Quantum Byzantine Agreement Against Full-Information Adversary

Authors Longcheng Li , Xiaoming Sun , Jiadong Zhu



PDF
Thumbnail PDF

File

LIPIcs.DISC.2024.32.pdf
  • Filesize: 0.87 MB
  • 22 pages

Document Identifiers

Author Details

Longcheng Li
  • State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
  • School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing, China
Xiaoming Sun
  • State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
  • School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing, China
Jiadong Zhu
  • State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Cite As Get BibTex

Longcheng Li, Xiaoming Sun, and Jiadong Zhu. Quantum Byzantine Agreement Against Full-Information Adversary. In 38th International Symposium on Distributed Computing (DISC 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 319, pp. 32:1-32:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024) https://doi.org/10.4230/LIPIcs.DISC.2024.32

Abstract

We exhibit that, when given a classical Byzantine agreement protocol designed in the private-channel model, it is feasible to construct a quantum agreement protocol that can effectively handle a full-information adversary. Notably, both protocols have equivalent levels of resilience, round complexity, and communication complexity. In the classical private-channel scenario, participating players are limited to exchanging classical bits, with the adversary lacking knowledge of the exchanged messages. In contrast, in the quantum full-information setting, participating players can exchange qubits, while the adversary possesses comprehensive and accurate visibility into the system’s state and messages. By showcasing the reduction from quantum to classical frameworks, this paper demonstrates the strength and flexibility of quantum protocols in addressing security challenges posed by adversaries with increased visibility. It underscores the potential of leveraging quantum principles to improve security measures without compromising on efficiency or resilience.
By applying our reduction, we demonstrate quantum advantages in the round complexity of asynchronous Byzantine agreement protocols in the full-information model. It is well known that in the full-information model, any classical protocol requires Ω(n) rounds to solve Byzantine agreement with probability one even against Fail-stop adversary when resilience t = Θ(n) [Attiya and Censor, 2008]. We show that quantum protocols can achieve O(1) rounds (i) with resilience t < n/2 against a Fail-stop adversary, and (ii) with resilience t < n/(3+ε) against a Byzantine adversary for any constant ε > 0, therefore surpassing the classical lower bound.

Subject Classification

ACM Subject Classification
  • Theory of computation → Distributed algorithms
  • Theory of computation → Quantum computation theory
Keywords
  • Byzantine agreement
  • Quantum computation
  • Full-information model

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Ittai Abraham, Danny Dolev, and Joseph Y Halpern. An almost-surely terminating polynomial protocol for asynchronous byzantine agreement with optimal resilience. In Proceedings of the Twenty-seventh ACM symposium on Principles of Distributed Computing, pages 405-414, 2008. URL: https://doi.org/10.1145/1400751.1400804.
  2. Hagit Attiya and Keren Censor. Tight bounds for asynchronous randomized consensus. Journal of the ACM (JACM), 55(5):1-26, 2008. URL: https://doi.org/10.1145/1411509.1411510.
  3. Hagit Attiya and Jennifer Welch. Distributed Computing: Fundamentals, Simulations and Advanced Topics. John Wiley & Sons, Inc., Hoboken, NJ, USA, 2004. Google Scholar
  4. Laasya Bangalore, Ashish Choudhury, and Arpita Patra. Almost-surely terminating asynchronous byzantine agreement revisited. In Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, pages 295-304, 2018. URL: https://dl.acm.org/citation.cfm?id=3212735.
  5. Ziv Bar-Joseph and Michael Ben-Or. A tight lower bound for randomized synchronous consensus. In Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, PODC '98, pages 193-199, New York, NY, USA, 1998. Association for Computing Machinery. URL: https://doi.org/10.1145/277697.277733.
  6. Michael Ben-Or. Another advantage of free choice: Completely asynchronous agreement protocols (extended abstract). In Robert L. Probert, Nancy A. Lynch, and Nicola Santoro, editors, Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, August 17-19, 1983, pages 27-30. ACM, 1983. URL: https://doi.org/10.1145/800221.806707.
  7. Michael Ben-Or and Avinatan Hassidim. Fast quantum byzantine agreement. In Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, STOC '05, pages 481-485, New York, NY, USA, 2005. Association for Computing Machinery. URL: https://doi.org/10.1145/1060590.1060662.
  8. Michael Ben-Or and Nathan Linial. Collective coin flipping, robust voting schemes and minima of banzhaf values. In 26th Annual Symposium on Foundations of Computer Science (SFCS 1985), pages 408-416, 1985. URL: https://doi.org/10.1109/SFCS.1985.15.
  9. Charles H Bennett and Gilles Brassard. Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science, 560:7-11, 2014. URL: https://doi.org/10.1016/j.tcs.2014.05.025.
  10. Gabriel Bracha. Asynchronous byzantine agreement protocols. Information and Computation, 75(2):130-143, 1987. URL: https://doi.org/10.1016/0890-5401(87)90054-X.
  11. Gabriel Bracha. An O(log n) expected rounds randomized byzantine generals protocol. J. ACM, 34(4):910-920, October 1987. URL: https://doi.org/10.1145/31846.42229.
  12. Ran Canetti and Tal Rabin. Fast asynchronous byzantine agreement with optimal resilience. In S. Rao Kosaraju, David S. Johnson, and Alok Aggarwal, editors, Proceedings of the Twenty-fifth Annual ACM Symposium on Theory of Computing, pages 42-51, 1993. URL: https://doi.org/10.1145/167088.167105.
  13. Jing Chen and Silvio Micali. Algorand: A secure and efficient distributed ledger. Theor. Comput. Sci., 777:155-183, 2019. URL: https://doi.org/10.1016/j.tcs.2019.02.001.
  14. Man-Duen Choi. Completely positive linear maps on complex matrices. Linear Algebra and its Applications, 10(3):285-290, 1975. Google Scholar
  15. Vicent Cholvi. Quantum byzantine agreement for any number of dishonest parties. Quantum Information Processing, 21(4):151, 2022. URL: https://doi.org/10.1007/s11128-022-03492-y.
  16. Benny Chor, Michael Merritt, and David B Shmoys. Simple constant-time consensus protocols in realistic failure models. Journal of the ACM (JACM), 36(3):591-614, 1989. URL: https://doi.org/10.1145/65950.65956.
  17. Thaddeus Dryja, Quanquan C Liu, and Neha Narula. A lower bound for byzantine agreement and consensus for adaptive adversaries using vdfs. arXiv preprint arXiv:2004.01939, abs/2004.01939, 2020. https://arxiv.org/abs/2004.01939, URL: https://doi.org/10.48550/arXiv.2004.01939.
  18. U. Feige. Noncryptographic selection protocols. In 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), pages 142-152, 1999. URL: https://doi.org/10.1109/SFFCS.1999.814586.
  19. Pesech Feldman and Silvio Micali. An optimal probabilistic protocol for synchronous byzantine agreement. SIAM Journal on Computing, 26(4):873-933, 1997. URL: https://doi.org/10.1137/S0097539790187084.
  20. Matthias Fitzi, Nicolas Gisin, and Ueli Maurer. Quantum solution to the byzantine agreement problem. Phys. Rev. Lett., 87:217901, November 2001. URL: https://doi.org/10.1103/PhysRevLett.87.217901.
  21. Matthias Fitzi, Daniel Gottesman, Martin Hirt, Thomas Holenstein, and Adam Smith. Detectable byzantine agreement secure against faulty majorities. In Proceedings of the Twenty-First Annual Symposium on Principles of Distributed Computing, PODC '02, pages 118-126, New York, NY, USA, 2002. Association for Computing Machinery. URL: https://doi.org/10.1145/571825.571841.
  22. Sascha Gaertner, Mohamed Bourennane, Christian Kurtsiefer, Adán Cabello, and Harald Weinfurter. Experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett., 100:070504, February 2008. URL: https://doi.org/10.1103/PhysRevLett.100.070504.
  23. Oded Goldreich, Shafi Goldwasser, and Nathan Linial. Fault-tolerant computation in the full information model. SIAM Journal on Computing, 27(2):506-544, 1998. URL: https://doi.org/10.1137/S0097539793246689.
  24. Mohammadtaghi Hajiaghayi, Dariusz Rafal Kowalski, and Jan Olkowski. Brief announcement: Improved consensus in quantum networks. In Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing, pages 286-289, 2023. URL: https://doi.org/10.1145/3583668.3594600.
  25. Shang-En Huang, Seth Pettie, and Leqi Zhu. Byzantine agreement in polynomial time with near-optimal resilience. In Stefano Leonardi and Anupam Gupta, editors, STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022, STOC 2022, pages 502-514, New York, NY, USA, 2022. ACM. URL: https://doi.org/10.1145/3519935.3520015.
  26. Shang-En Huang, Seth Pettie, and Leqi Zhu. Byzantine agreement with optimal resilience via statistical fraud detection. Journal of the ACM, 71(2):12:1-12:37, 2024. URL: https://doi.org/10.1145/3639454.
  27. Bruce M. Kapron, David Kempe, Valerie King, Jared Saia, and Vishal Sanwalani. Fast asynchronous byzantine agreement and leader election with full information. ACM Trans. Algorithms, 6(4), September 2010. URL: https://doi.org/10.1145/1824777.1824788.
  28. Valerie King and Jared Saia. Breaking the O(n²) bit barrier: scalable byzantine agreement with an adaptive adversary. Journal of the ACM (JACM), 58(4):1-24, 2011. URL: https://doi.org/10.1145/1989727.1989732.
  29. Valerie King and Jared Saia. Byzantine agreement in expected polynomial time. J. ACM, 63(2), March 2016. URL: https://doi.org/10.1145/2837019.
  30. Qing-bin Luo, Kai-yuan Feng, and Ming-hui Zheng. Quantum multi-valued byzantine agreement based on d-dimensional entangled states. International Journal of Theoretical Physics, 58(12):4025-4032, 2019. URL: https://doi.org/10.1007/s10773-019-04269-3.
  31. Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information (10th Anniversary edition). Cambridge University Press, 2016. URL: https://www.cambridge.org/de/academic/subjects/physics/quantum-physics-quantum-information-and-quantum-computation/quantum-computation-and-quantum-information-10th-anniversary-edition?format=HB.
  32. Marshall C. Pease, Robert E. Shostak, and Leslie Lamport. Reaching agreement in the presence of faults. J. ACM, 27(2):228-234, April 1980. URL: https://doi.org/10.1145/322186.322188.
  33. Ramij Rahaman, Marcin Wieśniak, and Marek Żukowski. Quantum byzantine agreement via hardy correlations and entanglement swapping. Phys. Rev. A, 92:042302, October 2015. URL: https://doi.org/10.1103/PhysRevA.92.042302.
  34. Alexander Russell and David Zuckerman. Perfect information leader election in log*n + O(1) rounds. In 39th Annual Symposium on Foundations of Computer Science, FOCS '98, November 8-11, 1998, Palo Alto, California, USA, pages 576-583. IEEE Computer Society, 1998. URL: https://doi.org/10.1109/SFCS.1998.743508.
  35. Sam Toueg. Randomized byzantine agreements. In Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, PODC '84, pages 163-178, New York, NY, USA, 1984. Association for Computing Machinery. URL: https://doi.org/10.1145/800222.806744.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail