Randomized algorithms in systems without coordination and centralization
DOI:
https://doi.org/10.20535/2411-1031.2024.12.1.306274Keywords:
randomized algorithm, parallel computing, probabilistic analysis, average complexity, Chernov-Heffding inequalities, Markov inequality, hypercube routingAbstract
Evaluating the complexity of algorithms based only on the possibility of the worst possible variant of the input data is often not justified. The development of algorithms that would predictably work quickly on all possible inputs is of practical importance. If for the problem there is a reasonable opportunity to model the distributions of input values, then you can use probabilistic analysis as a method of developing effective algorithms. When the information about the distribution of input values is not enough for their numerical modeling, algorithms are developed by giving a part of the algorithm itself a random character - randomized algorithms. The use of randomization ensures the operation of the algorithm with minimal needs to store internal states and events in the past, and the algorithms themselves look compact. The paper studies problems for which there are relatively effective deterministic algorithms for solving. But, as will be shown, the construction of appropriate randomized algorithms leads to effective and efficient parallel computing schemes with linear complexity on average. The advantages of randomization are especially evident in the case of large computer systems and communication networks that function without coordination and centralization. Examples of such distributed systems are, in particular, networks of currently popular cryptocurrencies. The use of randomized heuristics allows the system to adapt to changing operating conditions and minimizes the likelihood of conflicts between processes. The paper shows the advantages of using a randomized algorithm over deterministic algorithms for the problem of routing in a network with a hypercube topology. A theorem on estimating the expected number of steps required by Valiant's randomized algorithm to deliver all messages to an address is proved. The expected linear complexity of Valiant's algorithm is a direct consequence of the proven theorem.
References
D.R. Karger, and C. Stein, “A new approach to the minimum cut problem”, Journal of the ACM (JACM), vol. 43, iss. 4, 601-640, 1966.
Gupta, E. Lee, and J. Li, “The number of minimum k-cuts: Improving the Karger-Stein bound”. in Proc. 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019, pp. 229-240, doi: https://doi.org/10.48550/arXiv.1906.00417.
M.N. Wegman, and J.L. Carter, “New hash functions and their use in authentication and set equality”, J. Comput. System Sci, vol. 22, pp. 265-279, 1981.
M.O. Rabin, and R.M. Karp, “Efficient randomized pattern-matching algorithms”, IBM Journal of Research and Development, vol. 31, no. 2, pp. 249-260, 1987, doi: https://doi.org/10.1147/rd.312.0249.
Borodin, and J.E. Hopcroft, “Routing, merging, and sorting on parallel models of computation”, Journal of Computer and System Sciences, vol. 30 (1), pp. 130-145, 1985, doi: https://doi.org/10.1016/0022-0000(85)90008-X.
C. Kaklamanis, D. Krizanc, and T. Tsantilas, “Tight bounds for oblivious routing in the hypercube”, Mathematical Systems Theory, vol. 24 (4), pp. 223-232, 1991, doi: https://doi.org/10.1007/BF02090400.
F.T. Leighton, B.M. Maggs, and S.B. Rao, “Packet routing and job-shop scheduling inO(congestion+dilation) steps”, Combinatorica, vol. 14, pp. 167-186, 1994, doi: https://doi.org/10.1007/BF01215349.
L.G. Valiant, and G.J. Brebner, “Universal schemes for parallel communication”, in Proc. 13th Ann. ACM Symp. on Theory of Comp. (STOC’81), 1981, pp. 263-277, 1981, doi: https://doi.org/10.1145/800076.802479.
L.G. Valiant, “A scheme for fast parallel communication”, SIAM Journal on Computing, iss. 11 (2), pp. 350-361, 1982, doi: https://doi.org/10.1137/0211027.
H. Räcke, and S. Schmid, “Compact oblivious routing”, in Proc. 27th Europ. Symp. on Algor. (ESA 2019), Leibniz Int. Proc. in Inform. (LIPIcs), Schloss Dagstuhl, 2019, vol. 144, pp. 75:1-75:14, doi: https://doi.org/10.4230/LIPIcs.ESA.2019.75.
P. Czerner, and H. Räcke, “Compact Oblivious Routing in Weighted Graphs”, in Proc. 28th Ann. Europ. Symp. on Algor. (ESA 2020), Leibniz Int. Proc. in Inform. (LIPIcs), Schloss Dagstuhl, 2020, vol. 173, pp. 36:1-36:23, doi: https://doi.org/10.4230/LIPIcs.ESA.2020.36.
D. Rachmawati, H. Tamara, S. Sembiring, and M. Budiman, “RSA public key solving technique by using genetic algorithm”, Journal of Theoretical and Applied Information Technology, vol. 98, iss. 15, pp. 2990 2999, 2020.
A.K.S. Sabonchi, and B. Akay, “Cryptanalysis of polyalphabetic cipher using differential evolution algorithm”, Tehnički vjesnik, iss. 27 (4), pp. 1101 1107, 2020, doi: https://doi.org/10.17559/TV-20190314095054.
B. Akay, “A binomial crossover based artificial bee colony algorithm for cryptanalysis of polyalphabetic cipher”, Tehnički vjesnik, iss. 27 (6). pp. 1825-1835, 2020, doi: https://doi.org/10.17559/TV-20190422225110.
A.K.S. Sabonchi, B. Akay, “A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers”, Computer Systems Science And Engineering, vol. 39, no. 1, pp. 87-106, 2021, doi: http://doi.org/10.32604/csse.2021.05365.
H. Grari, S. Lamzabi, A. Azouaoui, and K. Zine-Dine, “Cryptanalysis of Merkle-Hellman cipher using ant colony optimization”, Int. Jour. Artif. Intell. (IJ-AI), vol. 10, no. 2, pp. 490-500, 2021, doi: https://doi.org/10.11591/ijai.v10.i2.
K. Dworak, and U. Boryczka, “Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis”, Entropy. vol. 23, iss. 12, pp. 1697-1718, 2021, doi: https://doi.org/10.3390/e23121697.
О.О. Kubaychuk, “Osoblyvosti zastosuvannia alhorytmu ASO do deiakykh zadach kryptoanalizu”, Naukoiemni tekhnolohii, no. 2 (58), pp. 141-148, 2023, doi: https://doi.org/10.18372/2310-5461.58.17650
О.О. Kubaychuk, “Ohliad zastosuvannia metaevrystychnoho pidkhodu v kryptoanalizi”, Visnyk KhNTU: informatsiini tekhnolohii, no. 2 (85), pp. 147-153, 2023, doi: https://doi.org/10.35546/kntu2078-4481.2023.2.20
R. Мotwani, and P. Raghavan, Randomized Algorithms. Cambridge, GB: Cambridge Univ. Press, 1995.
M. Mitzenmacher, and E.Upfal, Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge, GB: Cambridge Univ. Press, 2005.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Collection "Information Technology and Security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).