Abstract
Schemes for the identification and replacement of two-faced Byzantine processes are presented. The detection is based on the comparison of the (blackbox) decision result of a Byzantine consensus on input consisting of the inputs of each of the processes, in a system containing n processes \(p_1,\dots , p_n\). Process \(p_i\) that received a gossiped message from \(p_j\) with the input of another process \(p_k\), that differs from \(p_k\)’s input value as received from \(p_k\) by \(p_i\), reports on \(p_k\) and \(p_j\) being two-faced. If enough processes (where enough means at least \(t+1\), \(t<n\) is a threshold on the number of Byzantine participants) report on the same participant \(p_j\) to be two-faced, participant \(p_j\) is replaced. If less than the required \(t+1\) processes threshold report on a participant \(p_j\), both the reporting processes and the reported process are replaced. If one of them is not Byzantine, its replacement is the price to pay to cope with the uncertainty created by Byzantine processes. The scheme ensures that any two-faced Byzantine participant that prevents fast termination is eliminated and replaced. Such replacement may serve as a preparation for the next invocations of Byzantine agreement possibly used to implement a replicated state machine.
The research was partially supported by the Rita Altura Trust Chair in Computer Sciences; the Lynne and William Frankel Center for Computer Science; the Ministry of Foreign Affairs, Italy; the grant from the Ministry of Science, Technology and Space, Israel, and the National Science Council (NSC) of Taiwan; the Ministry of Science, Technology and Space, Infrastructure Research in the Field of Advanced Computing and Cyber Security; and the Israel National Cyber Bureau. Michel Raynal visited BGU with the support of the Dozor foundation. Contact author: Shlomi Dolev.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Binary Agreement is defined with the set \(V = \{0,1\}\).
- 2.
There is an alternative, stronger property for Validity [6]. The decision value v has to be an input value of at least one non-faulty process.
- 3.
Let us note, that in round-based computations, all \(\mathsf{deliver}()\) events happen during the receive step.
References
Abraham, I., Dolev, D.: Byzantine agreement with optimal early stopping, optimal resilience and polynomial complexity. In: Proceedings of the 47th Annual on Symposium on Theory of Computing (STOC) (2015)
Bar-Noy, A., Dolev, D., Dwork, C., Strong, H.R.: Shifting gears: changing algorithms on the fly to expedite Byzantine agreement. Inf. Comput. 97(2), 205–233 (1992)
Binun, A., et al.: Self-stabilizing Byzantine-tolerant distributed replicated state machine. In: Bonakdarpour, B., Petit, F. (eds.) SSS 2016. LNCS, vol. 10083, pp. 36–53. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49259-9_4
Dolev, D., Reischuk, R., Strong, H.R.: Early stopping in Byzantine agreement. J. ACM 37(4), 720–741 (1990)
Kung, H.T., Robinson, J.T.: On optimistic methods for concurrency control. ACM Trans. Database Syst. 6(2), 213–226 (1981)
Mostfaoui, A., Raynal, M.: Intrusion-tolerant broadcast and agreement abstractions in the presence of Byzantine processes. IEEE Trans. Parallel Distrib. Syst. 27(4), 1085–1098 (2016)
Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228–234 (1980)
Shaer, A., Dolev, S., Bonomi S., Raynal, M., Baldoni, R.: Bee’s strategy against Byzantines, replacing Byzantine participant. Technical report \(\#\)18-05, Department of Computer Science, Ben-Gurion University of the Negev (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Shaer, A., Dolev, S., Bonomi, S., Raynal, M., Baldoni, R. (2018). Bee’s Strategy Against Byzantines Replacing Byzantine Participants. In: Izumi, T., Kuznetsov, P. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2018. Lecture Notes in Computer Science(), vol 11201. Springer, Cham. https://doi.org/10.1007/978-3-030-03232-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-03232-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03231-9
Online ISBN: 978-3-030-03232-6
eBook Packages: Computer ScienceComputer Science (R0)