Byzantine Agreement. Gábor Mészáros. CEU Budapest, Hungary

Size: px
Start display at page:

Download "Byzantine Agreement. Gábor Mészáros. CEU Budapest, Hungary"

Transcription

1 CEU Budapest, Hungary

2 1453 AD, Byzantium

3 Distibuted Systems Communication System Model

4 Distibuted Systems Communication System Model G = (V, E) simple graph

5 Distibuted Systems Communication System Model G = (V, E) simple graph V : nodes - participants (finite state machines)

6 Distibuted Systems Communication System Model G = (V, E) simple graph V : nodes - participants (finite state machines) E: edges - communication channels

7 Distibuted Systems Communication System Model G = (V, E) simple graph V : nodes - participants (finite state machines) E: edges - communication channels Description of the communication mechanism

8 Distibuted Systems Communication System Model G = (V, E) simple graph V : nodes - participants (finite state machines) E: edges - communication channels Description of the communication mechanism Different Attributes - Different Fields of Interest

9 Distibuted Systems Communication System Model G = (V, E) simple graph V : nodes - participants (finite state machines) E: edges - communication channels Description of the communication mechanism Different Attributes - Different Fields of Interest Cryptography

10 Distibuted Systems Communication System Model G = (V, E) simple graph V : nodes - participants (finite state machines) E: edges - communication channels Description of the communication mechanism Different Attributes - Different Fields of Interest Cryptography Data Compression

11 Distibuted Systems Communication System Model G = (V, E) simple graph V : nodes - participants (finite state machines) E: edges - communication channels Description of the communication mechanism Different Attributes - Different Fields of Interest Cryptography Data Compression Distributed Computing

12 Distibuted Systems Communication System Model G = (V, E) simple graph V : nodes - participants (finite state machines) E: edges - communication channels Description of the communication mechanism Different Attributes - Different Fields of Interest Cryptography Data Compression Distributed Computing...

13 Byzantine Generals Problem Attributes

14 Byzantine Generals Problem Attributes Synchronous

15 Byzantine Generals Problem Attributes Synchronous Reliable

16 Byzantine Generals Problem Attributes Synchronous Reliable Authenticated

17 Byzantine Generals Problem Attributes Synchronous Reliable Authenticated Point-to-Point

18 Byzantine Generals Problem Attributes Synchronous Reliable Authenticated Point-to-Point Presence of faulty participants ("traitors") which can behave arbitrarily ("Byzantine failures").

19 Byzantine Generals Problem Attributes Synchronous Goals Reliable Authenticated Point-to-Point Presence of faulty participants ("traitors") which can behave arbitrarily ("Byzantine failures"). Given the set of initial assessments x i {0, 1} of each G i L V (G) ("loyal generals") calculate decisions d i {0, 1} satisfying:

20 Byzantine Generals Problem Attributes Synchronous Goals Reliable Authenticated Point-to-Point Presence of faulty participants ("traitors") which can behave arbitrarily ("Byzantine failures"). Given the set of initial assessments x i {0, 1} of each G i L V (G) ("loyal generals") calculate decisions d i {0, 1} satisfying: Termination: each process terminates in finitely many steps

21 Byzantine Generals Problem Attributes Synchronous Goals Reliable Authenticated Point-to-Point Presence of faulty participants ("traitors") which can behave arbitrarily ("Byzantine failures"). Given the set of initial assessments x i {0, 1} of each G i L V (G) ("loyal generals") calculate decisions d i {0, 1} satisfying: Termination: each process terminates in finitely many steps Agreement: d i = d j G i, G j L (the set of "loyal generals")

22 Byzantine Generals Problem Attributes Synchronous Goals Reliable Authenticated Point-to-Point Presence of faulty participants ("traitors") which can behave arbitrarily ("Byzantine failures"). Given the set of initial assessments x i {0, 1} of each G i L V (G) ("loyal generals") calculate decisions d i {0, 1} satisfying: Termination: each process terminates in finitely many steps Agreement: d i = d j G i, G j L (the set of "loyal generals") Nontriviality: x i = c {0, 1} G i L d i = c

23 Byzantine Generals Problem Definition A protocol P is t-resilient if it tolerates byzantine failure of at most t faulty participants.

24 Byzantine Generals Problem Definition A protocol P is t-resilient if it tolerates byzantine failure of at most t faulty participants. Question How many byzantine failures can a network tolerate?

25 Byzantine Generals Problem Example The "Simple Majority" strategy is not 1-resilient.

26 Byzantine Generals Problem Theorem (Lamport, Pease, Shostak, 1980) There exists t-resilient protocol t < n 3.

27 Byzantine Generals Problem Theorem (Lamport, Pease, Shostak, 1980) There exists t-resilient protocol t < n 3. Lemma No 1-resilient protocol P exists on K 3.

28 No 1-resilient P in K 3 Proof

29 No 1-resilient P in K 3 Proof

30 No 1-resilient P in K 3 Proof

31 t-resilient t < n 3 Corollary of the Lemma - Reduction A t n 3 -resilient protocol is 1-resilient in K 3.

32 t-resilient t < n 3 Corollary of the Lemma - Reduction A t n 3 -resilient protocol is 1-resilient in K 3. Constructions for t < n 3 (sketch)

33 t-resilient t < n 3 Corollary of the Lemma - Reduction A t n 3 -resilient protocol is 1-resilient in K 3. Constructions for t < n 3 (sketch) 1 Exponential data trees - "x told me, that y told him, that..." - fill() and resolve() -not efficient

34 t-resilient t < n 3 Corollary of the Lemma - Reduction A t n 3 -resilient protocol is 1-resilient in K 3. Constructions for t < n 3 (sketch) 1 Exponential data trees - "x told me, that y told him, that..." - fill() and resolve() -not efficient 2 Efficient (polinomial) Broadcast- firefly effect, echoes...

35 Generalized Byzatine Generals Problem I. - Graphs Communication Model G = (V, E) simple (not necessarily complete) graph with connectivity number k(g) := k

36 Generalized Byzatine Generals Problem I. - Graphs Communication Model G = (V, E) simple (not necessarily complete) graph with connectivity number k(g) := k Attributes

37 Generalized Byzatine Generals Problem I. - Graphs Communication Model G = (V, E) simple (not necessarily complete) graph with connectivity number k(g) := k Attributes Synchronous

38 Generalized Byzatine Generals Problem I. - Graphs Communication Model G = (V, E) simple (not necessarily complete) graph with connectivity number k(g) := k Attributes Synchronous Reliable

39 Generalized Byzatine Generals Problem I. - Graphs Communication Model G = (V, E) simple (not necessarily complete) graph with connectivity number k(g) := k Attributes Synchronous Reliable Authenticated

40 Generalized Byzatine Generals Problem I. - Graphs Communication Model G = (V, E) simple (not necessarily complete) graph with connectivity number k(g) := k Attributes Synchronous Reliable Authenticated Not necessarily Point-to-Point (communication on edges only)

41 Generalized Byzatine Generals Problem I. - Graphs Communication Model G = (V, E) simple (not necessarily complete) graph with connectivity number k(g) := k Attributes Synchronous Reliable Authenticated Not necessarily Point-to-Point (communication on edges only) Presence of faulty participants

42 Generalized Byzatine Generals Problem I. - Graphs Communication Model G = (V, E) simple (not necessarily complete) graph with connectivity number k(g) := k Attributes Synchronous Reliable Authenticated Not necessarily Point-to-Point (communication on edges only) Presence of faulty participants Goal Unanimity between the non-faulty processors

43 Generalized Byzantine Generals Problem I. - Graphs Theorem (Dolev, 1982) G = (V, E) is t-resilient t < n 3 and t < k 2.

44 Generalized Byzantine Generals Problem I. - Graphs Theorem (Dolev, 1982) G = (V, E) is t-resilient t < n 3 and t < k 2. Theorem (Kumar,2002) Given S 2 V (G) set of corruptible subsets in G = (V, E) unanimity is attainable

45 Generalized Byzantine Generals Problem I. - Graphs Theorem (Dolev, 1982) G = (V, E) is t-resilient t < n 3 and t < k 2. Theorem (Kumar,2002) Given S 2 V (G) set of corruptible subsets in G = (V, E) unanimity is attainable no union S 1 S 2 of any pair S 1, S 2 S contains a cut of G,

46 Generalized Byzantine Generals Problem I. - Graphs Theorem (Dolev, 1982) G = (V, E) is t-resilient t < n 3 and t < k 2. Theorem (Kumar,2002) Given S 2 V (G) set of corruptible subsets in G = (V, E) unanimity is attainable no union S 1 S 2 of any pair S 1, S 2 S contains a cut of G, no union S 1 S 2 S 3 of any triple S 1, S 2, S 3 S covers V (G).

47 Generalized Byzantine Generals Problem I. - Graphs Theorem (Dolev, 1982) G = (V, E) is t-resilient iff t < n 3 and t < k 2.

48 Generalized Byzantine Generals Problem I. - Graphs Theorem (Dolev, 1982) G = (V, E) is t-resilient iff t < n 3 and t < k 2. Proof (" ")

49 Generalized Byzantine Generals Problem I. - Graphs Theorem (Dolev, 1982) G = (V, E) is t-resilient iff t < n 3 and t < k 2. Proof (" ") 1 For each G i, G j V (G), (G i G j ) E(G) fix disjoint paths P 1, P 2,..., P k between the nodes ("delivery channels").

50 Generalized Byzantine Generals Problem I. - Graphs Theorem (Dolev, 1982) G = (V, E) is t-resilient iff t < n 3 and t < k 2. Proof (" ") 1 For each G i, G j V (G), (G i G j ) E(G) fix disjoint paths P 1, P 2,..., P k between the nodes ("delivery channels"). 2 Send messages from G i to G j via P 1, P 2,..., P k and consider majority of the 0-1 messages. t < k 2 guaranties reliability.

51 Generalized Byzantine Generals Problem I. - Graphs Theorem (Dolev, 1982) G = (V, E) is t-resilient iff t < n 3 and t < k 2. Proof (" ") 1 For each G i, G j V (G), (G i G j ) E(G) fix disjoint paths P 1, P 2,..., P k between the nodes ("delivery channels"). 2 Send messages from G i to G j via P 1, P 2,..., P k and consider majority of the 0-1 messages. t < k 2 guaranties reliability. 3 Emulate the solution of the original BA problem.

52 Generalized Byzantine Generals Problem II. - Hypergraphs Communication Model H = (V, E) hypergraph.

53 Generalized Byzantine Generals Problem II. - Hypergraphs Communication Model H = (V, E) hypergraph. Attributes

54 Generalized Byzantine Generals Problem II. - Hypergraphs Communication Model H = (V, E) hypergraph. Attributes Synchronous

55 Generalized Byzantine Generals Problem II. - Hypergraphs Communication Model H = (V, E) hypergraph. Attributes Synchronous Reliable

56 Generalized Byzantine Generals Problem II. - Hypergraphs Communication Model H = (V, E) hypergraph. Attributes Synchronous Reliable Authenticated

57 Generalized Byzantine Generals Problem II. - Hypergraphs Communication Model H = (V, E) hypergraph. Attributes Synchronous Reliable Authenticated Broadcast on the edges

58 Generalized Byzantine Generals Problem II. - Hypergraphs Communication Model H = (V, E) hypergraph. Attributes Synchronous Reliable Authenticated Broadcast on the edges Presence of faulty participants

59 Generalized Byzantine Generals Problem II. - Hypergraphs Theorem (Fitzi, Maurer, 2000) H = (V, E) 3-uniform complete hypergraph is t-resilible n 2 t + 1.

60 Other Possible Generalizations Variants

61 Other Possible Generalizations Variants Asynchronous communication

62 Other Possible Generalizations Variants Asynchronous communication General Hypergraphs

63 Other Possible Generalizations Variants Asynchronous communication General Hypergraphs Corruptible subsets

64 Other Possible Generalizations Variants Asynchronous communication General Hypergraphs Corruptible subsets Random processes

65 Other Possible Generalizations Variants Asynchronous communication General Hypergraphs Corruptible subsets Random processes...

66 THANK YOU!

Byzantine Agreement. Gábor Mészáros. Tatracrypt 2012, July 2 4 Smolenice, Slovakia. CEU Budapest, Hungary

Byzantine Agreement. Gábor Mészáros. Tatracrypt 2012, July 2 4 Smolenice, Slovakia. CEU Budapest, Hungary CEU Budapest, Hungary Tatracrypt 2012, July 2 4 Smolenice, Slovakia Byzantium, 1453 AD. The Final Strike... Communication via Messengers The Byzantine Generals Problem Communication System Model Goal G

More information

Agreement Protocols. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur

Agreement Protocols. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Agreement Protocols CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Classification of Faults Based on components that failed Program

More information

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,

More information

Distributed Systems Byzantine Agreement

Distributed Systems Byzantine Agreement Distributed Systems Byzantine Agreement He Sun School of Informatics University of Edinburgh Outline Finish EIG algorithm for Byzantine agreement. Number-of-processors lower bound for Byzantine agreement.

More information

CS505: Distributed Systems

CS505: Distributed Systems Cristina Nita-Rotaru CS505: Distributed Systems. Required reading for this topic } Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson for "Impossibility of Distributed with One Faulty Process,

More information

The Byzantine Generals Problem Leslie Lamport, Robert Shostak and Marshall Pease. Presenter: Jose Calvo-Villagran

The Byzantine Generals Problem Leslie Lamport, Robert Shostak and Marshall Pease. Presenter: Jose Calvo-Villagran + The Byzantine Generals Problem Leslie Lamport, Robert Shostak and Marshall Pease Presenter: Jose Calvo-Villagran jcalvovi@uwaterloo.ca + Overview n The Byzantine Generals Problem n A solution: Oral Messages

More information

Broadcast and Verifiable Secret Sharing: New Security Models and Round-Optimal Constructions

Broadcast and Verifiable Secret Sharing: New Security Models and Round-Optimal Constructions Broadcast and Verifiable Secret Sharing: New Security Models and Round-Optimal Constructions Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park in

More information

Fault-Tolerant Consensus

Fault-Tolerant Consensus Fault-Tolerant Consensus CS556 - Panagiota Fatourou 1 Assumptions Consensus Denote by f the maximum number of processes that may fail. We call the system f-resilient Description of the Problem Each process

More information

The Weighted Byzantine Agreement Problem

The Weighted Byzantine Agreement Problem The Weighted Byzantine Agreement Problem Vijay K. Garg and John Bridgman Department of Electrical and Computer Engineering The University of Texas at Austin Austin, TX 78712-1084, USA garg@ece.utexas.edu,

More information

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report # Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine

More information

Asynchronous Models For Consensus

Asynchronous Models For Consensus Distributed Systems 600.437 Asynchronous Models for Consensus Department of Computer Science The Johns Hopkins University 1 Asynchronous Models For Consensus Lecture 5 Further reading: Distributed Algorithms

More information

On the Resilience and Uniqueness of CPA for Secure Broadcast

On the Resilience and Uniqueness of CPA for Secure Broadcast On the Resilience and Uniqueness of CPA for Secure Broadcast Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos and Dimitris Sakavalas School of Electrical and Computer Engineering National Technical

More information

Distributed Consensus

Distributed Consensus Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement

More information

Model Checking of Fault-Tolerant Distributed Algorithms

Model Checking of Fault-Tolerant Distributed Algorithms Model Checking of Fault-Tolerant Distributed Algorithms Part I: Fault-Tolerant Distributed Algorithms Annu Gmeiner Igor Konnov Ulrich Schmid Helmut Veith Josef Widder LOVE 2016 @ TU Wien Josef Widder (TU

More information

Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure

Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure S. Dov Gordon Jonathan Katz Ranjit Kumaresan Arkady Yerukhimovich Abstract Given a public-key infrastructure (PKI) and digital

More information

Towards optimal synchronous counting

Towards optimal synchronous counting Towards optimal synchronous counting Christoph Lenzen Joel Rybicki Jukka Suomela MPI for Informatics MPI for Informatics Aalto University Aalto University PODC 5 July 3 Focus on fault-tolerance Fault-tolerant

More information

Byzantine behavior also includes collusion, i.e., all byzantine nodes are being controlled by the same adversary.

Byzantine behavior also includes collusion, i.e., all byzantine nodes are being controlled by the same adversary. Chapter 17 Byzantine Agreement In order to make flying safer, researchers studied possible failures of various sensors and machines used in airplanes. While trying to model the failures, they were confronted

More information

Byzantine Agreement. Chapter Validity 190 CHAPTER 17. BYZANTINE AGREEMENT

Byzantine Agreement. Chapter Validity 190 CHAPTER 17. BYZANTINE AGREEMENT 190 CHAPTER 17. BYZANTINE AGREEMENT 17.1 Validity Definition 17.3 (Any-Input Validity). The decision value must be the input value of any node. Chapter 17 Byzantine Agreement In order to make flying safer,

More information

Self-stabilizing Byzantine Agreement

Self-stabilizing Byzantine Agreement Self-stabilizing Byzantine Agreement Ariel Daliot School of Engineering and Computer Science The Hebrew University, Jerusalem, Israel adaliot@cs.huji.ac.il Danny Dolev School of Engineering and Computer

More information

Round Complexity of Authenticated Broadcast with a Dishonest Majority

Round Complexity of Authenticated Broadcast with a Dishonest Majority Round Complexity of Authenticated Broadcast with a Dishonest Majority Juan A. Garay Jonathan Katz Chiu-Yuen Koo Rafail Ostrovsky Abstract Broadcast among n parties in the presence of t n/3 malicious parties

More information

Early stopping: the idea. TRB for benign failures. Early Stopping: The Protocol. Termination

Early stopping: the idea. TRB for benign failures. Early Stopping: The Protocol. Termination TRB for benign failures Early stopping: the idea Sender in round : :! send m to all Process p in round! k, # k # f+!! :! if delivered m in round k- and p " sender then 2:!! send m to all 3:!! halt 4:!

More information

Faster Agreement via a Spectral Method for Detecting Malicious Behavior

Faster Agreement via a Spectral Method for Detecting Malicious Behavior Faster Agreement via a Spectral Method for Detecting Malicious Behavior Valerie King Jared Saia Abstract We address the problem of Byzantine agreement, to bring processors to agreement on a bit in the

More information

Finally the Weakest Failure Detector for Non-Blocking Atomic Commit

Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Finally the Weakest Failure Detector for Non-Blocking Atomic Commit Rachid Guerraoui Petr Kouznetsov Distributed Programming Laboratory EPFL Abstract Recent papers [7, 9] define the weakest failure detector

More information

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1. Coordination Failures and Consensus If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate the nodes? data consistency update propagation

More information

Tolerating Permanent and Transient Value Faults

Tolerating Permanent and Transient Value Faults Distributed Computing manuscript No. (will be inserted by the editor) Tolerating Permanent and Transient Value Faults Zarko Milosevic Martin Hutle André Schiper Abstract Transmission faults allow us to

More information

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications:

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications: AGREEMENT PROBLEMS (1) AGREEMENT PROBLEMS Agreement problems arise in many practical applications: agreement on whether to commit or abort the results of a distributed atomic action (e.g. database transaction)

More information

Failure detectors Introduction CHAPTER

Failure detectors Introduction CHAPTER CHAPTER 15 Failure detectors 15.1 Introduction This chapter deals with the design of fault-tolerant distributed systems. It is widely known that the design and verification of fault-tolerent distributed

More information

Byzantine Agreement in Polynomial Expected Time

Byzantine Agreement in Polynomial Expected Time Byzantine Agreement in Polynomial Expected Time [Extended Abstract] Valerie King Dept. of Computer Science, University of Victoria P.O. Box 3055 Victoria, BC, Canada V8W 3P6 val@cs.uvic.ca ABSTRACT In

More information

Optimal Resilience Asynchronous Approximate Agreement

Optimal Resilience Asynchronous Approximate Agreement Optimal Resilience Asynchronous Approximate Agreement Ittai Abraham, Yonatan Amit, and Danny Dolev School of Computer Science and Engineering, The Hebrew University of Jerusalem, Israel {ittaia, mitmit,

More information

Reliable Broadcast for Broadcast Busses

Reliable Broadcast for Broadcast Busses Reliable Broadcast for Broadcast Busses Ozalp Babaoglu and Rogerio Drummond. Streets of Byzantium: Network Architectures for Reliable Broadcast. IEEE Transactions on Software Engineering SE- 11(6):546-554,

More information

6.852: Distributed Algorithms Fall, Class 10

6.852: Distributed Algorithms Fall, Class 10 6.852: Distributed Algorithms Fall, 2009 Class 10 Today s plan Simulating synchronous algorithms in asynchronous networks Synchronizers Lower bound for global synchronization Reading: Chapter 16 Next:

More information

Do we have a quorum?

Do we have a quorum? Do we have a quorum? Quorum Systems Given a set U of servers, U = n: A quorum system is a set Q 2 U such that Q 1, Q 2 Q : Q 1 Q 2 Each Q in Q is a quorum How quorum systems work: A read/write shared register

More information

Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures

Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures Xianbing Wang 1, Yong-Meng Teo 1,2, and Jiannong Cao 3 1 Singapore-MIT Alliance, 2 Department of Computer Science,

More information

Communication-Efficient Randomized Consensus

Communication-Efficient Randomized Consensus Communication-Efficient Randomized Consensus Dan Alistarh 1, James Aspnes 2, Valerie King 3, and Jared Saia 4 1 Microsoft Research, Cambridge, UK. Email: dan.alistarh@microsoft.com 2 Yale University, Department

More information

r-robustness and (r, s)-robustness of Circulant Graphs

r-robustness and (r, s)-robustness of Circulant Graphs r-robustness and (r, s)-robustness of Circulant Graphs James Usevitch and Dimitra Panagou Abstract There has been recent growing interest in graph theoretical properties known as r- and (r, s)-robustness.

More information

ABSTRACT BROADCAST AND VERIFIABLE SECRET SHARING: NEW SECURITY MODELS AND ROUND-OPTIMAL CONSTRUCTIONS. Ranjit Kumaresan, Doctor of Philosophy, 2012

ABSTRACT BROADCAST AND VERIFIABLE SECRET SHARING: NEW SECURITY MODELS AND ROUND-OPTIMAL CONSTRUCTIONS. Ranjit Kumaresan, Doctor of Philosophy, 2012 ABSTRACT Title of dissertation: BROADCAST AND VERIFIABLE SECRET SHARING: NEW SECURITY MODELS AND ROUND-OPTIMAL CONSTRUCTIONS Ranjit Kumaresan, Doctor of Philosophy, 2012 Dissertation directed by: Professor

More information

ABSTRACT. a Byzantine adversary who controls at most t out of the n parties running the

ABSTRACT. a Byzantine adversary who controls at most t out of the n parties running the ABSTRACT Title of dissertation: BROADCAST AND VERIFIABLE SECRET SHARING: NEW SECURITY MODELS AND ROUND-OPTIMAL CONSTRUCTIONS Ranjit Kumaresan, Doctor of Philosophy, 2012 Dissertation directed by: Professor

More information

6.852: Distributed Algorithms Fall, Class 24

6.852: Distributed Algorithms Fall, Class 24 6.852: Distributed Algorithms Fall, 2009 Class 24 Today s plan Self-stabilization Self-stabilizing algorithms: Breadth-first spanning tree Mutual exclusion Composing self-stabilizing algorithms Making

More information

Optimal and Player-Replaceable Consensus with an Honest Majority Silvio Micali and Vinod Vaikuntanathan

Optimal and Player-Replaceable Consensus with an Honest Majority Silvio Micali and Vinod Vaikuntanathan Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2017-004 March 31, 2017 Optimal and Player-Replaceable Consensus with an Honest Majority Silvio Micali and Vinod Vaikuntanathan

More information

Simple Bivalency Proofs of the Lower Bounds in Synchronous Consensus Problems

Simple Bivalency Proofs of the Lower Bounds in Synchronous Consensus Problems Simple Bivalency Proofs of the Lower Bounds in Synchronous Consensus Problems Xianbing Wang, Yong-Meng Teo, and Jiannong Cao Singapore-MIT Alliance E4-04-10, 4 Engineering Drive 3, Singapore 117576 Abstract

More information

Consensus. Consensus problems

Consensus. Consensus problems Consensus problems 8 all correct computers controlling a spaceship should decide to proceed with landing, or all of them should decide to abort (after each has proposed one action or the other) 8 in an

More information

How to solve consensus in the smallest window of synchrony

How to solve consensus in the smallest window of synchrony How to solve consensus in the smallest window of synchrony Dan Alistarh 1, Seth Gilbert 1, Rachid Guerraoui 1, and Corentin Travers 2 1 EPFL LPD, Bat INR 310, Station 14, 1015 Lausanne, Switzerland 2 Universidad

More information

Bee s Strategy Against Byzantines Replacing Byzantine Participants

Bee s Strategy Against Byzantines Replacing Byzantine Participants Bee s Strategy Against Byzantines Replacing Byzantine Participants by Roberto Baldoni, Silvia Banomi, Shlomi Dolev, Michel Raynal, Amitay Shaer Technical Report #18-05 September 21, 2018 The Lynne and

More information

Byzantine Agreement in Expected Polynomial Time

Byzantine Agreement in Expected Polynomial Time 0 Byzantine Agreement in Expected Polynomial Time Valerie King, University of Victoria Jared Saia, University of New Mexico We address the problem of Byzantine agreement, to bring processors to agreement

More information

ROBUST & SPECULATIVE BYZANTINE RANDOMIZED CONSENSUS WITH CONSTANT TIME COMPLEXITY IN NORMAL CONDITIONS

ROBUST & SPECULATIVE BYZANTINE RANDOMIZED CONSENSUS WITH CONSTANT TIME COMPLEXITY IN NORMAL CONDITIONS ROBUST & SPECULATIVE BYZANTINE RANDOMIZED CONSENSUS WITH CONSTANT TIME COMPLEXITY IN NORMAL CONDITIONS Bruno Vavala University of Lisbon, Portugal Carnegie Mellon University, U.S. Nuno Neves University

More information

On Expected Constant-Round Protocols for Byzantine Agreement

On Expected Constant-Round Protocols for Byzantine Agreement On Expected Constant-Round Protocols for Byzantine Agreement Jonathan Katz Chiu-Yuen Koo Abstract In a seminal paper, Feldman and Micali show an n-party Byzantine agreement protocol in the plain model

More information

Deterministic Consensus Algorithm with Linear Per-Bit Complexity

Deterministic Consensus Algorithm with Linear Per-Bit Complexity Deterministic Consensus Algorithm with Linear Per-Bit Complexity Guanfeng Liang and Nitin Vaidya Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University of Illinois

More information

Uniform consensus is harder than consensus

Uniform consensus is harder than consensus R Available online at www.sciencedirect.com Journal of Algorithms 51 (2004) 15 37 www.elsevier.com/locate/jalgor Uniform consensus is harder than consensus Bernadette Charron-Bost a, and André Schiper

More information

C 1. Recap: Finger Table. CSE 486/586 Distributed Systems Consensus. One Reason: Impossibility of Consensus. Let s Consider This

C 1. Recap: Finger Table. CSE 486/586 Distributed Systems Consensus. One Reason: Impossibility of Consensus. Let s Consider This Recap: Finger Table Finding a using fingers Distributed Systems onsensus Steve Ko omputer Sciences and Engineering University at Buffalo N102 86 + 2 4 N86 20 + 2 6 N20 2 Let s onsider This

More information

On Expected Constant-Round Protocols for Byzantine Agreement

On Expected Constant-Round Protocols for Byzantine Agreement On Expected Constant-Round Protocols for Byzantine Agreement Jonathan Katz Chiu-Yuen Koo Abstract In a seminal paper, Feldman and Micali (STOC 88) show an n-party Byzantine agreement protocol tolerating

More information

Implementing Uniform Reliable Broadcast with Binary Consensus in Systems with Fair-Lossy Links

Implementing Uniform Reliable Broadcast with Binary Consensus in Systems with Fair-Lossy Links Implementing Uniform Reliable Broadcast with Binary Consensus in Systems with Fair-Lossy Links Jialin Zhang Tsinghua University zhanggl02@mails.tsinghua.edu.cn Wei Chen Microsoft Research Asia weic@microsoft.com

More information

Replication predicates for dependent-failure algorithms

Replication predicates for dependent-failure algorithms Replication predicates for dependent-failure algorithms Flavio Junqueira and Keith Marzullo Department of Computer Science and Engineering University of California, San Diego La Jolla, CA USA {flavio,

More information

Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks

Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks Manan Nayak, Shashank Agrawal, and Kannan Srinathan Center for Security, Theory and Algorithmic Research

More information

Byzantine Vector Consensus in Complete Graphs

Byzantine Vector Consensus in Complete Graphs Byzantine Vector Consensus in Complete Graphs Nitin H. Vaidya University of Illinois at Urbana-Champaign nhv@illinois.edu Phone: +1 217-265-5414 Vijay K. Garg University of Texas at Austin garg@ece.utexas.edu

More information

Section 6 Fault-Tolerant Consensus

Section 6 Fault-Tolerant Consensus Section 6 Fault-Tolerant Consensus CS586 - Panagiota Fatourou 1 Description of the Problem Consensus Each process starts with an individual input from a particular value set V. Processes may fail by crashing.

More information

An Efficient Algorithm for Byzantine Agreement without Authentication

An Efficient Algorithm for Byzantine Agreement without Authentication INFORMATION AND CONTROL 52, 257--274 (1982) An Efficient Algorithm for Byzantine Agreement without Authentication DANNY DOLEV IBM Research Laboratory, San Jose, California 95193 MICHAEL J. FISCHER* Yale

More information

On the Number of Synchronous Rounds Required for Byzantine Agreement

On the Number of Synchronous Rounds Required for Byzantine Agreement On the Number of Synchronous Rounds Required for Byzantine Agreement Matthias Fitzi 1 and Jesper Buus Nielsen 2 1 ETH Zürich 2 University pf Aarhus Abstract. Byzantine agreement is typically considered

More information

All-to-All Gradecast using Coding with Byzantine Failures

All-to-All Gradecast using Coding with Byzantine Failures All-to-All Gradecast using Coding with Byzantine Failures John Bridgman Vijay Garg Parallel and Distributed Systems Lab (PDSL) at The University of Texas at Austin email: johnfbiii@utexas.edu Presented

More information

1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007

1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007 Lecture 1 Introduction 1 Introduction 1.1 The Problem Domain Today, we are going to ask whether a system can recover from perturbation. Consider a children s top: If it is perfectly vertically, you can

More information

Secure Communication in Multicast Graphs

Secure Communication in Multicast Graphs Secure Communication in Multicast Graphs Qiushi Yang and Yvo Desmedt Department o Computer Science, University College London, UK {q.yang, y.desmedt}@cs.ucl.ac.uk Abstract. In this paper we solve the problem

More information

How can one get around FLP? Around FLP in 80 Slides. How can one get around FLP? Paxos. Weaken the problem. Constrain input values

How can one get around FLP? Around FLP in 80 Slides. How can one get around FLP? Paxos. Weaken the problem. Constrain input values How can one get around FLP? Around FLP in 80 Slides Weaken termination Weaken the problem use randomization to terminate with arbitrarily high probability guarantee termination only during periods of synchrony

More information

CS505: Distributed Systems

CS505: Distributed Systems Department of Computer Science CS505: Distributed Systems Lecture 5: Time in Distributed Systems Overview Time and Synchronization Logical Clocks Vector Clocks Distributed Systems Asynchronous systems:

More information

Towards Optimal Synchronous Counting

Towards Optimal Synchronous Counting Towards Optimal Synchronous Counting Christoph Lenzen clenzen@mpi-inf.mpg.de Max Planck Institute for Informatics Joel Rybicki joel.rybicki@aalto.fi Max Planck Institute for Informatics Helsinki Institute

More information

Abstract. The paper considers the problem of implementing \Virtually. system. Virtually Synchronous Communication was rst introduced

Abstract. The paper considers the problem of implementing \Virtually. system. Virtually Synchronous Communication was rst introduced Primary Partition \Virtually-Synchronous Communication" harder than Consensus? Andre Schiper and Alain Sandoz Departement d'informatique Ecole Polytechnique Federale de Lausanne CH-1015 Lausanne (Switzerland)

More information

Iterative Approximate Byzantine Consensus in Arbitrary Directed Graphs

Iterative Approximate Byzantine Consensus in Arbitrary Directed Graphs Iterative Approximate Byzantine Consensus in Arbitrary Directed Graphs Nitin Vaidya 1,3, Lewis Tseng,3, and Guanfeng Liang 1,3 1 Department of Electrical and Computer Engineering, Department of Computer

More information

A Realistic Look At Failure Detectors

A Realistic Look At Failure Detectors A Realistic Look At Failure Detectors C. Delporte-Gallet, H. Fauconnier, R. Guerraoui Laboratoire d Informatique Algorithmique: Fondements et Applications, Université Paris VII - Denis Diderot Distributed

More information

Broadcast Amplification

Broadcast Amplification Broadcast Amplification Martin Hirt, Ueli Maurer, Pavel Raykov {hirt,maurer,raykovp}@inf.ethz.ch ETH Zurich, Switzerland Abstract. A d-broadcast primitive is a communication primitive that allows a sender

More information

Time. Today. l Physical clocks l Logical clocks

Time. Today. l Physical clocks l Logical clocks Time Today l Physical clocks l Logical clocks Events, process states and clocks " A distributed system a collection P of N singlethreaded processes without shared memory Each process p i has a state s

More information

Clocks in Asynchronous Systems

Clocks in Asynchronous Systems Clocks in Asynchronous Systems The Internet Network Time Protocol (NTP) 8 Goals provide the ability to externally synchronize clients across internet to UTC provide reliable service tolerating lengthy

More information

Our Problem. Model. Clock Synchronization. Global Predicate Detection and Event Ordering

Our Problem. Model. Clock Synchronization. Global Predicate Detection and Event Ordering Our Problem Global Predicate Detection and Event Ordering To compute predicates over the state of a distributed application Model Clock Synchronization Message passing No failures Two possible timing assumptions:

More information

Theory of Computation Chapter 9

Theory of Computation Chapter 9 0-0 Theory of Computation Chapter 9 Guan-Shieng Huang May 12, 2003 NP-completeness Problems NP: the class of languages decided by nondeterministic Turing machine in polynomial time NP-completeness: Cook

More information

CS505: Distributed Systems

CS505: Distributed Systems Department of Computer Science CS505: Distributed Systems Lecture 10: Consensus Outline Consensus impossibility result Consensus with S Consensus with Ω Consensus Most famous problem in distributed computing

More information

Fault Reporting in Partially Known Networks and. Folk Theorems

Fault Reporting in Partially Known Networks and. Folk Theorems Fault Reporting in Partially Known Networks and Folk Theorems Tristan Tomala January 13, 2010 HEC Paris, Economics and Decision Sciences Department, 1 rue de la Libération, 78351 Jouy-en-Josas Cedex, France.

More information

Oblivious Transfer in Incomplete Networks

Oblivious Transfer in Incomplete Networks Oblivious Transfer in Incomplete Networks Varun Narayanan and Vinod M. Prabahakaran Tata Institute of Fundamental Research, Mumbai varun.narayanan@tifr.res.in, vinodmp@tifr.res.in bstract. Secure message

More information

Unreliable Failure Detectors for Reliable Distributed Systems

Unreliable Failure Detectors for Reliable Distributed Systems Unreliable Failure Detectors for Reliable Distributed Systems A different approach Augment the asynchronous model with an unreliable failure detector for crash failures Define failure detectors in terms

More information

Consensus when failstop doesn't hold

Consensus when failstop doesn't hold Consensus when failstop doesn't hold FLP shows that can't solve consensus in an asynchronous system with no other facility. It can be solved with a perfect failure detector. If p suspects q then q has

More information

The Complexity of a Reliable Distributed System

The Complexity of a Reliable Distributed System The Complexity of a Reliable Distributed System Rachid Guerraoui EPFL Alexandre Maurer EPFL Abstract Studying the complexity of distributed algorithms typically boils down to evaluating how the number

More information

Distributed Computing with Imperfect Randomness

Distributed Computing with Imperfect Randomness Distributed Computing with Imperfect Randomness Shafi Goldwasser, Madhu Sudan, and Vinod Vaikuntanathan MIT CSAIL, Cambridge MA 02139, USA {shafi,madhu,vinodv}@theory.csail.mit.edu Abstract. Randomness

More information

Efficient Asynchronous Multiparty Computation with Optimal Resilience

Efficient Asynchronous Multiparty Computation with Optimal Resilience Efficient Asynchronous Multiparty Computation with Optimal Resilience Arpita Patra Ashish Choudhary C. Pandu Rangan Department of Computer Science and Engineering Indian Institute of Technology Madras

More information

Robustness of Distributed Systems Inspired by Biological Processes

Robustness of Distributed Systems Inspired by Biological Processes Robustness of Distributed Systems Inspired by Biological Processes Thesis for the degree of DOCTOR of PHILOSOPHY by Ariel Daliot SUBMITTED TO THE SENATE OF THE HEBREW UNIVERSITY OF JERUSALEM November 2006

More information

Common Knowledge and Consistent Simultaneous Coordination

Common Knowledge and Consistent Simultaneous Coordination Common Knowledge and Consistent Simultaneous Coordination Gil Neiger College of Computing Georgia Institute of Technology Atlanta, Georgia 30332-0280 gil@cc.gatech.edu Mark R. Tuttle DEC Cambridge Research

More information

Early-Deciding Consensus is Expensive

Early-Deciding Consensus is Expensive Early-Deciding Consensus is Expensive ABSTRACT Danny Dolev Hebrew University of Jerusalem Edmond Safra Campus 9904 Jerusalem, Israel dolev@cs.huji.ac.il In consensus, the n nodes of a distributed system

More information

Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary

Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary Kaoru Kurosawa Department of Computer and Information Sciences, Ibaraki University, 4-12-1 Nakanarusawa, Hitachi,

More information

Shared Memory vs Message Passing

Shared Memory vs Message Passing Shared Memory vs Message Passing Carole Delporte-Gallet Hugues Fauconnier Rachid Guerraoui Revised: 15 February 2004 Abstract This paper determines the computational strength of the shared memory abstraction

More information

Generalized Consensus and Paxos

Generalized Consensus and Paxos Generalized Consensus and Paxos Leslie Lamport 3 March 2004 revised 15 March 2005 corrected 28 April 2005 Microsoft Research Technical Report MSR-TR-2005-33 Abstract Theoretician s Abstract Consensus has

More information

Early consensus in an asynchronous system with a weak failure detector*

Early consensus in an asynchronous system with a weak failure detector* Distrib. Comput. (1997) 10: 149 157 Early consensus in an asynchronous system with a weak failure detector* André Schiper Ecole Polytechnique Fe dérale, De partement d Informatique, CH-1015 Lausanne, Switzerland

More information

Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited

Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited Laasya Bangalore Ashish Choudhury Arpita Patra Abstract The problem of Byzantine Agreement (BA) is of interest to both distributed computing

More information

Computing in Distributed Systems in the Presence of Benign Failures

Computing in Distributed Systems in the Presence of Benign Failures Computing in Distributed Systems in the Presence of Benign Failures Bernadette Charron-Bost Ecole polytechnique, France André Schiper EPFL, Switzerland 1 Two principles of fault-tolerant distributed computing

More information

Synchronous Counting and Computational Algorithm Design

Synchronous Counting and Computational Algorithm Design Synchronous Counting and Computational Algorithm Design Danny Dolev 1, Janne H. Korhonen 2, Christoph Lenzen 3, Joel Rybicki 2, and Jukka Suomela 2 1 School of Engineering and Computer Science, The Hebrew

More information

Randomized Protocols for Asynchronous Consensus

Randomized Protocols for Asynchronous Consensus Randomized Protocols for Asynchronous Consensus Alessandro Panconesi DSI - La Sapienza via Salaria 113, piano III 00198 Roma, Italy One of the central problems in the Theory of (feasible) Computation is

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value

Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value Achour Mostefaoui, Michel Raynal To cite this version: Achour Mostefaoui, Michel Raynal. Signature-Free Broadcast-Based

More information

arxiv: v1 [cs.dc] 17 May 2017

arxiv: v1 [cs.dc] 17 May 2017 Self-stabilising Byzantine Clock Synchronisation is Almost as Easy as Consensus Christoph Lenzen clenzen@mpi-inf.mpg.de Department of Algorithms and Complexity, Max Planck Institute for Informatics, Saarland

More information

Time. To do. q Physical clocks q Logical clocks

Time. To do. q Physical clocks q Logical clocks Time To do q Physical clocks q Logical clocks Events, process states and clocks A distributed system A collection P of N single-threaded processes (p i, i = 1,, N) without shared memory The processes in

More information

Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation

Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Viveck R. Cadambe EE Department, Pennsylvania State University, University Park, PA, USA viveck@engr.psu.edu Nancy Lynch

More information

Real-Time Course. Clock synchronization. June Peter van der TU/e Computer Science, System Architecture and Networking

Real-Time Course. Clock synchronization. June Peter van der TU/e Computer Science, System Architecture and Networking Real-Time Course Clock synchronization 1 Clocks Processor p has monotonically increasing clock function C p (t) Clock has drift rate For t1 and t2, with t2 > t1 (1-ρ)(t2-t1)

More information

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong

Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms CS 249 Project Fall 2005 Wing Wong Outline Introduction Asynchronous distributed systems, distributed computations,

More information

Asynchronous reference frame agreement in a quantum network

Asynchronous reference frame agreement in a quantum network Asynchronous reference frame agreement in a quantum network Tanvirul Islam 1, 2, 3, 2, 3, and Stephanie Wehner 1 School of Computing, National University of Singapore, 13 Computing Drive, 117417 Singapore

More information

Signature-Free Asynchronous Byzantine Consensus with t < n/3 and O(n 2 ) Messages

Signature-Free Asynchronous Byzantine Consensus with t < n/3 and O(n 2 ) Messages Signature-Free Asynchronous Byzantine Consensus with t < n/3 and O(n 2 ) Messages Achour Mostefaoui, Moumen Hamouna, Michel Raynal To cite this version: Achour Mostefaoui, Moumen Hamouna, Michel Raynal.

More information

Resilient Distributed Optimization Algorithm against Adversary Attacks

Resilient Distributed Optimization Algorithm against Adversary Attacks 207 3th IEEE International Conference on Control & Automation (ICCA) July 3-6, 207. Ohrid, Macedonia Resilient Distributed Optimization Algorithm against Adversary Attacks Chengcheng Zhao, Jianping He

More information