A Simple and Efficient Signature-Based Consensus Protocol in the Asynchronous Distributed System

被引:2
|
作者
Cheng, Chien-Fu [1 ,2 ]
Tsai, Kuo-Tang [2 ]
Liao, Hsien-Chun [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, New Taipei City 251, Taiwan
[2] Tamkang Univ, Grad Inst Networking & Commun, New Taipei City 251, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2012年 / 41卷 / 02期
关键词
distributed consensus problem; oral message; signed message; dormant fault; malicious fault and grouping; TIME; CONSISTENCY; ENVIRONMENT;
D O I
10.5755/j01.itc.41.2.931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The consensus problem in distributed systems is mainly solved by message exchange. Most of previous consensus algorithms rely on exchange of oral messages to achieve consensus among processors. As oral messages are susceptible to influences from malicious attackers, this type of consensus protocols usually requires a large number of rounds of message exchange, and the complexity of message exchange is also excessively high. In light of this drawback of oral message-based consensus algorithms, some scholars proposed signed message-based consensus algorithm to reduce the number of rounds of message exchange required. However, some signed message-based consensus algorithms still have certain drawbacks which make them ineffective in some conditions. To address this issue, we propose a new signed message-based consensus algorithm in this paper. We integrate the concept of grouping into the proposed algorithm and find the best number of groups through mathematical analysis to further reduce the rounds of message exchange required. In other words, the proposed algorithm makes use of digital signature and the concept of grouping to solve the consensus problem. This algorithm can not only increase the fault-tolerance of distributed systems but also significantly reduce the rounds of message exchange required to achieve consensus.
引用
收藏
页码:183 / 198
页数:16
相关论文
共 50 条
  • [21] Asynchronous Consensus-Based Distributed Target Tracking
    Giannini, Silvia
    Petitti, Antonio
    Di Paola, Donato
    Rizzo, Alessandro
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 2006 - 2011
  • [22] Efficient signature-based fault diagnosis using variable size windows
    Clouqueur, T
    Ercevik, O
    Saluja, KK
    Takahashi, H
    VLSI DESIGN 2001: FOURTEENTH INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2001, : 391 - 396
  • [23] Performance evaluation of signature-based access mechanisms for efficient information retrieval
    Yoo, Jae Soo
    Chang, Jae Woo
    Lee, Yoon Joon
    Kim, Myoung Ho
    IEICE Transactions on Information and Systems, 1993, E76-D (02): : 179 - 188
  • [24] A signature-based approach for efficient relationship search on XML data collections
    Amato, G
    Debole, F
    Rabitti, F
    Savino, P
    Zezula, P
    DATABASE AND XML TECHNOLOGIES, PROCEEDINGS, 2004, 3186 : 82 - 96
  • [25] An efficient reduction strategy for signature-based algorithms to compute Grobner basis
    Sakata, Kosuke
    ACM COMMUNICATIONS IN COMPUTER ALGEBRA, 2019, 53 (03): : 81 - 92
  • [26] SUIS: An Online Graphical Signature-Based User Identification System
    Alam, Shahid
    2016 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2016, : 85 - 89
  • [27] Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
    Jan, Saeed Ullah
    Khan, Habib Ullah
    IEEE ACCESS, 2021, 9 : 130247 - 130263
  • [28] Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
    Jan, Saeed Ullah
    Khan, Habib Ullah
    IEEE Access, 2021, 9 : 130247 - 130263
  • [29] Security analysis of IKE's signature-based key-exchange protocol
    Canetti, R
    Krawczyk, H
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 143 - 161
  • [30] Attacks on a blind signature-based steganographic protocol of IEEE-WISP 2001
    Ling, Huo-Chong
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1937 - +