ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.02670
32
4
v1v2 (latest)

Synchronous Byzantine Lattice Agreement in O(log⁡(f)){\cal O}(\log (f))O(log(f)) Rounds

8 January 2020
Giuseppe Antonio Di Luna
E. Anceaume
Silvia Bonomi
Leonardo Querzoni
    LRM
ArXiv (abs)PDFHTML
Abstract

In the Lattice Agreement (LA) problem, originally proposed by Attiya et al., a set of processes has to decide on a chain of a lattice. More precisely, each correct process proposes an element eee of a certain join-semi lattice LLL and it has to decide on a value that contains eee. Moreover, any pair pi,pjp_i,p_jpi​,pj​ of correct processes has to decide two values decidec_ideci​ and decjdec_jdecj​ that are comparable (e.g. deci≤decjdec_i \leq dec_jdeci​≤decj​ or decj<decidec_j < dec_idecj​<deci​). LA has been studied for its practical applications, as example it can be used to implement a snapshot objects or a replicated state machine with commutative operations. Interestingly, the study of the Byzantine Lattice Agreement started only recently, and it has been mainly devoted to asynchronous systems. The synchronous case has been object of a recent pre-print where Zheng et al. propose an algorithm terminating in O(f){\cal O}(\sqrt f)O(f​) rounds and tolerating n/3−1n/3-1n/3−1 Byzantine processes. In this paper we present new contributions for the synchronous case. We investigate the problem in the usual message passing model for a system of nnn processes with distinct unique IDs. We first prove that, when only authenticated channels are available, the problem cannot be solved if f=n/3f=n/3f=n/3 or more processes are Byzantine. We then propose a novel algorithm that works in a synchronous system model with signatures (i.e., the {\em authenticated message} model), tolerates up to fff byzantine failures (where f<n/3f<n/3f<n/3) and that terminates in O(log⁡f){\cal O}(\log f)O(logf) rounds. We discuss how to remove authenticated messages at the price of algorithm resiliency (f<n/4f < n/4f<n/4).

View on arXiv
Comments on this paper