A Faster P Solution for the Byzantine Agreement Problem
نویسندگان
چکیده
We propose an improved generic version of P modules, an extensible framework for recursive composition of P systems. We further provide a revised P solution for the Byzantine agreement problem, based on Exponential Information Gathering (EIG) trees, for N processes connected in a complete graph. Each process is modelled by the combination of N + 1 modules: one “main” module, plus one “firewall” communication module for each process (including one for itself). The EIG tree evaluation functionality is localized into a “main” single cell P module. The messaging functionality is localized into a three cells communication P module. This revised P solution improves overall running time from 9L+ 6 to 6L+ 1, where L is the number of messaging rounds. Most of the running time, 5L steps, is spent on the communication overhead. We briefly discuss if single cells can solve the Byzantine agreement without support and protection from additional communication cells; we conjecture that this is not possible, within the currently accepted definitions.
منابع مشابه
Simple Gradecast Based Algorithms
Gradecast is a simple three-round algorithm presented by Feldman and Micali. The current work presents a very simple synchronous algorithm that utilized Gradecast to achieve Byzantine agreement. Two small variations of the presented algorithm lead to improved algorithms for solving the Approximate agreement problem and the Multi-consensus problem. An optimal approximate agreement algorithm was ...
متن کاملByzantine Agreements in Secure Communication
Byzantine Agreements were first formally proposed by Lamport [8], for use in finding faulty processors in distrubuted computer networks. In this article we will use the process of finding faults to uncover traitors in secure communications networks. Maintaining reliability in trusted networks is an important application of Byzantine Agreements. Thus by introducing the fundamentals of the Byzant...
متن کاملct 2 00 3 Byzantine Agreements in Secure Communication
Byzantine Agreements were first formally proposed by Lamport [8], for use in finding faulty processors in distrubuted computer networks. In this article we will use the process of finding faults to uncover traitors in secure communications networks. Maintaining reliability in trusted networks is an important application of Byzantine Agreements. Thus by introducing the fundamentals of the Byzant...
متن کاملOptimization of Multi-Scenario Problems Using Multi-Criterion Methods: A Case Study on Byzantine Agreement Problem
In this paper, we address solution methodologies of an optimization problem under multiple scenarios. Often in practice, a problem needs to be considered for different scenarios, such as evaluating for different loading conditions, different blocks of data, multi-stage operations, etc. After reviewing various single-objective aggregate methods for handling objectives and constraints under multi...
متن کاملTight Bounds for Connectivity and Set Agreement in Byzantine Synchronous Systems
In this paper, we show that the protocol complex of a Byzantine synchronous system can remain (k− 1)-connected for up to ⌈t/k⌉ rounds, where t is the maximum number of Byzantine processes, and t ≥ k ≥ 1. Protocol complex connectivity is important since a (k − 1)-connected protocol complex does not admit solutions for the k-set agreement problem. In crash-failure systems, the connectivity upper ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010