Home
Partners
Research interests
Projects
People
Opportunities (tesi di laurea IT)
Publications
Software
Events
Publications by year:
Publications by type: Conference papers - Journals - Technical Reports - Books - Book Chapters - Phd Thesis - Master Thesis (Tesi di Laurea Magistrale) - Bachelor Thesis (Tesi di Laurea)
Publications by author:
Publications by project:
Free search: Search


2015

S. Bonomi, A. Del Pozzo, R. Baldoni
Building Regular Registers with Rational Malicious Servers and Anonymous Clients

Technical report 1 - MIDLAB - 2015

Abstract [+]

"The paper addresses the problem of emulating a regular register in a synchronous distributed system where clients invoking ${\sf read}()$ and ${\sf write}()$ operations are anonymous while server processes maintaining the state of the register may be compromised by rational adversaries (i.e., a server might behave as \emph{rational malicious byzantine} process). We first model our problem as a Bayesian game between a client and a rational malicious server where the equilibrium depends on the decisions of the malicious server (behave correctly and not be detected by clients vs returning a wrong register value to clients with the risk of being detected and then excluded by the computation). We prove such equilibrium exists and finally we design a protocol implementing the regular register that forces the rational malicious server to behave correctly."

Downloads:pdf - Technical Report Netys
bib - BibTeX reference

Top -


DISCLAIMER - The reports contained in this page are included by the contributing authors as a mechanism to ensure timely dissemination of scholarly/technical information on a non-commerical basis. Copyright and all rights therein are maintained by the authors, despite the fact they have offered this information electronically. It is understood that all individuals copying this information will adhere to the terms/ constraints invoked by each author's copyright. Reports may not be copied for commercial redistribution, republication, or dissemination without the explicit permission of the authors. Sections of some of these reports have been published by IEEE, Springer-Verlag, Kluwer etc. and have Copyright. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works, must be obtained from the publisher.