Simulating authenticated broadcasts to derive simple fault-tolerant algorithms
Author(s) -
T K Srikanth,
Sam Toueg
Publication year - 1987
Publication title -
distributed computing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.707
H-Index - 48
eISSN - 1432-0452
pISSN - 0178-2770
DOI - 10.1007/bf01667080
Subject(s) - computer science , overhead (engineering) , simple (philosophy) , authentication (law) , algorithm , exploit , message authentication code , fault tolerance , computation , simplicity , distributed computing , computer network , cryptography , computer security , programming language , epistemology , philosophy
Fault-tolerant algorithms for distributed systems with arbitrary failures are simpler to develop and prove correct if messages can be authenticated. However, using digital signatures for message authentication usually incurs substantial overhead in communication and computation. To exploit the simplicity provided by authentication without this overhead, we present a broadcast primitive that provides properties of authenticated broadcasts. This gives a methodology for deriving non-authenticated algorithms. Starting with an authenticated algorithm, we replace signed communication with the broadcast primitive to obtain an equivalent non-authenticated algorithm. We have applied this approach to various problems and in each case obtained simpler and more efficient solutions than those previously known.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom