Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1813164.1813222guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

On the number of synchronous rounds sufficient for authenticated byzantine agreement

Published: 23 September 2009 Publication History

Abstract

Byzantine agreement is typically considered with respect to either a fully synchronous network or a fully asynchronous one. In the synchronous case, t + 1 communication rounds are necessary for deterministic protocols whereas all known probabilistic protocols require an expected large number of rounds. In this paper we examine the question of how many initial synchronous rounds are required for Byzantine agreement in the worst case if we allow to switch to asynchronous operation afterward. Let n = h + t be the number of parties where h are honest and t are corrupted. As the main result we show that, in the model with a public-key infrastructure and signatures (aka authenticated Byzantine agreement), d + O(1) deterministic synchronous rounds are sufficient where d is the minimal integer such that n - d > 3(t - d). This improves over the t + 1 necessary deterministic rounds for almost all cases, and over the exact expected number of rounds in the nondeterministic case for many cases.

References

[1]
Alistarh, D., Gilbert, S., Guerraoui, R., Travers, C.: How to solve consensus in the smallest window of synchrony. In: Taubenfeld, G. (ed.) DISC 2008. LNCS, vol. 5218, pp. 32-46. Springer, Heidelberg (2008).
[2]
Bar-Noy, A., Dolev, D., Dwork, C., Strong, H.R.: Shifting gears: Changing algorithms on the fly to expedite Byzantine agreement. Inf. Comput. 97(2), 205-233 (1992).
[3]
Beerliova-Trubiniova, Z., Hirt, M., Nielsen, J.B.: Almost-asynchronous mpc with faulty minority. Cryptology ePrint Archive, Report 2008/416 (2008), http://eprint.iacr.org/
[4]
Cachin, C., Kursawe, K., Shoup, V.: Random oracles in constantinople: Practical asynchronous Byzantine agreement using cryptography. J. Cryptology 18(3), 219- 246 (2005).
[5]
DeMillo, R.A., Lynch, N.A., Merritt, M.J.: Cryptographic protocols. In: Proceedings of the 14th Annual ACM Symposium on Theory of Computing (STOC 1982), pp. 383-400 (1982).
[6]
Dolev, D., Reischuk, R., Strong, H.R.: Early stopping in Byzantine agreement. J. ACM 37(4), 720-741 (1990).
[7]
Dolev, D., Strong, H.R.: Authenticated algorithms for Byzantine agreement. SIAM Journal on Computing 12(4), 656-666 (1983).
[8]
Dutta, P., Guerraoui, R.: The inherent price of indulgence. Distributed Computing 18(1), 85-98 (2005).
[9]
Dwork, C., Lynch, N.A., Stockmeyer, L.J.: Consensus in the presence of partial synchrony. J. ACM 35(2), 288-323 (1988).
[10]
Feldman, P., Micali, S.: An optimal probabilistic protocol for synchronous Byzantine agreement. SIAM Journal on Computing 26(4), 873-933 (1997).
[11]
Garay, J.A., Katz, J., Koo, C.-Y., Ostrovsky, R.: Round complexity of authenticated broadcast with a dishonest majority. In: FOCS, pp. 658-668. IEEE Computer Society, Los Alamitos (2007).
[12]
Katz, J., Koo, C.-Y.: On expected constant-round protocols for byzantine agreement. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 445-462. Springer, Heidelberg (2006).
[13]
Pfitzmann, B., Waidner, M.: Information-theoretic pseudosignatures and Byzantine agreement for t > = n/3. Technical Report RZ 2882 (#90830), IBM Research (1996).

Cited By

View all
  • (2010)On the theoretical gap between synchronous and asynchronous MPC protocolsProceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing10.1145/1835698.1835746(211-218)Online publication date: 25-Jul-2010

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
DISC'09: Proceedings of the 23rd international conference on Distributed computing
September 2009
532 pages
ISBN:3642043542
  • Editor:
  • Idit Keidar

In-Cooperation

  • EATCS: European Association for Theoretical Computer Science

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 23 September 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2010)On the theoretical gap between synchronous and asynchronous MPC protocolsProceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing10.1145/1835698.1835746(211-218)Online publication date: 25-Jul-2010

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media