Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3519270.3538475acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
research-article
Public Access

Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation

Published: 21 July 2022 Publication History
  • Get Citation Alerts
  • Abstract

    This paper studies Byzantine reliable broadcast (BRB) under asynchronous networks, and improves the state-of-the-art protocols from the following aspects. Near-optimal communication cost: We propose two new BRB protocols for n nodes and input message M that has communication cost O(n|M|+n2 logn), which is nearoptimal due to the lower bound of Ω(n|M|+n2). The first RBC protocol assumes threshold signature but is easy to understand, while the second RBC protocol is error-free but less intuitive. Improved computation:We propose a newconstruction that improves the computation cost of the state-of-the-art BRB by avoiding the expensive online error correction on the input message, while achieving the same communication cost. Balanced communication: We propose a technique named balanced multicast that can balance the communication cost for BRB protocols where the broadcaster needs to multicast the message M while other nodes only needs to multicast coded fragments of size O(|M|/n + logn). The balanced multicast technique can be applied to many existing BRB protocols as well as all our new constructions in this paper, and can make every node incur about the same communication cost. Finally, we present a lower bound to show the near optimality of our protocol in terms of communication cost at each node.

    Supplementary Material

    MP4 File (S8-T3.mp4)
    Presentation video

    References

    [1]
    Ittai Abraham and Gilad Asharov. Gradecast in synchrony and reliable broadcast in asynchrony with optimal resilience, efficiency, and unconditional security. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, 2022.
    [2]
    Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, and Alin Tomescu. Reaching consensus for asynchronous distributed key generation. In Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, page 363--373, 2021.
    [3]
    Ittai Abraham, Kartik Nayak, Ling Ren, and Zhuolun Xiang. Good-case latency of byzantine broadcast: A complete categorization. In Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing (PODC), page 331--341, 2021.
    [4]
    Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, and Haibin Zhang. Brief announcement: Asynchronous verifiable information dispersal with near-optimal communication. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, 2022.
    [5]
    Nicolas Alhaddad, Sisi Duan, Mayank Varia, and Haibin Zhang. Succinct erasure coding proof systems. Cryptology ePrint Archive, 2021.
    [6]
    Michael Ben-Or, Ran Canetti, and Oded Goldreich. Asynchronous secure computation. In Proceedings of the twenty-fifth annual ACM symposium on Theory of computing, pages 52--61, 1993.
    [7]
    Alexandra Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In Public Key Cryptography -- PKC 2003, 2002.
    [8]
    Dan Boneh and Xavier Boyen. Short signatures without random oracles. In International conference on the theory and applications of cryptographic techniques, pages 56--73. Springer, 2004.
    [9]
    Dan Boneh and Xavier Boyen. Short signatures without random oracles and the sdh assumption in bilinear groups. Journal of cryptology, 21(2):149--177, 2008.
    [10]
    Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In International conference on the theory and applications of cryptographic techniques, pages 416--432. Springer, 2003.
    [11]
    Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the weil pairing. In International conference on the theory and application of cryptology and information security, pages 514--532. Springer, 2001.
    [12]
    Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the weil pairing. Journal of cryptology, 17(4):297--319, 2004.
    [13]
    Gabriel Bracha. Asynchronous byzantine agreement protocols. Information and Computation, 75(2):130--143, 1987.
    [14]
    Christian Cachin, Klaus Kursawe, Frank Petzold, and Victor Shoup. Secure and efficient asynchronous broadcast protocols. In Annual International Cryptology Conference, pages 524--541. Springer, 2001.
    [15]
    Christian Cachin and Stefano Tessaro. Asynchronous verifiable information dispersal. In 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05), pages 191--201. IEEE, 2005.
    [16]
    Ran Canetti and Tal Rabin. Fast asynchronous byzantine agreement with optimal resilience. In Proceedings of the twenty-fifth annual ACM symposium on Theory of computing, pages 42--51, 1993.
    [17]
    Jinyuan Chen. Fundamental limits of byzantine agreement. arXiv preprint arXiv:2009.10965, 2020.
    [18]
    Jinyuan Chen. Optimal error-free multi-valued byzantine agreement. In 35th International Symposium on Distributed Computing (DISC 2021). Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2021.
    [19]
    Sourav Das, Zhuolun Xiang, and Ling Ren. Asynchronous data dissemination and its applications. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pages 2705--2721, 2021.
    [20]
    Sourav Das, Tom Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, and Ling Ren. Practical asynchronous distributed key generation. In 2022 IEEE Symposium on Security and Privacy (SP), pages 1549--1549, 2022.
    [21]
    Danny Dolev and Rüdiger Reischuk. Bounds on information exchange for byzantine agreement. Journal of the ACM (JACM), 32(1):191--204, 1985.
    [22]
    Sisi Duan, Michael K Reiter, and Haibin Zhang. Beat: Asynchronous bft made practical. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 2028--2041, 2018.
    [23]
    Sisi Duan and Haibin Zhang. Pace: Fully parallelizable bft from reproposable byzantine agreement. ACM CCS, 2022.
    [24]
    Sisi Duan, Haibin Zhang, and Boxin Zhao. Waterbear: Information-theoretic asynchronous bft made practical. Cryptology ePrint Archive, 2022.
    [25]
    Michael J Fischer, Nancy A Lynch, and Michael S Paterson. Impossibility of distributed consensus with one faulty process. Journal of the ACM (JACM), 32(2):374--382, 1985.
    [26]
    Shuhong Gao. A new algorithm for decoding reed-solomon codes. In Communications, information and network security, pages 55--68. Springer, 2003.
    [27]
    Xueqing Gong and Chi Wan Sung. Zigzag decodable codes: Linear-time erasure codes with applications to data storage. Journal of Computer and System Sciences, 89:190--208, 2017.
    [28]
    Rachid Guerraoui, Jovan Komatovic, Petr Kuznetsov, Yvonne-Anne Pignolet, Dragos-Adrian Seredinschi, and Andrei Tonkikh. Dynamic byzantine reliable broadcast. In OPODIS 2020, 2021.
    [29]
    Rachid Guerraoui, Petr Kuznetsov, Matteo Monti, Matej Pavlovic, and Dragos-Adrian Seredinschi. Scalable byzantine reliable broadcast. In DISC 2019, 2019.
    [30]
    Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. Dumbo: Faster asynchronous bft protocols. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pages 803--818, 2020.
    [31]
    James Hendricks, Gregory R Ganger, and Michael K Reiter. Verifying distributed erasure-coded data. In Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, pages 139--146, 2007.
    [32]
    Idit Keidar, Eleftherios Kokoris-Kogias, Oded Naor, and Alexander Spiegelman. All you need is DAG. In PODC, pages 165--175. ACM, 2021.
    [33]
    Eleftherios Kokoris-Kogias, Dahlia Malkhi, and Alexander Spiegelman. Asynchronous distributed key generation for computationally-secure randomness, consensus, and threshold signatures. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pages 1751--1767, 2020.
    [34]
    Chao Liu, Sisi Duan, and Haibin Zhang. Mib: Asynchronous bft with more replicas. arXiv preprint arXiv:2108.04488, 2021.
    [35]
    Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Aniket Kate, and Andrew Miller. Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pages 887--903, 2019.
    [36]
    Florence Jessie MacWilliams and Neil James Alexander Sloane. The theory of error correcting codes, volume 16. Elsevier, 1977.
    [37]
    Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. The honey badger of bft protocols. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 31--42, 2016.
    [38]
    Kartik Nayak, Ling Ren, Elaine Shi, Nitin H Vaidya, and Zhuolun Xiang. Improved extension protocols for byzantine broadcast and agreement. In 34th International Symposium on Distributed Computing (DISC 2020). Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2020.
    [39]
    Arpita Patra. Error-free multi-valued broadcast and byzantine agreement with optimal communication complexity. In International Conference On Principles Of Distributed Systems, pages 34--49. Springer, 2011.
    [40]
    James S. Plank, Jianqiang Luo, Catherine D. Schuman, Lihao Xu, and Zooko Wilcox-O'Hearn. A performance evaluation and examination of open-source erasure coding libraries for storage. In FAST, pages 253--265. USENIX, 2009.
    [41]
    James S Plank and Lihao Xu. Optimizing cauchy reed-solomon codes for fault-tolerant network storage applications. In NCA, pages 173--180. IEEE, 2006.
    [42]
    Irving S Reed and Gustave Solomon. Polynomial codes over certain finite fields. Journal of the society for industrial and applied mathematics, 8(2):300--304, 1960.
    [43]
    Michael K Reiter. Secure agreement protocols: Reliable and atomic group multicast in rampart. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 68--80, 1994.
    [44]
    Victor Shoup. Practical threshold signatures. In Advances in Cryptology -- EUROCRYPT 2000, 2000.
    [45]
    Sam Toueg. Randomized byzantine agreements. In Proceedings of the third annual ACM symposium on Principles of distributed computing, pages 163--178, 1984.
    [46]
    Lloyd R Welch and Elwyn R Berlekamp. Error correction for algebraic block codes, December 30 1986. US Patent 4,633,470.
    [47]
    Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, and Andrew Miller. hbacss: How to robustly share many secrets. In (To appear) Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022.

    Cited By

    View all
    • (2024)Distributed Transaction Processing in Untrusted EnvironmentsCompanion of the 2024 International Conference on Management of Data10.1145/3626246.3654684(570-579)Online publication date: 9-Jun-2024
    • (2022)Recent progress on BFT in the era of blockchainsNational Science Review10.1093/nsr/nwac1329:10Online publication date: 7-Jul-2022

    Index Terms

    1. Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          PODC'22: Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing
          July 2022
          509 pages
          ISBN:9781450392624
          DOI:10.1145/3519270
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 21 July 2022

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. asynchronous networks
          2. communication complexity
          3. computation complexity
          4. lower bounds
          5. reliable broadcast

          Qualifiers

          • Research-article

          Funding Sources

          Conference

          PODC '22
          Sponsor:

          Acceptance Rates

          Overall Acceptance Rate 740 of 2,477 submissions, 30%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)295
          • Downloads (Last 6 weeks)34
          Reflects downloads up to 12 Aug 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Distributed Transaction Processing in Untrusted EnvironmentsCompanion of the 2024 International Conference on Management of Data10.1145/3626246.3654684(570-579)Online publication date: 9-Jun-2024
          • (2022)Recent progress on BFT in the era of blockchainsNational Science Review10.1093/nsr/nwac1329:10Online publication date: 7-Jul-2022

          View Options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media