A preliminary version of this paper appeared under the title “Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes,” in Proc. of the Sixth International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, September 2010 .
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes†
Version of Record online: 13 NOV 2012
Copyright © 2012 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 6, Issue 5, pages 612–630, May 2013
How to Cite
Lin, J., Liu, P., Jing, J. and Wang, Q. (2013), Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes. Security Comm. Networks, 6: 612–630. doi: 10.1002/sec.593
- Issue online: 11 APR 2013
- Version of Record online: 13 NOV 2012
- National Natural Science Foundation of China. Grant Numbers: 70890084/G021102, 61003273, 61003274
- National Science & Technology Pillar Program of China. Grant Number: 2008BAH22B01
- Knowledge Innovation Program of Chinese Academy of Sciences. Grant Number: YYYJ-1013
- Strategic Priority Research Program of Chinese Academy of Sciences. Grant Number: XDA06010702
- Byzantine fault tolerance;
- Byzantine quorum system;
- threshold signature scheme
To tolerate servers' Byzantine failures, a distributed storage service of self-verifying data needs to make three security properties be Byzantine fault tolerant (BFT): data consistency, data availability, and confidentiality of the signing service's private key. Building such systems demands the integration of Byzantine quorum systems (BQSs), which only make data consistency and availability be BFT, and threshold signature schemes (TSSs), which only make confidentiality of the private key be BFT. Two families of valid TSS-BQS systems (of which the server protocols carry all the design options) have been proposed in the literature. Motivated by the failures in finding a third family of valid server protocols, we study the reverse problem and formally prove that it is impossible to find any third family of valid TSS-BQS systems. To obtain this proof, we develop a validity theory on server protocols of TSS-BQS systems. It is shown that the only two families of valid server protocols, “predicted” (or deduced) by the validity theory, precisely match the existing protocols. Copyright © 2012 John Wiley & Sons, Ltd.