Asynchronous verifiable information dispersal protocol of achieving optimal communication

被引:0
|
作者
Pang, Zengyu [1 ]
Shi, Ligen [2 ]
Xiang, Hua [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Capital Normal Univ, Sch Math Sci, Beijing 100048, Peoples R China
关键词
Verifiable; Dispersal; Retrieval; Asynchronous; Communication; ERROR-DETECTION; HARDWARE CONSTRUCTIONS;
D O I
10.1016/j.comnet.2024.110470
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of distributed systems necessitates robust protocols to facilitate secure and efficient data storage and retrieval amid challenges like asynchronous communication and adversarial threats. However, achieving the theoretical lower bounds of communication cost in Asynchronous Verifiable Information Dispersal (AVID) protocols remains an unresolved issue, prompting the need for innovation in this domain. In this paper, we propose a new AVID protocol designed to optimize communication cost. In contrast to previous approaches, we leverage vector commitment (VC) technology combined with erasure codes, replacing conventional hash tree structures or error correction codes. This approach results in significant O(logn) communication savings. Additionally, our research reveals that while ensuring simultaneous output from all honest nodes is desirable to satisfy Totality, it is not necessary for all nodes to receive corresponding shares or proofs during the Dispersal phase. This insight allows us to circumvent the common O(n(2)kappa) communication overhead. Our AVID protocol achieves an optimal dispersal cost of O(|M| + n(2)) compared to the prior best of O(|M| + kappa n(2)). Furthermore, each node in our protocol incurs a storage cost of O(|M|/n + kappa) bits, while the retrieval cost per client is O(|M| + n kappa).
引用
收藏
页数:10
相关论文
共 50 条
  • [41] A Multiple-Relay Communication Protocol for Achieving Fairness in Dense Networks
    Torrea-Duran, Rodolfo
    Rosas, Fernando
    Pollin, Sofie
    Vandendorpe, Luc
    Moonen, Marc
    IEEE ACCESS, 2018, 6 : 6740 - 6754
  • [42] Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience
    Ji, Xiaoyu
    Li, Junru
    Song, Yifan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VIII, 2024, 14927 : 418 - 453
  • [43] TinyThunder: enabling asynchronous Byzantine fault tolerance with optimal communication efficiency
    Chen, Xiaorui
    Li, Xiangxue
    COMPUTER JOURNAL, 2025,
  • [44] An Asynchronous AAA Blockchain-Based Protocol for Configuring Information Systems
    Bajor, Michal
    Niemiec, Marcin
    ENERGIES, 2022, 15 (18)
  • [45] Efficient Secret Sharing Schemes Achieving Optimal Information Rate
    Wang, Yongge
    Desmedt, Yvo
    2014 IEEE INFORMATION THEORY WORKSHOP (ITW), 2014, : 516 - 520
  • [46] Publicly verifiable secret sharing scheme and its application with almost optimal information rate
    Peng, Qiao
    Tian, Youliang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6227 - 6238
  • [47] A communication-induced checkpointing and asynchronous recovery protocol for mobile computing systems
    Tantikul, T
    Manivannan, D
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 70 - 74
  • [48] Asynchronous Device Discovery and Rendezvous Protocol for D2D Communication
    Kushalad, Kiran
    Sarkar, Mahasweta
    Patel, Pragnesh
    2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2016,
  • [49] OPTIMAL SCHEDULING OF A PROCESSOR EXECUTING A COMMUNICATION PROTOCOL STACK
    KURAPATI, S
    KUMAR, A
    IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1993, 13 : 117 - 128
  • [50] A self-verifiable computational visual cryptographic protocol for secure two-dimensional image communication
    Mary, G. Selva
    Kumar, S. Manoj
    MEASUREMENT SCIENCE AND TECHNOLOGY, 2019, 30 (12)