Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Reaching Agreement in the Presence of Faults

Published: 01 April 1980 Publication History
  • Get Citation Alerts
  • Abstract

    The problem addressed here concerns a set of isolated processors, some unknown subset of which may be faulty, that communicate only by means of two-party messages. Each nonfaulty processor has a private value of information that must be communicated to each other nonfaulty processor. Nonfaulty processors always communicate honestly, whereas faulty processors may lie. The problem is to devise an algorithm in which processors communicate their own values and relay values received from others that allows each nonfaulty processor to infer a value for each other processor. The value inferred for a nonfaulty processor must be that processor's private value, and the value inferred for a faulty one must be consistent with the corresponding value inferred by each other nonfaulty processor.
    It is shown that the problem is solvable for, and only for, n ≥ 3m + 1, where m is the number of faulty processors and n is the total number. It is also shown that if faulty processors can refuse to pass on information but cannot falsely relay information, the problem is solvable for arbitrary nm ≥ 0. This weaker assumption can be approximated in practice using cryptographic methods.

    References

    [1]
    DAvIEs, D, AND WAKEH~Y, J. Synchronization and matching m redundant systems IEEE Trans on Comptrs. C-27, 6 (June 1978), 531-539.
    [2]
    DIFFIE, W, AND BELLMAN, M. New dtrections in cryptography. IEEE Trans Inform. Theory IT-22, 6 (Nov 1976), 644-654
    [3]
    RIVEST, R.L., SHArerS, A, Am) ADLEMAN, L A A method for obtaming dtgltal signatures and pubhc-key cryptosystems. Comm. ACM 21, 2 (Feb 1978), 120-126.
    [4]
    WENSLEY, J H., ET ^L. SIFT: destgn and analysis of a fault-tolerant computer for aircraft control Proc. IEEE 66, 10 (Oct. 1978), 1240-1255.

    Cited By

    View all
    • (2024)Asynchronous Consensus Quorum Read: Pioneering Read Optimization for Asynchronous Consensus ProtocolsElectronics10.3390/electronics1303048113:3(481)Online publication date: 23-Jan-2024
    • (2024)Decentralization Is Good or Not? Defending Consensus in Ethereum 2.0Blockchains10.3390/blockchains20100012:1(1-19)Online publication date: 23-Jan-2024
    • (2024)Resource analysis for quantum-aided Byzantine agreement with the four-qubit singlet stateQuantum10.22331/q-2024-04-30-13248(1324)Online publication date: 30-Apr-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Journal of the ACM
    Journal of the ACM  Volume 27, Issue 2
    April 1980
    196 pages
    ISSN:0004-5411
    EISSN:1557-735X
    DOI:10.1145/322186
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 April 1980
    Published in JACM Volume 27, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)879
    • Downloads (Last 6 weeks)95
    Reflects downloads up to

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Asynchronous Consensus Quorum Read: Pioneering Read Optimization for Asynchronous Consensus ProtocolsElectronics10.3390/electronics1303048113:3(481)Online publication date: 23-Jan-2024
    • (2024)Decentralization Is Good or Not? Defending Consensus in Ethereum 2.0Blockchains10.3390/blockchains20100012:1(1-19)Online publication date: 23-Jan-2024
    • (2024)Resource analysis for quantum-aided Byzantine agreement with the four-qubit singlet stateQuantum10.22331/q-2024-04-30-13248(1324)Online publication date: 30-Apr-2024
    • (2024)Invited Paper: Causal Mutual Byzantine BroadcastProceedings of the 2024 Workshop on Advanced Tools, Programming Languages, and PLatforms for Implementing and Evaluating algorithms for Distributed systems10.1145/3663338.3663679(1-8)Online publication date: 17-Jun-2024
    • (2024)Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why a Lot of Randomness is Needed?Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662826(321-331)Online publication date: 17-Jun-2024
    • (2024)DARE to Agree: Byzantine Agreement With Optimal Resilience and Adaptive CommunicationProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662792(145-156)Online publication date: 17-Jun-2024
    • (2024)TetraBFT: Reducing Latency of Unauthenticated, Responsive BFT ConsensusProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662783(257-267)Online publication date: 17-Jun-2024
    • (2024)Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive ConsistencyProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662771(469-479)Online publication date: 17-Jun-2024
    • (2024)Byzantine Agreement with Optimal Resilience via Statistical Fraud DetectionJournal of the ACM10.1145/363945471:2(1-37)Online publication date: 12-Apr-2024
    • (2024)Sublinear Message Bounds of Authenticated Implicit Byzantine AgreementProceedings of the 25th International Conference on Distributed Computing and Networking10.1145/3631461.3631548(124-133)Online publication date: 4-Jan-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media