Probabilistic Indistinguishability and the Quality of Validity in Byzantine Agreement

Probabilistic Indistinguishability and the Quality of Validity in Byzantine Agreement

Probabilistic Indistinguishability and the Quality of Validity in Byzantine Agreement Guy Goren∗1, Yoram Moses†1, and Alexander Spiegelman2 1Technion 2Novi Research Abstract Lower bounds and impossibility results in distributed computing are both intellectually challenging and practically important. Hundreds if not thousands of proofs appear in the literature, but surprisingly, the vast majority of them apply to deterministic algorithms only. Probabilistic distributed problems have been around for at least four decades and receive a lot of attention with the emergence of blockchain systems. Nonetheless, we are aware of only a handful of randomized lower bounds. In this paper we provide a formal framework to reason about randomized distributed algo- rithms. We generalize the notion of indistinguishability, the most useful tool in deterministic lower bounds, to apply to a probabilistic setting. The power of this framework is applied to completely characterize the quality of decisions in the randomized multi-valued Consensus problem in an asynchronous environment with Byzantine faults. That is, we provide a tight bound on the probability of honest parties deciding on a possibly bogus value and prove that, in a precise sense, no algorithm can do better. arXiv:2011.04719v1 [cs.DC] 9 Nov 2020 ∗The research of Guy Goren was partly supported by a grant from the Technion Hiroshi Fujiwara cyber security research center and the Israel cyber bureau, as well as by a Jacobs fellowship. †Yoram Moses is the Israel Pollak academic chair at the Technion. His work was supported in part by the Israel Science Foundation under grant 2061/19, and by the U.S.-Israel Binational Science Foundation under grant 2015820. 1 Introduction Randomized algorithms have a long tradition in distributed computing [33], where they have been applied to many different problems in a variety of models [28]. In the context of fault-tolerant agreement they have served to overcome the impossibility of agreement in asynchronous settings [20, 34, 8], and have significantly improved efficiency compared to deterministic solutions [17, 24]. With the recent prevalence of blockchain systems, Byzantine agreement algorithms that can overcome malicious parties have found renewed interest in both industry and academia. For obvious reasons, blockchain systems should strive to minimize the share of decisions that originate from malicious parties, and to increase the share originating from honest ones. A natural question, then, is what are the inherent limits on the quality of Byzantine agreement algorithms in this regard? Namely, what can we say about the probability with which an algorithm can guarantee that a good decision is made? Given their practical importance, characterizing the power and limitations of randomized dis- tributed algorithms for agreement has become ever more desirable. However, obtaining tight, or nontrivial, probabilistic bounds on properties in the asynchronous Byzantine setting can be a challenging task. As is well known, there are \Hundreds of impossibility results for distributed computing" [19]. But very few of them apply to randomized protocols. Unfortunately, there is currently a dearth of general tools for characterizing the properties of randomized algorithms. The notion of indistinguishability has for years been one of the most useful tools for proving deterministic lower bounds and impossibility results in distributing computing [6]. Such determin- istic lower bounds typically rely on the fact that if a correct party cannot distinguish between two executions of a deterministic protocol (i.e., its local state is the same in both), then it performs the same actions in both. In a randomized algorithm, the fact that two executions are indistinguish- able to a given party up to a certain time does not ensure that its next action will be the same in both. Moreover, a single execution does not by itself provide information on the probability with which actions are performed. As a result, the classic notion of indistinguishability does not directly capture many of the probabilistic aspects of a randomized algorithm. A key contribution of this paper is the introduction of a framework for reasoning about properties of probabilistic protocols. In a nutshell, we generalize deterministic executions, which are modeled as sequences of alternating configurations and local events, into tree-based probabilistic scenarios. Just as, in deterministic algorithms, a protocol execution is precisely determined by the adversary's strategy, the adversary's strategy determines a scenario in a randomized algorithm. A scenario is a tree in which each node represents a configuration, and (directed) edges from a node point at the possible successor configurations. The tree edges are weighted, with the weight of an edge specifying the probability that the successor that it points to is chosen when the computation reaches the current node. An important feature of scenarios is that they allow us to formally define probabilistic properties of distributed algorithms. Currently, properties such as \all honest parties decide on the same value with high probability" or \all honest parties terminate with probability 1" are not well defined without an explicit definition of the probability space on all possible executions. Such properties cannot be evaluated based on an individual execution. Scenarios, in contrast, capture the algorithmic randomness and allow us to reason about probabilistic events therein. Statements like \the probability that party pi performs an action α in a given scenario scn of algorithm A is at least x" are well-defined. In deterministic algorithms, indistinguishability can be determined based on a party pi's local history, i.e., the sequence of local states that pi passes through in an execution. In order to maintain 1 relevant probabilistic information, we move from sequences to trees of local states. This facilitates the definition of a notion of probabilistic indistinguishability among scenarios, whereby two scenarios are considered indistinguishable to a process pi if they induce identical trees of pi's local states. Scenarios and probabilistic indistinguishability provide a formal and convenient framework that can be used to simplify existing proofs and prove new ones. It allows us to construct probabilistic lower bound proofs in a manner that is similar to how they are constructed, based on ordinary indistinguishability, in the deterministic case. A significant feature of this framework is its simplicity and ease of use. The notions contain just enough structure beyond that of their deterministic analogues to capture the desired probabilistic properties. Our original motivation for developing the above framework was to formally prove what is the best guarantee regarding the share of good decisions made by a randomized Byzantine agreement algorithm in our setting. And indeed, we prove a tight bound on the quality of decisions in Section 5. This is evidence that, at least for this problem, our tools are fine enough to capture an essential aspect of a randomized algorithm. Various works that establish randomized lower bounds on distributed algorithm develop ap- proaches that suffice to prove particular results of interest. We suggest that the notions of scenarios and probabilistic indistinguishability are general tools that can be used more broadly. As a case in point, we use them to reprove a central lower bound result of [1] in Appendix B. The new proof follows the outline of the original one and makes use of the same underlying structure. But the use of scenarios and probabilistic indistinguishability provide the arguments with a rigorous foundation and improve their transparency. 2 Related Work Deterministic indistinguishability in distributed computing. The main inherent limita- tion of distributed computing leveraged by most proofs is the lack of global knowledge [27, 16]. That is, each party needs to evaluate the global state of the system based on its local state and act accordingly. Deterministic indistinguishability captures exactly that: if two executions of a deter- ministic protocol looks the same from some party's local point of view, then this party performs exactly the same sequence of actions in both. Good surveys of techniques used in these proofs are presented in [6, 19, 27]. They all utilize indistinguishable executions, but differ in the way they construct them. Lower bounds approaches for randomized distributed protocols. There are several lower bound and impossibility results for randomized algorithms. One approach is to reduce the dis- tributed problem into a cleaner mathematical one that abstracts away the issues of local knowledge, and apply methodologies from other fields to the latter problem [3, 26]. Another approach used by Attiya and Censor-Hillel [4, 5] reduces the argument to deterministic indistinguishability. By considering a fixed random tape, they abstract away the randomness from the executions. On top of this, they employ higher-level techniques (e.g., multivalency and combinatorial arguments). A re- cent work [1] extends a lower bound by Dolev and Reischuk [14] on the communication complexity of Byzantine agreement to the randomized case. They informally apply deterministic indistin- guishability arguments to executions of randomized algorithms. The work of Fich, Herlihy and Shavit in [18] proves space lower bounds for randomized shared objects. Their technique exploits 2 covering arguments, which, in turn, rely on deterministic indistinguishability.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    21 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us