Skip to main content

Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT

  • Conference paper
Distributed Computing (DISC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6343))

Included in the following conference series:

Introduction

In the unconditionally reliable message transmission (URMT) problem, two non-faulty nodes, the sender S and the receiver R are part of a communication network modelled as a digraph over a set of nodes influenced by an unbounded active adversary that may corrupt some subset of these nodes. S has a message that he wishes to send to R; the challenge is to design a protocol such that R correctly obtains S’s message with arbitrarily high probability, irrespective of what the adversary (maliciously) does to disrupt the protocol. Analogous to randomized sequential algorithms, one may distinguish between two variants of URMT, namely, Monte Carlo and Las Vegas. In the former variant R outputs the sender’s message with high probability and may produce an incorrect output with small probability; in the latter, R outputs the sender’s message with high probability and with small probability may abort the protocol but in no case does the receiver terminates with an incorrect output.

In this work, we focus on studying the (im)possibility of Monte Carlo URMT protocols over asynchronous networks (U AMC ) and Las Vegas URMT protocols over synchronous networks (U SLV ). Though not seemingly related, interestingly, we show that the network connectivity requirements for both the aforementioned cases are same (and are strictly greater than that of Monte Carlo protocols over synchronous networks, which has been studied in [4]).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hirt, M., Maurer, U.: Player Simulation and General Adversary Structures in Perfect Multi-party Computation. Journal of Cryptology 13(1), 31–60 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  2. Mehta, A., Agrawal, S., Srinathan, K.: Interplay between (im)perfectness, synchrony and connectivity: The Case of Probabilistic Reliable Communication. Cryptology ePrint Archive, Report 2010/392 (2010), http://eprint.iacr.org/

  3. Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: STOC ’89: Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, pp. 73–85. ACM, New York (1989)

    Chapter  Google Scholar 

  4. Srinathan, K., Rangan, C.P.: Possibility and complexity of probabilistic reliable communications in directed networks. In: Proceedings of 25th ACM Symposium on Principles of Distributed Computing, PODC’06 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mehta, A., Agrawal, S., Srinathan, K. (2010). Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT. In: Lynch, N.A., Shvartsman, A.A. (eds) Distributed Computing. DISC 2010. Lecture Notes in Computer Science, vol 6343. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15763-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15763-9_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15762-2

  • Online ISBN: 978-3-642-15763-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics