Schemes for the identification and replacement of two-faced Byzantine processes are presented. The detection is based on the comparison of the (blackbox) decision result of a Byzantine consensus on input consisting of the inputs of each of the processes, in a system containing n processes p1, …, pn. Process pi that received a gossiped message from pj with the input of another process pk, that differs from pk ’s input value as received from pk by pi, reports on pk and pj being two-faced. If enough processes (where enough means at least t+1, t < n, is a threshold on the number of Byzantine participants) report on the same participant pj to be two-faced, participant pj is replaced. If less than the required t+1 processes threshold report on a participant pj, both the reporting processes and the reported process are replaced. If one of them is not Byzantine, its replacement is the price to pay to cope with the uncertainty created by Byzantine processes. The scheme ensures that any two-faced Byzantine participant that prevents fast termination is eliminated and replaced. Such replacement may serve as a preparation for the next invocations of Byzantine agreement possibly used to implement a replicated state machine.

Bee’s strategy against byzantines replacing byzantine participants: (Extended Abstract) / Shaer, A.; Dolev, S.; Bonomi, S.; Raynal, M.; Baldoni, R.. - 11201:(2018), pp. 139-153. (Intervento presentato al convegno 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2018 tenutosi a Tokyo; Japan) [10.1007/978-3-030-03232-6_10].

Bee’s strategy against byzantines replacing byzantine participants: (Extended Abstract)

Bonomi S.
;
Baldoni R.
2018

Abstract

Schemes for the identification and replacement of two-faced Byzantine processes are presented. The detection is based on the comparison of the (blackbox) decision result of a Byzantine consensus on input consisting of the inputs of each of the processes, in a system containing n processes p1, …, pn. Process pi that received a gossiped message from pj with the input of another process pk, that differs from pk ’s input value as received from pk by pi, reports on pk and pj being two-faced. If enough processes (where enough means at least t+1, t < n, is a threshold on the number of Byzantine participants) report on the same participant pj to be two-faced, participant pj is replaced. If less than the required t+1 processes threshold report on a participant pj, both the reporting processes and the reported process are replaced. If one of them is not Byzantine, its replacement is the price to pay to cope with the uncertainty created by Byzantine processes. The scheme ensures that any two-faced Byzantine participant that prevents fast termination is eliminated and replaced. Such replacement may serve as a preparation for the next invocations of Byzantine agreement possibly used to implement a replicated state machine.
2018
20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2018
Byzantine failures; Consensus; Detection; Distributed algorithms
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Bee’s strategy against byzantines replacing byzantine participants: (Extended Abstract) / Shaer, A.; Dolev, S.; Bonomi, S.; Raynal, M.; Baldoni, R.. - 11201:(2018), pp. 139-153. (Intervento presentato al convegno 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2018 tenutosi a Tokyo; Japan) [10.1007/978-3-030-03232-6_10].
File allegati a questo prodotto
File Dimensione Formato  
Shaer_Bee’s-strategy_2018.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 432.21 kB
Formato Adobe PDF
432.21 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1365986
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 2
social impact