Randomized and Quantum Protocols in Distributed Computation Michael Ben-Or The Hebrew University Michael Rabin’s Birthday Celebration.

Slides:



Advertisements
Similar presentations
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement Allison Lewko The University of Texas at Austin TexPoint fonts used in.
Advertisements

Distributed Leader Election Algorithms in Synchronous Ring Networks
Impossibility of Distributed Consensus with One Faulty Process
Chapter 6 - Convergence in the Presence of Faults1-1 Chapter 6 Self-Stabilization Self-Stabilization Shlomi Dolev MIT Press, 2000 Shlomi Dolev, All Rights.
Agreement: Byzantine Generals UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 739 Distributed Systems Andrea C. Arpaci-Dusseau Paper: “The.
Chapter 7 - Local Stabilization1 Chapter 7: roadmap 7.1 Super stabilization 7.2 Self-Stabilizing Fault-Containing Algorithms 7.3 Error-Detection Codes.
Sliding window protocol The sender continues the send action without receiving the acknowledgements of at most w messages (w > 0), w is called the window.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Achieving Byzantine Agreement and Broadcast against Rational Adversaries Adam Groce Aishwarya Thiruvengadam Ateeq Sharfuddin CMSC 858F: Algorithmic Game.
Consensus problem Agreement. All processes that decide choose the same value. Termination. All non-faulty processes eventually decide. Validity. The common.
Byzantine Generals Problem: Solution using signed messages.
Randomized Algorithms for Reliable Broadcast (IBM T.J. Watson) Vinod Vaikuntanathan Michael Ben-OrShafi GoldwasserElan Pavlov.
1 Complexity of Network Synchronization Raeda Naamnieh.
1 Principles of Reliable Distributed Systems Lecture 3: Synchronous Uniform Consensus Spring 2006 Dr. Idit Keidar.
 Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 7: Failure Detectors.
Quantum Error Correction SOURCES: Michele Mosca Daniel Gottesman Richard Spillman Andrew Landahl.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 6: Synchronous Byzantine.
1 Fault-Tolerant Consensus. 2 Failures in Distributed Systems Link failure: A link fails and remains inactive; the network may get partitioned Crash:
Breaking the O(n 2 ) Bit Barrier: Scalable Byzantine Agreement with an Adaptive Adversary Valerie King Jared Saia Univ. of VictoriaUniv. of New Mexico.
Randomized Protocols for Asynchronous Consensus James Aspnes Distributed Computing (2003) 16:
Bit Complexity of Breaking and Achieving Symmetry in Chains and Rings.
Wait-Free Consensus with Infinite Arrivals James Aspnes Gauri Shah Jatin Shah Yale University STOC 2002.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 2 – Distributed Systems.
Chapter Resynchsonous Stabilizer Chapter 5.1 Resynchsonous Stabilizer Self-Stabilization Shlomi Dolev MIT Press, 2000 Draft of Jan 2004, Shlomi.
Reaching Approximate Agreement in an Asynchronous Environment And what does it have to do with the Witness Protection Program.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
The Byzantine Generals Strike Again Danny Dolev. Introduction We’ll build on the LSP presentation. Prove a necessary and sufficient condition on the network.
Distributed Algorithms: Agreement Protocols. Problems of Agreement l A set of processes need to agree on a value (decision), after one or more processes.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
How to play ANY mental game
Quantum Error Correction Jian-Wei Pan Lecture Note 9.
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit.
Secure Multi-Party Quantum Computation Michael Ben-Or QCrypt 2013 Tutorial M. Ben-Or, C. Crépeau, D. Gottesman, A.Hassidim, A. Smith, arxiv.org/abs/
Robust Sharing of Secrets when the Dealer Is Honest or Cheating Tal Rabin 1994 Brian Fry COEN
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
Consensus and Its Impossibility in Asynchronous Systems.
Review for Exam 2. Topics included Deadlock detection Resource and communication deadlock Graph algorithms: Routing, spanning tree, MST, leader election.
Ch11 Distributed Agreement. Outline Distributed Agreement Adversaries Byzantine Agreement Impossibility of Consensus Randomized Distributed Agreement.
Foundations of Communication on Multiple-Access Channel Dariusz Kowalski.
Byzantine fault-tolerance COMP 413 Fall Overview Models –Synchronous vs. asynchronous systems –Byzantine failure model Secure storage with self-certifying.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 8 Instructor: Haifeng YU.
PROBABILISTIC COMPUTATION By Remanth Dabbati. INDEX  Probabilistic Turing Machine  Probabilistic Complexity Classes  Probabilistic Algorithms.
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase Ronald Cramer, Ivan Damgard, Serge Fehr.
Introduction to Quantum Key Distribution
CS294, Yelick Consensus revisited, p1 CS Consensus Revisited
Sliding window protocol The sender continues the send action without receiving the acknowledgements of at most w messages (w > 0), w is called the window.
Hwajung Lee. Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort.
Chap 15. Agreement. Problem Processes need to agree on a single bit No link failures A process can fail by crashing (no malicious behavior) Messages take.
UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department
PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Herzberg et al. Presented by: Avinash Ravi Kevin Skapinetz.
SysRép / 2.5A. SchiperEté The consensus problem.
Agreement in Distributed Systems n definition of agreement problems n impossibility of consensus with a single crash n solvable problems u consensus with.
Chapter 21 Asynchronous Network Computing with Process Failures By Sindhu Karthikeyan.
1 Fault tolerance in distributed systems n Motivation n robust and stabilizing algorithms n failure models n robust algorithms u decision problems u impossibility.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Alternating Bit Protocol S R ABP is a link layer protocol. Works on FIFO channels only. Guarantees reliable message delivery with a 1-bit sequence number.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
1 Fault-Tolerant Consensus. 2 Communication Model Complete graph Synchronous, network.
Round-Efficient Multi-Party Computation in Point-to-Point Networks Jonathan Katz Chiu-Yuen Koo University of Maryland.
Fail-Stop Processors UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 739 Distributed Systems Andrea C. Arpaci-Dusseau One paper: Byzantine.
Randomized Algorithms for Distributed Agreement Problems Peter Robinson.
Unreliable Failure Detectors for Reliable Distributed Systems Tushar Deepak Chandra Sam Toueg Presentation for EECS454 Lawrence Leinweber.
1 AGREEMENT PROTOCOLS. 2 Introduction Processes/Sites in distributed systems often compete as well as cooperate to achieve a common goal. Mutual Trust/agreement.
reaching agreement in the presence of faults
When Is Agreement Possible
Alternating Bit Protocol
Distributed Consensus
Agreement Protocols CS60002: Distributed Systems
Announcement Sign up google sheet for in class lectures
Presentation transcript:

Randomized and Quantum Protocols in Distributed Computation Michael Ben-Or The Hebrew University Michael Rabin’s Birthday Celebration

Randomized Protocols Power of Randomization Exponential speedup for known algorithms Complexity – The jury is still out on this Provably more powerful in distributed computation Natural application: Use randomization for symmetry breaking Leader Election in anonymous networks Dining Philosophers Problem No deterministic solutions Choice Coordination, Mutual Exclusion Efficient randomized protocols Note: No deterministic solution No bounded-step, zero-error randomized solution

Quantum Protocols Quantum Leader Election in Anonymous Networks Tani, Kobayashi & Matsumoto A connected synchronous network of n identical processors. Processors can send/receive quantum messages to/from neighbors. Know just a bound N on number of processors, n ≤ N. This includes many cases with no deterministic solution. No quantum cheating - No initial entanglement not allowing special initial symmetric quantum state such as

Each process prepares a register holding Compute quantumly if your value is the same as all other’s. Measure “Equal or Not” qubits. All the same value b.  If b=0 measure value register. Only those processes with value=1 remain as potential leaders.  If b=1 then global state is the symmetric state Quantum Magic: Each process applies the same operation U n to its register and the resulting state is a supper position on some “not all equal” states. Quantum Leader Election Cont.

U k for even k is (assuming k contenders remain, initially k=n) For odd k use V k (on two qubits) No need to know exact value k of remaining contenders. Letting k go down from N to 2 is good enough. After N-1 phases just one leader remains. State transforms to a superposition on “not all equal” states. Keeping just max value guarantees less remaining contenders if k>1.

Byzantine Agreement: n processes or players, P 1,…P n, each with an input bit b i Want all non faulty players to reach agreement on a bit b such that  All non faulty players agree on the same b  If all P i start with the same b i then output b=b i We model faults by a computationally unbounded Adversary Computer crash, no electricity – Fail-Stop fault model Software or undetected hardware errors, incoherent or wrong data, malicious players – Byzantine fault model Randomized Protocols Cont.

Assuming we have n players and at most t faults Protocols: There are efficient deterministic t+1 rounds protocols tolerating t<n/3 Byzantine faults in the synchronous model [PSL77-78,GM93] Lower Bounds: A deterministic lower bound of t+1 rounds for fail stop faults [FL82,DS81] For Byzantine faults t<n/3 [PSL78]. No deterministic protocols even for t=1 in the asynchronous setting [FLP82]. BA Deterministic Protocols

Weak Global Coin We reduce agreement to weak global coin flipping Decide when there is a large majority of players suggesting the same value b in {0,1}. If the coin flip succeeds with probability p the expected number of round to reach agreement is O(1/p). 0 n (n-t)/2(n+t)/2(n+3t)/5(n-3t)/5 Choose 1 Choose 0prefer 1prefer 0 Flip a coin n/2 BA Randomized Protocols

Adversary can react to players’ random selections: static or adaptive failures private communication or full information about the system fail stop or Byzantine type faults Examples: Static, fail stop, full information adversary: Each player P i selects a random r i in [0,n 3 ). Declare the player with the min as the leader. Leader flips an unbiased coin.  (1) rounds protocol. Adaptive, Byzantine, full information (even asynchronous) adversary: Use majority voting on random bits. Exp time, but just  (1) for t <  (n 1/2 ). BA Randomized Protocols

Adaptive, fail-stop, full information adversary: Majority voting gives for all t < n matching the lower bound [BB98]. Static, Byzantine, full information adversary: O(log n) time protocols No lower bounds! Coin Flipping with an Adaptive Adversary? All known robust coin flipping games select an almost random leader, and then the leader flips a coin. All this is useless in the adaptive setting. Are there better games than the “Majority” game for adaptive adversaries? BA Randomized Protocols – More Examples

BA Randomized Protocols Rabin’s fast Byzantine agreement Why not hand out random “global coins” in advance, as part of the protocol’s description – O(1) expected time. To allow adaptive, Byzantine, private communication adversary, (knows the full state of the faulty players), use a digitally signed secret sharing scheme to store those global coins, revealing them only when needed. Verifiable Secret Sharing [CGMA] and Global Random Coin protocol from scratch (using BA). Replenish the stock of shared global coins in Rabin’s protocol when needed, using available previously prepared global coins.

Global Coins with Adaptive, Byzantine, private comm. adversary: Each player P i selects a random r i in [0,n 3 ). Declare the player with the min as the leader. Leader flips an unbiased coin. Problem: A bad player can choose 1 and get elected. First try: Independently for player P: Each P k, k=1…n, selects random r i in [0,n 3 ), and set r =  k=1 n r k (mod n 3 ) Problem: A bad player can select r k after other values are known and control r. Idea: Use Verifiable Secret Sharing (VSS) Problem: VSS requires Byzantine Agreement !? Idea:[FM88] A two round “weak agreement” protocol is good enough for here O(1) time protocol. BA Randomized Protocols Cont.

Byzantine Agreement in the Quantum World Adaptive, Byzantine, full information adversary: Players have pairwise quantum channels “Full Information” in the quantum setting: The adversary knows the description of the current pure state of the system. Toy Example: Adaptive, fail-stop, full information adversary Each player prepares and a GHZ state and distributes the pieces to all n players. BA Quantum Protocols

At the next round all players measure all the pieces they have; a leader is selected according to the shared minimum; and the corresponding measured bit serves as the “global coin”. Cor: We get an O(1) expected round agreement protocol. By delaying the measurements until all the quantum messages have arrived the adversary has to stop messages before the outcome is known, and so effectively the adaptive adversary isn’t stronger than the static one. BA Quantum Protocols

Adaptive, Byzantine, full information adversary: Idea: replace random shared secrets by a superposition on all possible n 3 secrets and all possible polynomials. This is just an encoding of the superposition of all secrets using a standard CSS quantum error correcting code. We can use the QVSS procedure of [CGS02] replacing Byzantine agreements with the “weak agreements” of [FM88] We get an O(1) round quantum Byzantine agreement protocol in the adaptive, Byzantine, full information adversary model, tolerating an optimal t<n/3 faults. Works also in the recent Self Stabilizing Byzantine agreement protocols [BDH08, HBD10]. BA Quantum Protocols

Open Problems In the asynchronous setting we can handle only t<n/4 faults, while randomized BA is possible for t<n/3. The classical “private channel” solution of [CR93] uses secret authentication codes and this can’t work here. Quantum Choice Coordination? Bounded register, zero-error, wait free… Quantum Mutual Exclusion? Quantum version of [R80,RK92] protocol that tolerates a full information adversary? Quantum lower bound generalizing [KMRZ93]? Quantum protocol verification tools. Byzantine Quantum Protocols