{"title":"通过统计欺诈检测实现具有最佳复原力的拜占庭协议","authors":"Shang-En Huang, Seth Pettie, Leqi Zhu","doi":"10.1145/3639454","DOIUrl":null,"url":null,"abstract":"<p>Since the mid-1980s it has been known that Byzantine Agreement can be solved with probability 1 asynchronously, even against an omniscient, computationally unbounded adversary that can adaptively <i>corrupt</i> up to <i>f</i> < <i>n</i>/3 parties. Moreover, the problem is insoluble with <i>f</i> ≥ <i>n</i>/3 corruptions. However, Bracha’s [13] 1984 protocol (see also Ben-Or [8]) achieved <i>f</i> < <i>n</i>/3 resilience at the cost of <i>exponential</i> expected latency 2<sup><i>Θ</i>(<i>n</i>)</sup>, a bound that has <i>never</i> been improved in this model with <i>f</i> = ⌊(<i>n</i> − 1)/3⌋ corruptions. </p><p>In this paper, we prove that Byzantine Agreement in the asynchronous, full information model can be solved with probability 1 against an adaptive adversary that can corrupt <i>f</i> < <i>n</i>/3 parties, while incurring only <i>polynomial latency with high probability</i>. Our protocol follows an earlier polynomial latency protocol of King and Saia [33,34], which had <i>suboptimal</i>\nresilience, namely <i>f</i> ≈ <i>n</i>/10<sup>9</sup> [33,34]. </p><p>Resilience <i>f</i> = (<i>n</i> − 1)/3 is uniquely difficult, as this is the point at which the influence of the Byzantine and honest players are of roughly equal strength. The core technical problem we solve is to design a collective coin-flipping protocol that <i>eventually</i>\nlets us flip a coin with an unambiguous outcome. In the beginning, the influence of the Byzantine players is too powerful to overcome, and they can essentially fix the coin’s behavior at will. We guarantee that after just a polynomial number of executions of the coin-flipping protocol, either (a) the Byzantine players fail to fix the behavior of the coin (thereby ending the game) or (b) we can “blacklist” players such that the blacklisting rate for Byzantine players is at least as large as the blacklisting rate for good players. The blacklisting criterion is based on a simple statistical test of <i>fraud detection</i>.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"6 1","pages":""},"PeriodicalIF":2.3000,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection\",\"authors\":\"Shang-En Huang, Seth Pettie, Leqi Zhu\",\"doi\":\"10.1145/3639454\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Since the mid-1980s it has been known that Byzantine Agreement can be solved with probability 1 asynchronously, even against an omniscient, computationally unbounded adversary that can adaptively <i>corrupt</i> up to <i>f</i> < <i>n</i>/3 parties. Moreover, the problem is insoluble with <i>f</i> ≥ <i>n</i>/3 corruptions. However, Bracha’s [13] 1984 protocol (see also Ben-Or [8]) achieved <i>f</i> < <i>n</i>/3 resilience at the cost of <i>exponential</i> expected latency 2<sup><i>Θ</i>(<i>n</i>)</sup>, a bound that has <i>never</i> been improved in this model with <i>f</i> = ⌊(<i>n</i> − 1)/3⌋ corruptions. </p><p>In this paper, we prove that Byzantine Agreement in the asynchronous, full information model can be solved with probability 1 against an adaptive adversary that can corrupt <i>f</i> < <i>n</i>/3 parties, while incurring only <i>polynomial latency with high probability</i>. Our protocol follows an earlier polynomial latency protocol of King and Saia [33,34], which had <i>suboptimal</i>\\nresilience, namely <i>f</i> ≈ <i>n</i>/10<sup>9</sup> [33,34]. </p><p>Resilience <i>f</i> = (<i>n</i> − 1)/3 is uniquely difficult, as this is the point at which the influence of the Byzantine and honest players are of roughly equal strength. The core technical problem we solve is to design a collective coin-flipping protocol that <i>eventually</i>\\nlets us flip a coin with an unambiguous outcome. In the beginning, the influence of the Byzantine players is too powerful to overcome, and they can essentially fix the coin’s behavior at will. We guarantee that after just a polynomial number of executions of the coin-flipping protocol, either (a) the Byzantine players fail to fix the behavior of the coin (thereby ending the game) or (b) we can “blacklist” players such that the blacklisting rate for Byzantine players is at least as large as the blacklisting rate for good players. The blacklisting criterion is based on a simple statistical test of <i>fraud detection</i>.</p>\",\"PeriodicalId\":50022,\"journal\":{\"name\":\"Journal of the ACM\",\"volume\":\"6 1\",\"pages\":\"\"},\"PeriodicalIF\":2.3000,\"publicationDate\":\"2024-01-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of the ACM\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1145/3639454\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of the ACM","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1145/3639454","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
摘要
自 20 世纪 80 年代中期以来,人们就知道拜占庭协议可以以概率为 1 的异步方式求解,即使是面对一个全知的、计算无界的、可以自适应地破坏多达 f < n/3 方的对手。此外,在 f ≥ n/3 次破坏的情况下,这个问题是无法解决的。然而,Bracha [13] 的 1984 协议(另见 Ben-Or [8])以指数级的预期延迟 2Θ(n) 为代价实现了 f < n/3 的恢复能力,在 f = ⌊(n - 1)/3⌋ 破坏的模型中,这一约束从未被改进过。在本文中,我们证明了在异步、全信息模型中,拜占庭协议能以 1 的概率求解,以对抗能破坏 f < n/3 方的自适应对手,同时只产生高概率的多项式延迟。我们的协议沿用了 King 和 Saia [33,34]早期的多项式延迟协议,该协议具有次优复原力,即 f≈ n/109 [33,34]。恢复力 f = (n - 1)/3 是唯一的难点,因为在这一点上,拜占庭玩家和诚实玩家的影响力大致相当。我们要解决的核心技术问题是设计一个集体掷硬币协议,最终让我们掷出一个结果明确的硬币。一开始,拜占庭玩家的影响力强大到难以克服,他们基本上可以随意修正硬币的行为。我们保证,在抛硬币协议执行了多项式次数之后,要么(a)拜占庭玩家无法固定硬币的行为(从而结束游戏),要么(b)我们可以将玩家列入 "黑名单",使拜占庭玩家的黑名单率至少与优秀玩家的黑名单率一样大。黑名单标准基于一个简单的欺诈检测统计测试。
Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection
Since the mid-1980s it has been known that Byzantine Agreement can be solved with probability 1 asynchronously, even against an omniscient, computationally unbounded adversary that can adaptively corrupt up to f < n/3 parties. Moreover, the problem is insoluble with f ≥ n/3 corruptions. However, Bracha’s [13] 1984 protocol (see also Ben-Or [8]) achieved f < n/3 resilience at the cost of exponential expected latency 2Θ(n), a bound that has never been improved in this model with f = ⌊(n − 1)/3⌋ corruptions.
In this paper, we prove that Byzantine Agreement in the asynchronous, full information model can be solved with probability 1 against an adaptive adversary that can corrupt f < n/3 parties, while incurring only polynomial latency with high probability. Our protocol follows an earlier polynomial latency protocol of King and Saia [33,34], which had suboptimal
resilience, namely f ≈ n/109 [33,34].
Resilience f = (n − 1)/3 is uniquely difficult, as this is the point at which the influence of the Byzantine and honest players are of roughly equal strength. The core technical problem we solve is to design a collective coin-flipping protocol that eventually
lets us flip a coin with an unambiguous outcome. In the beginning, the influence of the Byzantine players is too powerful to overcome, and they can essentially fix the coin’s behavior at will. We guarantee that after just a polynomial number of executions of the coin-flipping protocol, either (a) the Byzantine players fail to fix the behavior of the coin (thereby ending the game) or (b) we can “blacklist” players such that the blacklisting rate for Byzantine players is at least as large as the blacklisting rate for good players. The blacklisting criterion is based on a simple statistical test of fraud detection.
期刊介绍:
The best indicator of the scope of the journal is provided by the areas covered by its Editorial Board. These areas change from time to time, as the field evolves. The following areas are currently covered by a member of the Editorial Board: Algorithms and Combinatorial Optimization; Algorithms and Data Structures; Algorithms, Combinatorial Optimization, and Games; Artificial Intelligence; Complexity Theory; Computational Biology; Computational Geometry; Computer Graphics and Computer Vision; Computer-Aided Verification; Cryptography and Security; Cyber-Physical, Embedded, and Real-Time Systems; Database Systems and Theory; Distributed Computing; Economics and Computation; Information Theory; Logic and Computation; Logic, Algorithms, and Complexity; Machine Learning and Computational Learning Theory; Networking; Parallel Computing and Architecture; Programming Languages; Quantum Computing; Randomized Algorithms and Probabilistic Analysis of Algorithms; Scientific Computing and High Performance Computing; Software Engineering; Web Algorithms and Data Mining