Signature-free asynchronous binary Byzantine consensus with t< n/3, O (n2) messages, and O (1) expected time

A Mostéfaoui, H Moumen, M Raynal - Journal of the ACM (JACM), 2015 - dl.acm.org
Journal of the ACM (JACM), 2015dl.acm.org
This article is on broadcast and agreement in asynchronous message-passing systems
made up of n processes, and where up to t processes may have a Byzantine Behavior. Its
first contribution is a powerful, yet simple, all-to-all broadcast communication abstraction
suited to binary values. This abstraction, which copes with up to t< n/3 Byzantine processes,
allows each process to broadcast a binary value, and obtain a set of values such that (1) no
value broadcast only by Byzantine processes can belong to the set of a correct process, and …
This article is on broadcast and agreement in asynchronous message-passing systems made up of n processes, and where up to t processes may have a Byzantine Behavior. Its first contribution is a powerful, yet simple, all-to-all broadcast communication abstraction suited to binary values. This abstraction, which copes with up to t < n/3 Byzantine processes, allows each process to broadcast a binary value, and obtain a set of values such that (1) no value broadcast only by Byzantine processes can belong to the set of a correct process, and (2) if the set obtained by a correct process contains a single value v, then the set obtained by any correct process contains v.
The second contribution of this article is a new round-based asynchronous consensus algorithm that copes with up to t < n/3 Byzantine processes. This algorithm is based on the previous binary broadcast abstraction and a weak common coin. In addition to being signature-free and optimal with respect to the value of t, this consensus algorithm has several noteworthy properties: the expected number of rounds to decide is constant; each round is composed of a constant number of communication steps and involves O(n2) messages; each message is composed of a round number plus a constant number of bits. Moreover, the algorithm tolerates message reordering by the adversary (i.e., the Byzantine processes).
ACM Digital Library