Skip to main content
Log in

Practical quantum Byzantine protocol via nearly optimal entanglement resources

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

The Byzantine General Problem is a well-known problem in distributed systems, Fitzi et al. (Phys Rev Lett 87(21):217901, 2001) and Gaertner et al. (Phys Rev Lett 100(7):070504, 2008) proposed slightly weaker 3-players Byzantine protocols using quantum entanglement, respectively. However, these protocols are difficult to be applied to the n-players situation, since they require a lot of complicated entangled quantum resources, and more seriously, they all face the risk of being attacked. In this work, we present a more practical protocol than previous proposals, which can be applied to the n-players containing t traitors (\(t < \frac{n}{2}\)) and only requires some very simple entangled states and a few digital signatures. Our protocol matches an incentives mechanism to achieve optimal efficiency: Only one round of execution and O(mn) message complexity are required, where m is a minor parameter of the protocol. (In the worst case, the entire network requires \(t+1\) rounds and \(O(n^2t)\) message complexity, yet the reward mechanism will prevent this situation.)

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Fitzi, M., Gisin, N., Maurer, U.: A quantum solution to the byzantine agreement problem. Phys. Rev. Lett. 87(21), 217901 (2001)

    Article  ADS  Google Scholar 

  2. Gaertner, S., Bourennane, M., Kurtsiefer, C., Cabello, A., Weinfurter, H.: Experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 100(7), 070504 (2008)

    Article  ADS  Google Scholar 

  3. Pease, M.: Reaching Agreement in the Presence of Faults. ACM, New York (1980)

    Book  Google Scholar 

  4. Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)

    Article  Google Scholar 

  5. Fitzi, M., Gottesman, D., Hirt, M., Holenstein, T.: Detectable byzantine agreement secure against faulty majorities. In: Symposium on Principles of Distributed Computing, pp. 118–126 (2002)

  6. Dolev, D., Strong, H.R.: Authenticated algorithms for byzantine agreement. Siam J. Comput. 12(4), 656–666 (1983)

    Article  MathSciNet  Google Scholar 

  7. Deng, W., Deng, Y.: Entropic methodology for entanglement measures. Phys. A: Stat. Mech. Appl. 512, 08 (2018)

    Article  MathSciNet  Google Scholar 

  8. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Working Paper (2008)

  9. Eyal, I., Gencer, A.E., Renesse, R.V.: Bitcoin-ng: a scalable blockchain protocol. In: Usenix Conference on Networked Systems Design & Implementation (2016)

  10. Kokoriskogias, E., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. Appl. Math. Model. 37(8), 5723–5742 (2016)

    Google Scholar 

  11. Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: Symposium on Operating Systems Design & Implementation (1999)

  12. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: International Conference on Financial Cryptography & Data Security (2014)

Download references

Acknowledgements

We are grateful to thank S. L. Ye for the helpful discussions. This work was supported by the National Natural Science Foundation of China (No. 61572456) and the Anhui Initiative in Quantum Information Technologies (No. AHY150300).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Yang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xue, L., Chen, B., Yang, W. et al. Practical quantum Byzantine protocol via nearly optimal entanglement resources. Quantum Inf Process 18, 301 (2019). https://doi.org/10.1007/s11128-019-2419-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-019-2419-y

Keywords

Navigation