Scalable and Secure Computation Among Strangers: Resource-Competitive Byzantine Protocols

07/24/2019
by   John Augustine, et al.
0

Motivated, in part, by the rise of permissionless systems such as Bitcoin where arbitrary nodes (whose identities are not known apriori) can join and leave at will, we extend established research in scalable Byzantine agreement to a more practical model where each node (initially) does not know the identity of other nodes. A node can send to new destinations only by sending to random (or arbitrary) nodes, or responding (if it chooses) to messages received from those destinations. We assume a synchronous and fully-connected network, with a full-information, but static Byzantine adversary. A general drawback of existing Byzantine protocols is that the communication cost incurred by the honest nodes may not be proportional to those incurred by the Byzantine nodes; in fact, they can be significantly higher. Our goal is to design Byzantine protocols for fundamental problems which are resource competitive, i.e., the number of bits sent by honest nodes is not much more than those sent by Byzantine nodes. We describe a randomized scalable algorithm to solve Byzantine agreement, leader election, and committee election in this model. Our algorithm sends an expected O((T+n) n) bits and has latency O(polylog(n)), where n is the number of nodes, and T is the minimum of n^2 and the number of bits sent by adversarially controlled nodes. The algorithm is resilient to (1/4-ϵ)n Byzantine nodes for any fixed ϵ > 0, and succeeds with high probability. Our work can be considered as a first application of resource-competitive analysis to fundamental Byzantine problems. To complement our algorithm we also show lower bounds for resource-competitive Byzantine agreement. We prove that, in general, one cannot hope to design Byzantine protocols that have communication cost that is significantly smaller than the cost of the Byzantine adversary.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/12/2023

Sublinear Message Bounds of Authenticated Implicit Byzantine Agreement

This paper studies the message complexity of authenticated Byzantine agr...
research
05/15/2021

Byzantine-Resilient Population Protocols

Population protocols model information spreading in networks where pairw...
research
12/01/2020

Byzantine Eventual Consistency and the Fundamental Limits of Peer-to-Peer Databases

Sybil attacks, in which a large number of adversary-controlled nodes joi...
research
02/19/2020

The Sum of Its Parts: Analysis of Federated Byzantine Agreement Systems

Federated Byzantine Agreement Systems (FBASs) are a fascinating new para...
research
06/19/2020

Stateless Distributed Ledgers

In public distributed ledger technologies (DLTs), such as Blockchains, n...
research
12/03/2019

Mathematical Analysis and Algorithms for Federated Byzantine Agreement Systems

We give an introduction to federated Byzantine agreement systems (FBAS) ...
research
12/25/2018

Correction to Byzantine Agreement in Expected Polynomial Time, JACM 2016

This is a brief correction by the authors to "Byzantine Agreement in Exp...

Please sign up or login with your details

Forgot password? Click here to reset