Skip to main content
Log in

Simulating authenticated broadcasts to derive simple fault-tolerant algorithms

  • Published:
Distributed Computing Aims and scope Submit manuscript

Abstract

Fault-tolerant algorithms for distributed systems with arbitrary failures are simpler to develop and prove correct if messages can be authenticated. However, using digital signatures for message authentication usually incurs substantial overhead in communication and computation. To exploit the simplicity provided by authentication without this overhead, we present a broadcast primitive that provides properties of authenticated broadcasts. This gives a methodology for deriving non-authenticated algorithms. Starting with an authenticated algorithm, we replace signed communication with the broadcast primitive to obtain an equivalent non-authenticated algorithm. We have applied this approach to various problems and in each case obtained simpler and more efficient solutions than those previously known.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Coan AB (1986) A communication-efficient canonical form for fault-tolerant distributed protocols. Proc Fifth Annu ACM Symp on Principles of Distributed Computing, Calgary, Canada (August 1986), pp. 63–72

  • Dolev D (1982) The Byzantine Generals Strike again. J Algorithms 3 (1):14–30

    Google Scholar 

  • Dolev D, Strong HR (1982) Polynomial algorithms for multiple process agreement. Proc 14th Annual ACM Symp Theory Comput, San Francisco, California, (May 1982), pp 404–407

  • Dolev D, Strong HR (1983) Authenticated algorithms for Byzantine Agreement. SIAM J Comput 12 (4):656–666

    Google Scholar 

  • Dolev D, Fischer MJ, Fowler R, Lynch NA, Strong HR (1982) An efficient algorithm for Byzantine Agreement without authentication, Inf Control, vol 52, no 3

  • Fischer MJ (1983) The consensus problem in unreliable distributed systems (A Brief Survey), YALEU/DCS/RR-273 (June 1983)

  • Garcia-Molina H, Pittelli F, Davidson S (1984) Applications of Byzantine Agreement in database systems. Tech Rep TR 316, Princeton University (June 1984)

  • Halpern JY, Strong HR, Dolev D (1984) Fault-tolerant clock synchronization, Proc Third Annual ACM Symp Principles of Distributed Computing, Vancouver, Canada, (August 1984) pp 89–102

  • Lamport L, Shostak R, Pease M (1982) The Byzantine Generals problem. ACM Trans Program Lang Syst 4:382–401

    Google Scholar 

  • Lundelius J, Lynch N (1984) A new fault-tolerant algorithm for clock synchronization. Proc Third Annual ACM Symp on Principles of Distributed Computing, Vancouver, Canada (August 1984), pp 75–88

  • Lynch N, Fischer M, Fowler R (1982) A simple and efficient lyzantine Generals algorithm. Proc Second IEEE Symp Reliability in Distributed Software and Data Base Systems, Pittsburgh, Pennsylvania, pp 46–52

  • Merritt M (1984) Elections in the presence of faults. Proc 3rd Symp Principles of Distributed Computing, Vancouver, Canada

  • Mohan C, Strong HR, Filkenstein S (1983) Method for distributed transaction commit and recovery using Byzantine Agreement within clusters of processors. Proc 2nd Symp Principles of Distributed Computing (August 1983). Montreal, Canada, pp 89–103

  • Pease M, Shostak R, Lamport L (1980) Reaching agreement in the presence of faults. J ACM 27 (2):228–234

    Google Scholar 

  • Rabin M (1983) Randomized Byzantine generals. Proc 24th Symp Foundations of Computer Science, Tucson, Arizona (November 1983) pp 403–409

  • Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21 (2):120–126

    Google Scholar 

  • Srikanth TK, Toueg S (1987) Optimal clock synchronization. Proc 4th Symp Principles of Distributed Computing, Minaki, Canada (August 1985). To appear in the Journal of the ACM (July 1987)

  • Tanenbaum AS (1981) Computer networks. Prentice-Hall software series

  • Toueg S (1984) Randomized asynchronous Byzantine Agreements. Proc 3rd Symp Principles of Distributed Computing, Vancouver, Canada (August 1984)

  • Toueg S, Perry KJ, Srikanth TK (1987) Fast distributed agreement. Proc 4th Symp Principles of Distributed Computing, Minaki, Canada (August 1985). Also appeared in SIAM J Comput vol. 16, No. 3, June 1987

Download references

Author information

Authors and Affiliations

Authors

Additional information

T.K. Srikanth He received the B. Tech. degree in Mechanical Engineering from the Indian Institute of Technology, Madras, in 1981. He received the M.S. and Ph.D. degrees in computer science from Cornell University, in 1985 and 1986, respectively. He is currently a research scientist at XOX Corporation, Ithaca, New York. His research interests include distributed computing, fault-tolerance, and geometric modeling.

Sam Toueg He received the B.Sc. Degree in computer science from the Technion, Israel Institute of Technology, in 1976, and the M.S.E., M.A., and Ph.D. degrees in computer science from Princeton University, in 1977, 1978, and 1979, respectively. He spent a post-doctoral year at the IBM Thomas J. Watson Research Center, at Yorktown Heights, in the Systems Analysis and Algorithms division. In 1981 he joined the Department of Computer Science at Cornell University, Ithaca, NY, where he is currently an Associate Professor. His current research interests include distributed computing, faulttolerance, computer networks, and distributed database systems. Dr. Toueg is a member of the Association for Computing Machinery SIGACT and SIGCOMM.

Partial support for this work was provided by the National Science Foundation under grant MCS 83-03135

Rights and permissions

Reprints and permissions

About this article

Cite this article

Srikanth, T.K., Toueg, S. Simulating authenticated broadcasts to derive simple fault-tolerant algorithms. Distrib Comput 2, 80–94 (1987). https://doi.org/10.1007/BF01667080

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01667080

Key words

Navigation