Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Reaching Agreement in the Presence of Faults

Published: 01 April 1980 Publication History

Abstract

The problem addressed here concerns a set of isolated processors, some unknown subset of which may be faulty, that communicate only by means of two-party messages. Each nonfaulty processor has a private value of information that must be communicated to each other nonfaulty processor. Nonfaulty processors always communicate honestly, whereas faulty processors may lie. The problem is to devise an algorithm in which processors communicate their own values and relay values received from others that allows each nonfaulty processor to infer a value for each other processor. The value inferred for a nonfaulty processor must be that processor's private value, and the value inferred for a faulty one must be consistent with the corresponding value inferred by each other nonfaulty processor.
It is shown that the problem is solvable for, and only for, n ≥ 3m + 1, where m is the number of faulty processors and n is the total number. It is also shown that if faulty processors can refuse to pass on information but cannot falsely relay information, the problem is solvable for arbitrary nm ≥ 0. This weaker assumption can be approximated in practice using cryptographic methods.

References

[1]
DAvIEs, D, AND WAKEH~Y, J. Synchronization and matching m redundant systems IEEE Trans on Comptrs. C-27, 6 (June 1978), 531-539.
[2]
DIFFIE, W, AND BELLMAN, M. New dtrections in cryptography. IEEE Trans Inform. Theory IT-22, 6 (Nov 1976), 644-654
[3]
RIVEST, R.L., SHArerS, A, Am) ADLEMAN, L A A method for obtaming dtgltal signatures and pubhc-key cryptosystems. Comm. ACM 21, 2 (Feb 1978), 120-126.
[4]
WENSLEY, J H., ET ^L. SIFT: destgn and analysis of a fault-tolerant computer for aircraft control Proc. IEEE 66, 10 (Oct. 1978), 1240-1255.

Cited By

View all
  • (2025)Network Agnostic Perfectly Secure Multiparty Computation Against General AdversariesIEEE Transactions on Information Theory10.1109/TIT.2024.347051371:1(644-682)Online publication date: 1-Jan-2025
  • (2025)Pako: Multi-Valued Byzantine Agreement Comparable to Partially-Synchronous BFTIEEE Transactions on Computers10.1109/TC.2024.351062074:3(887-900)Online publication date: Mar-2025
  • (2025)High-performance BFT consensus for Metaverse through block linking and shortcut loopComputer Communications10.1016/j.comcom.2024.107990229(107990)Online publication date: Jan-2025
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of the ACM
Journal of the ACM  Volume 27, Issue 2
April 1980
196 pages
ISSN:0004-5411
EISSN:1557-735X
DOI:10.1145/322186
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 1980
Published in JACM Volume 27, Issue 2

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,024
  • Downloads (Last 6 weeks)104
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Network Agnostic Perfectly Secure Multiparty Computation Against General AdversariesIEEE Transactions on Information Theory10.1109/TIT.2024.347051371:1(644-682)Online publication date: 1-Jan-2025
  • (2025)Pako: Multi-Valued Byzantine Agreement Comparable to Partially-Synchronous BFTIEEE Transactions on Computers10.1109/TC.2024.351062074:3(887-900)Online publication date: Mar-2025
  • (2025)High-performance BFT consensus for Metaverse through block linking and shortcut loopComputer Communications10.1016/j.comcom.2024.107990229(107990)Online publication date: Jan-2025
  • (2025)Proof of carbon reduction: A novel incentive mechanism in blockchain for carbon emissions reduction in constructionBuilding and Environment10.1016/j.buildenv.2025.112684272(112684)Online publication date: Mar-2025
  • (2025)DyBFT: leaderless BFT protocol based on locally adjustable valid committee set mechanismWorld Wide Web10.1007/s11280-024-01324-w28:1Online publication date: 21-Jan-2025
  • (2025)ERBFT: improved asynchronous BFT with erasure code and verifiable random functionThe Journal of Supercomputing10.1007/s11227-025-06995-481:3Online publication date: 12-Feb-2025
  • (2025)Communication lower bounds for cryptographic broadcast protocolsDistributed Computing10.1007/s00446-024-00473-538:1(1-17)Online publication date: 7-Jan-2025
  • (2025)Byzantine AgreementEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1668(314-319)Online publication date: 8-Jan-2025
  • (2025)Incentives for Distributed LedgersEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1666(1189-1191)Online publication date: 8-Jan-2025
  • (2024)R-DOCO: Resilient Distributed Online Convex Optimization Against Adversarial AttacksMathematics10.3390/math1221343912:21(3439)Online publication date: 3-Nov-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media