Nothing Special   »   [go: up one dir, main page]

Skip to main content

Runtime Minimization of the Threshold Distributed Computation Protocol in the Case of Participants Failures

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2019, ruSMART 2019)

Abstract

Threshold (kn)-schemes are applied to ensure fault tolerance in many protocols of distributed computing, where k is a minimum amount of nodes and \(n \ge k\) is a total number of nodes in the system. When \(n=k\) in such a system, if one of the nodes fails during the execution of this protocol, it is replaced with a new one and the procedure is restarted, while all the time and traffic spent during the previous stages will be lost. If it is initially involved more than the minimum threshold of nodes (\(n > k\)), then in case of any node fails, the protocol will not be restarted. In such a case, an optimization problem arises, which consists in runtime minimizing of the protocol with given constraints on the threshold k and the failure characteristics. In this paper, using the example of the threshold calculation protocol of the digital digest, such an optimization problem will be formulated and solved.

The author Turlikov is supported by research project RFBR No. 17-07-00142.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, H., Wang, Y.: Designing fault tolerance strategy by iterative redundancy for component-based distributed computing systems. Math. Probl. Eng. 2014, 11 (2014)

    MathSciNet  MATH  Google Scholar 

  2. Randles, M., Lamb, D., Odat, E., Taleb-Bendiab, A.: Distributed redundancy and robustness in complex systems. J. Comput. Syst. Sci. 77, 293–304 (2011)

    Article  MathSciNet  Google Scholar 

  3. Brun, Y., Edwards, G., Bang, J.Y., Medvidovic, N.: Smart redundancy for distributed computation. In: 31st International Conference on Distributed Computing Systems, pp. 665–676, Minneapolis (2011)

    Google Scholar 

  4. Farley, N., Fitzpatrick, R., Jones, D.: BADGER - Blockchain Auditable Distributed (RSA) key GEneRation. In: IACR Cryptology ePrint Archive (2019)

    Google Scholar 

  5. Di Pietro, R., Mancini, L., Zanin, G.: Efficient and adaptive threshold signatures for ad hoc networks. Electron. Notes Theor. Comput. Sci. 171, 93–105 (2007)

    Article  Google Scholar 

  6. Wang, B., Cai, C., Zhou, Q.: A rational threshold signature model and protocol based on different permissions. J. Appl. Math. 2014, 9 (2014)

    Google Scholar 

  7. Krouk, E., Semenov, S.: Transmission of a message during limited time with the help of transport coding. In: Proceedings of ICETE 2005 – International Conference on E-business and Telecommunication Networks, pp. 88–93, Reading (2005)

    Google Scholar 

  8. Krouk, E., Semenov, S.: Delivery of a message during limited time with the help of transport coding. In: Fifth IEEE Workshop on Signal Processing Advances in Wireless Communications, pp. 1–5. Lisbon (2004)

    Google Scholar 

  9. Kabatiansky, G., Krouk, E., Semenov, S.: Error Correcting Coding and Security for Data Networks: Analysis of the Superchannel Concept. Wiley, New Jersey (2005)

    Book  Google Scholar 

  10. David, H., Nagaraja, H.N.: Order Statistics, 3rd edn. WileyInterscience, New York (2003)

    Book  Google Scholar 

  11. Mitzenmacher, M., Upfal, E.: Probability and Computing. Cambridge University Press, Cambridge (2005)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandra Afanasyeva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Afanasyeva, A., Evstafiev, I., Turlikov, A. (2019). Runtime Minimization of the Threshold Distributed Computation Protocol in the Case of Participants Failures. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2019 2019. Lecture Notes in Computer Science(), vol 11660. Springer, Cham. https://doi.org/10.1007/978-3-030-30859-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30859-9_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30858-2

  • Online ISBN: 978-3-030-30859-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics