Randomized Distributed Agreement (Extended Abstract)

Distributed Agreement (DA) is one of the fundamental problems in the theory and practice of fault-tolerant distributed systems. It requires correct processors (agents, players) to agree on an initial value held by one of them, despite the (even malicious) behavior of a subset of size t. A randomized solution to the problem achieves agreement with a high probability after a constant number of communication rounds. In this paper we present a succint and efficient randomized DA protocol for asynchronous networks that works for n > 5t processors, where n is the size of the network. The protocol has low communication complexity (@(log n) message size) and does not require any cryptographic assumption. The protocol belongs to the class of protocols that require a “trusted dealer,” who is in charge of a suitable network initialization, and represents an improvement in terms of number of processors to previous solutions presented in [17, 18, 201. We contrast our approach to the class of protocols that are currently able to perform randomized agreement from scratch, an unlimited number of times (e.g., [14]), but have

[1]  Silvio Micali,et al.  Optimal algorithms for Byzantine agreement , 1988, STOC '88.

[2]  Kenneth J. Perry Randomized Byzantine Agreement , 1985, IEEE Transactions on Software Engineering.

[3]  Cynthia Dwork On Verification in Secret Sharing , 1991, CRYPTO.

[4]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1985, JACM.

[5]  Sam Toueg,et al.  Randomized Byzantine Agreements , 1984, PODC '84.

[6]  Silvio Micali,et al.  Byzantine Agreement in Constant Expected Time (and Trusting No One) , 1985, FOCS 1985.

[7]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[8]  Brian A. Coan,et al.  A Simple and Efficient Randomized Byzantine Agreement Algorithm , 1985, IEEE Transactions on Software Engineering.

[9]  Michael O. Rabin,et al.  Randomized byzantine generals , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).

[10]  Adi Shamir,et al.  How to share a secret , 1979, CACM.