Making Chord Robust to Byzantine Attacks

作者: Amos Fiat , Jared Saia , Maxwell Young

DOI: 10.1007/11561071_71

关键词:

摘要: Chord is a distributed hash table (DHT) that requires only O(log n) links per node and performs searches with latency message cost n), where n the number of peers in network. assumes all nodes behave according to protocol. We give variant which robust high probability for any time period during which: 1) there are always at least z total network some integer z; 2) never more than (1/4–e)z Byzantine fixed e > 0; 3) peer insertion deletion events no zk tunable parameter k. assume an adversary controlling IP-addresses locations they join carefully selected by this adversary. Our notion robustness rather strong we not guarantee can be performed but also enforce set “proper behavior” such as contributing new material, etc. In comparison Chord, resources required polylogarithmic factor greater communication, messaging, linking costs.

参考文章(41)
Oded Goldreich, , Silvio Micali, Avi Wigderson, , , How to play any mental game, or a completeness theorem for protocols with honest majority Providing Sound Foundations for Cryptography. pp. 307- 328 ,(2019) , 10.1145/3335741.3335755
Kirsten Hildrum, John Kubiatowicz, Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks Lecture Notes in Computer Science. pp. 321- 336 ,(2003) , 10.1007/978-3-540-39989-6_23
Marvin Theimer, Alec Wolman, Michael B. Jones, Stefan Saroiu, Nicholas J. A. Harvey, SkipNet: a scalable overlay network with practical locality properties usenix symposium on internet technologies and systems. pp. 9- 9 ,(2003)
Baruch Awerbuch, Christian Scheideler, Robust distributed name service international workshop on peer to peer systems. ,vol. 3279, pp. 237- 249 ,(2004) , 10.1007/978-3-540-30183-7_23
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
M. Frans Kaashoek, David R. Karger, Koorde: A Simple Degree-Optimal Distributed Hash Table. international workshop on peer-to-peer systems. ,vol. 2735, pp. 98- 107 ,(2003) , 10.1007/978-3-540-45172-3_9
Baruch Awerbuch, Christian Scheideler, Group Spreading: A Protocol for Provably Secure Distributed Name Service Automata, Languages and Programming. ,vol. 3142, pp. 183- 195 ,(2004) , 10.1007/978-3-540-27836-8_18
John D. Kubiatowicz, Anthony D. Joseph, Ben Y. Zhao, Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and University of California at Berkeley. ,(2001)
B. Prabhu, K. Srinathan, C. Pandu Rangan, Asynchronous Unconditionally Secure Computation: An Efficiency Improvement international conference on cryptology in india. pp. 93- 107 ,(2002) , 10.1007/3-540-36231-2_9