We address the problem of designing distributed algorithms for large scale networks that are robust to Byzantine faults. We consider a message passing, full information synchronous model: the adversary is malicious, controls a constant fraction of processors, and can view all messages in a round before sending out its own messages for that round. Furthermore, each corrupt processor may send an unlimited number of messages. The only constraint on the adversary is that it must choose its corrupt processors at the start, without knowledge of the processors' private random bits. To the authors' best knowledge, there have been no protocols for such a model that compute Byzantine agreement without all-to-all communication, even if private channels or cryptography are assumed, unless corrupt processors' messages are limited. In this paper, we give a polylogarithmic time algorithm to agree on a small representative committee of processors using only total bits which succeeds with high probability. This representative set can then be used to efficiently solve Byzantine agreement, leader election, or other problems. This work extends the authors' work on scalable almost everywhere agreement. © 2009 Springer Berlin Heidelberg.
CITATION STYLE
King, V., & Saia, J. (2009). From almost everywhere to everywhere: Byzantine agreement with Õ (n3/2) bits. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5805 LNCS, pp. 464–478). https://doi.org/10.1007/978-3-642-04355-0_47
Mendeley helps you to discover research relevant for your work.