From almost everywhere to everywhere: Byzantine agreement with Õ (n3/2) bits

26Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We address the problem of designing distributed algorithms for large scale networks that are robust to Byzantine faults. We consider a message passing, full information synchronous model: the adversary is malicious, controls a constant fraction of processors, and can view all messages in a round before sending out its own messages for that round. Furthermore, each corrupt processor may send an unlimited number of messages. The only constraint on the adversary is that it must choose its corrupt processors at the start, without knowledge of the processors' private random bits. To the authors' best knowledge, there have been no protocols for such a model that compute Byzantine agreement without all-to-all communication, even if private channels or cryptography are assumed, unless corrupt processors' messages are limited. In this paper, we give a polylogarithmic time algorithm to agree on a small representative committee of processors using only total bits which succeeds with high probability. This representative set can then be used to efficiently solve Byzantine agreement, leader election, or other problems. This work extends the authors' work on scalable almost everywhere agreement. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

King, V., & Saia, J. (2009). From almost everywhere to everywhere: Byzantine agreement with Õ (n3/2) bits. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5805 LNCS, pp. 464–478). https://doi.org/10.1007/978-3-642-04355-0_47

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free