Journal of Computer and System Sciences, 43, 425–440, 1991.
C. Rackoff and S. Simon. Cryptographic defense against traffic analysis. In: Proceedings of the STOC 93, pp. 672–681.
S. Sahni and T. Gonzalez. P-complete approximation problems. J. of the ACM, 23, pp. 555–565, 1976.
M. Sudan. Efficient Checking of Polynomials and Proofs and the Hardness of Approximation Problems. PhD. thesis, U. C. Berkeley, 1992.
Y. Wang, Y. Desmedt, and M. Burmester. Hardness of dependable computation with multiple inputs. Submitted.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Burmester, M., Desmedt, Y., Wang, Y. (1998). Using Approximation Hardness to Achieve Dependable Computation. In: Luby, M., Rolim, J.D.P., Serna, M. (eds) Randomization and Approximation Techniques in Computer Science. RANDOM 1998. Lecture Notes in Computer Science, vol 1518. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49543-6_15
Download citation
DOI: https://doi.org/10.1007/3-540-49543-6_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65142-0
Online ISBN: 978-3-540-49543-7
eBook Packages: Springer Book Archive