Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Bounds on information exchange for Byzantine agreement

Published: 01 January 1985 Publication History

Abstract

Byzantine Agreement has become increasingly important in establishing distributed properties when errors may exist in the systems. Recent polynomial algorithms for reaching Byzantine Agreement provide us with feasible solutions for obtaining coordination and synchronization in distributed systems. In this paper the amount of information exchange necessary to ensure Byzantine Agreement is studied. This is measured by the total number of messages the participating processors have to send in the worst case. In algorithms that use a signature scheme, the number of signatures appended to messages are also counted.
First it is shown that Ω(nt) is a lower bound for the number of signatures for any algorithm using authentication, where n denotes the number of processors and t the upper bound on the number of faults the algorithm is supposed to handle. For algorithms that reach Byzantine Agreement without using authentication this is even a lower bound for the total number of messages. If n is large compared to t, these bounds match the upper bounds from previously known algorithms. For the number of messages in the authenticated case we prove the lower bound Ω(n + t2). Finally algorithms that achieve this bound are presented.

References

[1]
DEMILLO, R. A., LYNCH, N. A., AND MERRITT, M. J.Cryptographic protocols. In Proceedings of the 14th Annual ACM Symposium on the Theory of Computing (San Francisco, Calif., May 5-7). ACM, New York, 1982, pp. 383-400.
[2]
DIFFIE W., AND HELLMAN, M. New direction in cryptography. IEEE Trans. Inform. IT-22, 6 (1976), 644-654.
[3]
DOLEV, D.Unanimity in an unknown and unreliable environment. In Proceedings of the 22nd Annual Symposium on Foundations of Computer Science. IEEE, New York, 1981, pp. 159-168.
[4]
DOLEV, D.The Byzantine generals strike again. J. Algorithms 3, 1 (1982), 14-30.
[5]
DOLEV, D., AND REISCHUK, R.Bounds on information exchange for Byzantine Agreement. In Proceedings of the ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (Ottawa, Ontario, Canada, Aug. 18-20). ACM, New York, 1982, pp. 132-140.
[6]
DOLEV, D., AND STRONG, H.R.Polynomial algorithms for multiple processor agreement. In Proceedings of the 14th ACM SIGACT Symposium on Theory of Computing (San Francisco, Calif., May 5-7). ACM, New York, 1982, pp. 401-407.
[7]
DOLEV, D., AND STRONG, H. R.Distributed commit with bounded waiting. In Proceedings of the 2nd Symposium on Reliability in Distributed Software and Database Systems (Pittsburgh, Pa., July). IEEE Computer Society, 1982, pp. 53-60.
[8]
DOLEV, D., AND STRONG, H. R.Requirements for agreement in a distributed system. In Proceedings of the Second International Symposium on Distributed Data Bases (Berlin). 1982, pp. 115- 129. Also in Distributed Data Bases, H. J. Schneider, Ed. North Holland, Amsterdam, 1982.
[9]
DOLEV, D., AND STRONG, H.R. Authenticated algorithms for Byzantine Agreement. SIAM J. Comput. 12 (1983), 656-666.
[10]
DOLEV, D., FISCHER, M., FOWLER, R., LYNCH, N., AND STRONG, R. Efficient Byzantine Agreement without authentication. Inf. Cont. 3 (1983), 257-274.
[11]
FISCHER, M., AND }LYNCH, N.A lower bound for the time to assure interactive consistency. Inf. Process. Lett. 14, 4 (1982), 183-186.
[12]
FISCHER, M., FOWLER, R., AND LYNCH, N.A simple and efficient Byzantine generals algorithm. In Proceedings of the Second Symposium on Reliability in Distributed Software and Database Systems (Pittsburgh, Pa., July). IEEE Computer Society, 1982.
[13]
LAMPORT, L.The weak Byzantine generals problem. J. ACM 30, 3 (July 1983), 668-676.
[14]
LAMPORT, L., SHOSTAK, R., AND PEASE, M. The Byzantine generals problem. A CM Trans. Program. Lang. Syst. 4, 2 (July 1982), 382-401.
[15]
PEASE, M., SHOSTAK, R., AND LAMPORT. L.Reaching agreement in the presence of faults. J. ACM 27, 2 (Apr. 1980) 228-234.
[16]
R~VEST, R. L., SHAMIR, A., AND ADLEMAN, L.A method for obtaining digital signatures and public-key cryptosy:stems. Commun. ACM, 21, 2 (Feb. 1978) 120-126.

Cited By

View all
  • (2024)Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why a Lot of Randomness is Needed?Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662826(321-331)Online publication date: 17-Jun-2024
  • (2024)On the Communication Complexity of Secure Multi-Party Computation With AbortsProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662815(480-491)Online publication date: 17-Jun-2024
  • (2024)DARE to Agree: Byzantine Agreement With Optimal Resilience and Adaptive CommunicationProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662792(145-156)Online publication date: 17-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1985
Published in JACM Volume 32, Issue 1

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)205
  • Downloads (Last 6 weeks)20
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Nearly-Optimal Consensus Tolerating Adaptive Omissions: Why a Lot of Randomness is Needed?Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662826(321-331)Online publication date: 17-Jun-2024
  • (2024)On the Communication Complexity of Secure Multi-Party Computation With AbortsProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662815(480-491)Online publication date: 17-Jun-2024
  • (2024)DARE to Agree: Byzantine Agreement With Optimal Resilience and Adaptive CommunicationProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662792(145-156)Online publication date: 17-Jun-2024
  • (2024)Lumiere: Making Optimal BFT for Partial Synchrony PracticalProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662787(135-144)Online publication date: 17-Jun-2024
  • (2024)TetraBFT: Reducing Latency of Unauthenticated, Responsive BFT ConsensusProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662783(257-267)Online publication date: 17-Jun-2024
  • (2024)All Byzantine Agreement Problems Are ExpensiveProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662780(157-169)Online publication date: 17-Jun-2024
  • (2024)SoK: Public Randomness2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP60621.2024.00020(216-234)Online publication date: 8-Jul-2024
  • (2024)Modeling Mobile Crash in Byzantine Consensus2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00043(159-171)Online publication date: 8-Jul-2024
  • (2024)Byzantine consensus is : the Dolev-Reischuk bound is tight even in partial synchrony!Distributed Computing10.1007/s00446-023-00458-w37:2(89-119)Online publication date: 1-Jun-2024
  • (2024)Byzantine Protocols with Asymptotically Optimal Communication ComplexitySecurity and Privacy in Communication Networks10.1007/978-3-031-64948-6_13(247-264)Online publication date: 13-Oct-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media