Skip to main content

Bee’s Strategy Against Byzantines Replacing Byzantine Participants

(Extended Abstract)

  • Conference paper
  • First Online:
Stabilization, Safety, and Security of Distributed Systems (SSS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11201))

Abstract

Schemes for the identification and replacement of two-faced Byzantine processes are presented. The detection is based on the comparison of the (blackbox) decision result of a Byzantine consensus on input consisting of the inputs of each of the processes, in a system containing n processes \(p_1,\dots , p_n\). Process \(p_i\) that received a gossiped message from \(p_j\) with the input of another process \(p_k\), that differs from \(p_k\)’s input value as received from \(p_k\) by \(p_i\), reports on \(p_k\) and \(p_j\) being two-faced. If enough processes (where enough means at least \(t+1\), \(t<n\) is a threshold on the number of Byzantine participants) report on the same participant \(p_j\) to be two-faced, participant \(p_j\) is replaced. If less than the required \(t+1\) processes threshold report on a participant \(p_j\), both the reporting processes and the reported process are replaced. If one of them is not Byzantine, its replacement is the price to pay to cope with the uncertainty created by Byzantine processes. The scheme ensures that any two-faced Byzantine participant that prevents fast termination is eliminated and replaced. Such replacement may serve as a preparation for the next invocations of Byzantine agreement possibly used to implement a replicated state machine.

The research was partially supported by the Rita Altura Trust Chair in Computer Sciences; the Lynne and William Frankel Center for Computer Science; the Ministry of Foreign Affairs, Italy; the grant from the Ministry of Science, Technology and Space, Israel, and the National Science Council (NSC) of Taiwan; the Ministry of Science, Technology and Space, Infrastructure Research in the Field of Advanced Computing and Cyber Security; and the Israel National Cyber Bureau. Michel Raynal visited BGU with the support of the Dozor foundation. Contact author: Shlomi Dolev.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Binary Agreement is defined with the set \(V = \{0,1\}\).

  2. 2.

    There is an alternative, stronger property for Validity [6]. The decision value v has to be an input value of at least one non-faulty process.

  3. 3.

    Let us note, that in round-based computations, all \(\mathsf{deliver}()\) events happen during the receive step.

References

  1. Abraham, I., Dolev, D.: Byzantine agreement with optimal early stopping, optimal resilience and polynomial complexity. In: Proceedings of the 47th Annual on Symposium on Theory of Computing (STOC) (2015)

    Google Scholar 

  2. Bar-Noy, A., Dolev, D., Dwork, C., Strong, H.R.: Shifting gears: changing algorithms on the fly to expedite Byzantine agreement. Inf. Comput. 97(2), 205–233 (1992)

    Article  MathSciNet  Google Scholar 

  3. Binun, A., et al.: Self-stabilizing Byzantine-tolerant distributed replicated state machine. In: Bonakdarpour, B., Petit, F. (eds.) SSS 2016. LNCS, vol. 10083, pp. 36–53. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49259-9_4

    Chapter  Google Scholar 

  4. Dolev, D., Reischuk, R., Strong, H.R.: Early stopping in Byzantine agreement. J. ACM 37(4), 720–741 (1990)

    Article  MathSciNet  Google Scholar 

  5. Kung, H.T., Robinson, J.T.: On optimistic methods for concurrency control. ACM Trans. Database Syst. 6(2), 213–226 (1981)

    Article  Google Scholar 

  6. Mostfaoui, A., Raynal, M.: Intrusion-tolerant broadcast and agreement abstractions in the presence of Byzantine processes. IEEE Trans. Parallel Distrib. Syst. 27(4), 1085–1098 (2016)

    Article  Google Scholar 

  7. Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228–234 (1980)

    Article  MathSciNet  Google Scholar 

  8. Shaer, A., Dolev, S., Bonomi S., Raynal, M., Baldoni, R.: Bee’s strategy against Byzantines, replacing Byzantine participant. Technical report \(\#\)18-05, Department of Computer Science, Ben-Gurion University of the Negev (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shlomi Dolev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shaer, A., Dolev, S., Bonomi, S., Raynal, M., Baldoni, R. (2018). Bee’s Strategy Against Byzantines Replacing Byzantine Participants. In: Izumi, T., Kuznetsov, P. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2018. Lecture Notes in Computer Science(), vol 11201. Springer, Cham. https://doi.org/10.1007/978-3-030-03232-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03232-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03231-9

  • Online ISBN: 978-3-030-03232-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics