Agreement Among Unacquainted Byzantine Generals  Michael Okun School of Computer Science, The Hebrew University of Jerusalem [email protected]

Background. The Byzantine Agreement (BA) problem introduced by Pease, Shostak and Lamport in [1] is one of the central problems in distributed computing. It was extensively studied under various timing, topology, authentication and failure assumptions. In previous works it was assumed that the network topology is known to the processors in advance, i.e., every processor has an a priori knowledge of the true unique identifier of the processor to which it is connected by each of its communication channels (see Fig. 1a).

link 1 2 3

D ID 11 00 00 1 11 00 C 11 11 00 3 2 B A

link 1 2 3

ID D C B

3 2

2 1

1 2 00 11 00 11 3 00 11 11 00

A

(a)

C link ID

11 00 00 11 00 11 00 11

1

3 00 11 00 11 11 00 11 00

B

1 2 3

B A D

link 1 2 3

ID A D C

D

00 11 00 11 11 00 11 00

1 3 2

1 2 3

00 11 00 11 11 00 11 00

A

(b)

C

11 00 00 11 00 11 00 11

00 11 00 11 11 00 11 00

2 3 000 111 000 111 1000 111 111 000

00 11 00 11 11 00 11 00

3 2

1

B

1 3 2

11 00 00 11 00 11 00 11

11 00 00 11 00 11 11 00

2 3 000 111 000 111 1111 000 111 000

11 00 00 11 00 11 11 00

3 2

1 2 3

(c)

1

11 00 00 11 00 11 00 11

11 00 00 11 00 11 11 00

(d)

Fig. 1. A system with 4 processors: (a) the standard model, (b) without topology information, (c) anonymous model, (d) anonymous model without port awareness

This work deals with the BA problem when this assumption is relaxed. First, we consider the case in which each processor has a unique identifier, but the processors start without knowing the identifiers of the processors or the identifiers of the links between the processors (see Fig. 1b). In this case there are several reasonable models, all of which assume that each message carries an id of the sender. The models vary according to the ways in which a faulty processor may corrupt the id field in its messages. Specifically, we consider the following models: (I1 ) A message sent by any processor always includes its unique true id. In this case a faulty processor can prevent a correct processor p from directly learning about its id iff it sends no messages to p throughout the whole BA protocol. (I2 ) A faulty processor may send messages with different ids, not necessarily its own, however it cannot use an id belonging to a correct processor. This implies that “identity theft” is not allowed in this model. 

This research was supported by Israeli Council for Higher Education and by Sally Berg foundation.

P. Fraigniaud (Ed.): DISC 2005, LNCS 3724, pp. 499–500, 2005. c Springer-Verlag Berlin Heidelberg 2005 

500

M. Okun

(I3 ) A faulty processor may include any id in its messages, even that of correct processors, i.e., it is able to “fake” messages of correct processors. In addition, we consider the case in which there are no identifiers at all (anonymous processors). Two types of anonymous networks are examined: (A1 ) The processors are port aware: each processor has an internal labeling of its communication channels, which allows it to distinguish between messages arriving via different channels (see Fig. 1c). (A2 ) The processors are port unaware: each processor receives all its messages through a single mailbox, and cannot associate a message with the link through which it was received (see Fig. 1d). We note that the above five models form a strict hierarchy, in the sense that each model is the result of further relaxation of its predecessor. Results. The BA problem has no deterministic solution in the A2 model even in the presence of a single faulty processor. This can be shown by a simple valency argument. On the other hand, Ben-Or’s randomized algorithm can be used to achieve BA with probability 1 (whenever the number of faulty processors, f , is less than 1/3 of the total number of processors, n). These characteristics of A2 are similar to the asynchronous BA case. For A1 we found an efficient BA algorithm that runs in at most 6f +1 rounds, for n > 3f [2]. It is based on the ideas of the Srikanth-Toueg (and similar) BA algorithms, though some non-trivial adaptations were required. Finding the exact number of rounds required for achieving BA in the various models seems to be a much harder problem. The difficulty is that the Exponential Information Gathering algorithms (which are the only known algorithms for the standard BA that work in the optimal number of rounds), if at all, can be used only for I1 . In the I2 model BA can be achieved in f + 1 rounds. The proof of this (tight) upper bound is non-constructive, and is based on several new techniques [3]. Further model relaxations increase the number of rounds: in I3 , even for f = 1, a relatively simple chain-argument shows that 3 rounds are required. However, it is still not clear if the additional round is also necessary for higher values of f . Finding the exact number of rounds required for BA in the A1 model, or even proving a sufficiently tight upper bound is also an open problem.

References [1] M. Pease, R. Shostak, L. Lamport, Reaching Agreement in the Presence of Faults, J. ACM 27(2) (1980) 228-234. [2] M. Okun, A. Barak, On Anonymous Byzantine Agreement, Leibniz Center TR 2004-2, School of Computer Science, The Hebrew University, 2004, submitted for publication. [3] M. Okun, On the Round Complexity of Byzantine Agreement Without Initial SetUp, 2005, submitted for publication.

Agreement Among Unacquainted Byzantine Generals

School of Computer Science, The Hebrew University of Jerusalem ... This research was supported by Israeli Council for Higher Education and by Sally.

108KB Sizes 3 Downloads 165 Views

Recommend Documents

Prosphora Byzantine style.pdf
have finished kneading we cut out 300 gr of dough and put it in a food container for next time (sustainable up. to 2 weeks in the refrigerator). We cut the dough in ...

Prosphora Byzantine style.pdf
Page 3 of 60. 3. INDICE. Sinopsis ....................................................................................................................................5. Capítulo 1 .....................................................................

Byzantine Supplemental Readings and Images.pdf
Page 1 of 2. Stand 02/ 2000 MULTITESTER I Seite 1. RANGE MAX/MIN VoltSensor HOLD. MM 1-3. V. V. OFF. Hz A. A. °C. °F. Hz. A. MAX. 10A. FUSED.

Efficient Byzantine k-Anonymous Broadcast
Efficient Byzantine k-Anonymous Broadcast. Bryan Turner [email protected]. August, 2006. Abstract. Anonymous message transmission allows participants to exchange messages while keeping the sender and receiver identities private. Protocols based

On Optimal Probabilistic Asynchronous Byzantine ...
multivalued consensus protocol. We propose the long message multi-valued con- sensus protocols in the asynchronous networks (there is no common global clock and message delivery time is indefinite) using the asynchronous short message broadcast proto

Byzantine-Islam Study Guide.pdf
Download. Connect more apps... Try one of the apps below to open or edit this item. Byzantine-Islam Study Guide.pdf. Byzantine-Islam Study Guide.pdf. Open.

Regles generals jocs LAN Party.pdf
... apps below to open or edit this item. Regles generals jocs LAN Party.pdf. Regles generals jocs LAN Party.pdf. Open. Extract. Open with. Sign In. Main menu.

Brahms: Byzantine Resilient Random Membership ...
Mar 15, 2009 - Since pushes arrive unsolicited, an adversary with an unlimited capacity could swamp ...... Service for Wireless Ad Hoc Networks. In ACM .... the 4th USENIX Symposium on Internet Technologies and Systems (USITS), 2003.

Brahms: Byzantine Resilient Random Membership ...
tion partners in gossip-based protocols [6, 10, 13], data sampling, ..... tim to pull more data from faulty nodes. As the ...... Replicated Database Management.

Medication Agreement
I release Jefferson County School District staff from all liability for any injury caused by the administration of the medication in compliance with medication label.

Asynchronous Byzantine Consensus - automatic ...
Jun 24, 2007 - A. B. C normal phase recovery phase normal phase recovery phase liveness: processes decide ... usually always safety: one decision per ... system state execution emphasis speed robustness number of steps small (fast) large (slow) solut

Stipulation of Agreement to Negotiate Agreement to Arbitrate.pdf ...
Retrying... Stipulation of Agreement to Negotiate Agreement to Arbitrate.pdf. Stipulation of Agreement to Negotiate Agreement to Arbitrate.pdf. Open. Extract.

AGREEMENT OF SALE This AGREEMENT OF SALE ... -
Oct 10, 2013 - Company registered under the Companies Act 1956, having its registered ...... brings an alternative purchaser for the said apartment, the Vendor No.1/Developer ..... capacity) per block with rescue device and V3F for energy.

First Hibernate example Generals Short introduction ...
Feb 25, 2005 - Hibernate provides a solution to map database tables to a class. .... Create the Honey.hbm.xml in the package de.laliluna.example and change ...

LOT Agreement Overview
... a group bear 100% of the costs. ○ >50% of PAE targets have revenues