From O ( n 2 ) to O ( n ) : An Efficient Deterministic Algorithm for Byzantine Agreement

In this paper, we introduce an efficient deterministic agreement algorithm that solves the multi-valued Byzantine agreement problem deterministically for networks of arbitrary size n ≥ 4 and up to t < n/3 failures. This paper considers the “broadcast” version of the agreement problem, wherein the goal is for the nodes in the network to agree on the values that a certain source node wants to broadcast to them. The per-bit communication complexity of an agreement algorithm is defined as the worst case communication complexity for achieving agreement for l bits divided by the message length l. Our algorithm achieves per-bit complexity arbitrarily close to n(n−1)/(n−t) for large value of l. For large l, by using a multi-valued approach, it not only breaks the quadratic lower bound Ω(n) for perbit complexity from the prior work, it is also the most efficient among the known Byzantine agreement algorithms, including the ones that achieve agreement just probabilistically. Moreover, we believe that, besides being order-optimal, the proposed algorithm is in fact also optimal in the sense of minimizing the per-bit cost.

[1]  Tracey Ho,et al.  New results on network error correction: Capacities and upper bounds , 2010, 2010 Information Theory and Applications Workshop (ITA).

[2]  Lang Tong,et al.  Nonlinear network coding is necessary to combat general Byzantine attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[4]  Christina Fragouli,et al.  On Feedback for Network Coding , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[5]  Matthias Fitzi,et al.  Optimally efficient multi-valued byzantine agreement , 2006, PODC '06.

[6]  Martin Hirt,et al.  Efficient Multi-party Computation with Dispute Control , 2006, TCC.

[7]  Kenneth P. Birman,et al.  Reliable Distributed Systems: Technologies, Web Services, and Applications , 2005 .

[8]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[9]  R. Koetter,et al.  An algebraic approach to network coding , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[10]  Ueli Maurer,et al.  Efficient Secure Multi-party Computation , 2000, ASIACRYPT.

[11]  Joseph Y. Halpern,et al.  The Failure Discovery problem , 1993, Mathematical systems theory.

[12]  Joseph Y. Halpern,et al.  Message-optimal protocols for Byzantine Agreement , 1993, Mathematical systems theory.

[13]  Vassos Hadzilacos,et al.  On the message complexity of binary byzantine agreement under crash failures , 1992, Distributed Computing.

[14]  Brian A. Coan,et al.  Modular Construction of a Byzantine Agreement Protocol with Optimal Message Bit Complexity , 1992, Inf. Comput..

[15]  Piotr Berman,et al.  Bit optimal distributed consensus , 1992 .

[16]  Danny Dolev,et al.  Multiparty communication complexity , 1989, 30th Annual Symposium on Foundations of Computer Science.

[17]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[18]  Eric C. Cooper Replicated distributed programs , 1985, SOSP '85.

[19]  Danny Dolev,et al.  Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..

[20]  J. T. Sims,et al.  The Byzantine Generals Problem , 1982, TOPL.

[21]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[22]  Andrew Chi-Chih Yao,et al.  Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.

[23]  Kenneth P. Birman,et al.  A History of the Virtual Synchrony Replication Model , 2010, Replication.

[24]  T. Ho,et al.  On Linear Network Coding , 2010 .

[25]  Nitin H. Vaidya,et al.  Secure Capacity of Wireless Broadcast Networks , 2009 .

[26]  Birgit Pfitzmann,et al.  Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3 , 2007 .

[27]  Yair Amir,et al.  The Spread Wide Area Group Communication System , 2007 .

[28]  R. Yeung,et al.  NETWORK ERROR CORRECTION, PART II: LOWER BOUNDS , 2006 .

[29]  Seif Haridi,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.

[30]  Danny Dolev,et al.  Bounds on information exchange for Byzantine agreement , 1985, JACM.