Abstract
The Byzantine General Problem is a well-known problem in distributed systems, Fitzi et al. (Phys Rev Lett 87(21):217901, 2001) and Gaertner et al. (Phys Rev Lett 100(7):070504, 2008) proposed slightly weaker 3-players Byzantine protocols using quantum entanglement, respectively. However, these protocols are difficult to be applied to the n-players situation, since they require a lot of complicated entangled quantum resources, and more seriously, they all face the risk of being attacked. In this work, we present a more practical protocol than previous proposals, which can be applied to the n-players containing t traitors (\(t < \frac{n}{2}\)) and only requires some very simple entangled states and a few digital signatures. Our protocol matches an incentives mechanism to achieve optimal efficiency: Only one round of execution and O(mn) message complexity are required, where m is a minor parameter of the protocol. (In the worst case, the entire network requires \(t+1\) rounds and \(O(n^2t)\) message complexity, yet the reward mechanism will prevent this situation.)
Similar content being viewed by others
References
Fitzi, M., Gisin, N., Maurer, U.: A quantum solution to the byzantine agreement problem. Phys. Rev. Lett. 87(21), 217901 (2001)
Gaertner, S., Bourennane, M., Kurtsiefer, C., Cabello, A., Weinfurter, H.: Experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 100(7), 070504 (2008)
Pease, M.: Reaching Agreement in the Presence of Faults. ACM, New York (1980)
Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)
Fitzi, M., Gottesman, D., Hirt, M., Holenstein, T.: Detectable byzantine agreement secure against faulty majorities. In: Symposium on Principles of Distributed Computing, pp. 118–126 (2002)
Dolev, D., Strong, H.R.: Authenticated algorithms for byzantine agreement. Siam J. Comput. 12(4), 656–666 (1983)
Deng, W., Deng, Y.: Entropic methodology for entanglement measures. Phys. A: Stat. Mech. Appl. 512, 08 (2018)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Working Paper (2008)
Eyal, I., Gencer, A.E., Renesse, R.V.: Bitcoin-ng: a scalable blockchain protocol. In: Usenix Conference on Networked Systems Design & Implementation (2016)
Kokoriskogias, E., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. Appl. Math. Model. 37(8), 5723–5742 (2016)
Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: Symposium on Operating Systems Design & Implementation (1999)
Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: International Conference on Financial Cryptography & Data Security (2014)
Acknowledgements
We are grateful to thank S. L. Ye for the helpful discussions. This work was supported by the National Natural Science Foundation of China (No. 61572456) and the Anhui Initiative in Quantum Information Technologies (No. AHY150300).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Xue, L., Chen, B., Yang, W. et al. Practical quantum Byzantine protocol via nearly optimal entanglement resources. Quantum Inf Process 18, 301 (2019). https://doi.org/10.1007/s11128-019-2419-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-019-2419-y