异步通信
计算机科学
协议(科学)
对手
对抗制
同步(交流)
计算机网络
国家(计算机科学)
复制(统计)
分布式计算
异步(计算机编程)
计算机安全
算法
人工智能
医学
频道(广播)
统计
替代医学
数学
病理
作者
Andreea B. Alexandru,Erica Blum,Jonathan Katz,Julian Loss
标识
DOI:10.1007/978-3-031-22963-3_23
摘要
Protocols for state machine replication (SMR) are typically designed for synchronous or asynchronous networks, with a lower corruption threshold in the latter case. Recent network-agnostic protocols are secure when run in either a synchronous or an asynchronous network. We propose two new constructions of network-agnostic SMR protocols that improve on existing protocols in terms of either the adversarial model or communication complexity: We further explore SMR protocols run in a network that may change between synchronous and asynchronous arbitrarily often; parties can be uncorrupted (as in the proactive model), and the protocol should remain secure as long as the appropriate corruption thresholds are maintained. We show that purely asynchronous proactive secret sharing is impossible without some form of synchronization between the parties, ruling out a natural approach to proactively secure network-agnostic SMR protocols. Motivated by this negative result, we consider a model where the adversary is limited in the total number of parties it can corrupt over the duration of the protocol and show, in this setting, that our SMR protocols remain secure even under arbitrarily changing network conditions.
科研通智能强力驱动
Strongly Powered by AbleSci AI