-
SmartShards: Churn-Tolerant Continuously Available Distributed Ledger
Authors:
Joseph Oglio,
Mikhail Nesterenko,
Gokarna Sharma
Abstract:
We present SmartShards: a new sharding algorithm for improving Byzantine tolerance and churn resistance in blockchains. Our algorithm places a peer in multiple shards to create an overlap. This simplifies cross-shard communication and shard membership management. We describe SmartShards, prove it correct and evaluate its performance.
We propose several SmartShards extensions: defense against a s…
▽ More
We present SmartShards: a new sharding algorithm for improving Byzantine tolerance and churn resistance in blockchains. Our algorithm places a peer in multiple shards to create an overlap. This simplifies cross-shard communication and shard membership management. We describe SmartShards, prove it correct and evaluate its performance.
We propose several SmartShards extensions: defense against a slowly adaptive adversary, combining transactions into blocks, fortification against the join/leave attack.
△ Less
Submitted 14 March, 2025;
originally announced March 2025.
-
Qusicryslals in Vernam cipher
Authors:
Maryna Nesterenko,
Severin Posta
Abstract:
We propose a modification of the classical Vernam cipher based on properties of one-dimensional quasicrystals. The method uses the sequence of quasicrystal minimal distances as an one-time pad. The main advantages are strict aperiodicity of such sets and rather short key that uniquely defines quasicrystal.
We propose a modification of the classical Vernam cipher based on properties of one-dimensional quasicrystals. The method uses the sequence of quasicrystal minimal distances as an one-time pad. The main advantages are strict aperiodicity of such sets and rather short key that uniquely defines quasicrystal.
△ Less
Submitted 12 February, 2025;
originally announced February 2025.
-
Consensus Through Knot Discovery in Asynchronous Dynamic Networks
Authors:
Rachel Bricker,
Mikhail Nesterenko,
Gokarna Sharma
Abstract:
We state the Problem of Knot Identification as a way to achieve consensus in dynamic networks. The network adversary is asynchronous and not oblivious. The network may be disconnected throughout the computation. We determine the necessary and sufficient conditions for the existence of a solution to the Knot Identification Problem: the knots must be observable by all processes and the first observe…
▽ More
We state the Problem of Knot Identification as a way to achieve consensus in dynamic networks. The network adversary is asynchronous and not oblivious. The network may be disconnected throughout the computation. We determine the necessary and sufficient conditions for the existence of a solution to the Knot Identification Problem: the knots must be observable by all processes and the first observed knot must be the same for all processes. We present an algorithm KIA that solves it. We conduct KIA performance evaluation.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
TRAIL: Cross-Shard Validation for Cryptocurrency Byzantine Shard Protection
Authors:
Mitch Jacovetty,
Joseph Oglio,
Mikhail Nesterenko,
Gokarna Sharma
Abstract:
We present TRAIL: an algorithm that uses a novel consensus procedure to tolerate failed or malicious shards within a blockchain-based cryptocurrency. Our algorithm takes a new approach of selecting validator shards for each transaction from those that previously held the assets being transferred. This approach ensures the algorithm's robustness and efficiency. TRAIL is presented using PBFT for int…
▽ More
We present TRAIL: an algorithm that uses a novel consensus procedure to tolerate failed or malicious shards within a blockchain-based cryptocurrency. Our algorithm takes a new approach of selecting validator shards for each transaction from those that previously held the assets being transferred. This approach ensures the algorithm's robustness and efficiency. TRAIL is presented using PBFT for internal shard transaction processing and a modified version of PBFT for external cross-shard validation. We describe TRAIL, prove it correct, analyze its message complexity, and evaluate its performance. We propose various TRAIL optimizations: we describe how it can be adapted to other Byzantine-tolerant consensus algorithms, how a complete system may be built on the basis of it, and how TRAIL can be applied to existing and future sharded blockchains.
△ Less
Submitted 11 May, 2024;
originally announced May 2024.
-
BeRGeR: Byzantine-Robust Geometric Routing
Authors:
Brown Zaz,
Mikhail Nesterenko,
Gokarna Sharma
Abstract:
We present BeRGeR: the first asynchronous geometric routing algorithm that guarantees delivery of a message despite a Byzantine fault without relying on cryptographic primitives or randomization. The communication graph is a planar embedding that remains three-connected if all edges intersecting the source-target line segment are removed. We prove the algorithm correct and estimate its message com…
▽ More
We present BeRGeR: the first asynchronous geometric routing algorithm that guarantees delivery of a message despite a Byzantine fault without relying on cryptographic primitives or randomization. The communication graph is a planar embedding that remains three-connected if all edges intersecting the source-target line segment are removed. We prove the algorithm correct and estimate its message complexity.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Consensus on an Unknown Torus with Dense Byzantine Faults
Authors:
Joseph Oglio,
Kendric Hood,
Gokarna Sharma,
Mikhail Nesterenko
Abstract:
We present a solution to consensus on a torus with Byzantine faults. Any solution to classic consensus that is tolerant to $f$ Byzantine faults requires $2f+1$ node-disjoint paths. Due to limited torus connectivity, this bound necessitates spatial separation between faults. Our solution does not require this many disjoint paths and tolerates dense faults.
Specifically, we consider the case where a…
▽ More
We present a solution to consensus on a torus with Byzantine faults. Any solution to classic consensus that is tolerant to $f$ Byzantine faults requires $2f+1$ node-disjoint paths. Due to limited torus connectivity, this bound necessitates spatial separation between faults. Our solution does not require this many disjoint paths and tolerates dense faults.
Specifically, we consider the case where all faults are in one column. We address the version of consensus where only processes in fault-free columns must agree. We prove that even this weaker version is not solvable if the column may be completely faulty.
We then present a solution for the case where at least one row is fault-free. The correct processes share orientation but do not know the identities of other processes or the torus dimensions. The communication is synchronous.
To achieve our solution, we build and prove correct an all-to-all broadcast algorithm $\mathcal{BAT}$ that guarantees delivery to all processes in fault-free columns. We use this algorithm to solve our weak consensus problem. Our solution, $\mathcal{CBAT}$, runs in $O(H+W)$ rounds, where $H$ and $W$ are torus height and width respectively. We extend our consensus solution to the fixed message size model where it runs in $O(H^3W^2)$ rounds. Our results are immediately applicable if the faults are located in a single row, rather than a column.
△ Less
Submitted 8 August, 2023; v1 submitted 22 March, 2023;
originally announced March 2023.
-
Blockchain in Dynamic Networks
Authors:
Rachel Bricker,
Mikhail Nesterenko,
Gokarna Sharma
Abstract:
We consider blockchain in dynamic networks. We define the Blockchain Decision Problem. It requires miners that maintain the blockchain to confirm whether a particular block is accepted. We establish the necessary conditions for the existence of a solution. We, however, prove that the solution, even under these necessary conditions is, in general, impossible. We then present two algorithms that sol…
▽ More
We consider blockchain in dynamic networks. We define the Blockchain Decision Problem. It requires miners that maintain the blockchain to confirm whether a particular block is accepted. We establish the necessary conditions for the existence of a solution. We, however, prove that the solution, even under these necessary conditions is, in general, impossible. We then present two algorithms that solve the Blockchain Decision Problem under either the knowledge of the maximum source pool propagation time or the knowledge of the source pool membership. We evaluate the performance of the two algorithms.
△ Less
Submitted 5 August, 2022;
originally announced August 2022.
-
QUANTAS: Quantitative User-friendly Adaptable Networked Things Abstract Simulator
Authors:
Joseph Oglio,
Kendric Hood,
Mikhail Nesterenko,
Sebastien Tixeuil
Abstract:
We present QUANTAS: a simulator that enables quantitative performance analysis of distributed algorithms. It has a number of attractive features. QUANTAS is an abstract simulator, therefore, the obtained results are not affected by the specifics of a particular network or operating system architecture. QUANTAS allows distributed algorithms researchers to quickly investigate a potential solution an…
▽ More
We present QUANTAS: a simulator that enables quantitative performance analysis of distributed algorithms. It has a number of attractive features. QUANTAS is an abstract simulator, therefore, the obtained results are not affected by the specifics of a particular network or operating system architecture. QUANTAS allows distributed algorithms researchers to quickly investigate a potential solution and collect data about its performance. QUANTAS programming is relatively straightforward and is accessible to theoretical researchers. To demonstrate QUANTAS capabilities, we implement and compare the behavior of two representative examples from four major classes of distributed algorithms: blockchains, distributed hash tables, consensus, and reliable data link message transmission.
△ Less
Submitted 16 May, 2022; v1 submitted 10 May, 2022;
originally announced May 2022.
-
Partitionable Asynchronous Cryptocurrency Blockchain
Authors:
Kendric Hood,
Joseph Oglio,
Mikhail Nesterenko,
Gokarna Sharma
Abstract:
We consider operation of blockchain-based cryptocurrency in case of partitioning. We define the Partitionable Blockchain Consensus Problem. The problem may have an interesting solution if the partitions proceed independently by splitting accounts. We prove that this problem is not solvable in the asynchronous system. The peers in the two partitions may not agree on the last jointly mined block or,…
▽ More
We consider operation of blockchain-based cryptocurrency in case of partitioning. We define the Partitionable Blockchain Consensus Problem. The problem may have an interesting solution if the partitions proceed independently by splitting accounts. We prove that this problem is not solvable in the asynchronous system. The peers in the two partitions may not agree on the last jointly mined block or, alternatively, on the starting point of independent concurrent computation. We introduce a family of detectors that enable a solution. We establish the relationship between detectors. We present the algorithm that solves the Partitionable Blockchain Consensus Problem using our detectors. We extend our solution to multiple splits, message loss and to partition merging. We simulate and evaluate the performance of detectors, discuss the implementation of the detectors and future work.
△ Less
Submitted 18 December, 2020;
originally announced December 2020.
-
Byzantine Geoconsensus
Authors:
Joseph Oglio,
Kendric Hood,
Gokarna Sharma,
Mikhail Nesterenko
Abstract:
We define and investigate the consensus problem for a set of $N$ processes embedded on the $d$-dimensional plane, $d\geq 2$, which we call the {\em geoconsensus} problem. The processes have unique coordinates and can communicate with each other through oral messages. In contrast to the literature where processes are individually considered Byzantine, it is considered that all processes covered by…
▽ More
We define and investigate the consensus problem for a set of $N$ processes embedded on the $d$-dimensional plane, $d\geq 2$, which we call the {\em geoconsensus} problem. The processes have unique coordinates and can communicate with each other through oral messages. In contrast to the literature where processes are individually considered Byzantine, it is considered that all processes covered by a finite-size convex fault area $F$ are Byzantine and there may be one or more processes in a fault area. Similarly as in the literature where correct processes do not know which processes are Byzantine, it is assumed that the fault area location is not known to the correct processes. We prove that the geoconsensus is impossible if all processes may be covered by at most three areas where one is a fault area.
Considering the 2-dimensional embedding, on the constructive side, for $M \geq 1$ fault areas $F$ of arbitrary shape with diameter $D$, we present a consensus algorithm that tolerates $f\leq N-(2M+1)$ Byzantine processes provided that there are $9M+3$ processes with pairwise distance between them greater than $D$. For square $F$ with side $\ell$, we provide a consensus algorithm that lifts this pairwise distance requirement and tolerates $f\leq N-15M$ Byzantine processes given that all processes are covered by at least $22M$ axis aligned squares of the same size as $F$. For a circular $F$ of diameter $\ell$, this algorithm tolerates $f\leq N-57M$ Byzantine processes if all processes are covered by at least $85M$ circles. We then extend these results to various size combinations of fault and non-fault areas as well as $d$-dimensional process embeddings, $d\geq 3$.
△ Less
Submitted 5 October, 2020;
originally announced October 2020.
-
Blockguard: Adaptive Blockchain Security
Authors:
Shishir Rai,
Kendric Hood,
Mikhail Nesterenko,
Gokarna Sharma
Abstract:
We consider the problem of varying the security of blockchain transactions according to their importance. This adaptive security is achieved by using variable size consensus committees. To improve performance, such committees function concurrently. We present two algorithms that allow adaptive security by forming concurrent variable size consensus committees on demand. One is based on a single joi…
▽ More
We consider the problem of varying the security of blockchain transactions according to their importance. This adaptive security is achieved by using variable size consensus committees. To improve performance, such committees function concurrently. We present two algorithms that allow adaptive security by forming concurrent variable size consensus committees on demand. One is based on a single joint blockchain, the other is based on separate sharded blockchains. For in-committee consensus, our algorithms may use various available byzantine-robust fault tolerant algorithms (BFT). We implement synchronous BFT, asynchronous BFT and proof-of-work consensus. We thoroughly evaluate the performance of our adaptive security algorithms.
△ Less
Submitted 30 July, 2019;
originally announced July 2019.
-
Observation of the novel type of ordering: Spontaneous ferriquadrupolar order
Authors:
A. A. Zvyagin,
K. Kutko,
D. Kamenskyi,
A. V. Peschanskii,
S. Poperezhai,
N. M. Nesterenko
Abstract:
Using Raman and infrared spectroscopies the spontaneous ferriquadrupolar ordering has been observed in the rare-earth-based system KDy(MoO$_4$)$_2$. Ordered quadrupoles in the electron subsystem attend non-equivalent distortions of rare-earth ions in the ordered phase. The mean field theory explaining the onset of such a type of ordering has been constructed.
Using Raman and infrared spectroscopies the spontaneous ferriquadrupolar ordering has been observed in the rare-earth-based system KDy(MoO$_4$)$_2$. Ordered quadrupoles in the electron subsystem attend non-equivalent distortions of rare-earth ions in the ordered phase. The mean field theory explaining the onset of such a type of ordering has been constructed.
△ Less
Submitted 1 October, 2018;
originally announced October 2018.
-
Concurrent Geometric Multicasting
Authors:
Jordan Adamek,
Mikhail Nesterenko,
James Robinson,
Sébastien Tixeuil
Abstract:
We present MCFR, a multicasting concurrent face routing algorithm that uses geometric routing to deliver a message from source to multiple targets. We describe the algorithm's operation, prove it correct, estimate its performance bounds and evaluate its performance using simulation. Our estimate shows that MCFR is the first geometric multicast routing algorithm whose message delivery latency is in…
▽ More
We present MCFR, a multicasting concurrent face routing algorithm that uses geometric routing to deliver a message from source to multiple targets. We describe the algorithm's operation, prove it correct, estimate its performance bounds and evaluate its performance using simulation. Our estimate shows that MCFR is the first geometric multicast routing algorithm whose message delivery latency is independent of network size and only proportional to the distance between the source and the targets. Our simulation indicates that MCFR has significantly better reliability than existing algorithms.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
Infinite Unlimited Churn
Authors:
Dianne Foreback,
Mikhail Nesterenko,
Sébastien Tixeuil
Abstract:
We study unlimited infinite churn in peer-to-peer overlay networks. Under this churn, arbitrary many peers may concurrently request to join or leave the overlay network; moreover these requests may never stop coming. We prove that unlimited adversarial churn, where processes may just exit the overlay network, is unsolvable. We focus on cooperative churn where exiting processes participate in the c…
▽ More
We study unlimited infinite churn in peer-to-peer overlay networks. Under this churn, arbitrary many peers may concurrently request to join or leave the overlay network; moreover these requests may never stop coming. We prove that unlimited adversarial churn, where processes may just exit the overlay network, is unsolvable. We focus on cooperative churn where exiting processes participate in the churn handling algorithm. We define the problem of unlimited infinite churn in this setting. We distinguish the fair version of the problem, where each request is eventually satisfied, from the unfair version that just guarantees progress. We focus on local solutions to the problem, and prove that a local solution to the Fair Infinite Unlimited Churn is impossible. We then present and prove correct an algorithm UIUC that solves the Unfair Infinite Unlimited Churn Problem for a linearized peer-to-peer overlay network. We extend this solution to skip lists and skip graphs.
△ Less
Submitted 2 August, 2016;
originally announced August 2016.
-
Realizations of Galilei algebras
Authors:
Maryna Nesterenko,
Severin Posta,
Olena Vaneeva
Abstract:
All inequivalent realizations of the Galilei algebras of dimensions not greater than five are constructed using the algebraic approach proposed by I. Shirokov. The varieties of the deformed Galilei algebras are discussed and families of one-parametric deformations are presented in explicit form. It is also shown that a number of well-known and physically interesting equations and systems are invar…
▽ More
All inequivalent realizations of the Galilei algebras of dimensions not greater than five are constructed using the algebraic approach proposed by I. Shirokov. The varieties of the deformed Galilei algebras are discussed and families of one-parametric deformations are presented in explicit form. It is also shown that a number of well-known and physically interesting equations and systems are invariant with respect to the considered Galilei algebras or their deformations.
△ Less
Submitted 8 January, 2016; v1 submitted 1 September, 2015;
originally announced September 2015.
-
Stateless Geocasting
Authors:
Jordan Adamek,
Mikhail Nesterenko,
Sébastien Tixeuil
Abstract:
We present two stateless algorithms that guarantee to deliver the message to every device in a designated geographic area: flooding and planar geocasting. Due to the algorithms' statelessness, intermediate devices do not have to keep message data between message transmissions. We formally prove the algorithms correct, estimate their message complexity and evaluate their performance through simulat…
▽ More
We present two stateless algorithms that guarantee to deliver the message to every device in a designated geographic area: flooding and planar geocasting. Due to the algorithms' statelessness, intermediate devices do not have to keep message data between message transmissions. We formally prove the algorithms correct, estimate their message complexity and evaluate their performance through simulation.
△ Less
Submitted 25 June, 2015;
originally announced June 2015.
-
Packet Efficient Implementation of the Omega Failure Detector
Authors:
Quentin Bramas,
Dianne Foreback,
Mikhail Nesterenko,
Sébastien Tixeuil
Abstract:
We assume that a message may be delivered by packets through multiple hops and investigate the feasibility and efficiency of an implementation of the Omega Failure Detector under such an assumption.To motivate the study, we prove that the existence and sustainability of a leader is exponentially more probable in a multi-hop Omega implementation than in a single-hop one.An implementation is: \emph{…
▽ More
We assume that a message may be delivered by packets through multiple hops and investigate the feasibility and efficiency of an implementation of the Omega Failure Detector under such an assumption.To motivate the study, we prove that the existence and sustainability of a leader is exponentially more probable in a multi-hop Omega implementation than in a single-hop one.An implementation is: \emph{message efficient} if all but finitely many messages are sent by a single process; \emph{packet efficient} if the number of packets used to transmit a message in all but finitely many messages is linear w.r.t the number of processes, packets of different messages may potentially use different channels, thus the number of used channels is not limited; \emph{super packet efficient} if the number of channels used by packets to transmit all but finitely many messages is linear.We present the following results for deterministic algorithms. If reliability and timeliness of one message does not correlate with another, i.e., there are no channel reliability properties, then a packet efficient implementation of Omega is impossible. If eventuallytimely and fair-lossy channels are considered, we establish necessary and sufficient conditions for the existence of a message and packet efficient implementation of Omega. We also prove that the eventuality of timeliness of channels makes a super packet efficientimplementation of Omega impossible. On the constructive side, we present and prove correct a deterministic packet efficient implementation of Omega that matches the necessary conditions we established.
△ Less
Submitted 12 February, 2016; v1 submitted 19 May, 2015;
originally announced May 2015.
-
The cooperative Jahn-Teller ordering investigation by absorption spectra in $KDy(MoO_4)_2$
Authors:
N. M. Nesterenko,
Yu. Kharchenko
Abstract:
Absorption spectra fine structure of $KDy(MoO_4)_2$ in the region of cooperative Jahn-Teller type ordering was studied. Temperature anomalies in the spectra occurring at phase transformation correlate with the ultrasound peculiarities observed earlier. Based on the symmetry approaching, possible activity of the irreducible representations of the rhombic $D_{2h}$ point group was discussed, which le…
▽ More
Absorption spectra fine structure of $KDy(MoO_4)_2$ in the region of cooperative Jahn-Teller type ordering was studied. Temperature anomalies in the spectra occurring at phase transformation correlate with the ultrasound peculiarities observed earlier. Based on the symmetry approaching, possible activity of the irreducible representations of the rhombic $D_{2h}$ point group was discussed, which lead to the incommensurate phase at cooperative ordering. It was supposed, that coupled $A_u$-type phonon mode may lead to the incommensurate phase existence, which is possible at least in the temperature region 17-12 K.
△ Less
Submitted 8 July, 2014;
originally announced July 2014.
-
LC nanocomposites: induced optical singularities, managed nano/micro structure, and electrical conductivity
Authors:
V. V. Ponevchinsky,
A. I. Goncharuk,
V. G. Denisenko,
N. I. Lebovka,
L. N. Lisetski,
M. I. Nesterenko,
V. D. Panikarskaya,
M. S. Soskin
Abstract:
Microstructure, phase transitions, electrical conductivity, and optical and electrooptical properties of multiwalled carbon nanotubes (NTs), dispersed in the cholesteric liquid crystal (cholesteryl oleyl carbonate, COC), nematic 5CB and their mixtures, were studied in the temperature range between 255 K and 363 K. The relative concentration X=COC/(COC+5CB)was varied within 0.0-1.0. The concentrati…
▽ More
Microstructure, phase transitions, electrical conductivity, and optical and electrooptical properties of multiwalled carbon nanotubes (NTs), dispersed in the cholesteric liquid crystal (cholesteryl oleyl carbonate, COC), nematic 5CB and their mixtures, were studied in the temperature range between 255 K and 363 K. The relative concentration X=COC/(COC+5CB)was varied within 0.0-1.0. The concentration $C_p$ of NTs was varied within 0.01-5% wt. The value of X affected agglomeration and stability of NTs inside COC+5CB. High-quality dispersion, exfoliation, and stabilization of the NTs were observed in COC solvent ("good" solvent). From the other side, the aggregation of NTs was very pronounced in nematic 5CB solvent ("bad" solvent). The dispersing quality of solvent influenced the percolation concentration $C_p$, corresponding to transition between the low conductive and high conductive states: e.g., percolation was observed at $C_p=1%$ and $C_p=0.1%$ for pure COC and 5CB, respectively. The effects of thermal pre-history on the heating-cooling hysteretic behavior of electrical conductivity were studied. The mechanism of dispersion of NTs in COC+5CB mixtures is discussed. Utilization of the mixtures of "good" and "bad" solvents allowed fine regulation of the dispersion, stability and electrical conductivity of LC+NTs composites. The mixtures of COC and 5CB were found to be promising for application as functional media with controllable useful chiral and electrophysical properties.
△ Less
Submitted 3 March, 2013;
originally announced March 2013.
-
Anomalous selective reflection in cholesteryl oleyl carbonate - nematic 5CB mixtures and effects of their doping by single-walled carbon nanotubes
Authors:
N. I. Lebovka,
L. N. Lisetski,
M. I. Nesterenko,
V. D. Panikarskaya,
N. A. Kasian,
S. S. Minenko,
M. S. Soskin
Abstract:
Liquid crystalline (LC) mixtures of cholesteryl oleyl carbonate (COC) and 4-pentyl-4'-cyanobiphenyl (5CB), as well as dispersions of single-walled carbon nanotubes (NTs) in these mixtures, were studied by means of selective reflection measurements, differential scanning calorimetry (DSC) and optical microscopy. The relative mass of COC in a mixture X was varied between 0.4 and 1.0, the temperature…
▽ More
Liquid crystalline (LC) mixtures of cholesteryl oleyl carbonate (COC) and 4-pentyl-4'-cyanobiphenyl (5CB), as well as dispersions of single-walled carbon nanotubes (NTs) in these mixtures, were studied by means of selective reflection measurements, differential scanning calorimetry (DSC) and optical microscopy. The relative mass of COC in a mixture X was varied between 0.4 and 1.0, the temperature range of measurements was between 284 K and 314 K, and concentration of NTs was fixed at 0.1 %. Two important anomalies were noted: (1) the cholesteric to smectic-A transition temperature increased on dilution of COC by non-smectogenic 5CB in the concentration range 0.8<X<1, and (2) the reciprocal pitch vs. 5CB concentration dependence was essentially linear, in contrast to behaviour commonly observed in nematic-cholesteric mixtures. A model of molecular arrangement in the mixtures, accounting for the possibility of integration of 5CB dimers and monomers between COC molecules and presumably explaining the experimental data, was proposed. The helical pitch of the cholesteric mixtures remained practically unchanged upon doping by NTs, and only slight widening of the selective reflection peaks was noted. The obtained results allow considering the COC+5CB mixtures as promising matrices for composite materials on the basis of liquid crystals and carbon nanotubes.
△ Less
Submitted 3 March, 2013;
originally announced March 2013.
-
S-expansions of three-dimensional Lie algebras
Authors:
Maryna Nesterenko
Abstract:
S-expansions of three-dimensional real Lie algebras are considered. It is shown that the expansion operation allows one to obtain a non-unimodular Lie algebra from a unimodular one. Nevertheless S-expansions define no ordering on the variety of Lie algebras of a fixed dimension.
S-expansions of three-dimensional real Lie algebras are considered. It is shown that the expansion operation allows one to obtain a non-unimodular Lie algebra from a unimodular one. Nevertheless S-expansions define no ordering on the variety of Lie algebras of a fixed dimension.
△ Less
Submitted 8 December, 2012;
originally announced December 2012.
-
Orthogonal polynomials of compact simple Lie groups: Branching rules for polynomials
Authors:
Maryna Nesterenko,
Jiri Patera,
Marzena Szajewska,
Agnieszka Tereszkiewicz
Abstract:
Polynomials in this paper are defined starting from a compact semisimple Lie group. A known classification of maximal, semisimple subgroups of simple Lie groups is used to select the cases to be considered here. A general method is presented and all the cases of rank not greater then 3 are explicitly studied. We derive the polynomials of simple Lie groups B_3 and C_3 as they are not available else…
▽ More
Polynomials in this paper are defined starting from a compact semisimple Lie group. A known classification of maximal, semisimple subgroups of simple Lie groups is used to select the cases to be considered here. A general method is presented and all the cases of rank not greater then 3 are explicitly studied. We derive the polynomials of simple Lie groups B_3 and C_3 as they are not available elsewhere. The results point to far reaching Lie theoretical connections to the theory of multivariable orthogonal polynomials.
△ Less
Submitted 19 July, 2011; v1 submitted 26 July, 2010;
originally announced July 2010.
-
Orthogonal polynomials of compact simple Lie groups
Authors:
Maryna Nesterenko,
Jiri Patera,
Agnieszka Tereszkiewicz
Abstract:
Recursive algebraic construction of two infinite families of polynomials in $n$ variables is proposed as a uniform method applicable to every semisimple Lie group of rank $n$. Its result recognizes Chebyshev polynomials of the first and second kind as the special case of the simple group of type $A_1$. The obtained not Laurent-type polynomials are proved to be equivalent to the partial cases of th…
▽ More
Recursive algebraic construction of two infinite families of polynomials in $n$ variables is proposed as a uniform method applicable to every semisimple Lie group of rank $n$. Its result recognizes Chebyshev polynomials of the first and second kind as the special case of the simple group of type $A_1$. The obtained not Laurent-type polynomials are proved to be equivalent to the partial cases of the Macdonald symmetric polynomials. Basic relation between the polynomials and their properties follow from the corresponding properties of the orbit functions, namely the orthogonality and discretization. Recurrence relations are shown for the Lie groups of types $A_1$, $A_2$, $A_3$, $C_2$, $C_3$, $G_2$, and $B_3$ together with lowest polynomials.
△ Less
Submitted 16 August, 2011; v1 submitted 20 January, 2010;
originally announced January 2010.
-
Self-Stabilizing Byzantine Asynchronous Unison
Authors:
Swan Dubois,
Maria Gradinariu Potop-Butucaru,
Mikhail Nesterenko,
Sébastien Tixeuil
Abstract:
We explore asynchronous unison in the presence of systemic transient and permanent Byzantine faults in shared memory. We observe that the problem is not solvable under less than strongly fair scheduler or for system topologies with maximum node degree greater than two. We present a self-stabilizing Byzantine-tolerant solution to asynchronous unison for chain and ring topologies. Our algorithm ha…
▽ More
We explore asynchronous unison in the presence of systemic transient and permanent Byzantine faults in shared memory. We observe that the problem is not solvable under less than strongly fair scheduler or for system topologies with maximum node degree greater than two. We present a self-stabilizing Byzantine-tolerant solution to asynchronous unison for chain and ring topologies. Our algorithm has minimum possible containment radius and optimal stabilization time.
△ Less
Submitted 1 December, 2009;
originally announced December 2009.
-
Branching rules for the Weyl group orbits of the Lie algebra A(n)
Authors:
M. Larouche,
M. Nesterenko,
J. Patera
Abstract:
The orbits of Weyl groups W(A(n)) of simple A(n) type Lie algebras are reduced to the union of orbits of the Weyl groups of maximal reductive subalgebras of A(n). Matrices transforming points of the orbits of W(An) into points of subalgebra orbits are listed for all cases n<=8 and for the infinite series of algebra-subalgebra pairs A(n) - A(n-k-1) x A(k) x U(1), A(2n) - B(n), A(2n-1) - C(n), A(2…
▽ More
The orbits of Weyl groups W(A(n)) of simple A(n) type Lie algebras are reduced to the union of orbits of the Weyl groups of maximal reductive subalgebras of A(n). Matrices transforming points of the orbits of W(An) into points of subalgebra orbits are listed for all cases n<=8 and for the infinite series of algebra-subalgebra pairs A(n) - A(n-k-1) x A(k) x U(1), A(2n) - B(n), A(2n-1) - C(n), A(2n-1) - D(n). Numerous special cases and examples are shown.
△ Less
Submitted 14 September, 2009;
originally announced September 2009.
-
Ideal Stabilization
Authors:
Mikhail Nesterenko,
Sébastien Tixeuil
Abstract:
We define and explore the concept of ideal stabilization. The program is ideally stabilizing if its every state is legitimate. Ideal stabilization allows the specification designer to prescribe with arbitrary degree of precision not only the fault-free program behavior but also its recovery operation. Specifications may or may not mention all possible states. We identify approaches to designing…
▽ More
We define and explore the concept of ideal stabilization. The program is ideally stabilizing if its every state is legitimate. Ideal stabilization allows the specification designer to prescribe with arbitrary degree of precision not only the fault-free program behavior but also its recovery operation. Specifications may or may not mention all possible states. We identify approaches to designing ideal stabilization to both kinds of specifications. For the first kind, we state the necessary condition for an ideally stabilizing solution. On the basis of this condition we prove that there is no ideally stabilizing solution to the leader election problem. We illustrate the utility of the concept by providing examples of well-known programs and proving them ideally stabilizing. Specifically, we prove ideal stabilization of the conflict manager, the alternator, the propagation of information with feedback and the alternating bit protocol.
△ Less
Submitted 10 June, 2009;
originally announced June 2009.
-
Orbit functions of SU(n) and Chebyshev polynomials
Authors:
M. Nesterenko,
J. Patera,
A. Tereszkiewicz
Abstract:
Orbit functions of a simple Lie group/Lie algebra L consist of exponential functions summed up over the Weyl group of L. They are labeled by the highest weights of irreducible finite dimensional representations of L. They are of three types: C-, S- and E-functions. Orbit functions of the Lie algebras An, or equivalently, of the Lie group SU(n+1), are considered.
First, orbit functions in two d…
▽ More
Orbit functions of a simple Lie group/Lie algebra L consist of exponential functions summed up over the Weyl group of L. They are labeled by the highest weights of irreducible finite dimensional representations of L. They are of three types: C-, S- and E-functions. Orbit functions of the Lie algebras An, or equivalently, of the Lie group SU(n+1), are considered.
First, orbit functions in two different bases - one orthonormal, the other given by the simple roots of SU(n) - are written using the isomorphism of the permutation group of n elements and the Weyl group of SU(n).
Secondly, it is demonstrated that there is a one-to-one correspondence between classical Chebyshev polynomials of the first and second kind, and C- and $S$-functions of the simple Lie group SU(2).
It is then shown that the well-known orbit functions of SU(n) are straightforward generalizations of Chebyshev polynomials to n-1 variables. Properties of the orbit functions provide a wealth of properties of the polynomials.
Finally, multivariate exponential functions are considered, and their connection with orbit functions of SU(n) is established.
△ Less
Submitted 28 September, 2009; v1 submitted 18 May, 2009;
originally announced May 2009.
-
Computing with almost periodic functions
Authors:
R. V. Moody,
M. Nesterenko,
J. Patera
Abstract:
The paper develops a method for discrete computational Fourier analysis of functions defined on quasicrystals and other almost periodic sets. A key point is to build the analysis around the emerging theory of quasicrystals and diffraction in the setting on local hulls and dynamical systems. Numerically computed approximations arising in this way are built out of the Fourier module of the quasicr…
▽ More
The paper develops a method for discrete computational Fourier analysis of functions defined on quasicrystals and other almost periodic sets. A key point is to build the analysis around the emerging theory of quasicrystals and diffraction in the setting on local hulls and dynamical systems. Numerically computed approximations arising in this way are built out of the Fourier module of the quasicrystal in question, and approximate their target functions uniformly on the entire infinite space.
The methods are entirely group theoretical, being based on finite groups and their duals, and they are practical and computable. Examples of functions based on the standard Fibonacci quasicrystal serve to illustrate the method (which is applicable to all quasicrystals modeled on the cut and project formalism).
△ Less
Submitted 13 August, 2008;
originally announced August 2008.
-
Three dimensional C-, S- and E-transforms
Authors:
M. Nesterenko,
J. Patera
Abstract:
Three dimensional continuous and discrete Fourier-like transforms, based on the three simple and four semisimple compact Lie groups of rank 3, are presented. For each simple Lie group, there are three families of special functions ($C$-, $S$-, and $E$-functions) on which the transforms are built. Pertinent properties of the functions are described in detail, such as their orthogonality within ea…
▽ More
Three dimensional continuous and discrete Fourier-like transforms, based on the three simple and four semisimple compact Lie groups of rank 3, are presented. For each simple Lie group, there are three families of special functions ($C$-, $S$-, and $E$-functions) on which the transforms are built. Pertinent properties of the functions are described in detail, such as their orthogonality within each family, when integrated over a finite region $F$ of the 3-dimensional Euclidean space (continuous orthogonality), as well as when summed up over a lattice grid $F_M\subset F$ (discrete orthogonality). The positive integer $M$ sets up the density of the lattice containing $F_M$. The expansion of functions given either on $F$ or on $F_M$ is the paper's main focus.
△ Less
Submitted 23 May, 2008;
originally announced May 2008.
-
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
Authors:
Adnan Vora,
Mikhail Nesterenko,
Sébastien Tixeuil,
Sylvie Delaët
Abstract:
The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes from the universe of arbitrary non-existent fictitious nodes created by the attacker. Similar to failure detectors, we propose to use universe detectors to help nodes determine which universe is real. In this paper, we…
▽ More
The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes from the universe of arbitrary non-existent fictitious nodes created by the attacker. Similar to failure detectors, we propose to use universe detectors to help nodes determine which universe is real. In this paper, we (i) define several variants of the neighborhood discovery problem under Sybil attack (ii) propose a set of matching universe detectors (iii) demonstrate the necessity of additional topological constraints for the problems to be solvable: node density and communication range; (iv) present SAND -- an algorithm that solves these problems with the help of appropriate universe detectors, this solution demonstrates that the proposed universe detectors are the weakest detectors possible for each problem.
△ Less
Submitted 13 May, 2008; v1 submitted 1 May, 2008;
originally announced May 2008.
-
Void Traversal for Guaranteed Delivery in Geometric Routing
Authors:
Mikhail Nesterenko,
Adnan Vora
Abstract:
Geometric routing algorithms like GFG (GPSR) are lightweight, scalable algorithms that can be used to route in resource-constrained ad hoc wireless networks. However, such algorithms run on planar graphs only. To efficiently construct a planar graph, they require a unit-disk graph. To make the topology unit-disk, the maximum link length in the network has to be selected conservatively. In practi…
▽ More
Geometric routing algorithms like GFG (GPSR) are lightweight, scalable algorithms that can be used to route in resource-constrained ad hoc wireless networks. However, such algorithms run on planar graphs only. To efficiently construct a planar graph, they require a unit-disk graph. To make the topology unit-disk, the maximum link length in the network has to be selected conservatively. In practical setting this leads to the designs where the node density is rather high. Moreover, the network diameter of a planar subgraph is greater than the original graph, which leads to longer routes. To remedy this problem, we propose a void traversal algorithm that works on arbitrary geometric graphs. We describe how to use this algorithm for geometric routing with guaranteed delivery and compare its performance with GFG.
△ Less
Submitted 25 March, 2008;
originally announced March 2008.
-
Snap-Stabilization in Message-Passing Systems
Authors:
Sylvie Delaët,
Stéphane Devismes,
Mikhail Nesterenko,
Sébastien Tixeuil
Abstract:
In this paper, we tackle the open problem of snap-stabilization in message-passing systems. Snap-stabilization is a nice approach to design protocols that withstand transient faults. Compared to the well-known self-stabilizing approach, snap-stabilization guarantees that the effect of faults is contained immediately after faults cease to occur. Our contribution is twofold: we show that (1) snap-…
▽ More
In this paper, we tackle the open problem of snap-stabilization in message-passing systems. Snap-stabilization is a nice approach to design protocols that withstand transient faults. Compared to the well-known self-stabilizing approach, snap-stabilization guarantees that the effect of faults is contained immediately after faults cease to occur. Our contribution is twofold: we show that (1) snap-stabilization is impossible for a wide class of problems if we consider networks with finite yet unbounded channel capacity; (2) snap-stabilization becomes possible in the same setting if we assume bounded-capacity channels. We propose three snap-stabilizing protocols working in fully-connected networks. Our work opens exciting new research perspectives, as it enables the snap-stabilizing paradigm to be implemented in actual networks.
△ Less
Submitted 11 February, 2008; v1 submitted 8 February, 2008;
originally announced February 2008.
-
New families of cryptographic systems
Authors:
Maryna Nesterenko,
Jiri Patera,
Dmytro Zhavrotskyj
Abstract:
A symmetric encryption method based on properties of quasicrystals is proposed. The advantages of the cipher are strict aperiodicity and everywhere discontinuous property as well as the speed of computation, simplicity of implementation and a straightforward possibility of extending the method to encryption of higher dimensional data.
A symmetric encryption method based on properties of quasicrystals is proposed. The advantages of the cipher are strict aperiodicity and everywhere discontinuous property as well as the speed of computation, simplicity of implementation and a straightforward possibility of extending the method to encryption of higher dimensional data.
△ Less
Submitted 28 September, 2007;
originally announced October 2007.
-
2FACE: Bi-Directional Face Traversal for Efficient Geometric Routing
Authors:
Mark Miyashita,
Mikhail Nesterenko
Abstract:
We propose bi-directional face traversal algorithm $2FACE$ to shorten the path the message takes to reach the destination in geometric routing. Our algorithm combines the practicality of the best single-direction traversal algorithms with the worst case message complexity of $O(|E|)$, where $E$ is the number of network edges. We apply $2FACE$ to a variety of geometric routing algorithms. Our sim…
▽ More
We propose bi-directional face traversal algorithm $2FACE$ to shorten the path the message takes to reach the destination in geometric routing. Our algorithm combines the practicality of the best single-direction traversal algorithms with the worst case message complexity of $O(|E|)$, where $E$ is the number of network edges. We apply $2FACE$ to a variety of geometric routing algorithms. Our simulation results indicate that bi-directional face traversal decreases the latency of message delivery two to three times compared to single direction face traversal. The thus selected path approaches the shortest possible route. This gain in speed comes with a similar message overhead increase. We describe an algorithm which compensates for this message overhead by recording the preferable face traversal direction. Thus, if a source has several messages to send to the destination, the subsequent messages follow the shortest route. Our simulation results show that with most geometric routing algorithms the message overhead of finding the short route by bi-directional face traversal is compensated within two to four repeat messages.
△ Less
Submitted 22 November, 2006;
originally announced November 2006.
-
Discovering Network Topology in the Presence of Byzantine Faults
Authors:
Mikhail Nesterenko,
Sébastien Tixeuil
Abstract:
We study the problem of Byzantine-robust topology discovery in an arbitrary asynchronous network. We formally state the weak and strong versions of the problem. The weak version requires that either each node discovers the topology of the network or at least one node detects the presence of a faulty node. The strong version requires that each node discovers the topology regardless of faults. We…
▽ More
We study the problem of Byzantine-robust topology discovery in an arbitrary asynchronous network. We formally state the weak and strong versions of the problem. The weak version requires that either each node discovers the topology of the network or at least one node detects the presence of a faulty node. The strong version requires that each node discovers the topology regardless of faults. We focus on non-cryptographic solutions to these problems. We explore their bounds. We prove that the weak topology discovery problem is solvable only if the connectivity of the network exceeds the number of faults in the system. Similarly, we show that the strong version of the problem is solvable only if the network connectivity is more than twice the number of faults. We present solutions to both versions of the problem. The presented algorithms match the established graph connectivity bounds. The algorithms do not require the individual nodes to know either the diameter or the size of the network. The message complexity of both programs is low polynomial with respect to the network size. We describe how our solutions can be extended to add the property of termination, handle topology changes and perform neighborhood discovery.
△ Less
Submitted 22 November, 2006;
originally announced November 2006.
-
Contractions of Low-Dimensional Lie Algebras
Authors:
Maryna Nesterenko,
Roman Popovych
Abstract:
Theoretical background of continuous contractions of finite-dimensional Lie algebras is rigorously formulated and developed. In particular, known necessary criteria of contractions are collected and new criteria are proposed. A number of requisite invariant and semi-invariant quantities are calculated for wide classes of Lie algebras including all low-dimensional Lie algebras.
An algorithm tha…
▽ More
Theoretical background of continuous contractions of finite-dimensional Lie algebras is rigorously formulated and developed. In particular, known necessary criteria of contractions are collected and new criteria are proposed. A number of requisite invariant and semi-invariant quantities are calculated for wide classes of Lie algebras including all low-dimensional Lie algebras.
An algorithm that allows one to handle one-parametric contractions is presented and applied to low-dimensional Lie algebras. As a result, all one-parametric continuous contractions for the both complex and real Lie algebras of dimensions not greater than four are constructed with intensive usage of necessary criteria of contractions and with studying correspondence between real and complex cases.
Levels and co-levels of low-dimensional Lie algebras are discussed in detail. Properties of multi-parametric and repeated contractions are also investigated.
△ Less
Submitted 11 January, 2007; v1 submitted 6 August, 2006;
originally announced August 2006.
-
Transformation Groups on Real Plane and their Differential Invariants
Authors:
Maryna Nesterenko
Abstract:
Complete sets of bases of differential invariants, operators of invariant differentiation and Lie determinants of continuous transformation groups acting on the real plane are constructed. As a necessary preliminary, realizations of finite-dimensional Lie algebras on the real plane are revisited.
Complete sets of bases of differential invariants, operators of invariant differentiation and Lie determinants of continuous transformation groups acting on the real plane are constructed. As a necessary preliminary, realizations of finite-dimensional Lie algebras on the real plane are revisited.
△ Less
Submitted 8 September, 2006; v1 submitted 12 December, 2005;
originally announced December 2005.
-
Realizations of real semisimple low-dimensional Lie algebras
Authors:
Maryna Nesterenko,
Roman Popovych
Abstract:
A complete set of inequivalent realizations of three- and four-dimensional real unsolvable Lie algebras in vector fields on a space of an arbitrary (finite) number of variables is obtained.
A complete set of inequivalent realizations of three- and four-dimensional real unsolvable Lie algebras in vector fields on a space of an arbitrary (finite) number of variables is obtained.
△ Less
Submitted 4 October, 2005;
originally announced October 2005.
-
Realizations of Real Low-Dimensional Lie Algebras
Authors:
Roman O. Popovych,
Vyacheslav M. Boyko,
Maryna O. Nesterenko,
Maxim W. Lutfullin
Abstract:
Using a new powerful technique based on the notion of megaideal, we construct a complete set of inequivalent realizations of real Lie algebras of dimension no greater than four in vector fields on a space of an arbitrary (finite) number of variables. Our classification amends and essentially generalizes earlier works on the subject.
Known results on classification of low-dimensional real Lie a…
▽ More
Using a new powerful technique based on the notion of megaideal, we construct a complete set of inequivalent realizations of real Lie algebras of dimension no greater than four in vector fields on a space of an arbitrary (finite) number of variables. Our classification amends and essentially generalizes earlier works on the subject.
Known results on classification of low-dimensional real Lie algebras, their automorphisms, differentiations, ideals, subalgebras and realizations are reviewed.
△ Less
Submitted 4 August, 2005; v1 submitted 21 January, 2003;
originally announced January 2003.