Breaking the O(n2) bit barrier: Scalable byzantine agreement with an adaptive adversary

  • Authors:
  • Valerie King;Jared Saia

  • Affiliations:
  • University of Victoria, Victoria, BC, Canada;University of New Mexico, Albuquerque, NM

  • Venue:
  • Journal of the ACM (JACM)
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We describe an algorithm for Byzantine agreement that is scalable in the sense that each processor sends only Õ(&sqrt;n) bits, where n is the total number of processors. Our algorithm succeeds with high probability against an adaptive adversary, which can take over processors at any time during the protocol, up to the point of taking over arbitrarily close to a 1/3 fraction. We assume synchronous communication but a rushing adversary. Moreover, our algorithm works in the presence of flooding: processors controlled by the adversary can send out any number of messages. We assume the existence of private channels between all pairs of processors but make no other cryptographic assumptions. Finally, our algorithm has latency that is polylogarithmic in n. To the best of our knowledge, ours is the first algorithm to solve Byzantine agreement against an adaptive adversary, while requiring o(n2) total bits of communication.