Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Sublinear Message Bounds of Authenticated Implicit Byzantine Agreement (2307.05922v1)

Published 12 Jul 2023 in cs.DC and cs.CR

Abstract: This paper studies the message complexity of authenticated Byzantine agreement (BA) in synchronous, fully-connected distributed networks under an honest majority. We focus on the so-called {\em implicit} Byzantine agreement problem where each node starts with an input value and at the end a non-empty subset of the honest nodes should agree on a common input value by satisfying the BA properties (i.e., there can be undecided nodes). We show that a sublinear (in $n$, number of nodes) message complexity BA protocol under honest majority is possible in the standard PKI model when the nodes have access to an unbiased global coin and hash function. In particular, we present a randomized Byzantine agreement algorithm which, with high probability achieves implicit agreement, uses $\tilde{O}(\sqrt{n})$ messages, and runs in $\tilde{O}(1)$ rounds while tolerating $(1/2 - \epsilon)n$ Byzantine nodes for any fixed $\epsilon > 0$, the notation $\Tilde{O}$ hides a $O(\polylog{n})$ factor. The algorithm requires standard cryptographic setup PKI and hash function with a static Byzantine adversary. The algorithm works in the CONGEST model and each node does not need to know the identity of its neighbors, i.e., works in the $KT_0$ model. The message complexity (and also the time complexity) of our algorithm is optimal up to a $\polylog n$ factor, as we show a $\Omega(\sqrt{n})$ lower bound on the message complexity.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (50)
  1. Communication complexity of byzantine agreement, revisited. In PODC, 2019.
  2. Synchronous byzantine agreement with expected O(1) rounds, expected o(n22{}^{\mbox{2}}start_FLOATSUPERSCRIPT 2 end_FLOATSUPERSCRIPT) communication, and optimal resilience. In FC 2019.
  3. Solida: A blockchain protocol based on reconfigurable byzantine consensus. In OPODIS 2017.
  4. A. Agbaria and R. Friedman. Overcoming byzantine failures using checkpointing. UILU-ENG- 03-2228 (CRHC-03-14), 2003.
  5. Scaling byzantine fault-tolerant replication towide area networks. In DSN, 2006.
  6. D. P. Anderson and J. Kubiatowicz. The worldwide computer. Scientific American, 286(3):28–35, 2002.
  7. Distributed Computing: Fundamentals, Simulations and Advanced Topics (2nd edition). John Wiley Interscience, 2004.
  8. Sublinear message bounds for randomized agreement. In PODC, pages 315–324, 2018.
  9. Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In STOC, 1988.
  10. Byzantine agreement in the full-information model in o(log n) rounds. In STOC, pages 179–186. ACM, 2006.
  11. Bitcoin. Bitcoin website https://bitcoin.org/.
  12. Fast byzantine agreement. In PODC,2013.
  13. Practical Byzantine Fault Tolerance and Proactive Recovery. TOCS, 20(4):398–461, 2002.
  14. Authenticated algorithms for byzantine agreement. SIAM J. Comput., 12(4):656–666, 1983.
  15. Ethereum. Ethereum website https://ethereum.org/.
  16. Byzantine agreement in constant expected time (and trusting no one). In FOCS, pages 267–276, 1985.
  17. An optimal probabilistic protocol for synchronous byzantine agreement. SIAM J. Comput., 26(4):873–933, 1997.
  18. A lower bound for the time to assure interactive consistency. Inf. Process. Lett., 14(4):183–186, 1982.
  19. Matthias Fitzi. Generalized communication and security models in byzantine agreement. PhD Dissertation, 2002.
  20. Fully polynomial byzantine agreement for n > 3t processors in t + 1 rounds. SIAM J. Comput., 27(1):247–290, 1998.
  21. Algorand: Scaling byzantine agreements for cryptocurrencies. In SOSP,, pages 51–68, 2017.
  22. Distributed agreement with optimal communication complexity. In SODA, pages 965–977, 2010.
  23. Fault-tolerant distributed computing in full-information networks. In FOCS, pages 15–26, 2006.
  24. Jim Gray. The cost of messages. In PODC, pages 1–7. ACM, 1988.
  25. Message-optimal protocols for byzantine agreement. Mathematical Systems Theory, 26(1):41–102, 1993.
  26. On expected constant-round protocols for byzantine agreement. J. Comput. Syst. Sci., 75(2):91–112, 2009.
  27. Breaking the O(n22{}^{\mbox{2}}start_FLOATSUPERSCRIPT 2 end_FLOATSUPERSCRIPT) bit barrier: Scalable byzantine agreement with an adaptive adversary. J. ACM, 58(4):18:1–18:24, 2011.
  28. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium, USENIX Security 16, 2016.
  29. Jiejun Kong. Anonymous and untraceable communications in mobile wireless networks. Citeseer, 2004.
  30. Synchronous byzantine agreement with nearly a cubic number of communication bits: synchronous byzantine agreement with nearly a cubic number of communication bits. In PODC, pages 84–91. ACM, 2013.
  31. Brief announcement: On the message complexity of fault-tolerant computation: Leader election and agreement. In PODC ’21.
  32. Sublinear bounds for randomized leader election. Theor. Comput. Sci., 561:134–143, 2015.
  33. The byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382–401, 1982.
  34. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, 2009.
  35. Nancy Lynch. Distributed Algorithms. Morgan Kaufmann, 1996.
  36. Unreliable intrusion detection in distributed computations. In CSFW, pages 116–125, 1997.
  37. Silvio Micali. ALGORAND: the efficient and democratic ledger. CoRR, abs/1607.01341, 2016. URL: http://arxiv.org/abs/1607.01341.
  38. Verifiable random functions. In FOCS, pages 120–130. IEEE Computer Society, 1999.
  39. Optimal and player-replaceable consensus with an honest majority. 2017.
  40. Probability and computing: Randomized algorithms and probabilistic analysis. 2004.
  41. Optimal communication complexity of byzantine consensus under honest majority. Journal of Environmental Sciences (China) English Ed, 2020.
  42. Reaching agreement in the presence of faults. J. ACM, 27(2):228–234, 1980.
  43. David Peleg. Distributed computing: A locality-sensitive approach. 2000.
  44. Michael O. Rabin. Randomized byzantine generals. In FOCS, pages 403–409, 1983.
  45. Pond: The oceanstore prototype. In FAST, pages 1–14, 2003.
  46. Designing secure sensor networks. IEEE Wireless Commun., 11(6):38–43, 2004.
  47. Security, privacy and trust in internet of things: The road ahead. Computer networks, 76:146–164, 2015.
  48. Rolf H Weber. Internet of things–new security and privacy challenges. Computer law & security review, 26(1):23–30, 2010.
  49. Alex Wright. Contemporary approaches to fault tolerance. Commun. ACM, 52(7):13–15, 2009.
  50. Byzantine agreement protocol using hierarchical groups. In ICPADS, 2005.
Citations (1)

Summary

We haven't generated a summary for this paper yet.