
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
25th Annual Symposium on Foundations of Computer Science (FOCS 1984)
Singer Island, FL
October 24October 26
ISBN: 081860591X
ASCII Text  x  
A.Z. Broder, D. Dolev, "Flipping Coins In Many Pockets (Byzantine Agreement On Uniformly Random Values)," 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 157170, 25th Annual Symposium on Foundations of Computer Science (FOCS 1984), 1984.  
BibTex  x  
@article{ 10.1109/SFCS.1984.715912, author = {A.Z. Broder and D. Dolev}, title = {Flipping Coins In Many Pockets (Byzantine Agreement On Uniformly Random Values)}, journal ={2013 IEEE 54th Annual Symposium on Foundations of Computer Science}, volume = {0}, year = {1984}, isbn = {081860591X}, pages = {157170}, doi = {http://doi.ieeecomputersociety.org/10.1109/SFCS.1984.715912}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  CONF JO  2013 IEEE 54th Annual Symposium on Foundations of Computer Science TI  Flipping Coins In Many Pockets (Byzantine Agreement On Uniformly Random Values) SN  081860591X SP157 EP170 A1  A.Z. Broder, A1  D. Dolev, PY  1984 VL  0 JA  2013 IEEE 54th Annual Symposium on Foundations of Computer Science ER   
It was recently shown by Michael Rabin that a sequence of random 01 values, prepared and distributed by a trusted "dealer," can be used to achieve Byzantine agreement in constant expected time in a network of processors. A natural question is whether it is possible to generate these values uniformly at random within the network. In this paper we present a cryptography based protocol for agreernent on a 01 randona value, if less than half of the processors are faulty. In fact the protocol allows uniform sampling from any finite set, and thus solves the problem of choosing a network leader uniformly at random. The protocol is usable both when all the communication is via "broadcast," in which case it needs three rounds of information exchange, and when each pair of processors communicate on a private line, in which case it needs 3t + 3 rounds, where t is the number of faulty proccssors. The protocol remains valid even if passive eavesdropping is allowed. On the other hand we show that no (probabilistic) protocol can achieve agreement on a fair coin in fewer phases then necessary for Byzantine agreement, and hence the "predealt" nature of the random sequence required for Rabin's algorithm is crucial.
Citation:
A.Z. Broder, D. Dolev, "Flipping Coins In Many Pockets (Byzantine Agreement On Uniformly Random Values)," focs, pp.157170, 25th Annual Symposium on Foundations of Computer Science (FOCS 1984), 1984
Usage of this product signifies your acceptance of the Terms of Use.