Hydra: Secure Replication on the Internet

This paper describes the Hydra protocol suite for coordination in asynchronous networks subject to Byzantine faults. Hydra supplies a number of group communication primitives, such as binary and multi-valued Byzantine agreement, reliable and consistent broadcast, and an atomic broadcast channel. Atomic broadcast immediately provides secure state-machine replication. The protocols are designed for an asynchronous wide-area network, such as the Internet, where messages may be delayed indefinitely, the servers do not have access to a common clock, and up to one third of the servers may fail in potentially malicious ways. Security is achieved through the use of threshold public-key cryptography, in particular through a cryptographic common coin based on the Diffie-Hellman problem that underlies the randomized protocols in Hydra. The implementation of Hydra in Java is described and timing measurements are given for a test-bed of servers distributed over three continents. They show that extensive use of public-key cryptography does not impose a large overhead for secure coordination in wide-area networks.

By: Christian Cachin and Jonathan A. Poritz

Published in: Proceedings of International Conference on Dependable Systems and NetworksLos Alamitos, CA, IEEE Computer Society, p.167-76 in 2002

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .