Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
167 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Near-Optimal Communication Byzantine Reliable Broadcast under a Message Adversary (2312.16253v2)

Published 25 Dec 2023 in cs.DC

Abstract: We address the problem of Reliable Broadcast in asynchronous message-passing systems with $n$ nodes, of which up to $t$ are malicious (faulty), in addition to a message adversary that can drop some of the messages sent by correct (non-faulty) nodes. We present a Message-Adversary-Tolerant Byzantine Reliable Broadcast (MBRB) algorithm that communicates ${\cal O}(|m|+n\kappa)$ bits per node, where $|m|$ represents the length of the application message and $\kappa=\Omega(\log n)$ is a security parameter. This communication complexity is optimal up to the parameter $\kappa$. This significantly improves upon the state-of-the-art MBRB solution (Albouy, Frey, Raynal, and Ta\"iani, TCS 2023), which incurs communication of ${\cal O}(n|m|+n2\kappa)$ bits per node. Our solution sends at most $4n2$ messages overall, which is asymptotically optimal. Reduced communication is achieved by employing coding techniques that replace the need for all nodes to (re-)broadcast the entire application message $m$. Instead, nodes forward authenticated fragments of the encoding of $m$ using an erasure-correcting code. Under the cryptographic assumptions of threshold signatures and vector commitments, and assuming $n > 3t+2d$, where the adversary drops at most $d$ messages per broadcast, our algorithm allows at least $\ell = n - t - (1 + \epsilon)d$ (for any arbitrarily low $\epsilon> 0$) correct nodes to reconstruct $m$, despite missing fragments caused by the malicious nodes and the message adversary.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (41)
  1. A Modular Approach to Construct Signature-Free BRB Algorithms Under a Message Adversary. In 26th International Conference on Principles of Distributed Systems (OPODIS 2022), volume 253 of LIPIcs, pages 26:1–26:23, 2023.
  2. Asynchronous Byzantine reliable broadcast with a message adversary. CoRR, abs/2205.09992, 2022. Also in SSS 2021: 21-33.
  3. Balanced Byzantine reliable broadcast with near-optimal communication and improved computation. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, PODC’22, page 399–417, 2022.
  4. Reliable broadcasting in logarithmic time with Byzantine link failures. Journal of Algorithms, 22(2):199–211, 1997.
  5. Martin Biely. An optimal Byzantine agreement algorithm with arbitrary node and link failures. In IASTED Parallel and Distributed Computing and Systems, volume 1, pages 146–151, 2003.
  6. Synchronous consensus under hybrid process and link failures. Theoretical Computer Science, 412(40):5602–5630, 2011.
  7. Short signatures from the weil pairing. Journal of Cryptolgy, 17(4):297–319, sep 2004.
  8. Practical Byzantine reliable broadcast on partially connected networks. In ICDCS, pages 506–516. IEEE, 2021.
  9. Resilient consensus protocols. In Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing, pages 12–26. ACM, August 1983.
  10. Asynchronous consensus and broadcast protocols. J. ACM, 32(4):824–840, 1985.
  11. C. Cachin and J.A. Poritz. Secure INtrusion-tolerant replication on the internet. In Proceedings International Conference on Dependable Systems and Networks (DSN), pages 167–176, 2002.
  12. C. Cachin and S. Tessaro. Asynchronous verifiable information dispersal. In 24th IEEE Symposium on Reliable Distributed Systems (SRDS’05), pages 191–201, 2005.
  13. Distributed computations in fully-defective networks. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, PODC’22, pages 141–150, 2022.
  14. Making asynchronous distributed computations robust to noise. Distributed Computing, 32(5):405–421, 2019.
  15. Pallab Dasgupta. Agreement under faulty interfaces. Information Processing Letters, 65(3):125–129, 1998.
  16. Danny Dolev. The Byzantine generals strike again. Journal of Algorithms, 3(1):14–30, 1982.
  17. Bounds on information exchange for Byzantine agreement. J. ACM, 32(1):191–204, jan 1985.
  18. BEAT: asynchronous BFT made practical. In CCS, pages 2028–2041. ACM, 2018.
  19. Self-stabilizing Byzantine fault-tolerant repeated reliable broadcast. In Stabilization, Safety, and Security of Distributed Systems, pages 206–221. Springer International Publishing, 2022.
  20. Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. In Dependable Computing and Fault Tolerant Systems, volume 10, pages 139–158. IEEE, 1995.
  21. Dynamic Byzantine reliable broadcast. In 24th International Conference on Principles of Distributed Systems (OPODIS 2020), volume 184, pages 23:1–23:18, Dagstuhl, Germany, 2021.
  22. The adversarial noise threshold for distributed protocols. In ACM-SIAM Symposium on Discrete Algorithms, pages 240–258, 2016.
  23. The elliptic curve digital signature algorithm (ECDSA). International journal of information security, 1(1):36–63, 2001.
  24. The Byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382–401, jul 1982.
  25. Self-stabilizing Byzantine broadcast. In 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, pages 152–160, 2014.
  26. Ralph C. Merkle. A certified digital signature. In Gilles Brassard, editor, Advances in Cryptology — CRYPTO’ 89 Proceedings, pages 218–238, New York, NY, 1990. Springer New York.
  27. The honey badger of BFT protocols. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, page 31–42, 2016.
  28. Improved extension protocols for Byzantine broadcast and agreement. In 34th International Symposium on Distributed Computing (DISC 2020), volume 179, pages 28:1–28:17, 2020.
  29. Reaching agreement in the presence of faults. J. ACM, 27(2):228–234, apr 1980.
  30. Andrzej Pelc. Reliable communication in networks with Byzantine link failures. Networks, 22(5):441–459, 1992.
  31. Distributed agreement in the presence of processor and communication faults. IEEE Trans. Softw., SE-12(3):477–482, 1986.
  32. Michel Raynal. Message adversaries. In Encyclopedia of Algorithms, pages 1272–1276. Springer, 2016.
  33. Michel Raynal. Fault-Tolerant Message-Passing Distributed Systems - An Algorithmic Approach. Springer, 2018.
  34. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960.
  35. Ron M. Roth. Introduction to coding theory. Cambridge University Press, 2006.
  36. Time is not a healer. In STACS 89, pages 304–313, Berlin, Heidelberg, 1989. Springer Berlin Heidelberg.
  37. Distributed function evaluation in the presence of transmission faults. In International Symposium on Algorithms, pages 358–367. Springer, 1990.
  38. Agreement in synchronous networks with ubiquitous faults. Theor. Comput. Sci., 384(2-3):232–249, 2007.
  39. Randomized asynchronous consensus with imperfect communications. In SRDS, pages 361–370. IEEE Computer Society, 2003.
  40. Claus-Peter Schnorr. Efficient signature generation by smart cards. Journal of cryptology, 4(3):161–174, 1991.
  41. Byzantine agreement in the presence of mixed faults on processors and links. IEEE Transactions on Parallel and Distributed Systems, 9(4):335–345, Apr 1998.
Citations (1)

Summary

We haven't generated a summary for this paper yet.