2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2014
DOI: 10.1109/allerton.2014.7028589
|View full text |Cite
|
Sign up to set email alerts
|

Multi-party set reconciliation using characteristic polynomials

Abstract: Abstract-In the standard set reconciliation problem, there are two parties A1 and A2, each respectively holding a set of elements S1 and S2. The goal is for both parties to obtain the union S1 ∪ S2. In many distributed computing settings the sets may be large but the set difference |S1 −S2|+|S2 −S1| is small. In these cases one aims to achieve reconciliation efficiently in terms of communication; ideally, the communication should depend on the size of the set difference, and not on the size of the sets.Recent … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The XOR operations in the IBLT are also redefined in the multi-ary system correspondingly. The possibility of using characteristic polynomials to reconcile multiple sets is investigated by combining with the gossip protocol in general networks [17].…”
Section: Background and Related Work A Set Reconciliationmentioning
confidence: 99%
“…The XOR operations in the IBLT are also redefined in the multi-ary system correspondingly. The possibility of using characteristic polynomials to reconcile multiple sets is investigated by combining with the gossip protocol in general networks [17].…”
Section: Background and Related Work A Set Reconciliationmentioning
confidence: 99%
“…These ideas have been extended, for example to multi-party reconciliation [8,24]. However, there remain many open problems related to reconciliation of objects beyond sets.…”
Section: Related Workmentioning
confidence: 99%
“…Then on the arrival of I(A 3 ) the relay could again determine the set difference between A 1 ∪ A 2 and A 3 and use this to build an IBLT for A 1 ∪ A 2 ∪ A 3 . This repeated decoding and encoding approach is used in [3]. However, this approach requires much more work from the relay, namely a full decoding for each newly received IBLT, which should be avoided in many settings.…”
Section: Combining With Network Codingmentioning
confidence: 99%
“…As users migrate information to cloud storage, the burden of reliability moves to the cloud provider. Thus many cloud vendors such as Amazon [13] and Azure ered using IBLTs for scalable synchronization of transactions 3 [1,20]. Multi-party variations would be potentially useful in the Bitcoin setting, where multiple parties may need to track transactions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation