Distributed algorithms made secure: a graph theoretic approach

From MaRDI portal
Publication:5236286

DOI10.1137/1.9781611975482.102zbMATH Open1432.68559arXiv1712.01139OpenAlexW2903436234MaRDI QIDQ5236286FDOQ5236286


Authors: Eylon Yogev, M. Parter Edit this on Wikidata


Publication date: 15 October 2019

Published in: Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (Search for Journal in Brave)

Abstract: In the area of distributed graph algorithms a number of network's entities with local views solve some computational task by exchanging messages with their neighbors. Quite unfortunately, an inherent property of most existing distributed algorithms is that throughout the course of their execution, the nodes get to learn not only their own output but rather learn quite a lot on the inputs or outputs of many other entities. This leakage of information might be a major obstacle in settings where the output (or input) of network's individual is a private information. In this paper, we introduce a new framework for emph{secure distributed graph algorithms} and provide the first emph{general compiler} that takes any "natural" non-secure distributed algorithm that runs in r rounds, and turns it into a secure algorithm that runs in widetildeO(rcdotDcdotpoly(Delta)) rounds where Delta is the maximum degree in the graph and D is its diameter. The security of the compiled algorithm is information-theoretic but holds only against a semi-honest adversary that controls a single node in the network. This compiler is made possible due to a new combinatorial structure called emph{private neighborhood trees}: a collection of n trees T(u1),ldots,T(un), one for each vertex uiinV(G), such that each tree T(ui) spans the neighbors of ui {em without going through ui}. Intuitively, each tree T(ui) allows all neighbors of ui to exchange a emph{secret} that is hidden from ui, which is the basic graph infrastructure of the compiler. In a (d,c)-private neighborhood trees each tree T(ui) has depth at most d and each edge einG appears in at most c different trees. We show a construction of private neighborhood trees with d=widetildeO(DeltacdotD) and c=widetildeO(D).


Full work available at URL: https://arxiv.org/abs/1712.01139




Recommendations




Cited In (5)





This page was built for publication: Distributed algorithms made secure: a graph theoretic approach

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5236286)