Byzantine faulty operation recovery and cost analysis of SPURT: A distributed randomness beacon
Krishnan, Vinith
Loading…
Permalink
https://hdl.handle.net/2142/110720
Description
Title
Byzantine faulty operation recovery and cost analysis of SPURT: A distributed randomness beacon
Author(s)
Krishnan, Vinith
Issue Date
2021-04-23
Director of Research (if dissertation) or Advisor (if thesis)
Ren, Ling
Department of Study
Computer Science
Discipline
Computer Science
Degree Granting Institution
University of Illinois at Urbana-Champaign
Degree Name
M.S.
Degree Level
Thesis
Keyword(s)
Applied Cryptography, Randomness, Consensus
Abstract
A reliable source of randomness plays an integral part in the design of many cryptographic, security, and distributed system protocols. Yet, existing constructions of distributed random beacons still have limitations such as strong setup or network assumptions, and high computational and communication costs. SPURT a novel efficient distributed randomness beacon protocol does not require any trusted or expensive setup and is secure against a malicious adversary that controls up to one-third of the nodes in a partially synchronous network. One crucial property that SPURT guarantees is unpredictability, which ensures that every honest party is able to recover the random beacon value either before or soon (3 single trip message delays) after the adversary recovers it. This thesis presents the recovery mechanisms that let SPURT provide the above guarantee even in the presence of a malicious leader. We implement SPURT and evaluate it using a network of up to 128 nodes running in geographically distributed AWS instances. Analysis and experiments demonstrated that SPURT offers very high throughput, while only incurring reasonable overhead costs from the recovery mechanisms.
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.