Affiliation:
1. Faculty of Fundamental Problems of Technology, Wrocław University of Science and Technology, Wybrzeze Wyspianskiego 27, 50-370 Wroclaw, Poland
Abstract
AbstractIn our article, we present several protocols that allow to efficiently construct large groups of users based only on local relations of trust. What is more, our approach proves to need only very small computational and communication overhead. Moreover, we give guarantees that a trusted core of the network is defended, even facing a powerful adversary capable of controlling a vast majority of users. This is non-trivial property in real-life networks, as those are usually modelled using preferential attachment graphs, which are extremely prone to attacks on the hub nodes. We show that using our protocols we can achieve similar robustness as Erdős–Renyí graphs, which, on the contrary, are very resistant against attacks focused on chosen nodes. Our protocols have been tested on graphs representing real-world social networks using high performance computing due to the size of the networks. In addition for some protocols, we provided a formal analysis to prove some phenomena in random graphs following power-law distribution, which we use as a network model. Finally, we explicitly demonstrate how our approach can be used to amplify security offered by some privacy-preserving protocols. We believe however that our results can be also seen as a contribution to fundamental observation about the nature of social networks. These results may help to design protocols, whenever it is necessary to gather a big group of users in highly dynamic or even adversarial settings.
Publisher
Oxford University Press (OUP)
Subject
Applied Mathematics,Computational Mathematics,Control and Optimization,Management Science and Operations Research,Computer Networks and Communications
Reference39 articles.
1. Scale-free networks;Barabási,;Sci. Am.,2003
2. Why your friends have more friends than you do;Feld,;Am. J. Sociol.,1991
3. Privacy-preserving aggregation of time-series data;Shi,,2011
4. Practical fault-tolerant data aggregation;Grining,,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A system model of three-body interactions in complex networks: consensus and conservation;Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences;2022-02