ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2203.02553
27
7
v1v2 (latest)

Optimal Clock Synchronization with Signatures

4 March 2022
Christoph Lenzen
J. Loss
ArXiv (abs)PDFHTML
Abstract

Cryptographic signatures can be used to increase the resilience of distributed systems against adversarial attacks, by increasing the number of faulty parties that can be tolerated. While this is well-studied for consensus, it has been underexplored in the context of fault-tolerant clock synchronization, even in fully connected systems. Here, the honest parties of an nnn-node system are required to compute output clocks of small skew (i.e., maximum phase offset) despite local clock rates varying between 111 and ϑ>1\vartheta>1ϑ>1, end-to-end communication delays varying between d−ud-ud−u and ddd, and the interference from malicious parties. So far, it is only known that clock pulses of skew ddd can be generated with (trivially optimal) resilience of ⌈n/2⌉−1\lceil n/2\rceil-1⌈n/2⌉−1 (PODC `19), improving over the tight bound of ⌈n/3⌉−1\lceil n/3\rceil-1⌈n/3⌉−1 holding without signatures for \emph{any} skew bound (STOC `84, PODC `85). Since typically d≫ud\gg ud≫u and ϑ−1≪1\vartheta-1\ll 1ϑ−1≪1, this is far from the lower bound of u+(ϑ−1)du+(\vartheta-1)du+(ϑ−1)d that applies even in the fault-free case (IPL `01). We prove matching upper and lower bounds of Θ(u+(ϑ−1)d)\Theta(u+(\vartheta-1)d)Θ(u+(ϑ−1)d) on the skew for the resilience range from ⌈n/3⌉\lceil n/3\rceil⌈n/3⌉ to ⌈n/2⌉−1\lceil n/2\rceil-1⌈n/2⌉−1. The algorithm showing the upper bound is, under the assumption that the adversary cannot forge signatures, deterministic. The lower bound holds even if clocks are initially perfectly synchronized, message delays between honest nodes are known, ϑ\varthetaϑ is arbitrarily close to one, and the synchronization algorithm is randomized. This has crucial implications for network designers that seek to leverage signatures for providing more robust time. In contrast to the setting without signatures, they must ensure that an attacker cannot easily bypass the lower bound on the delay on links with a faulty endpoint.

View on arXiv
Comments on this paper