Tiny Groups Tackle Byzantine Adversaries
Abstract
A popular technique for tolerating malicious faults in open distributed systems is to establish small groups of participants, each of which has a non-faulty majority. These groups are used as building blocks to design attack-resistant algorithms. Despite over a decade of active research, current constructions require group sizes of $O(\log n)$, where $n$ is the number of participants in the system. This group size is important since communication and state costs scale polynomially with this parameter. Given the stubbornness of this logarithmic barrier, a natural question is whether better bounds are possible. Here, we consider an attacker that controls a constant fraction of the total computational resources in the system. By leveraging proof-of-work (PoW), we demonstrate how to reduce the group size exponentially to $O(\log\log n)$ while maintaining strong security guarantees. This reduction in group size yields a significant improvement in communication and state costs.
- Publication:
-
arXiv e-prints
- Pub Date:
- May 2017
- DOI:
- 10.48550/arXiv.1705.10387
- arXiv:
- arXiv:1705.10387
- Bibcode:
- 2017arXiv170510387J
- Keywords:
-
- Computer Science - Data Structures and Algorithms;
- Computer Science - Distributed;
- Parallel;
- and Cluster Computing
- E-Print:
- This work is supported by the National Science Foundation grant CCF 1613772 and a C Spire Research Gift