Secured distributed algorithms without hardness assumptions

Leonid Barenboim, Harel Levin

Research output: Contribution to journalArticlepeer-review

Abstract

We study algorithms in the LOCAL model that produce secured output. Specifically, each vertex computes its part in the output, the entire output is correct, but each vertex cannot discover the output of other vertices, with a certain probability. As the extensive research in the distributed algorithms field yielded efficient decentralized algorithms, the discussion about the security of distributed algorithms was somewhat neglected. Nevertheless, many protocols and algorithms were devised in the research area of secure multi-party computation problem. However, the focus in those protocols was to work for every function f at the expense of increasing the round complexity, or the necessity of several computational assumptions. We present a novel approach, which identifies and develops those algorithms that are inherently secure (which means they do not require any further constructions). This approach yields efficient secure algorithms for various labeling and decomposition problems without requiring any hardness assumption, but only a private randomness generator in each vertex.

Original languageEnglish
Pages (from-to)130-140
Number of pages11
JournalJournal of Parallel and Distributed Computing
Volume171
DOIs
StatePublished - Jan 2023

Bibliographical note

Funding Information:
We are grateful to Merav Parter and Eylon Yogev for helpful remarks. We are grateful to the anonymous reviewers for very helpful suggestions.

Publisher Copyright:
© 2022 Elsevier Inc.

DBLP License: DBLP's bibliographic metadata records provided through http://dblp.org/ are distributed under a Creative Commons CC0 1.0 Universal Public Domain Dedication. Although the bibliographic metadata records are provided consistent with CC0 1.0 Dedication, the content described by the metadata records is not. Content may be subject to copyright, rights of privacy, rights of publicity and other restrictions.

Keywords

  • Distributed algorithms
  • Generic algorithms
  • Graph coloring
  • Multi-party computation
  • Privacy preserving

Fingerprint

Dive into the research topics of 'Secured distributed algorithms without hardness assumptions'. Together they form a unique fingerprint.

Cite this