skip to main content
research-article

Byzantine Agreement in Expected Polynomial Time

Published:20 March 2016Publication History
Skip Abstract Section

Abstract

We address the problem of Byzantine agreement, to bring processors to agreement on a bit in the presence of a strong adversary. This adversary has full information of the state of all processors, the ability to control message scheduling in an asynchronous model, and the ability to control the behavior of a constant fraction of processors that it may choose to corrupt adaptively.

In 1983, Ben-Or proposed an algorithm for solving this problem with expected exponential communication time. In this article, we improve that result to require expected polynomial communication time and computation time. Like Ben-Or’s algorithm, our algorithm uses coinflips from individual processors to repeatedly try to generate a fair global coin. We introduce a method that uses spectral analysis to identify processors that have thwarted this goal by flipping biased coins.

References

  1. D. Achlioptas and F. McSherry. 2001. Fast computation of low rank matrix approximations. In Proceedings of the 33rd Annual ACM Symposium on Theory of Computing. ACM, 611--618.Google ScholarGoogle Scholar
  2. N. Alon, M. Krivelevich, and B. Sudakov. 1998. Finding a large hidden clique in a random graph. In Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 594--598.Google ScholarGoogle Scholar
  3. J. Aspnes. 1998. Lower bounds for distributed coin-flipping and randomized consensus. Journal of the Association for Computing Machinery 45, 3 (May 1998), 415--450.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Aspnes. 2003. Randomized protocols for asynchronous consensus. Distributed Computing 16 (2003), 165--175.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Aspnes and M. Herlihy. 1990. Fast randomized consensus using shared memory. Journal of Algorithms 11, 3 (1990), 441--461.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Attiya and K. Censor. 2008. Lower bounds for randomized consensus under a weak adversary. In Principles of Distributed Computing (PODC). 315--324.Google ScholarGoogle Scholar
  7. H. Attiya and J. Welch. 2004. Distributed Computing: Fundamentals, Simulations and Advanced Topics (2nd ed.). John Wiley Interscience.Google ScholarGoogle ScholarCross RefCross Ref
  8. Y. Azar, A. Fiat, A. Karlin, F. McSherry, and J. Saia. 2001. Spectral analysis of data. In Symposium on Theory of Computing (STOC’01). ACM, 619--626.Google ScholarGoogle Scholar
  9. M. Ben-Or. 1983. Another advantage of free choice (Extended Abstract): Completely asynchronous agreement protocols. In Proceedings of the 2nd Annual ACM Symposium on Principles of Distributed Computing. ACM, New York, NY, 27--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Ben-Or and R. El-Yaniv. 2003. Resilient-optimal interactive consistency in constant time. Distributed Computing 16, 4 (2003), 249--262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Ben-Or, E. Pavlov, and V. Vaikuntanathan. 2006. Byzantine agreement in the full-information model in O (log n) rounds. In Proceedings of the ACM Symposium on Theory of Computing (STOC’06).Google ScholarGoogle Scholar
  12. G. Bracha. 1984. An asynchronous [(n-1)/3]-resilient consensus protocol. In PODC. 154--162.Google ScholarGoogle Scholar
  13. G. Bracha. 1987a. Asynchronous byzantine agreement protocols. Journal of Information and Computation 75, 2 (1987), 130--143.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. Bracha. 1987b. Asynchronous byzantine agreement protocols. Information and Computation 75, 2 (1987), 130--143.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Cachin, K. Kursawe, and V. Shoup. 2005. Random oracles in constantinople: Practical asynchronous byzantine agreement using cryptography. Journal of Cryptology 18, 3 (2005), 219--246.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Canetti and T. Rabin. 1993. Fast asynchronous Byzantine agreement with optimal resilience. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing (STOC’93).Google ScholarGoogle Scholar
  17. S. Chakrabarti, B. E. Dom, S. R. Kumar, P. Raghavan, S. Rajagopalan, A. Tomkins, D. Gibson, and J. Kleinberg. 1999. Mining the Web’s link structure. Computer 32, 8 (1999), 60--67.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. Chor and C. Dwork. 1989. Randomization in byzantine agreement. Advances in Computing Research 5 (1989), 443--498.Google ScholarGoogle Scholar
  19. P. Feldman and S. Micali. 1985. Byzantine agreement in constant expected time (and trusting no one). In FOCS. 267--276.Google ScholarGoogle Scholar
  20. W. Feller. 1968. An Introduction to Probability Theory, Vol. 1 (3rd ed.). Wiley, New York, NY.Google ScholarGoogle Scholar
  21. M. J. Fischer, N. A. Lynch, and M. S. Paterson. 1985. Impossibility of distributed consensus with one faulty process. Journal of the ACM 32, 2 (1985), 374--382.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2004. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web. ACM, 403--412.Google ScholarGoogle Scholar
  23. M. Jerrum. 1992. Large cliques elude the Metropolis process. Random Structures & Algorithms 3, 4 (1992), 347--359.Google ScholarGoogle ScholarCross RefCross Ref
  24. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. 2003. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web. ACM, 640--651.Google ScholarGoogle Scholar
  25. B. M. Kapron, D. Kempe, V. King, J. Saia, and V. Sanwalani. 2010. Fast asynchronous Byzantine agreement and leader election with full information. ACM Trans. Algorithms 6, 4 (2010). http://doi.acm.org/10.1145/1824777.1824788.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Karlin and A. Yao. 1984. Probabilistic lower bounds for byzantine agreement and clock synchronization. (1984). Unpublished manuscript.Google ScholarGoogle Scholar
  27. V. King and J. Saia. 2013. Byzantine agreement in polynomial expected time. In Proceedings of the ACM Symposium on Theory of Computing (STOC’13). ACM, 401--410.Google ScholarGoogle Scholar
  28. V. King and J. Saia. 2014. Faster agreement via a spectral method for detecting malicious behavior. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics.Google ScholarGoogle Scholar
  29. J. M. Kleinberg. 1999. Authoritative sources in a hyperlinked environment. Journal of the ACM 46, 5 (1999), 604--632.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. L. Kučera. 1995. Expected complexity of graph partitioning problems. Discrete Applied Mathematics 57, 2 (1995), 193--212.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. L. Lamport, R. Shostak, and M. Pease. 1982. The byzantine generals problem. ACM Transactions on Programming Languages and Systems 4, 3 (1982), 401.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. B. Lewko. 2011. The contest between simplicity and efficiency in asynchronous byzantine agreement. In Proceedings of the 25th International Symposium on Distributed Computing (DISC'11), D. Peleg (Ed.). Lecture Notes in Computer Science. Vol. 6950, Springer, 348--362.Google ScholarGoogle ScholarCross RefCross Ref
  33. N. Lynch. 1996. Distributed Algorithms. Morgan Kaufmann.Google ScholarGoogle Scholar
  34. G. Neiger and S. Toueg. 1990. Automatically increasing the fault-tolerance of distributed algorithms. Journal of Algorithms 11, 3 (1990), 374--419.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. L. Page, S. Brin, R. Motwani, and T. Winograd. 1998. The PageRank citation ranking: bringing order to the web. Stanford University Technical Report. http://ilpubs.stanford.edu:8090/422/1/1999-66.pdf.Google ScholarGoogle Scholar
  36. L. Xiong and L. Liu. 2004. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16, 7 (2004), 843--857.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. H. Zhang, A. Goel, R. Govindan, K. Mason, and B. Van Roy. 2004. Making eigenvector-based reputation systems robust to collusion. In Algorithms and Models for the Web-Graph. Springer, 92--104.Google ScholarGoogle Scholar

Index Terms

  1. Byzantine Agreement in Expected Polynomial Time

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Journal of the ACM
      Journal of the ACM  Volume 63, Issue 2
      May 2016
      249 pages
      ISSN:0004-5411
      EISSN:1557-735X
      DOI:10.1145/2906142
      Issue’s Table of Contents

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 20 March 2016
      • Accepted: 1 October 2015
      • Revised: 1 June 2015
      • Received: 1 July 2014
      Published in jacm Volume 63, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader