Good-case early-stopping latency of synchronous byzantine reliable broadcast: the deterministic case

This paper considers the good-case latency of Byzantine Reliable Broadcast (BRB), i.e., the time taken by correct processes to deliver a message when the initial sender is correct. This time plays a crucial role in the performance of practical distributed systems. Although significant strides have b...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Distributed computing Jg. 37; H. 2; S. 121 - 143
Hauptverfasser: Albouy, Timothé, Frey, Davide, Raynal, Michel, Taïani, François
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2024
Springer Nature B.V
Springer Verlag
Schlagworte:
ISSN:0178-2770, 1432-0452
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This paper considers the good-case latency of Byzantine Reliable Broadcast (BRB), i.e., the time taken by correct processes to deliver a message when the initial sender is correct. This time plays a crucial role in the performance of practical distributed systems. Although significant strides have been made in recent years on this question, progress has mainly focused on either asynchronous or randomized algorithms. By contrast, the good-case latency of deterministic synchronous BRB under a majority of Byzantine faults has been little studied. In particular, it was not known whether a good-case latency below the worst-case bound of t + 1 rounds could be obtained. This work answers this open question positively and proposes a deterministic synchronous Byzantine reliable broadcast that achieves a good-case latency of max ( 2 , t + 3 - c ) rounds (or equivalently max ( 2 , f + t + 3 - n ) ), where t is the upper bound on the number of Byzantine processes, f ≤ t the number of effectively Byzantine processes, and c = n - f the number of effectively correct processes. The proposed algorithm does not put any constraint on t , and assumes an authenticated setting, in which individual processes can sign the messages they send, and verify the authenticity of the signatures they receive.
Bibliographie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0178-2770
1432-0452
DOI:10.1007/s00446-024-00464-6