skip to main content
10.1145/191177.191194acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article
Free Access

Secure agreement protocols: reliable and atomic group multicast in rampart

Published:02 November 1994Publication History

ABSTRACT

Reliable and atomic group multicast have been proposed as fundamental communication paradigms to support secure distributed computing in systems in which processes may behave maliciously. These protocols enable messages to be multicast to a group of processes, while ensuring that all honest group members deliver the same messages and, in the case of atomic multicast, deliver these messages in the same order. We present new reliable and atomic group multicast protocols for asynchronous distributed systems. We also describe their implementation as part of Rampart, a toolkit for building high-integrity distributed services, i.e., services that remain correct and available despite the corruption of some component servers by an attacker. To our knowledge, Rampart is the first system to demonstrate reliable and atomic group multicast in asynchronous systems subject to process corruptions.

References

  1. 1.Y. Amir, D. Dolev, S. Kramer, and D. Malki. Transis: A communication sub-system for high availability. In Proceedings of the SP, nd International Symposium on Fault-Tolerant Computing, pages 76-84, July 1992.]]Google ScholarGoogle Scholar
  2. 2.D. Beaver. Multiparty protocols tolerating half faulty processors. In G. Brassard, editor, Advances in Gryptology-- CRYPTO '89 Proceedings (Lecture Notes in Computer Science 435), pages 560-57'2. Springer-Verlag, 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.K. P. Birman, A. SchJper, and P. Stephenson. Lightweight causal and atomic group multicast. A CM Transactions on Computer Systems, 9(3):272-314, August 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.D. F. C. Brewer and M. J. Nash. The Chinese wall security policy. In Proceedings of the 1989 IEEE Symposium on Security and Pri~acy, pages 206-214, April 1989.]]Google ScholarGoogle ScholarCross RefCross Ref
  5. 5.J. Chang and N. F. Maxemchuck. Reliable broadcast protocols. A CM Transactions on Computer Systems, 2(3):251- 27'3, August 1984.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.D. Chaum, C. Crdpeau, and I. Damg&rd. Multiparty unconditionally secure protocols. In Proceedings of the ~Oth ACM Symposium on Theory of Computing, pages 11-19, May 1988.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.F. Cristian, H. Aghili, R. Strong, and D. Dolev. Atomic broadcast: From simple message diffusion to Byzantine agreement. In Proceedings of the 15th International Symposium on Fault-Tolerant Computing, pages 200-206, June 1985. A revised version appears as IBM Research Laboratory Technical Report RJ5244 (April 1989).]]Google ScholarGoogle Scholar
  8. 8.M. J. Fischer, N. A. Lynch, and M. S. Paterson. Impossibility of distributed consensus with one faulty process..Journal of the A CM, 32(2):37'4-382, April 1985.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.M. K. Franklin and M. Yung. The varieties of secure distributed computation. In Proceedings of Sequences II, Methods in Communications, Security and Computer Science, pages 392-417, June 1991.]]Google ScholarGoogle Scholar
  10. 10.H. Garcia-Molina and A. Spauster. Ordered and reliable multicast communication. ACId Transactions on Computer Systems, 9(3):242-27'1, August 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the 19th A CM Symposium on Theory of Computing, pages 218-229, May 1987'.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.K. R. Iversen. A cryptographic scheme for computerized general elections. In J. Feigenbaum, editor, Advances in Cryptology--CRYPTO '91 Proceedings (Lecture Notes in Computer Science 576), pages 405-419. Springer-Verlag, 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.M. F. Kaashoek and A. S. Tanenbaum. Group communica. tion in the Amoeba distributed operating system. In Proceedings of the 11th International Conference on Distributed Computing Systems, pages 222-230, May 1991.]]Google ScholarGoogle ScholarCross RefCross Ref
  14. 14.J. B. Lacy, D. P. Mitchell, and W. M. SCheU. CryptoLib: Cryptographyin software. In Proceedings of the ~th USENIX Security Workshop, pages 1-17, October 1993.]]Google ScholarGoogle Scholar
  15. 15.L. Laraport, R. Shostak, and M. Pease. The Byzantine generals problem. A CM Transactions on Programming Languages and Systems, 4(3):382-401, July 1982.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.S. W. Luan and V. D. Gligor. A fault-tolerant protocol for atomic broadcast. IEEE Transactions on Parallel and Distributed Systems, 1(3):27'1-285, July 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.P. M. Melliar-Smith, L. E. Moser, and V. Agrawala. Broadcast protocols for distributed systems. IEEE Transactions on Parallel and Distributed Systems, 1(1):17-25, January 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.J.H. Moore. Protocol failures in cryptosystems. Proceedings oy the IEEE, 76(5), May 1988.]]Google ScholarGoogle ScholarCross RefCross Ref
  19. 19.F. M. Pittelli and H. GarciwMolina. Reliable scheduling in a TMR database system. ACM Tran$actions on Computer Systems, 7'(1):25-60, February 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.T. l%abin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proceeding8 of |he ~lJf A CM Sympoeiurn on Theory of Computing, pages 73-85, May 1989.]] Google ScholarGoogle Scholar
  21. 21.M. K. Reiter. A secure group membership protocol. In Proceeding8 of the 1994 IEEE Symposium on Research in Secttrity and Pr~uac~, pages 176-189, May 1994.]] Google ScholarGoogle Scholar
  22. 22.M.K. Reiter and K. P. Birman. How to securely replicate services. A CM Transactions on Programming Languages and Systems, 16(3):986-1009, May 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.M. K. Reiter, K. P. Birman, and R. van Renesse. A security architecture for fault-tolerant systems. To appear in A CM T~unaaction8 on Computer Sljatems, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.It, L. Rivest. The MD4 message digest algorithm. In A. J. Menezes and S. A. Vanstone, editors, Advances in Cryptoiogy--CRYPTO '90 Proceedings (Lecture Notes in Computer Science 537), pages 303-311. Springer-Verlag, 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.B.. L. Rivest. RFC 19~I: The MD5 Meuage Digest Algorithm. Internet Activities Board, April 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.R. L. Rivest, A. Shamir, and L. Adlemem. A method for obtaining digital signatures and public-key cryptosystems. Communications of the A CM, 21(2):120-126, February 1978.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27.A. Schiper and A. Sandoz. Uniform reliable multicast in a virtually synchronous environment. In Proceeding8 of the 19th International Conference on Distributed Computing Systems, pages 561-568, May 1993.]]Google ScholarGoogle Scholar
  28. 28.F. B. Sc/meider. Implementing fettdt-tolerant services using the state machine approach: A tutorial. A CM CompuZing Sur~eya, 22(4):299-319, December 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. 29.S. K. Shrivastava, P. D. Ezhi}chelvan, N. A. Speirs, S. TaD, and A. Tully. Principal features of the VOLTAN family of reliable node architectures for distributed systems. IEEE Transactions on Computers, 41(5):542-549, May 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30.S. Toueg. Randomized Byzantine agreements. In Proceed. ing8 of the 3rd A CM Symposium on Principles of Distributed Computing, pages 163-178, August 1984.]] Google ScholarGoogle Scholar
  31. 31.R. van Renesse, K. Birman, R. Cooper, B. Glade, and P. Stephenson. R.eliable multicast between microkernels. In Proceeding8 of the USENIX Microkernels and Other Kernel Architecture8 Workshop, April 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. 32.V. L. Voydock and S. T. Kent. Security mechanisms in high-level network protocols. A GM Computing Surueys, 15(2):135-171, June 1983.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure agreement protocols: reliable and atomic group multicast in rampart

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '94: Proceedings of the 2nd ACM Conference on Computer and communications security
        November 1994
        293 pages
        ISBN:0897917324
        DOI:10.1145/191177

        Copyright © 1994 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 November 1994

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        CCS '94 Paper Acceptance Rate31of70submissions,44%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader