Towards practical communication in Byzantine-resistant DHTs

  • Authors:
  • Maxwell Young;Aniket Kate;Ian Goldberg;Martin Karsten

  • Affiliations:
  • School of Computing, National University of Singapore, Singapore, Singapore;Max Planck Institute for Software Systems, Saarbrücken, Germany;David R. Cheriton School of Computer Science, University of Waterloo,Waterloo, ON, Canada;David R. Cheriton School of Computer Science, University of Waterloo,Waterloo, ON, Canada

  • Venue:
  • IEEE/ACM Transactions on Networking (TON)
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

There are several analytical results on distributed hash tables (DHTs) that can tolerate Byzantine faults. Unfortunately, in such systems, operations such as data retrieval and message sending incur significant communication costs. For example, a simple scheme used in many Byzantine fault-tolerant DHT constructions of n nodes requires O(log3 n) messages; this is likely impractical for real-world applications. The previous best known message complexity is O(log2 n) in expectation. However, the corresponding protocol suffers from prohibitive costs owing to hidden constants in the asymptotic notation and setup costs. In this paper, we focus on reducing the communication costs against a computationally bounded adversary. We employ threshold cryptography and distributed key generation to define two protocols, both of which are more efficient than existing solutions. In comparison, our first protocol is deterministic with O(log2 n) message complexity, and our second protocol is randomized with expected O(log n) message complexity. Furthermore, both the hidden constants and setup costs for our protocols are small, and no trusted third party is required. Finally, we present results from microbenchmarks conducted over PlanetLab showing that our protocols are practical for deployment under significant levels of churn and adversarial behavior.