skip to main content
research-article

Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection

Published:12 April 2024Publication History
Skip Abstract Section

Abstract

Since the mid-1980s it has been known that Byzantine Agreement can be solved with probability 1 asynchronously, even against an omniscient, computationally unbounded adversary that can adaptively corrupt up to f < n/3 parties. Moreover, the problem is insoluble with f ≥ n/3 corruptions. However, Bracha’s [13] 1984 protocol (see also Ben-Or [8]) achieved f < n/3 resilience at the cost of exponential expected latency 2Θ (n), a bound that has never been improved in this model with f = ⌊ (n-1)/3 ⌋ corruptions.

In this article, we prove that Byzantine Agreement in the asynchronous, full information model can be solved with probability 1 against an adaptive adversary that can corrupt f < n/3 parties, while incurring only polynomial latency with high probability. Our protocol follows an earlier polynomial latency protocol of King and Saia [33, 34], which had suboptimal resilience, namely f ≈ n/109 [33, 34].

Resilience f = (n-1)/3 is uniquely difficult, as this is the point at which the influence of the Byzantine and honest players are of roughly equal strength. The core technical problem we solve is to design a collective coin-flipping protocol that eventually lets us flip a coin with an unambiguous outcome. In the beginning, the influence of the Byzantine players is too powerful to overcome, and they can essentially fix the coin’s behavior at will. We guarantee that after just a polynomial number of executions of the coin-flipping protocol, either (a) the Byzantine players fail to fix the behavior of the coin (thereby ending the game) or (b) we can “blacklist” players such that the blacklisting rate for Byzantine players is at least as large as the blacklisting rate for good players. The blacklisting criterion is based on a simple statistical test of fraud detection.

REFERENCES

  1. [1] Abraham Ittai, Dolev Danny, and Halpern Joseph Y.. 2008. An almost-surely terminating polynomial protocol forasynchronous Byzantine agreement with optimal resilience. In Proceedings of the 27th Annual ACM Symposium on Principles of Distributed Computing. 405414. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Ajtai Miklós and Linial Nathan. 1993. The influence of large coalitions. Combinatorica 13, 2 (1993), 129145. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Alon Noga and Naor Moni. 1993. Coin-flipping games immune against linear-sized coalitions. SIAM Journal on Computing 22, 2 (1993), 403417. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Aspnes James. 1998. Lower bounds for distributed coin-flipping and randomized consensus. Journal of the ACM 45, 3 (1998), 415450. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Attiya Hagit and Censor Keren. 2008. Tight bounds for asynchronous randomized consensus. Journal of the ACM 55, 5 (2008), 126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Attiya Hagit and Welch Jennifer L.. 2004. Distributed Computing, 2nd Ed.Wiley.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Bangalore Laasya, Choudhury Ashish, and Patra Arpita. 2020. The power of shunning: Efficient asynchronous Byzantine agreement revisited. Journal of the ACM 67, 3 (2020), 14:1–14:59. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Ben-Or Michael. 1983. Another advantage of free choice: Completely asynchronous agreement protocols (extended abstract). In Proceedings of the 2nd Annual ACM Symposium on Principles of Distributed Computing. 2730. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Ben-Or Michael and Linial Nathan. 1985. Collective coin flipping, robust voting schemes and minima of Banzhaf values. In Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science. 408416. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Ben-Or Michael, Pavlov Elan, and Vaikuntanathan Vinod. 2006. Byzantine agreement in the full-information model in \({O}(\log n)\) rounds. In Proceedings of the 38th Annual ACM Symposium on Theory of Computing. 179186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Berman Piotr and Garay Juan A.. 1993. Randomized distributed agreement revisited. In Proceedings of the 23rd Annual International Symposium on Fault-Tolerant Computing. 412419. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Boppana Ravi B. and Narayanan Babu O.. 2000. Perfect-information leader election with optimal resilience. SIAM Journal on Computing 29, 4 (2000), 13041320. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Bracha Gabriel. 1987. Asynchronous Byzantine agreement protocols. Information and Computation 75, 2 (1987), 130143. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Bracha Gabriel and Toueg Sam. 1985. Asynchronous consensus and broadcast protocols. Journal of the ACM 32, 4 (1985), 824840. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Cachin Christian, Kursawe Klaus, and Shoup Victor. 2005. Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. Journal of Cryptology 18, 3 (2005), 219246. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Canetti Ran and Rabin Tal. 1993. Fast asynchronous Byzantine agreement with optimal resilience. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing. 4251. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Chor Benny and Coan Brian A.. 1985. A simple and efficient randomized Byzantine agreement algorithm. IEEE Transactions on Software Engineering 11, 6 (1985), 531539.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Dubhashi D. P. and Panconesi A.. 2009. Concentration of Measure for the Analysis of Randomized Algorithms. Cambridge University Press.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Dwork Cynthia, Lynch Nancy, and Stockmeyer Larry. 1988. Consensus in the presence of partial synchrony. Journal of the ACM 35, 2 (1988), 288323.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Feige Uriel. 1999. Noncryptographic selection protocols. In Proceedings 40th Annual IEEE Symposium on Foundations of Computer Science. 142153. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Feldman Pesech and Micali Silvio. 1997. An optimal probabilistic protocol for synchronous Byzantine agreement. SIAM Journal on Computing 26, 4 (1997), 873933. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Fischer Michael J. and Lynch Nancy A.. 1982. A lower bound for the time to assure interactive consistency. Information Processing Letters 14, 4 (1982), 183186. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Fischer Michael J., Lynch Nancy A., and Merritt Michael. 1986. Easy impossibility proofs for distributed consensus problems. Distributed Computing 1, 1 (1986), 2639. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Fischer Michael J., Lynch Nancy A., and Paterson Mike. 1985. Impossibility of distributed consensus with one faulty process. Journal of the ACM 32, 2 (1985), 374382. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Garay Juan A. and Moses Yoram. 1998. Fully polynomial Byzantine agreement for \(n\gt 3t\) processors in \(t+1\) rounds. SIAM Journal on Computing 27, 1 (1998), 247290. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Goldwasser Shafi, Pavlov Elan, and Vaikuntanathan Vinod. 2006. Fault-tolerant distributed computing in full-information networks. In Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science. 1526. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Haitner Iftach and Karidi-Heller Yonatan. 2020. A tight lower bound on adaptively secure full-information coin flip. In Proceedings of the 61st Annual IEEE Symposium on Foundations of Computer Science. 12681276. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Huang Shang-En, Pettie Seth, and Zhu Leqi. 2022. Byzantine agreement in polynomial time with near-optimal resilience. In Proceedings of the 54th ACM Symposium on Theory of Computing. 502514.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Huang Shang-En, Pettie Seth, and Zhu Leqi. 2023. Byzantine agreement with optimal resilience via statistical fraud detection. In Proceedings of the 34th ACM-SIAM Symposium on Discrete Algorithms. 43354353.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Kahn Jeff, Kalai Gil, and Linial Nathan. 1988. The influence of variables on boolean functions (extended abstract). In Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science. 6880. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Kapron Bruce M., Kempe David, King Valerie, Saia Jared, and Sanwalani Vishal. 2010. Fast asynchronous Byzantine agreement and leader election with full information. ACM Transactions on Algorithms 6, 4 (2010), 68:1–68:28. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Kimmett Ben. 2020. Improvement and partial simulation of King & Saia’s expected-polynomial-time Byzantine agreement algorithm. Master’s Thesis. University of Victoria, Canada.Google ScholarGoogle Scholar
  33. [33] King Valerie and Saia Jared. 2016. Byzantine agreement in expected polynomial time. Journal of the ACM 63, 2 (2016), 13:1–13:21. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] King Valerie and Saia Jared. 2018. Correction to Byzantine agreement in expected polynomial time, JACM 2016. arXiv:1812.10169. Retrieved from http://arxiv.org/abs/1812.10169Google ScholarGoogle Scholar
  35. [35] Lamport Leslie, Shostak Robert E., and Pease Marshall C.. 1982. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems 4, 3 (1982), 382401. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Lewko Allison B.. 2011. The contest between simplicity and efficiency in asynchronous Byzantine agreement. In Proceedings of the 25th International Symposium on Distributed Computing (DISC) (Lecture Notes in Computer Science), Vol. 6950. 348362. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Lynch Nancy A.. 1996. Distributed Algorithms. Morgan Kaufmann.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Pease Marshall C., Shostak Robert E., and Lamport Leslie. 1980. Reaching agreement in the presence of faults. Journal of the ACM 27, 2 (1980), 228234. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Rabin Michael O.. 1983. Randomized Byzantine generals. In Proceedings of the 24th Annual IEEE Symposium on Foundations of Computer Science. 403409. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Russell Alexander, Saks Michael E., and Zuckerman David. 2002. Lower bounds for leader election and collective coin-flipping in the perfect information model. SIAM Journal on Computing 31, 6 (2002), 16451662. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Saks Michael E.. 1989. A robust noncryptographic protocol for collective coin flipping. SIAM Journal on Discrete Mathematics 2, 2 (1989), 240244. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Toueg Sam. 1984. Randomized Byzantine agreements. In Proceedings of the 3rd Annual ACM Symposium on Principles of Distributed Computing. 163178. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Journal of the ACM
        Journal of the ACM  Volume 71, Issue 2
        April 2024
        627 pages
        ISSN:0004-5411
        EISSN:1557-735X
        DOI:10.1145/3613546
        • Editor:
        • Venkatesan Guruswami
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 April 2024
        • Online AM: 2 January 2024
        • Accepted: 15 December 2023
        • Revised: 30 August 2023
        • Received: 10 January 2023
        Published in jacm Volume 71, Issue 2

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)116
        • Downloads (Last 6 weeks)54

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text