Skip to main content

Using Approximation Hardness to Achieve Dependable Computation

  • Conference paper
  • First Online:
Randomization and Approximation Techniques in Computer Science (RANDOM 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1518))

Abstract

Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended to computations solely based on functions in one input in which redundant hardware or software (servers) are used to compute intermediate and end results. However, almost all practical computation systems consist of components which are based on computations with multiple inputs. Wang, Desmedt, and Burmester have used AND/OR graphs to model this scenario. Roughly speaking, an AND/OR graph is a directed graph with two types of vertices, labeled ∧ -vertices and ∀ -vertices. In this case, processors which need all their inputs in order to operate could be represented by ∧-vertices, whereas processors which can choose one of their “redundant” inputs could be represented by ∧-vertices. In this paper, using the results for hardness of approximation and optimization problems, we will design dependable computation systems which could defeat as many malicious faults as possible. Specifically, assuming certain approximation hardness result, we will construct k-connected AND/OR graphs which could defeat a ck-active adversary (therefore a ck-passive adversary also) where > 1 is any given constant. This result improves a great deal on the results for the equivalent communication problems.

Research supported by DARPA F30602-97-1-0205. However the views and conclusions contained in this paper are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Defense Advance Research Projects Agency (DARPA), the Air Force, of the US Government.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Arora. Probabilistic Checking of Proofs and Hardness of Approximation Problems. PhD Thesis, CS Division, UC Berkeley, August, 1994.

    Google Scholar 

  2. S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and intractability of approximation problems. In: Proceedings of 33rd IEEE Symposium on Foundations of Computer Science, pp. 13–22, 1992.

    Google Scholar 

  3. S. Arora and S. Safra. Probabilistic checking of proofs: a new characterization of NP. In: Proceedings of 33rd IEEE Symposium on Foundations of Computer Science, pp. 2–13, 1992.

    Google Scholar 

  4. A. Beimel and M. Franklin. Reliable communication over partially authenticated networks. In. Proceedings of the WDAG’ 97, Lecture Notes in Computer Science 1320, pp. 245–259, Springer Verlag, 1997.

    Google Scholar 

  5. M. Bellare. Proof checking and approximation: towards tight results. In: Complexity Theory Column 12, SIGACT News. 27(1), March 1996.

    Google Scholar 

  6. R. Boppana and M. Halldorsson. Approximating maximum independent sets by excluding subgraphs. BIT, 32(2), pp. 180–196, 1992.

    Article  MATH  MathSciNet  Google Scholar 

  7. M. Burmester, Y. Desmedt, and G. Kabatianski. Trust and security: a new look at the Byzantine general problems. In: R. N. Wright and P. G. Neumann, Eds, Network Threats, DIM ACS, Series in Discrete Mathematics and Theoretical Computer Science, AMS, Vol. 38, 1997.

    Google Scholar 

  8. R. Canetti, E. Kushilevitz, R. Ostrovsky, and A. Rosen. Randomness vs. faulttolerance. In: Proceedings of the PODC’ 97, pp. 35–44, Springer Verlag, 1997.

    Google Scholar 

  9. D. Chaum. Untraceable electronic mail, return addresses and digital pseudonyms. Communication of the ACM, Vol. 24, pp. 84–88, 1981.

    Article  Google Scholar 

  10. D. Dolev. The Byzantine generals strike again. J. of Algorithms, 3, pp. 14–30, 1982.

    Article  MATH  MathSciNet  Google Scholar 

  11. D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. J. of the ACM, 40(1), pp. 17–47, 1993.

    Article  MATH  MathSciNet  Google Scholar 

  12. S. Dolev and R. Ostrovsky. Efficient anonymous multicast and reception. In: Advances in Cryptology, Crypto’97, pp. 395–409, Springer Verlag, 1997.

    Google Scholar 

  13. U. Feige, S. Goldwasser, L. Lovasz, S. Safra, and M. Szegedy. Approximating clique is almost NP-complete. In: Proceedings of 32nd IEEE Symposium on Foundations of Computer Science, pp. 2–11, 1991.

    Google Scholar 

  14. M.R. Garey and D.S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, San Francisco, 1979.

    MATH  Google Scholar 

  15. V. Hadzilacos. Issues of Fault Tolerance in Concurrent Computations. PhD thesis, Harvard University, Cambridge, MA, 1984.

    Google Scholar 

  16. L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. J. of the ACM, 32(2), pp. 374–382, 1982.

    Google Scholar 

  17. N. J. Nilsson. Principles of Artificial Intelligence. Tioga, 1980.

    Google Scholar 

  18. C. Papadimitriou and M. Yannakakis. Optimization, approximation and complexity classes. Journal of Computer and System Sciences, 43, 425–440, 1991.

    Article  MATH  MathSciNet  Google Scholar 

  19. C. Rackoff and S. Simon. Cryptographic defense against traffic analysis. In: Proceedings of the STOC 93, pp. 672–681.

    Google Scholar 

  20. S. Sahni and T. Gonzalez. P-complete approximation problems. J. of the ACM, 23, pp. 555–565, 1976.

    Article  MATH  MathSciNet  Google Scholar 

  21. M. Sudan. Efficient Checking of Polynomials and Proofs and the Hardness of Approximation Problems. PhD. thesis, U. C. Berkeley, 1992.

    Google Scholar 

  22. Y. Wang, Y. Desmedt, and M. Burmester. Hardness of dependable computation with multiple inputs. Submitted.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Burmester, M., Desmedt, Y., Wang, Y. (1998). Using Approximation Hardness to Achieve Dependable Computation. In: Luby, M., Rolim, J.D.P., Serna, M. (eds) Randomization and Approximation Techniques in Computer Science. RANDOM 1998. Lecture Notes in Computer Science, vol 1518. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49543-6_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-49543-6_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65142-0

  • Online ISBN: 978-3-540-49543-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics