Near-Optimal Communication Byzantine Reliable Broadcast under a Message Adversary (2312.16253v2)
Abstract: We address the problem of Reliable Broadcast in asynchronous message-passing systems with $n$ nodes, of which up to $t$ are malicious (faulty), in addition to a message adversary that can drop some of the messages sent by correct (non-faulty) nodes. We present a Message-Adversary-Tolerant Byzantine Reliable Broadcast (MBRB) algorithm that communicates ${\cal O}(|m|+n\kappa)$ bits per node, where $|m|$ represents the length of the application message and $\kappa=\Omega(\log n)$ is a security parameter. This communication complexity is optimal up to the parameter $\kappa$. This significantly improves upon the state-of-the-art MBRB solution (Albouy, Frey, Raynal, and Ta\"iani, TCS 2023), which incurs communication of ${\cal O}(n|m|+n2\kappa)$ bits per node. Our solution sends at most $4n2$ messages overall, which is asymptotically optimal. Reduced communication is achieved by employing coding techniques that replace the need for all nodes to (re-)broadcast the entire application message $m$. Instead, nodes forward authenticated fragments of the encoding of $m$ using an erasure-correcting code. Under the cryptographic assumptions of threshold signatures and vector commitments, and assuming $n > 3t+2d$, where the adversary drops at most $d$ messages per broadcast, our algorithm allows at least $\ell = n - t - (1 + \epsilon)d$ (for any arbitrarily low $\epsilon> 0$) correct nodes to reconstruct $m$, despite missing fragments caused by the malicious nodes and the message adversary.
- A Modular Approach to Construct Signature-Free BRB Algorithms Under a Message Adversary. In 26th International Conference on Principles of Distributed Systems (OPODIS 2022), volume 253 of LIPIcs, pages 26:1–26:23, 2023.
- Asynchronous Byzantine reliable broadcast with a message adversary. CoRR, abs/2205.09992, 2022. Also in SSS 2021: 21-33.
- Balanced Byzantine reliable broadcast with near-optimal communication and improved computation. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, PODC’22, page 399–417, 2022.
- Reliable broadcasting in logarithmic time with Byzantine link failures. Journal of Algorithms, 22(2):199–211, 1997.
- Martin Biely. An optimal Byzantine agreement algorithm with arbitrary node and link failures. In IASTED Parallel and Distributed Computing and Systems, volume 1, pages 146–151, 2003.
- Synchronous consensus under hybrid process and link failures. Theoretical Computer Science, 412(40):5602–5630, 2011.
- Short signatures from the weil pairing. Journal of Cryptolgy, 17(4):297–319, sep 2004.
- Practical Byzantine reliable broadcast on partially connected networks. In ICDCS, pages 506–516. IEEE, 2021.
- Resilient consensus protocols. In Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing, pages 12–26. ACM, August 1983.
- Asynchronous consensus and broadcast protocols. J. ACM, 32(4):824–840, 1985.
- C. Cachin and J.A. Poritz. Secure INtrusion-tolerant replication on the internet. In Proceedings International Conference on Dependable Systems and Networks (DSN), pages 167–176, 2002.
- C. Cachin and S. Tessaro. Asynchronous verifiable information dispersal. In 24th IEEE Symposium on Reliable Distributed Systems (SRDS’05), pages 191–201, 2005.
- Distributed computations in fully-defective networks. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, PODC’22, pages 141–150, 2022.
- Making asynchronous distributed computations robust to noise. Distributed Computing, 32(5):405–421, 2019.
- Pallab Dasgupta. Agreement under faulty interfaces. Information Processing Letters, 65(3):125–129, 1998.
- Danny Dolev. The Byzantine generals strike again. Journal of Algorithms, 3(1):14–30, 1982.
- Bounds on information exchange for Byzantine agreement. J. ACM, 32(1):191–204, jan 1985.
- BEAT: asynchronous BFT made practical. In CCS, pages 2028–2041. ACM, 2018.
- Self-stabilizing Byzantine fault-tolerant repeated reliable broadcast. In Stabilization, Safety, and Security of Distributed Systems, pages 206–221. Springer International Publishing, 2022.
- Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. In Dependable Computing and Fault Tolerant Systems, volume 10, pages 139–158. IEEE, 1995.
- Dynamic Byzantine reliable broadcast. In 24th International Conference on Principles of Distributed Systems (OPODIS 2020), volume 184, pages 23:1–23:18, Dagstuhl, Germany, 2021.
- The adversarial noise threshold for distributed protocols. In ACM-SIAM Symposium on Discrete Algorithms, pages 240–258, 2016.
- The elliptic curve digital signature algorithm (ECDSA). International journal of information security, 1(1):36–63, 2001.
- The Byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382–401, jul 1982.
- Self-stabilizing Byzantine broadcast. In 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, pages 152–160, 2014.
- Ralph C. Merkle. A certified digital signature. In Gilles Brassard, editor, Advances in Cryptology — CRYPTO’ 89 Proceedings, pages 218–238, New York, NY, 1990. Springer New York.
- The honey badger of BFT protocols. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, page 31–42, 2016.
- Improved extension protocols for Byzantine broadcast and agreement. In 34th International Symposium on Distributed Computing (DISC 2020), volume 179, pages 28:1–28:17, 2020.
- Reaching agreement in the presence of faults. J. ACM, 27(2):228–234, apr 1980.
- Andrzej Pelc. Reliable communication in networks with Byzantine link failures. Networks, 22(5):441–459, 1992.
- Distributed agreement in the presence of processor and communication faults. IEEE Trans. Softw., SE-12(3):477–482, 1986.
- Michel Raynal. Message adversaries. In Encyclopedia of Algorithms, pages 1272–1276. Springer, 2016.
- Michel Raynal. Fault-Tolerant Message-Passing Distributed Systems - An Algorithmic Approach. Springer, 2018.
- Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960.
- Ron M. Roth. Introduction to coding theory. Cambridge University Press, 2006.
- Time is not a healer. In STACS 89, pages 304–313, Berlin, Heidelberg, 1989. Springer Berlin Heidelberg.
- Distributed function evaluation in the presence of transmission faults. In International Symposium on Algorithms, pages 358–367. Springer, 1990.
- Agreement in synchronous networks with ubiquitous faults. Theor. Comput. Sci., 384(2-3):232–249, 2007.
- Randomized asynchronous consensus with imperfect communications. In SRDS, pages 361–370. IEEE Computer Society, 2003.
- Claus-Peter Schnorr. Efficient signature generation by smart cards. Journal of cryptology, 4(3):161–174, 1991.
- Byzantine agreement in the presence of mixed faults on processors and links. IEEE Transactions on Parallel and Distributed Systems, 9(4):335–345, Apr 1998.