Secure Distributed Network Optimization Against Eavesdroppers

Yael Hitron, Merav Parter, Eylon Yogev

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

We present a new algorithmic framework for distributed network optimization in the presence of eavesdropper adversaries, also known as passive wiretappers. In this setting, the adversary is listening to the traffic exchanged over a fixed set of edges in the graph, trying to extract information on the private input and output of the vertices. A distributed algorithm is denoted as f-secure, if it guarantees that the adversary learns nothing on the input and output for the vertices, provided that it controls at most f graph edges. Recent work has presented general simulation results for f-secure algorithms, with a round overhead of DΘ(f), where D is the diameter of the graph. In this paper, we present a completely different white-box, and yet quite general, approach for obtaining f-secure algorithms for fundamental network optimization tasks. Specifically, for n-vertex D-diameter graphs with (unweighted) edge-connectivity Ω(f), there are f-secure congest algorithms for computing MST, partwise aggregation, and (1 + ϵ) (weighted) minimum cut approximation, within Oe(D + f √n) congest rounds, hence nearly tight for f = Oe(1). Our algorithms are based on designing a secure algorithmic-toolkit that leverages the special structure of congest algorithms for global optimization graph problems. One of these tools is a general secure compiler that simulates light-weight distributed algorithms in a congestion-sensitive manner. We believe that these tools set the ground for designing additional secure solutions in the congest model and beyond.

Original languageEnglish
Title of host publication14th Innovations in Theoretical Computer Science Conference, ITCS 2023
EditorsYael Tauman Kalai
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
ISBN (Electronic)9783959772631
DOIs
StatePublished - 1 Jan 2023
Event14th Innovations in Theoretical Computer Science Conference, ITCS 2023 - Cambridge, United States
Duration: 10 Jan 202313 Jan 2023

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume251
ISSN (Print)1868-8969

Conference

Conference14th Innovations in Theoretical Computer Science Conference, ITCS 2023
Country/TerritoryUnited States
CityCambridge
Period10/01/2313/01/23

Bibliographical note

Publisher Copyright:
© Yael Hitron, Merav Parter, and Eylon Yogev; licensed under Creative Commons License CC-BY 4.0.

Funding

Funding Merav Parter: This project is funded by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 949083). Eylon Yogev: Supported in part by a grant from the Israel Science Foundation (no. 2893/22), and by an Alon Young Faculty Fellowship. Merav Parter: This project is funded by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No. 949083). Eylon Yogev: Supported in part by a grant from the Israel Science Foundation (no. 2893/22), and by an Alon Young Faculty Fellowship.

FundersFunder number
Alon Young Faculty Fellowship
Horizon 2020 Framework Programme
European Commission
Israel Science Foundation2893/22
Horizon 2020949083

    Keywords

    • congest
    • network optimization
    • secure computation

    Fingerprint

    Dive into the research topics of 'Secure Distributed Network Optimization Against Eavesdroppers'. Together they form a unique fingerprint.

    Cite this