skip to main content
10.1145/3382734.3405717acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
short-paper

Brief Announcement: On Using Null Messages in a Byzantine Setting

Published:31 July 2020Publication History

ABSTRACT

In reliable settings, null messages allow the transfer of information without explicit communication in cases of interest. We investigate the use of null messages in the much more challenging Byzantine model (without signatures). Different ways of using null messages are discussed. One of them, called a silent validation round, can provide processes with global information about all correct sites of the system, without any message exchange. As a case study, we consider optimizing the behavior in failure-free runs of protocols for the classic Byzantine Consensus problem.

References

  1. Eugene S Amdur, Samuel M Weber, and Vassos Hadzilacos. 1992. On the message complexity of binary byzantine agreement under crash failures. Distributed Computing 5, 4 (1992), 175--186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Piotr Berman, Juan A Garay, and Kenneth J Perry. 1992. Optimal early stopping in distributed consensus. In International Workshop on Distributed Algorithms. Springer, 221--237.Google ScholarGoogle ScholarCross RefCross Ref
  3. KM Chandy and Jayadev Misra. 1986. How processes learn. Distributed Computing 1, 1 (1986), 40--52.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gregory Chockler, Murat Demirbas, Seth Gilbert, Nancy Lynch, Calvin Newport, and Tina Nolte. 2008. Consensus and collision detectors in radio networks. Distributed Computing 21, 1 (2008), 55--84.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Danny Dolev and Rüdiger Reischuk. 1985. Bounds on information exchange for Byzantine agreement. Journal of the ACM (JACM) 32, 1 (1985), 191--204.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Danny Dolev and H. Raymond Strong. 1983. Authenticated algorithms for Byzantine agreement. SIAM J. Comput. 12, 4 (1983), 656--666.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Seth Gilbert, Rachid Guerraoui, and Calvin Newport. 2009. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. Theoretical Computer Science 410, 6-7 (2009), 546--569.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Guy Goren and Yoram Moses. 2018. Silence. In Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing (PODC '18). ACM, New York, NY, USA, 285--294. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Rachid Guerraoui and Jingjing Wang. 2017. How fast can a distributed transaction commit?. In Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems. ACM, 107--122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Vassos Hadzilacos and Joseph Y Halpern. 1993. Message-optimal protocols for Byzantine agreement. Mathematical Systems Theory 26, 1 (1993), 41--102.Google ScholarGoogle ScholarCross RefCross Ref
  11. Leslie Lamport. 1978. Time, Clocks, and the Ordering of Events in a Distributed System. Communications (1978).Google ScholarGoogle Scholar
  12. Leslie Lamport. 1984. Using time instead of timeout for fault-tolerant distributed systems. ACM Transactions on Programming Languages and Systems (TOPLAS) 6, 2 (1984), 254--280.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Russell Turpin and Brian A Coan. 1984. Extending binary Byzantine agreement to multivalued Byzantine agreement. Inform. Process. Lett. 18, 2 (1984), 73--76.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Brief Announcement: On Using Null Messages in a Byzantine Setting

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          PODC '20: Proceedings of the 39th Symposium on Principles of Distributed Computing
          July 2020
          539 pages
          ISBN:9781450375825
          DOI:10.1145/3382734

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 31 July 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          Overall Acceptance Rate740of2,477submissions,30%

          Upcoming Conference

          PODC '24
        • Article Metrics

          • Downloads (Last 12 months)11
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader