Git Product home page Git Product logo

Comments (3)

HeikoStamer avatar HeikoStamer commented on September 26, 2024

Indeed, that was one of the original ideas for this module of LibTMCG. However, it's a very complex task that takes a lot of time. I already have some code from 2001-2003 (part of my diploma thesis), that implements their Asynchronous Byzantine Binary Argeement (ABBA) protocol based upon Shoup's non-interactive RSA-threshold signature scheme. Unfortunately, it does not solve the distributed key generation for RSA, so it is almost useless here.

In general I'am not sure, whether an efficient common coin implementation (as threshold signature schemes can provide) is really required for a practical multi-value consensus/agreement algorithm. Currently I use the 'Independent Choice' method (cf. Cachin et al.: Reliable and Secure Distributed Programming) for a non-byzantine Randomized Binary Consensus algorithm in DOTS. Of Course that leads to exponential termination bounds, however, only for unlikely failures or malicious cases.

Unfortunately, the required asynchronous communication model for LibTMCG (including the already contained Reliable Broadcast and other methods) is not specified and documented yet. Maybe this is a good starting point for external contributions, because my own time is very limited and I don't see any satisfying (e.g. free software, minimal dependencies) third-party library providing those basic methods (any ideas?).

from libtmcg.

fionafibration avatar fionafibration commented on September 26, 2024

Ok, I can look at implementing that. I was also planning on attempting to implement an open vote network and open veto network, because of certain games that require anonymous voting (mainly party games, I don't know of any gambling card games)

from libtmcg.

fionafibration avatar fionafibration commented on September 26, 2024

Another possible algorithm that could be used for Byzantine Agreement could be the Polygraph accountable protocol, which can actually detect and prove malicious users or users who act out of accordance with the protocol.

This would allow an honest player to prove to all other players that a malicious player is actually malicious, even if those players don't directly observe misconduct.

The accountability feature may even provide a method of fairly paying out bets, as the ledger used can provide a basically unforgeable transcript of the entire game session, which could then be passed to a payout authority, or could even be parsed by an Ethereum smart contract to fairly pay out winnings without one party being able to manipulate the payouts.

I don't know how well this would work, or whether the protocol's ledgers would even support this, but it is an interesting thought.

from libtmcg.

Related Issues (1)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.