Next Article in Journal
Revolutionizing Tire Quality Control: AI’s Impact on Research, Development, and Real-Life Applications
Previous Article in Journal
Peripheral Pulmonary Lesions Classification Using Endobronchial Ultrasonography Images Based on Bagging Ensemble Learning and Down-Sampling Technique
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Quantum Detectable Byzantine Agreement Protocol Using Only EPR Pairs

by
Theodore Andronikos
1,*,† and
Alla Sirokofskich
2,†
1
Department of Informatics, Ionian University, 7 Tsirigoti Square, 49100 Corfu, Greece
2
Department of History and Philosophy of Sciences, National and Kapodistrian University of Athens, 15771 Athens, Greece
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Appl. Sci. 2023, 13(14), 8405; https://doi.org/10.3390/app13148405
Submission received: 19 June 2023 / Revised: 14 July 2023 / Accepted: 17 July 2023 / Published: 20 July 2023
(This article belongs to the Section Applied Physics General)

Abstract

:
In this paper, we introduce a new quantum protocol for Detectable Byzantine Agreement. What distinguishes the proposed protocol among similar quantum protocols, is the fact that it uses only EPR pairs, and, in particular, | Ψ + pairs. There are many sophisticated quantum protocols that guarantee Detectable Byzantine Agreement, but they do not easily lend themselves to practical implementations, due to present-day technological limitations. For a large number n of players, | G H Z n-tuples, or other more exotic entangled states, are not easy to produce, a fact which might complicate the scalability of such protocols. In contrast, Bell states are, undoubtedly, the easiest to generate among maximally entangled states. This will, hopefully, facilitate the scalability of the proposed protocol, as only EPR pairs are required, irrespective of the number n of players. Finally, we mention that, even for arbitrary many players n, our protocol always completes in a constant number of rounds, namely 4.

1. Introduction

The term “Byzantine Agreement” has its origins in the landmark paper [1]. The paper studied the problem of using a playful terminology, involving Byzantium, a commanding general and many lieutenant generals, some loyal and some traitors. In another seminal work [2] the same authors had previously tackled the same problem but in a more formal way. The approach in [2] was perfectly distributed and symmetrical, whereas the approach in [1] has an slight asymmetry because the commanding general assumes the role of coordinating the lieutenant generals.
Currently, probably the most important application of Byzantine Agreement protocols would be in facilitating the implementation of a distributed consensus mechanism that enforces the consistency of data. Byzantine Agreement protocols are critical for successfully tackling distributed fault scenarios in the presence of adversaries (traitors) and enhancing the security of blockchain networks.
Today, it is clear that we have entered the quantum era. This is much more than a buzzword, as it promises to bring fundamental changes in our capabilities, indicated by the impressive progress in the construction of new, more powerful than before, quantum computers, such as IBM’s 127 qubit processor Eagle [3] and the more recent 433 qubit Osprey [4] quantum processor. At the same time, caution is warranted because these new powerful quantum computers bring us closer to the practical implementation of the quantum algorithms developed by Peter Shor and Lov Grover [5,6], that can compromise the security of the classical world.
It is fitting that the quantum paradigm can also be employed to provide us with novel quantum algorithms that adequately protect our critical information and achieve uncompromised security. The unique quantum phenomena are exploited in the design of secure protocols, e.g., for key distribution, as in [7,8,9,10,11,12,13], for secret sharing, as in [14,15], for cloud storage [16,17] or blockchain [18,19,20]. The emerging quantum setting has inspired researchers to approach the problem of Byzantine Agreement from a quantum perspective.
In an influential paper [21] in 2001, the authors introduced a variant of Byzantine Agreement, called “Detectable Byzantine Agreement” and gave the first quantum protocol for Detectable Byzantine Agreement. Their protocol, which tackled only the case of 3 players, used entangled qutrits in the Aharonov state. Since then, the concept of Detectable Byzantine Agreement has become widely accepted and has generated a plethora of similar works. Other early efforts include [22], where another protocol was proposed utilizing a four-qubit singlet state, and [23] that introduced a continuous variable solution to the Byzantine Agreement problem with multipartite entangled Gaussian states. More recently, notable contributions were made by [24], presenting a quantum protocol based on tripartite GHZ-like states and homodyne measurements in the continuous variable scenario, by [19], devising a protocol without entanglement, with the additional attractive feature of achieving agreement in only three rounds, and by [20], introducing a general n-party quantum protocol based on GHZ states, with possible use in a quantum blockchain network.
In this work, we introduce a novel quantum protocol, named EPRQDBA, and formally prove that EPRQDBA achieves detectable Byzantine Agreement. Almost all previous analogous protocols have been cast in the form of a game, and, we, too, follow this tradition. In particular, in our protocol, the familiar protagonists Alice, Bob and Charlie make one more appearance. It is instructive to mention that the pedagogical nature of games often makes expositions of difficult and technical concepts easier to understand and appreciate. Ever since their introduction in 1999 [25,26], quantum games, have offered additional insight because quite often quantum strategies seem to achieve better results than classical ones [27,28,29]. The famous prisoners’ dilemma game provides the most prominent example [26,30], which also applies to other abstract quantum games [31]. The quantization of many classical systems can even apply to political structures, as was shown in [32].
Contribution. This paper presents a new quantum protocol for Detectable Byzantine Agreement, called EPRQDBA. Indeed there exist many sophisticated quantum protocols guaranteed to achieve Detectable Byzantine Agreement, so why a new one? The distinguishing feature of the EPRQDBA protocol, which does not utilize a quantum signature scheme, is the fact that it only relies on EPR pairs. Exotic multi-particle entangled states employed in other protocol are not so easy to produce with our current quantum apparatus. This increases preparation time and complicates their use in situations where the number n of players is large. Similarly, although for small values of n  | G H Z n states are easily generated by contemporary quantum computers, when the number n of players increases, it becomes considerably more difficult to prepare and distribute | G H Z n tuples. Thus, protocols that require | G H Z n tuples for n players dot not facilitate scalability. In contrast, Bell states are, without a doubt the easiest to generate among maximally entangled states. The EPRQDBA only requires EPR pairs, specifically | Ψ + pairs, irrespective of the number n of players. This leads to a reduction in preparation time, increases scalability, and, ultimately, practicability. Another strong point of the EPRQDBA protocol is the fact that it completes in a constant number of rounds, specifically 4 rounds. Thus, the completion time of the protocol is independent of the number n of players, which also enhances its scalability.

Organization

The paper is organized as follows. Section 1 contains an introduction to the subject along with bibliographic pointers to related works. Section 2 provides a brief exposition to all the concepts necessary for the understanding of our protocol. Section 3 contains a detailed exposition of the EPRQDBA protocol for the special case of 3 players, namely Alice, Bob and Charlie. Section 4 gives a formal presentation of the EPRQDBA protocol in the general case of n players. Finally, Section 5 contains a summary and a discussion on some of the finer points of this protocol.

2. Preliminaries

2.1. | Ψ + EPR Pairs

Quantum entanglement is one of the most celebrated properties of quantum mechanics and, without exaggeration, serves as the core of the majority of quantum protocols. Mathematically, entangled states of composite systems must be described as a linear combination of two or more product states of their subsystems, as a single product state will not suffice. The famous Bell states are special quantum states of two qubits, also called EPR pairs, that represent the simplest form of maximal entanglement. These states are succinctly described by the next formula from [33].
| β x , y = | 0 | y + ( 1 ) x | 1 | y ¯ 2 ,
where | y ¯ is the negation of | y .
There are four Bell states and their specific mathematical expression is given below. The subscripts A and B are used to emphasize the subsystem to which the corresponding qubit belongs, that is, qubits | · A belong to Alice and qubits | · B belong to Bob.
| Φ + = | β 00 = | 0 A | 0 B + | 1 A | 1 B 2
| Φ = | β 10 = | 0 A | 0 B | 1 A | 1 B 2
| Ψ + = | β 01 = | 0 A | 1 B + | 1 A | 0 B 2
| Ψ = | β 11 = | 0 A | 1 B | 1 A | 0 B 2
For existing quantum computers that use the circuit model, it is quite easy to generate Bell states. The proposed protocol relies on | Ψ + = | 0 A | 1 B + | 1 A | 0 B 2 pairs. Apart from | Ψ + pairs, we shall make use of qubits in another well-known state, namely | + . For convenience, we recall the definition of | +
| + = H | 0 = | 0 + | 1 2 ,
which can be immediately produced by applying the Hadamard transform on | 0 . Let us also clarify that all quantum registers are measured with respect to the computational basis B = { | 0 , | 1 } .

2.2. Detectable Byzantine Agreement

In the landmark paper [1], the authors used the term the “Byzantine Generals Problem” to formulate the problem we study in this paper. A little later, two other influential works [34,35] changed the terminology a bit and refereed to the same problem as the “Byzantine Agreement Problem,” a term that has been consistently used in the literature ever since. The problem itself involves n generals of the Byzantine empire, one of them being the commanding general and the rest n 1 being lieutenant generals. The commanding general must communicate his order to the lieutenant generals who are in different geographical locations. The overall situation is further complicated by the existence of traitors among the generals (possibly including even the commanding general). The notion of Byzantine Agreement was defined in [1] as follows.
Definition 1
(Byzantine Agreement). A protocol achieves Byzantine Agreement (BA) if it satisfies the following conditions.
(BA1)
All loyal lieutenant generals follow the same order.
(BA2)
When the commanding general is loyal, all loyal lieutenant generals follow the commanding general’s order.
The authors in [1] not only presented an algorithm that, under certain assumptions, achieves BA, but also obtained the significant result that, under the assumption of pairwise authenticated channels among the generals, BA can be attained if and only if t < n 3 , where n is the number of generals and t is the number of traitors. Later it was established that this bound can’t be improved even if additional resources are assumed (see [36]). An important special illustration of this fact, is the case of n = 3 generals, exactly one of which is a traitor because it is impossible to achieve BA in such a case, by any classical protocol.
In the seminal paper [21] a variant of BA called Detectable Byzantine Agreement (DBA from now on) was introduced. By slightly relaxing the requirements of the BA protocol, and, in particular, allowing the loyal generals to abort the protocol, an action that is not permitted in the original protocol, the authors were able to give the first quantum protocol for DBA. Their protocol relied on Aharonov states and improved the previous bound by achieving agreement in the special case of one traitor among three generals. Although [21] considered only the case of 3 generals, later works introduced DBA protocols for n parties. In this work we use the Definition 2 for DBA.
Definition 2
(Detectable Byzantine Agreement). A protocol achieves Detectable Byzantine Agreement (DBA) if it satisfies the following conditions.
(DBA1)
If all generals are loyal, the protocol achieves Byzantine Agreement.
(DBA2)
Consistency: All loyal generals either follow the same order or abort the protocol.
(DBA3)
Validity: If the commanding general is loyal, then either all loyal lieutenant generals follow the commanding general’s order or abort the protocol.
A comparison of Definition 1 with Definition 2 shows that the critical difference between BA and DBA lies in the extra capability of the generals to abort the protocol in the DBA case. As is common practice, we shall assume that the commanding general’s orders are either 0 or 1, and we shall use the symbol ⊥ to signify that the decision to abort.

2.3. Assumptions and Setting

In this section we begin the presentation of our EPR-based protocol for Detectable Byzantine Agreement, or EPRQDBA for short. For the sake of completeness, we explicitly state the assumptions that underlie the execution of the EPRQDBA protocol.
(A1)
There is a “quantum source” responsible for generating single qubits in the | + state and EPR pairs entangled in the | Ψ + state. The source distributes these qubits to each general through a quantum channel.
(A2)
A complete network of pairwise authenticated classical channels connects all generals.
(A3)
The classical network is synchronous coordinated by a global clock.
(A4)
The protocol unfolds in rounds. In every round each general may receive messages, perform computations, and send messages. The messages sent during the current round are guaranteed to have arrived to their intended recipients by the beginning of the next round.
(A5)
All measurements are performed with respect to the computational basis B = { | 0 , | 1 } .
We follow the tradition and describe the EPRQDBA protocol as a game. The players in this game are the n spatially distributed generals. It will be convenient to divide them into two groups. The commanding general alone comprises the first group. From now on the famous Alice will play the role of the commanding general. The  n 1 lieutenant generals make up the second group. In the special case of n = 3 that we shall examine shortly, the venerable Bob and Charlie will play the 2 lieutenant generals. In the general case, where n > 3 , we will mostly employ generic names such LT 0 , …, LT n 2 , LT standing of course for “lieutenant general.” Occasionally, to emphasize some point, we may use again Bob or Charlie. To make the presentation easier to follow, we shall first show how the EPRQDBA protocol works in the special case of only 3 players, namely Alice, Bod and Charlie.

3. The 3 Player EPRQDBA Protocol

3.1. Entanglement Distribution Phase

The EPRQDBA protocol can be conceptually organized into 3 distinct phases. The first is the entanglement distribution phase, which refers to the generation and distribution of qubits and entangled EPR pairs. As we have briefly explained in assumption ( A 1 ), we assume the existence of a trusted quantum source that undertakes this role. It is a relatively easy task, in view of the capabilities of modern quantum apparatus. Hence, the quantum source will have no difficulty in producing
  • 2 m qubits in the | + state by simply applying the Hadamard transform on | 0 , and
  • 2 m EPR pairs in the | Ψ + state, which can be easily generated by contemporary quantum computers.
In the above scheme, the parameter m is a properly chosen positive integer. Further suggestions regarding appropriate values of m are provided in the mathematical analysis of the protocol.
Afterwards, the source transmits the qubits to the intended recipients through the quantum channels following the pattern outlined below.
(3D1)
The 2 m EPR pairs are numbered from 0 to 2 m 1 .
(3D2)
From every EPR pair k, where 0 k 2 m 1 , the first qubit is sent to Alice.
(3D3)
The source sends to Bob 2 m qubits: q 0 , q 1 , …, q 2 m 2 , q 2 m 1 . The transmission alternates qubits in the | + state (in the even positions of this sequence) with the second qubit of the odd-numbered EPR pairs (in the odd positions of this sequence).
(3D4)
Symmetrically, the source sends to Charlie 2 m qubits: q 0 , q 1 , …, q 2 m 2 , q 2 m 1 . In the even positions of this sequence, the source inserts the second qubit of the even-numbered EPR pairs and in the odd positions qubits in the | + state.
The end result is that the quantum registers of Alice, Bob and Charlie are populated as shown in Figure 1. Qubits of the same EPR pair are shown in the same color. Red is used to indicate the EPR pairs shared between Alice and Bob, which occupy the odd-numbered positions in their quantum registers. Analogously, green is used for the EPR pairs shared between Alice and Charlie that occupy the even-numbered positions in their quantum registers. The gray qubits represent those in the | + state that occupy the remaining positions in Bob and Charlie’s registers.

3.2. Entanglement Verification Phase

This phase is crucial because the entire protocol is based on entanglement. If entanglement is not guaranteed, then agreement cannot not be guaranteed either. Obviously, the verification process can lead to two dramatically different outcomes. If entanglement verification is successfully established, then the EPRQDBA protocol is certain to achieve agreement. Failure of verification implies absence of the necessary entanglement. This could be attributed either to noisy quantum channels or insidious sabotage by an active adversary. Whatever the true reason is, the only viable solution is to abort the current execution of the protocol, and initiate the whole procedure again from scratch, after taking some corrective measures.
This phase is very important because if entanglement is broken, then agreement can’t be guaranteed. For this reason, the entanglement verification phase has been extensively analyzed in the relative literature. The EPRQDBA protocol adheres to the previously established methods that have been introduced in previous works, such as [20,21,22,23,24]. In order to avoid repeating well-known techniques, we refer the reader to the these papers that describe in detail the implementation of this phase.

3.3. Agreement Phase

The EPRQDBA protocol achieves detectable agreement during its third and last phase, aptly named agreement phase. Alice, Bob and Charlie initiate the agreement phase by measuring their quantum registers. The distribution scheme, as analyzed in Section 3.1, leads to some crucial correlations among the contents of Alice, Bob and Charlie’s registers.
Definition 3.
Let the bit vectors a , b , and c denote the contents of Alice, Bob and Charlie’s registers after the measurement, and assume that their explicit form is as given below:
a = a 2 m 1 a 2 m 2 p a i r m 1 a 2 m 3 a 2 m 4 p a i r m 2 a 3 a 2 p a i r 1 a 1 a 0 p a i r 0 ,
b = b 2 m 1 b 2 m 2 p a i r m 1 b 2 m 3 b 2 m 4 p a i r m 2 b 3 b 2 p a i r 1 b 1 b 0 p a i r 0 ,
c = c 2 m 1 c 2 m 2 p a i r m 1 c 2 m 3 c 2 m 4 p a i r m 2 c 3 c 2 p a i r 1 c 1 c 0 p a i r 0 .
The k t h pair of a , 0 k m 1 , is the pair of bits a 2 k + 1 a 2 k , and is designated by a k . Similarly, the k t h pairs of b and c are designated by b k and c k . Hence, a , b , and c can be written succinctly as:
a = a m 1 a m 2 a 1 a 0 ,
b = b m 1 b m 2 b 1 b 0 ,
c = c m 1 c m 2 c 1 c 0 .
We also define a special type of pair, termed the uncertain pair, that is denoted by u = , whereis a new symbol, different from 0 and 1. In contrast, pairs consisting of BITS 0 and/or 1 are called definite pairs.
When we want refer to either Bob’s or Charlie’s bit vector, but without specifying precisely which one, we will designate it by
l = l m 1 l m 2 l 1 l 0 = l 2 m 1 l 2 m 2 pair m 1 l 2 m 3 l 2 m 4 pair m 2 l 3 l 2 pair 1 l 1 l 0 pair 0 .
According to the distribution scheme, Alice and Bob share the odd-numbered | Ψ + = | 0 A | 1 B + | 1 A | 0 B 2 pairs, and Alice and Charlie share the even-numbered | Ψ + = | 0 A | 1 C + | 1 A | 0 C 2 pairs. Therefore, the next Lemma 1 holds. Its proof is trivial and is omitted.
Lemma 1
(Pair Differentiation Property). The next property, termed pair differentiation property, characterizes the corresponding bits and pairs of the bit vectors a , b , and c .
  • For every odd-numbered bit b k in b , where k = 1 , 3 , , 2 m 1 , it holds that
    b k = a k ¯ , k = 1 , 3 , , 2 m 1 .
  • For every even-numbered bit c k in c , where k = 0 , 2 , , 2 m 2 , it holds that
    c k = a k ¯ , k = 0 , 2 , , 2 m 2 .
  • Every a k pair, where 0 k m 1 , differs from the corresponding pairs b k and c k .
    a k b k and a k c k , for every k , 0 k m 1 .
In the above relations (14) and (15), a k ¯ is the negation of a k .
Visually, the situation regarding the correlations among corresponding bits is shown in Figure 2. Again bits resulting from the same EPR pair are shown in the same color.
Definition 4
(Command Vectors). Alice sends to Bob and Charlie either the command 0 or the command 1. Besides her command, as a “proof”, she also sends an appropriate command vector. The idea is that the command vector for Bob is always different from the command vector for Charlie, even when the command is the same. For the command 0, the command vectors for Bob and Charlie are 𝟘 B and 𝟘 C , respectively, whereas for the command 1 the corresponding command vectors are 1 B and 1 C . The explicit form of the command vectors is the following.
0 B = v m 1 v m 2 v 1 v 0 , w h e r e v k = a k = a 2 k + 1 a 2 k i f a 2 k + 1 = 0 u = i f a 2 k + 1 0 , 0 k m 1 .
0 C = v m 1 v m 2 v 1 v 0 , w h e r e v k = a k = a 2 k + 1 a 2 k i f a 2 k = 0 u = i f a 2 k 0 , 0 k m 1 .
1 B = v m 1 v m 2 v 1 v 0 , w h e r e v k = a k = a 2 k + 1 a 2 k i f a 2 k + 1 = 1 u = i f a 2 k + 1 1 , 0 k m 1 .
1 C = v m 1 v m 2 v 1 v 0 , w h e r e v k = a k = a 2 k + 1 a 2 k i f a 2 k = 1 u = i f a 2 k 1 , 0 k m 1 .
A command vector, besides pairs containing 0 and 1 bits, also contains an approximately equal number of pairs consisting ofcharacters. When we want refer to a command vector, but without providing further details, we will designate it by
v = v m 1 v m 2 v 1 v 0 = v 2 m 1 v 2 m 2 p a i r m 1 v 2 m 3 v 2 m 4 p a i r m 2 v 3 v 2 p a i r 1 v 1 v 0 pair 0 .
Given a command vector or a bit vector, we define the set containing the positions of the pairs that consist of a given combination of bits.
Definition 5
(Pair Designation). Given a command vector v or a bit vector l , we define the set P x , y ( v ) and P x , y ( l ) , respectively, of the positions of those pairs consisting precisely of the bits x , y .
Example 1
(Illustrating the concepts). This first example is designed to illustrate all the previous concepts. For practical purposes, i.e., to fit in a page, we take m = 12 . In a real implementation m should certainly be greater (see Table 1). Let us assume that the contents of Alice, Bob and Charlie’s registers are those shown in Figure 3.
By Definition 3, we may write that
a = 10 p a i r 11 11 p a i r 10 00 p a i r 9 10 p a i r 8 01 p a i r 7 11 p a i r 6 00 p a i r 5 00 p a i r 4 11 p a i r 3 00 p a i r 2 10 p a i r 1 01 p a i r 0 ,
b = 00 p a i r 11 01 p a i r 10 11 p a i r 9 01 p a i r 8 10 p a i r 7 01 p a i r 6 10 p a i r 5 11 p a i r 4 01 p a i r 3 10 p a i r 2 00 p a i r 1 11 p a i r 0 ,
c = 01 pair 11 00 pair 10 11 pair 9 11 pair 8 00 pair 7 10 pair 6 01 pair 5 11 pair 4 00 pair 3 11 pair 2 01 pair 1 10 pair 0 ,
where the bit vectors a , b , and c denote the contents of Alice, Bob and Charlie’s registers after the measurement.
In Figure 3, the correlated pairs of bits are drawn with the same color. Specifically, as in all previous figures, red is used to indicate the pairs of bits that originated from the measurement of the EPR pairs shared between Alice and Bob, and which occupy the odd-numbered positions in their registers. Analogously, green depicts the pairs of bits that originated from the measurement of the EPR pairs shared between Alice and Charlie, which occupy the even-numbered positions in their registers. The remaining gray bits that appear in Bob and Charlie’s registers come from qubits that were initially in the | + state.
By a simple observation of the red and green pairs of bits, we immediately see that Lemma 1 is verified. In every red pair, the two bits are complementary, i.e., the second bit is the negation of the first. This is due to the fact that their values are the result of the measurement of a | Ψ + pair. The red pairs correlate Alice and Bob’s registers. Exactly the same holds for the green pairs, which correlate Alice and Charlie’s registers. The initial presence of the | Ψ + pairs in the entanglement distribution phase, has manifested into classical correlation among the contents of Alice, Bob, and Charlie’s registers during the agreement phase.
There are 12 pairs in a , b , and c . In each of them, the k t h pair, 0 k 11 , contains the bits that occupy positions 2 k + 1 and 2 k , as shown in Figure 3. The bit in position 2 k + 1 is the most significant bit of the k t h pair and the bit in position 2 k is the least significant bit.
Let us suppose that Alice sends the order 0. According to Definition 4, Alice must prove her order by sending the command vectors 0 B and 0 C to Bob and Charlie, respectively. The command vector 0 B is constructed by including the pairs in a with most significant bit 0 (irrespective of what the least significant bit is) and filling the gaps with the uncertain pair. Symmetrically, 0 C is constructed by including the pairs in a with least significant bit 0 (irrespective of what the most significant bit is) and filling the gaps with the uncertain pair. Thus, 0 B and 0 C are as given below (we have also repeated a to facilitate the comparison).
a = 10 p a i r 11 11 p a i r 10 00 p a i r 9 10 p a i r 8 01 p a i r 7 11 p a i r 6 00 p a i r 5 00 p a i r 4 11 p a i r 3 00 p a i r 2 10 p a i r 1 01 p a i r 0 ,
0 B = p a i r 11 p a i r 10 00 p a i r 9 p a i r 8 01 p a i r 7 p a i r 6 00 p a i r 5 00 p a i r 4 p a i r 3 00 p a i r 2 p a i r 1 01 p a i r 0 ,
0 C = 10 p a i r 11 p a i r 10 00 p a i r 9 10 p a i r 8 p a i r 7 p a i r 6 00 p a i r 5 00 p a i r 4 p a i r 3 00 p a i r 2 10 p a i r 1 p a i r 0 .
Recalling Definition 5, we see that the sets P x , y ( 0 B ) and P x , y ( 0 C ) contain the positions in 0 B and 0 C , respectively, of the pairs consisting of the bits x , y . In view of (26) and (27), we derive that
P 0 , 0 ( 0 B ) = { 2 , 4 , 5 , 9 } P 0 , 0 ( 0 C ) = { 2 , 4 , 5 , 9 } P 0 , 1 ( 0 B ) = { 0 , 7 } P 1 , 0 ( 0 C ) = { 1 , 8 , 11 }
Let us now suppose that Alice sends the order 1. In this case, Alice must prove her order by sending the command vectors 1 B and 1 C to Bob and Charlie, respectively. The command vector 1 B is constructed by including the pairs in a with most significant bit 1 (irrespective of what the least significant bit is) and filling the gaps with the uncertain pair. Symmetrically, 1 C is constructed by including the pairs in a with least significant bit 1 (irrespective of what the most significant bit is) and filling the gaps with the uncertain pair. The resulting 1 B and 1 C are shown below (again, we have also repeated a to facilitate the comparison).
a = 10 p a i r 11 11 p a i r 10 00 p a i r 9 10 p a i r 8 01 p a i r 7 11 p a i r 6 00 p a i r 5 00 p a i r 4 11 p a i r 3 00 p a i r 2 10 p a i r 1 01 p a i r 0 ,
1 B = 10 p a i r 11 11 p a i r 10 p a i r 9 10 p a i r 8 p a i r 7 11 p a i r 6 p a i r 5 p a i r 4 11 p a i r 3 p a i r 2 10 p a i r 1 p a i r 0 ,
1 C = pair 11 11 pair 10 pair 9 pair 8 01 pair 7 11 pair 6 pair 5 pair 4 11 pair 3 pair 2 pair 1 01 pair 0 .
The sets P x , y ( 1 B ) and P x , y ( 1 C ) contain the positions in 1 B and 1 C , respectively, of the x , y pairs. Taking into account (29) and (30), we see that
P 1 , 0 ( 1 B ) = { 1 , 8 , 11 } P 0 , 1 ( 1 C ) = { 0 , 7 } P 1 , 1 ( 1 B ) = { 3 , 6 , 10 } P 1 , 1 ( 1 C ) = { 3 , 6 , 10 }
In the present example, the value of the parameter m is 12, which implies that m 4 = 3 . The cardinality of all the sets P 0 , 0 ( 0 B ) , P 0 , 1 ( 0 B ) , P 0 , 0 ( 0 C ) , P 1 , 0 ( 0 C ) , P 1 , 0 ( 1 B ) , P 1 , 1 ( 1 B ) , P 0 , 1 ( 1 C ) , and P 1 , 1 ( 1 C ) is 3 = m 4 , which verifies the next Lemma 2. Of course, the exact cardinality of some of these sets deviates slightly from the expected value 3, but this is not unexpected. As m increases, the ratio of the deviation to m will tend to 0.
Based on Definition 5, it is trivial to see that the next Lemma 2 holds. The notation | S | is employed to designate the cardinality, i.e., the number of elements, of an arbitrary set S.
Lemma 2
(Loyal Command Vector Properties). If Alice is loyal, her command vectors 0 B , 0 C , 1 B and 1 C satisfy the following properties.
| P 0 , 0 ( 0 B ) | m 4 | P 0 , 0 ( 0 C ) | m 4 | P 0 , 1 ( 0 B ) | m 4 | P 1 , 0 ( 0 C ) | m 4 | P 1 , 0 ( 1 B ) | m 4 | P 0 , 1 ( 1 C ) | m 4 | P 1 , 1 ( 1 B ) | m 4 | P 1 , 1 ( 1 C ) | m 4
The agreement phase of the EPRQDBA protocol evolves in rounds. The actions taken by the Alice, Bob and Charlie in each round are described below.
Algorithms 1–3 apply Lemmata 1 and 2 to determine whether a command vector is consistent, in which case they return TRUE. If they determine inconsistencies, they terminate and return FALSE. The names of Algorithms 2 and 3 are mnemonic abbreviations for “Check with Command Vector” and “Check with Bit Vector.” It is important to explain their difference.
Without loss of generality, let us suppose that Bob received the order 0 and a consistent command vector v A from Alice, while Charlie claims that he received the order 1. Charlie must convince Bob by sending Bob the command vector v he claims he received from Alice. Bob checks v for inconsistencies against his own v A by invoking the Algorithm 2. Now, imagine that Bob received an inconsistent command vector v A from Alice and his initial decision is to abort, while Charlie claims that he received the order 1. Charlie must convince Bob by sending Bob the command vector v he claims he received from Alice. In this situation, Bob does not have a consistent command vector v A that he could use, so Bob must check v for inconsistencies against his own bit vector b by invoking the Algorithm 3.
In Algorithms 1–3, we employ the following notation.
  • i , j { 0 , 1 } are the indices of Bob (1) and Charlie (0).
  • c, where c = 0 or c = 1 , is the command being checked for consistency.
  • v A = v 2 m 1 v 2 m 2 v 1 v 0 is the command vector sent by Alice.
  • v , is the command vector sent by Bod to Charlie (or vice versa).
  • l = l 2 m 1 l 2 m 2 l 1 l 0 is the bit vector of Bod (Charlie) who does the consistency checking.
  • △ is the symmetric difference of two sets, i.e., S S = S S S S , for given sets S and S .
   Algorithm 1 CheckAlice (i, c, v A , l )
Applsci 13 08405 i001
   Algorithm 2 CheckWCV (i, j, c, v , v A )
Applsci 13 08405 i002
   Algorithm 3 CheckWBV (i, j, c, v , l )
Applsci 13 08405 i003
In order to streamline the exposition of the text, all lengthy proofs are relocated in the Appendix A.
In the literature, all works focusing on the 3 player setting, assume that there is exactly one traitor among the 3, who can either be the commanding general or one of the lieutenant generals. If we assume that there is precisely one traitor among the 3, we can prove the following Propositions 1 and 2.
Proposition 1
(Loyal Alice). If Alice is loyal, the 3 player EPRQDBA protocol will enable the loyal lieutenant general to agree with Alice. Specifically, if Alice and Bob are loyal and Charlie is a traitor, Bob will follow Alice’s order. Symmetrically, if Alice and Charlie are loyal and Bob is a traitor, Charlie will follow Alice’s order.
Proposition 2
(Traitor Alice). If Bob and Charlie are loyal and Alice is a traitor, the 3 player EPRQDBA protocol will enable Bob and Charlie to reach agreement, in the sense of both following the same order or both aborting.
Example 2
(Illustrating the 3 player protocol). This second example is a continuation of the first. It aims to illustrate the operation of the 3 Player EPRQDBA Protocol and give an intuitive explanation of why Propositions 1 and 2 are true.
Let us continue Example 1, and examine first the scenario where a loyal Alice sends order 0 to both Bob and Charlie accompanied by the command vectors 0 B and 0 C as given by (26) and (27), respectively. We may distinguish the following cases.
  • Both Bob and Charlie are loyal. Then, according to Rule 3 , 1 of the 3 player EPRQDBA Protocol 1, all 3 players agree to execute order 0.
  • There is one traitor among Bob and Charlie. Without loss of generality we may assume that Charlie is the traitor, who tries to sabotage the agreement. What can he do?
    Charlie may claim that he decided to abort because Alice sent him an inconsistent command vector. Then, according to Rule 3 , 2 of the 3 player EPRQDBA Protocol 1, Bob will stick to his initial decision, and, together with Alice, will agree to execute order 0. In this way, assumption (DBA 3 ) of the detectable Byzantine Agreement protocol, stipulating that commanding general is loyal, then either all loyal lieutenant generals follow the commanding general’s order or abort the protocol (recall Definition 2), is satisfied. The rationale behind this rule is that Bob, having already received a consistent command vector from Alice, is suspicious of Charlie’s decision to abort, and decides to cling to his preliminary decision.
    Charlie may claim that Alice gave the order 1, along with a consistent command vector 1 C . Bob will then use the CheckWCV Algorithm 2 to check Charlie’s command vector against his own command vector 0 B for inconsistencies. If Bob finds no inconsistencies, then, according to Rule 3 , 3 of the 3 player EPRQDBA Protocol 1, he will abort. Obviously, in such a case, Charlie will have won in sabotaging the agreement. Let’s analyze the probability of this event. First, let’s recall from (27) what Charlie knows with certainty.
    0 C = 10 p a i r 11 p a i r 10 00 p a i r 9 10 p a i r 8 p a i r 7 p a i r 6 00 p a i r 5 00 p a i r 4 p a i r 3 00 p a i r 2 10 p a i r 1 p a i r 0 .
    He partially knows 0 B given by (26), and in particular only the pairs consisting of 00,
    0 B = p a i r 11 p a i r 10 00 p a i r 9 p a i r 8 01 p a i r 7 p a i r 6 00 p a i r 5 00 p a i r 4 p a i r 3 00 p a i r 2 p a i r 1 01 p a i r 0 ,
    and his problem is to construct something resembling the real 1 C , as given from (30).
    1 C = p a i r 11 11 p a i r 10 p a i r 9 p a i r 8 01 p a i r 7 11 p a i r 6 p a i r 5 p a i r 4 11 p a i r 3 p a i r 2 p a i r 1 01 p a i r 0 .
    Charlie knows that the least significant bit of the uncertain pairs in 0 C is 1 and the most significant bit is 0 or 1, with equal probability 0.5 . However, Charlie cannot know with certainty if the most significant bit of a specific uncertain pair is 0 or 1. Therefore, when guessing 1 C , Charlie can make two detectable mistakes: (i) place a 0 in a wrong pair that is not actually contained in P 0 , 1 ( 0 B ) , e.g., set the pair 10 as 01, or (ii) place a 1 in a wrong pair that appears in P 0 , 1 ( 0 B ) , e.g., set pair 7 as 11. The situation from a probabilistic point of view resembles the probability of picking the one correct configuration out of many. The total number of configurations is equal to the number of ways to place 2 or 3 identical objects (0) into 5 distinguishable boxes. The probability that Charlie places all the 0s correctly is
    P ( Charlie places all 0 correctly ) = 1 5 3 = 0.1 .
    Thus, the probability that Charlie cheats successfully is just 0.1 , even in this toy scale example with m = 12 . Consequently, Bob is bound to detect inconsistencies, which will lead him to apply Rule 3 , 4 of the 3 player EPRQDBA Protocol 1, cling to his initial decision, and, ultimately, achieve agreement with Alice.
The situation where a loyal Alice sends order 1 to both Bob and Charlie is identical.
Let us now examine the second major scenario where a traitor Alice intends to prevent the loyal Bob and Charlie from recanting agreement. In view of Definition 2, this precludes the cases where Alice sends to both of them inconsistent command vectors, or the same order, accompanied by appropriate consistent command vectors. In reviewing her remaining options, we distinguish the following cases.
  • Alice sends an order, say 0, along with a consistent command vector to Bob and an inconsistent one to Charlie. In this case, Bob will stick to his initial decision, but Charlie will use the CheckWBV Algorithm 3 to verify Bob’s command vector. In doing so, Charlie will crosscheck 0 B , given by (26), with his own bit vector c from (24).
    0 B = p a i r 11 p a i r 10 00 p a i r 9 p a i r 8 01 p a i r 7 p a i r 6 00 p a i r 5 00 p a i r 4 p a i r 3 00 p a i r 2 p a i r 1 01 p a i r 0 ,
    c = 01 p a i r 11 00 p a i r 10 11 p a i r 9 11 p a i r 8 00 p a i r 7 10 p a i r 6 01 p a i r 5 11 p a i r 4 00 p a i r 3 11 p a i r 2 01 p a i r 1 10 p a i r 0 .
    Charlie will count the 00 and 01 pairs in 0 B to find that they are 4 and 2, pretty close to the expected value 3, and in all these pairs the least significant bit is the negation of his corresponding bit, as dictated by the original | Ψ + entanglement. Hence, Charlie will successfully verify Bob’s command vector, and, according to the Rule 3 , 5 of the 3 player EPRQDBA Protocol 1, he will change his decision to that of Bob, thereby reaching the desired agreement. The rationale behind this rule is that Charlie, having already received an inconsistent command vector from Alice, is suspicious of Alice. His suspicion is confirmed when he verifies Bob’s command vector, considering that it high unlikely for Bob to have forge a consistent command vector. Thus, he decides to change his preliminary decision to that of Bob.
  • Alice sends to Bob and Charlie different orders with consistent command vectors. Let us assume, without loss of generality, that Alice sends the order 0 together with a consistent command vector 0 B to Bob and the order 1 together with a consistent command vector 1 C to Charlie. Bob knows the positions of almost all 00 and 01 pairs in a . If Alice had forged even a single 10 or 11 pair, claiming to be either 00 or 01, then Bob, when using the CheckAlice Algorithm 1, he would have immediately detected the inconsistency. Symmetrically, Charlie knows the positions of almost all 01 and 11 pairs in a . According to the rules of the protocol, Bob will sent to Charlie the command vector 0 B , and, simultaneously, Charlie will send to Bob the command vector 1 C . Both will use the CheckWCV Algorithm 2 to verify the consistency of the others’ command vector. Then, according to Rule 3 , 3 , both Bob and Charlie will abort, again fulfilling the requirements of DBA.
Let us ponder the question of what will happen if there are 2 traitors and only one loyal general. It might be that the 2 traitors are the 2 lieutenant generals, or the commanding general and one of the lieutenant generals. This case is actually very easy as explained in the next Corollary 1.
   Protocol 1: The 3 Player EPRQDBA Protocol.
(Round1)
Alice sends to Bob and Charlie her order and the appropriate command vector as proof.
(Round2)
Bob uses the CheckAlice Algorithm 1 to check the received command vector against his own bit vector b for inconsistencies.
If no inconsistencies are found, Bob preliminary accepts the received order.
Otherwise, Bob’s preliminary decision is to abort (⊥).
Upon completion of the verification procedure, Bob sends to Charlie his preliminary decision together with the received command vector.
Symmetrically and in parallel, Charlie performs the same actions.
(Round3)
Bob compares his own initial decision with that of Charlie’s.
Rule 3 , 1 : If Charlie’s decisions coincides with Bob’s preliminary decision, then Bob accepts as final his preliminary decision and terminates the protocol on his end.
In case Charlie’s initial decision is different, then the following cases are considered.
Rule 3 , 2 : If Bob’s decision is 0 (1) and Charlie’s decision is to abort, then Bob sticks to his initial decision and terminates the protocol.
If Bob’s decision is 0 (1) and Charlie’s decision is 1, then Bob uses the CheckWCV Algorithm 2 to check Charlie’s command vector against his own command vector for inconsistencies.
Rule 3 , 3 : If no inconsistencies are detected, then Bob aborts and terminates the protocol.
Rule 3 , 4 : Otherwise, Bob sticks to his preliminary decision and terminates the protocol.
If Bob’s decision is to abort and Charlie’s decision is 0 (or 1), then Bob uses the CheckWBV Algorithm 3 to check Charlie’s command vector against his own bit vector for inconsistencies.
Rule 3 , 5 : If no inconsistencies are found, then Bob changes his final decision to 0 (1) and terminates the protocol.
Rule 3 , 6 : Otherwise, Bob sticks to his initial decision to abort and terminates the protocol.
Charlie’s actions mirror Bob’s actions.
Corollary 1
(The case of 2 traitors). The 3 player EPRQDBA protocol achieves detectable Byzantine Agreement even when there are 2 traitors among the 3 generals.
Proof. 
The fundamental assumption (DBA 2 ) of any detectable Byzantine Agreement protocol, stipulates that all loyal generals either follow the same order or abort the protocol (recall Definition 2). When there is only one loyal general, no matter whether he is the commanding general or a lieutenant general, whatever he decides is perfectly fine, as there is no other loyal party that he must agree with.    □
The next theorem is an obvious consequence of Propositions 1 and 2, and Corollary 1.
Theorem 1
(3 Player Detectable Byzantine Agreement). The 3 player EPRQDBA protocol achieves detectable Byzantine Agreement in any eventuality.

4. The n Player EPRQDBA Protocol

In this section we present the general form of the EPRQDBA protocol that can handle any number n > 3 generals who are spatially distributed. To be precise, we assume that Alice is the unique commanding general, who tries to coordinate her n 1 lieutenant generals LT 0 , …, LT n 2 , LT being an abbreviation for “lieutenant general.” As in the 3 player case, the n player form of the EPRQDBA protocol can be conceptually divided into 3 distinct phases, which we describe below.

4.1. The n Player Entanglement Distribution Phase

The first phase is the entanglement distribution phase that involves the generation and distribution of qubits and entangled EPR pairs. As we have already explained in assumption ( A 1 ), we take for granted the existence of a trusted quantum source that fulfills this task. Taking into account the capabilities of modern quantum apparatus, the quantum source should have no difficulty in producing
  • ( n 2 ) ( n 1 ) m qubits in the | + state by simply applying the Hadamard transform on | 0 , and
  • ( n 1 ) m EPR pairs in the | Ψ + state, which can be easily generated by modern quantum computers.
The parameter m plays an important role and should be a sufficiently large positive integer. The forthcoming mathematical analysis of the protocol contains additional discussion regarding m. The source distributes the produced qubits according to the next scheme.   
(nD1)
The ( n 1 ) m EPR pairs are numbered from 0 to ( n 1 ) m 1 .
(nD2)
The source sends a sequence q 0 A , q 1 A , …, q ( n 1 ) m 2 A , q ( n 1 ) m 1 A of ( n 1 ) m qubits to Alice and a sequence q 0 i , q 1 i , …, q ( n 1 ) m 2 i , q ( n 1 ) m 1 i of ( n 1 ) m qubits to lieutenant general LT i , 0 i n 2 .
(nD3)
Alice’s sequence is constructed by inserting in position k the first qubit of the EPR pair k, 0 k ( n 1 ) m 1 .
(nD4)
LT i ’s sequence, 0 i n 2 , is constructed as follows. Position k, 0 k ( n 1 ) m 1 , contains the second qubit of the EPR pair k if and only if k i mod ( n 1 ) ; otherwise position k contains a qubit in the | + state.
The end result is that the quantum registers of Alice and her n 1 lieutenant generals LT 0 , …, LT n 2 , are populated as shown in Figure 4.

4.2. The n Player Entanglement Verification Phase

This phase is extremely important because the entire protocol is based on entanglement. If entanglement is not guaranteed, then agreement cannot not be guaranteed either. The verification process can lead to two dramatically different outcomes. If entanglement verification is successfully established, then the EPRQDBA protocol is certain to achieve agreement. Failure of verification implies absence of the necessary entanglement. This may be attributed either to noisy quantum channels or insidious sabotage by an active adversary. Whatever the true reason is, the only viable solution is to abort the current execution of the protocol, and initiate the whole procedure again from scratch, after taking some corrective measures.
One should not underestimate the significance of this phase. Many previous papers have comprehensively and thoroughly studied this phase. The EPRQDBA protocol subscribes to the sophisticated methods that have already been described in the literature, such as [20,21,22,23,24]. The interested reader may consult these works and the references therein for further analysis.

4.3. The n Player Agreement Phase

The EPRQDBA protocol achieves detectable agreement during its third and last phase, aptly named agreement phase. The agreement phase begins when Alice and her n 1 lieutenant generals LT 0 , …, LT n 2 measure their quantum registers. By recalling the distribution scheme of Section 4.1, we see that certain important correlations among Alice’s register and the registers of her lieutenant generals have been established.
Definition 6.
Let the bit vectors a and l i denote the contents of Alice and LT i ’s, 0 i n 2 , registers after the measurement, and assume that their explicit form is as given below:
a = a ( n 1 ) m 1 a ( n 1 ) m ( n 1 ) ( n 1 ) - t u p l e a n 2 a 0 ( n 1 ) - t u p l e ,
l i = l ( n 1 ) m 1 i l ( n 1 ) m ( n 1 ) i ( n 1 ) - t u p l e l n 2 i l 0 i ( n 1 ) - t u p l e .
The k t h ( n 1 ) -tuple of a , 0 k m 1 , is the ( n 1 ) -tuple of bits a ( n 1 ) k + ( n 2 ) a ( n 1 ) k , and is designated by a k . Similarly, the k t h ( n 1 ) -tuple of l i is designated by l k i . Hence, a and l i can be written succinctly as:
a = a m 1 a m 2 a 1 a 0 ,
l i = l m 1 i l m 2 i l 1 i l 0 i .
We also use the notion of the uncertain ( n 1 ) -tuple, denoted by u = , whereis a new symbol, different from 0 and 1. In contrast, ( n 1 ) -tuples consisting of bits 0 and/or 1 are called definite tuples.
According to the distribution scheme, each ( n 1 ) -tuple in Alice’s bit vector a shares one | Ψ + = | 0 A | 1 i + | 1 A | 0 i 2 pair with every lieutenant general LT i , 0 i n 2 . This is captured by the next Lemma 3. Its proof is obvious and is omitted.
Lemma 3
(Tuple Differentiation Property). The next property, termed tuple differentiation property characterizes the corresponding bits and tuples of the bit vectors a and l i , 0 i n 2 .
l k i = a k ¯ , iff k i mod ( n 1 ) , k = 0 , , ( n 1 ) m 1 , 0 i n 2 .
Consequently, each a k tuple, where 0 k m 1 , is different from the corresponding tuple of every l i , 0 i n 2 .
a k l k i , for every k , 0 k m 1 .
Definition 7
(n Player Command Vectors). Alice sends to every lieutenant general LT i , 0 i n 2 , either the command 0 or the command 1. Besides her order, as a “proof,” she also sends an appropriate command vector. The idea is that the command vector for every lieutenant general is always different, even when the command is the same. For the order 0, the command vector sent to every lieutenant general LT i , 0 i n 2 , is 0 i , whereas for the order 1 the corresponding command vector is 1 i . The explicit form of the command vectors is the following.
0 i = v m 1 v 0 , where v k = a k if a ( n 1 ) k + i = 0 u = if a ( n 1 ) k + i 0 , 0 k m 1 .
1 i = v m 1 v 0 , where v k = a k if a ( n 1 ) k + i = 1 u = if a ( n 1 ) k + i 1 , 0 k m 1 .
A command vector besides tuples comprised entirely of 0 and 1 bits, also contains an approximately equal number of tuples consisting ofcharacters. When we want refer to a command vector, but without providing further details, we will designate it by
v = v m 1 v 0 = v ( n 1 ) m 1 v ( n 1 ) m ( n 1 ) ( n 1 ) - tuple v n 2 v 0 ( n 1 ) - tuple .
Given a command vector or a bit vector, we gather in a set the positions of the ( n 1 ) -tuples that contain a specific combination of bits.
Definition 8
(Tuple Designation). Given a command vector v or a bit vector l i , 0 i n 2 , we define the set T j y i x ( v ) and T j y i x ( l i ) , respectively, of the positions of the ( n 1 ) -tuples that contain bit x { 0 , 1 } in the i t h place and bit y { 0 , 1 } in the j t h place, 0 i j n 2 .
Likewise, the set of the positions of their ( n 1 ) -tuples that contain bit x { 0 , 1 } in the i t h place is denoted by T i x ( v ) and T i x ( l i ) , respectively.
In view of Definition 7, it is trivial to see that the assertions of the next Lemma 4 are valid, where the notation | S | is employed to designate the cardinality, i.e., the number of elements, of an arbitrary set S.
Lemma 4
(n Player Loyal Command Vector Properties). If Alice is loyal, her command vectors 0 i and 1 i , 0 i n 2 , satisfy the following properties.
| T i 0 ( 0 i ) | m 2 | T i 1 ( 1 i ) | m 2 | T j 0 i 0 ( 0 i ) | m 4 | T j 0 i 1 ( 1 i ) | m 4 | T j 1 i 0 ( 0 i ) | m 4 | T j 1 i 1 ( 1 i ) | m 4
As expected the protocol evolves in rounds. The actions of the n generals in each round are explained below. In the exposition of Protocol 2, we have made a few plausible assumptions regarding the behavior of traitors, which we state below.
   Protocol 2: The n Player EPRQDBA Protocol.
(Round1)
Send ▹ Alice sends to all of her n 1 lieutenant generals LT 0 , …, LT n 2 her order c i (which is either 0 or 1) and the appropriate command vector v i as proof.
(Round2)
Receive ▹ All LT i , 0 i n 2 , receive Alice’s order and command vector v i .
Subsequently, each LT i , calls the CheckAlice Algorithm 4 to check v i against his bit vector for inconsistencies.
If no inconsistencies are found, LT i ’s initial decision is d i ( 2 ) is Alice’s order.
If LT i detects inconsistencies, his initial decision is d i ( 2 ) = .
Send ▹ Upon completion of the verification procedure, LT i sends to all other LT j , 0 i j n 2 , his initial decision d i ( 2 ) together with v i as proof.
(Round3)
Receive ▹ Every LT i , 0 i n 2 , receives from every other LT j , 0 i j n 2 , LT j ’s initial decision d j ( 2 ) together with v j as proof.
Afterwards, each LT i , compares his d i ( 2 ) to all other d j ( 2 ) , 0 i j n 2 .
Rule 3 , 1 : If all d j ( 2 ) coincide with d i ( 2 ) , then LT i ’s intermediary decision is d i ( 3 ) = d i ( 2 ) .
If there is at least one d j ( 2 ) such that d i ( 2 ) d j ( 2 ) , then the following cases are considered.
Rule 3 , 2 : If d i ( 2 ) = 0 ( 1 ) and all different decisions are ⊥, then LT i ’s intermediary decision is d i ( 3 ) = d i ( 2 ) .
If d i ( 2 ) = 0 ( 1 ) and there exist d j ( 2 ) = 1 ( 0 ) , then LT i uses the CheckLTwCV Algorithm 5 to check the corresponding v j .
Rule 3 , 3 : If there is at least one consistent v j , then LT i ’s intermediary decision is d i ( 3 ) = .
Rule 3 , 4 : Otherwise, LT i ’s intermediary decision is d i ( 3 ) = d i ( 2 ) .
If d i ( 2 ) = and there exist different d j ( 2 ) , then LT i uses the CheckLTwBV Algorithm 6 to check the corresponding v j .
Rule 3 , 5 : If all the consistent v j correspond to the same d j ( 2 ) , then LT i ’s intermediary decision is d i ( 3 ) = d j ( 2 ) .
Rule 3 , 6 : Otherwise, LT i ’s intermediary decision is d i ( 3 ) = d i ( 2 ) .
Send ▹ Upon completion of the above comparison, LT i sends to all other lieutenant generals LT j , 0 i j n 2 , his intermediary decision d i ( 3 ) with proof those v k , v l that enabled him to arrive at his decision.
Note. The number of sent v j (s) can be 0 (Rule 3 , 1 , Rule 3 , 2 , Rule 3 , 4 ), 1 (Rule 3 , 3 , Rule 3 , 5 ), or even 2, in case there are two opposite orders, but with consistent command vectors (Rule 3 , 6 ). It should be clear that this time LT i transmits his own intermediary decision, together with command vectors sent to him from other lieutenant generals.
(Round4)
Receive ▹ Every LT i , 0 i n 2 , receives from every other LT j , 0 i j n 2 , LT j ’s intermediary decision d j ( 3 ) together with a list of 0 , 1 or 2 command vectors v k , v l as proof.
Subsequently, each LT i , compares his d i ( 3 ) to all other d j ( 3 ) , 0 i j n 2 .
Rule 4 , 1 : If d i ( 3 ) = because LT i has been sent two consistent but contradictory command vectors, then LT i ’s final decision is d i ( 4 ) = d i ( 3 ) .
Rule 4 , 2 : If d i ( 3 ) = d j ( 3 ) , for every j , 0 i j n 2 , then d i ( 4 ) = d i ( 3 ) .
If If d i ( 3 ) = 0 ( 1 ) and there is at least one d j ( 3 ) such that d i ( 3 ) d j ( 3 ) , then the following cases are considered.
If there exist d j ( 3 ) = d j ( 2 ) (meaning that LT j has revised his intermediary decision from 0 or 1 to ⊥), then, for every such j, LT i uses the CheckLTwCV Algorithm 5 to check the command vectors supplied as proof.
Rule 4 , 3 : If they are consistent for at least one j, then d i ( 4 ) = .
Rule 4 , 4 : Otherwise, LT i ’s final decision is d i ( 4 ) = d i ( 3 ) .
If LT i ’s decision is 0 (1) and at least one different decision is 1 (0), then LT i uses the CheckLTwCV Algorithm 5 to check the command vectors of all lieutenant generals whose intermediary decision is 1 (0) for inconsistencies.
Rule 4 , 5 : If there exists at least one command vector with no inconsistencies, then LT i aborts and terminates the protocol.
Rule 4 , 6 : Otherwise, LT i clings to his intermediary decision.
(T1)
If Alice is loyal, then the traitors do not possess any inside information. This means that for a disloyal lieutenant general it will be probabilistically impossible to forge a consistent command vector. Actually, the soundness of the protocol when Alice is loyal relies on this fact.
(T2)
The disloyal lieutenant generals manifest their traitorous behavior at the end of ( Round 2 ), either by falsely claiming that their decision is to abort, or by sending contradictory orders accompanied by consistent command vectors to different lieutenant generals.Their behavior is consistent in the sense that they always send identical information to the same lieutenant general, i.e., at the end of ( Round 3 ) they transmit the same decision they sent at the end of ( Round 2 ).
In terms of notation, to enhance the readability of the n Player EPRQDBA Protocol, we denote by d i ( 2 ) , d i ( 3 ) , and d i ( 4 ) the initial, intermediary, and final decision of lieutenant general LT i at the end of ( Round 2 ), ( Round 3 ), and ( Round 4 ).
The following algorithms apply Lemmas 3 and 4 to determine whether a command vector is consistent, in which case they return TRUE. If they determine inconsistencies, they terminate and return FALSE. The names of Algorithms 5 and 6 are mnemonic abbreviations for “Check LT with Command Vector” and “Check LT with Bit Vector.” To clear up things, we explain their difference.
Without loss of generality, let us suppose that LT i received the order 0 and a consistent command vector v A from Alice, while LT j claims that he received the order 1. According to the EPRQDBA protocol, LT j must convince LT i by sending the command vector v he claims he received from Alice. LT i checks v for inconsistencies against his own v A by invoking the Algorithm 5. Now, suppose that LT i received an inconsistent command vector v A from Alice and his initial decision is to abort, while LT j claims that he received the order 1. LT j must convince LT i by sending the command vector v he claims he received from Alice. In this situation, LT i does not have a consistent command vector v A that he could use, so LT i must check v for inconsistencies against his own bit vector b by invoking the Algorithm 6.
In Algorithms 4–6, we employ the following notation.
  • i, 0 i n 2 , is the index of the lieutenant general who does the consistency checking.
  • j, 0 i j n 2 , is the index of the lieutenant general whose command vector is being checked for consistency.
  • c, where c = 0 or c = 1 , is the command being checked for consistency.
  • v A = v ( n 1 ) m 1 v ( n 1 ) m ( n 1 ) v n 2 v 0 , is the command vector sent by Alice.
  • v is the command vector sent by the lieutenant general LT j .
  • l = l ( n 1 ) m 1 l ( n 1 ) m ( n 1 ) l n 2 l 0 is the bit vector of the lieutenant general LT i who does the consistency checking.
  • △ is the symmetric difference of two sets, i.e., S S = S S S S , for given sets S and S .
We now proceed to formally prove that the EPRQDBA protocol enables all the loyal generals to reach agreement.
Proposition 3
(n Player Loyal Alice). If Alice is loyal, then the n player EPRQDBA protocol will enable all loyal lieutenant generals to follow Alice’s order.
Proposition 4
(n Player Traitor Alice). If Alice is a traitor, then the n player EPRQDBA protocol will enable all loyal lieutenant generals to reach agreement, in the sense of all following the same order or all aborting.
The next Theorem 2 is an immediate consequence of Propositions 3 and 4.
Theorem 2
(n Player Detectable Byzantine Agreement). The n player EPRQDBA protocol achieves detectable Byzantine Agreement.
   Algorithm 4 CheckAlice ( i, c, v A , l )
Applsci 13 08405 i004
   Algorithm 5 CheckLTwCV (i, j, c, v , v A )
Applsci 13 08405 i005
   Algorithm 6 CheckLTwBV (i, j, c, v , l )
Applsci 13 08405 i006
In closing we may ask what will happen if there are n 1 traitors and only one loyal general. It might be that the n 1 traitors are the n 1 lieutenant generals, or Alice and n 2 of her lieutenant generals. Again, this case turns to be very easy. The crucial assumption (DBA 2 ) of any detectable Byzantine Agreement protocol, stipulates that all loyal generals either follow the same order or abort the protocol (recall Definition 2). When there is only one loyal general, maybe Alice herself, or one of the lieutenant generals, any decision taken would be fine, as there is no other loyal party that to agree with.

5. Discussion and Conclusions

This paper introduced the quantum protocol EPRQDBA that achieves Detectable Byzantine Agreement for an arbitrary number n of players.
The EPRQDBA protocol has a number of advantages to offer.
  • It is completely general because it can handle any number n of players.
  • It takes only a constant number of rounds, namely 3, to complete, no matter how many players there are.
  • It requires only EPR (specifically | Ψ + ) pairs, irrespective of the number n of players. This is probably the most important quality of the protocol. Without a doubt, EPR pairs are the easiest to produce among all maximally entangled states. In comparison, even | G H Z n states, would not be able to scale well as n increases, not to mention other more difficult to create entangled states.
All the above qualities advocate for its scalability and its potential applicability in practice. To drive further this point, we present the numerical characteristics of the EPRQDBA protocol in the following Table 1.
Parameter m is independent of the number of players n, which is another plus for the scalability of the protocol. Obviously, a proper value for must be selected in order to ensure that the probability that a traitor can forge a command vector is negligible. The reason why m does not scale with n is that the protocol always uses EPR pairs, that is, bipartite entanglement. The rules of the protocol dictate that every consistency check takes place between two command vectors, or between a command vector and a bit vector. Therefore, in every case the comparison involves just 2 strings of bits, irrespective of the number of generals. Moreover, this comparison, even in the most general case, involves just 2 bits, say i and j, in every n 1 tuple. Thus, the situation from a probabilistic point of view is always identical with the 3 player case. In a final analysis, the probability that a traitor deceives a loyal general, is the probability of picking the one correct configuration out of many. The total number of configurations is equal to the number of ways to place m 4 identical objects (either 0 or 1, depending on the order) into m 2 distinguishable boxes (the uncertain tuples). The probability that a traitor places all the m 4 bits correctly in the m 2 uncertain tuples is
P ( traitor cheats ) 1 m / 2 m / 4 ,
which tends to zero as m increases.
Table 1. This table summarizes the numerical characteristics of the EPRQDBA protocol. The abbreviations “bpm” and “tb” stand for “bits per message” and “total bits,” respectively.
Table 1. This table summarizes the numerical characteristics of the EPRQDBA protocol. The abbreviations “bpm” and “tb” stand for “bits per message” and “total bits,” respectively.
Qubits
# of | Ψ + pairs# of | + qubits
( n 1 ) m ( n 2 ) ( n 1 ) m
Bits & Messages
Round# of messages# bits per messageTotal # of bits
1 n 1 ( n 1 ) m ( n 1 ) 2 m
2 ( n 2 ) ( n 1 ) ( n 1 ) m ( n 2 ) ( n 1 ) 2 m
3 ( n 2 ) ( n 1 ) 0 # bpm 2 ( n 1 ) m 0 # tb 2 ( n 2 ) ( n 1 ) 2 m
4000
m & Probability
m m 4 m 2 P ( traitor cheats )
4120.5000000000000000
8240.167
16480.0145
32816 7.770 · 10 5
641632 1.663 · 10 9

Author Contributions

Conceptualization, T.A. and A.S.; methodology, T.A.; validation, A.S.; formal analysis, A.S.; investigation, T.A.; writing original draft preparation, T.A. and A.S.; writing review and editing, T.A. and A.S.; visualization, A.S.; supervision, T.A.; project administration, T.A. and A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable, the study does not report any data.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proofs of the Main Results

In this Appendix we formally prove the main results of this paper.
Proposition A1
(Loyal Alice). If Alice is loyal, the 3 player EPRQDBA protocol will enable the loyal lieutenant general to agree with Alice. Specifically, if Alice and Bob are loyal and Charlie is a traitor, Bob will follow Alice’s order. Symmetrically, if Alice and Charlie are loyal and Bob is a traitor, Charlie will follow Alice’s order.
Proof. 
We assume that Alice is loyal and, without loss of generality, that Alice conveys the command 0 to both Bob and Charlie, along with the appropriate command vectors as proof. These command vectors satisfy the properties asserted in Lemma 2.
Let us also assume that Bob is loyal. Consequently, Bob will use the Algorithm 1 to verify the validity of the received command vector 0 B .
According to the rules of the 3 player EPRQDBA Protocol 1, the only way for Bob to change his initial decision and abort is if Charlie sends to Bob a valid command vector 1 C . In such a case Charlie would be a traitor that has in reality received the command vector 0 C during ( Round 1 ). Can Charlie construct a convincing 1 C ?
Bob, having received the command vector 0 B , knows the positions of all the pairs in a of the form a 2 k + 1 a 2 k , such that a 2 k + 1 = 0 and a 2 k = 1 , 0 k m 1 .
P 0 , 1 ( 0 B ) = { p 1 , p 2 , , p t } , where t m 4 .
Having 0 C , Charlie knows that the least significant bit of the m 2 uncertain pairs in 0 C is 1 and the most significant bit is 0 or 1, with equal probability 0.5 . However, Charlie cannot know with certainty if the most significant bit of a specific uncertain pair is 0 or 1. Therefore, when constructing 1 C , Charlie can make two detectable mistakes.
(M1)
Place a 0 in a wrong pair that is not actually contained in P 0 , 1 ( 0 B ) .
(M2)
Place a 1 in a wrong pair that appears in P 0 , 1 ( 0 B ) .
The situation from a probabilistic point of view resembles the probability of picking the one correct configuration out of many. The total number of configurations is equal to the number of ways to place m 4 identical objects (0) into m 2 distinguishable boxes. The probability that Charlie places all the m 4 bits 0 correctly in the m 2 uncertain pairs is
P ( Charlie places all 0 correctly ) 1 m / 2 m / 4 ,
which tends to zero as m increases. Put it another way, the cardinality of the symmetric difference P 0 , 1 ( 0 B ) P 0 , 1 ( 1 C ) will be significantly greater than 0 from a statistical point of view.
Hence, when Bob uses the Algorithm 2 during ( Round 3 ) to verify the validity of the command vector 1 C sent by Charlie, he will detect inconsistencies and stick to his preliminary decision. Ergo, Bob follows Alice’s order.
The case where Alice conveys the command 1 is virtually identical.
Finally, the situation where Alice and Charlie are loyal and Bob is a traitor, is completely symmetrical. □
Proposition A2
(Traitor Alice). If Bob and Charlie are loyal and Alice is a traitor, the 3 player EPRQDBA protocol will enable Bob and Charlie to reach agreement, in the sense that they will either follow the same order or abort.
Proof. 
Let us now consider the case where the commanding general Alice is a traitor, but both Bob and Charlie are loyal. We distinguish the following cases.
  • Alice sends a consistent command vector to Bob (Charlie) and an inconsistent command vector to Charlie (Bob). In this case, Bob (Charlie) will stick to his initial decision, but Charlie (Bob) will use the CheckWBV Algorithm 3 to verify Bob’s (Charlie’s) command vector. Then, according to Rule 3 , 5 of the 3 player EPRQDBA Protocol 1, Charlie (Bob) will change his decision to that of Bob (Charlie).
  • Alice sends to Bob and Charlie different orders with consistent command vectors. Let us assume, without loss of generality, that Alice sends the order 0 together with a consistent command vector 0 B to Bob and the order 1 together with a consistent command vector 1 C to Charlie.
    Bob knows the positions of almost all 00 and 01 pairs in a . If Alice had forged even a single 10 or 11 pair, claiming to be either 00 or 01, then Bob, when using the CheckAlice Algorithm 1, he would have immediately detected the inconsistency. Therefore, Bob knows the sets
    P 0 , 0 ( 0 B ) = { p 1 , p 2 , , p t 1 } , where t 1 m 4 , and
    P 0 , 1 ( 0 B ) = { p 1 , p 2 , , p t 2 } , where t 2 m 4 ,
    of the positions of the 00 and 01 pairs in a .
    Symmetrically, Charlie knows the positions of almost all 01 and 11 pairs in a :
    P 0 , 1 ( 1 C ) = { q 1 , q 2 , , q t 3 } , where t 3 m 4 , and
    P 1 , 1 ( 1 C ) = { q 1 , q 2 , , q t 4 } , where t 4 m 4 .
    According to the rules of the protocol, Bob will sent to Charlie the command vector 0 B , and, simultaneously, Charlie will send to Bob the command vector 1 C . Both will use the CheckWCV Algorithm 2 to verify the consistency of the others’ command vector. Then, according to Rule 3 , 3 , both Bob and Charlie will abort.
  • Alice sends to both Bob and Charlie inconsistent command vectors. Then, according to Rule 3 , 1 of the protocol, both Bob and Charlie agree to abort.
Ergo, both Bob and Charlie will either follow the same order or abort. □
Proposition A3
(n Player Loyal Alice). If Alice is loyal, then the n player EPRQDBA protocol will enable all loyal lieutenant generals to follow Alice’s order.
Proof. 
We assume that Alice is loyal and, without loss of generality, we suppose that Alice conveys the command 0 to all her lieutenant generals, along with the appropriate command vectors as proof. These command vectors satisfy the properties asserted in Lemma 4.
Let us consider an arbitrary loyal lieutenant general LT i , 0 i n 2 . LT i will use the Algorithm 4 to verify the validity of the received command vector 0 i . Hence, LT i will have accepted order 0 at the end of ( Round 2 ).
According to the rules of the n player EPRQDBA Protocol 2, the only way for LT i to change his initial decision and abort is if another LT j , 0 i j n 2 , sends to LT i his decision 1 accompanied by a valid command vector 1 j . Such an LT j would, of course, be a traitor that has in reality received the command vector 0 j during ( Round 1 ). Can such an LT j construct a convincing 1 j ?
LT i , having received the command vector 0 i , knows the positions of all the ( n 1 ) -tuples in a that contain 0 in the ith position and 1 in the jth position.
T j 1 i 0 ( 0 i ) = { p 1 , p 2 , , p t } , where t m 4 .
Knowing 0 j , LT j knows the ( n 1 ) -tuples of a that contain 0 in their jth place, and the uncertain ( n 1 ) -tuples. Both are m 2 in number. LT j also knows that the m 2 uncertain ( n 1 ) -tuples contain 1 in their jth position and 0 or 1, with equal probability 0.5 , in their i t h position. However, LT j cannot know with certainty if a specific uncertain ( n 1 ) -tuple contains 0 or 1 in the ith position. Therefore, when constructing 1 j , LT j can make two detectable mistakes.
(M1)
Place a 0 in the ith place of a wrong ( n 1 ) -tuple not contained in T j 1 i 0 ( 0 i ) .
(M2)
Place a 1 in the ith place of a wrong ( n 1 ) -tuple that appears in T j 1 i 0 ( 0 i ) .
The situation from a probabilistic point of view resembles the probability of picking the one correct configuration out of many. The total number of configurations is equal to the number of ways to place m 4 identical objects into m 2 distinguishable boxes. Hence, the probability that LT j places all the m 4 bits 0 correctly in the m 2 uncertain ( n 1 ) -tuples is
P ( LT j places all 0 correctly ) 1 m / 2 m / 4 ,
which is practically zero for sufficiently large m. Thus, the cardinality of the symmetric difference
T j 1 i 0 ( 0 i ) T j 1 i 0 ( 1 j ) = T j 1 i 0 ( 0 i ) T j 1 i 0 ( 1 j ) T j 1 i 0 ( 1 j ) T j 1 i 0 ( 0 i )
will be significantly greater than 0 from a statistical point of view.
Hence, when LT i uses the Algorithm 5 during ( Round 3 ) to verify the validity of the command vector 1 j sent by LT j , he will detect inconsistencies and stick to his preliminary decision. Ergo, LT i and all loyal lieutenant generals will be included in G 0 at the end of the protocol.
The case where Alice conveys the command 1 is identical. □
Proposition A4 studies the situation where the commanding general Alice is a traitor. We assume that disloyal lieutenant generals behave as specified in assumption ( T 2 ).
Proposition A4
(n Player Traitor Alice). If Alice is a traitor, then the n player EPRQDBA protocol will enable all loyal lieutenant generals to reach agreement, in the sense that they will either all follow the same order or all abort.
Proof. 
In terms of notation, we denote by d i ( 2 ) , d i ( 3 ) , d i ( 4 ) , the initial, intermediary, and final decision lieutenant general LT i at the end of ( Round 2 ), ( Round 3 ), and ( Round 4 ). We assume that the commanding general Alice is a traitor and consider the following cases.
  • During ( Round 2 ) all loyal generals receive inconsistent command vectors. Accordingly, at the end of ( Round 2 ), each loyal LT i communicates to every other general his initial decision d i ( 2 ) = . What are the possible actions of the disloyal generals at the end of ( Round 2 )?
    At least one disloyal LT k sends to at least one loyal LT i his initial decision 0 and proof 0 k . Every other disloyal LT l tells each loyal LT j that his initial decision is either ⊥, or 0, with proof 0 l . Then, at the end of ( Round 3 ), LT i will communicate to every other general his intermediary decision d i ( 3 ) = 0 and proof 0 k . By assumption ( T 2 ), at the end of ( Round 3 ), each disloyal LT k will transmit to each other lieutenant general the same decision he sent at the end of ( Round 2 ), i.e., ⊥ or 0. As a result, the decisions of the loyal lieutenant generals, will not be affected. In this scenario, all loyal lieutenant generals set their final decision to 0 during ( Round 4 ), thereby agreeing to follow order 0 at the end of the protocol.
    At least one disloyal LT k sends to at least one loyal LT i his initial decision 0 and proof 0 k , and at least one disloyal LT l sends to at least one loyal LT j (conceivably i = j ) his initial decision 1 and proof 1 l . In this subcase, it does not matter what the remaining disloyal lieutenant generals do at the end of ( Round 2 ). Then, at the end of ( Round 3 ), LT i will communicate to every other general his intermediary decision d i ( 3 ) = 0 and proof 0 k . Symmetrically, at the end of ( Round 3 ), LT j will communicate to every other general his intermediary decision d j ( 3 ) = 1 and proof 1 l . In the special case where i = j , at the end of ( Round 3 ), LT i will communicate to every other lieutenant general his intermediary decision d i ( 3 ) = , together with his proof 0 k , 1 l . This will cause all other loyal lieutenant generals to set their final decision to ⊥ during ( Round 4 ), thereby achieving agreement by aborting at the end of the protocol.
    Every disloyal LT k conveys to all loyal LT i that his initial decision is ⊥. Then, at the end of ( Round 3 ), every loyal LT i will communicate to every other general his intermediary decision ⊥. By ( T 2 ), at the end of ( Round 3 ), each disloyal LT k will transmit the same decision ⊥ he sent at the end of ( Round 2 ) to each other general. As a result, the decisions of the loyal lieutenant generals, will not be affected. This will cause all other loyal lieutenant generals to set their final decision to ⊥ during ( Round 4 ), thereby achieving agreement by aborting at the end of the protocol.
  • During ( Round 2 ) all loyal lieutenant generals receive and verify the same order from Alice. Without loss of generality, we may suppose that the order in question is 0. Then, at the end of ( Round 2 ), each loyal LT i communicates to every other general his initial decision 0 and proof 0 i . Let us examine the possible actions of the disloyal lieutenant generals at the end of ( Round 2 ).
    At least one disloyal LT k transmits to at least one loyal LT i his initial decision 1 with a consistent proof 1 k . Then, at the end of ( Round 3 ), LT i will communicate to every other lieutenant general his intermediary decision d i ( 3 ) = , together with his proof 1 k . This will cause all other loyal lieutenant generals to set their final decision to ⊥ during ( Round 4 ), thereby achieving agreement by aborting at the end of the protocol.
    Every disloyal LT k tells each loyal LT i that his initial decision is either ⊥, or 0, with proof 0 k . Then, at the end of ( Round 3 ), every LT i will communicate to every other general his intermediary decision 0, together with his intermediary proof p i ( 3 ) = ε . In this scenario, all loyal lieutenant generals set their final decision to 0 during ( Round 4 ), thereby agreeing to follow order 0 at the end of the protocol.
  • During ( Round 2 ) at least one loyal LT i receives the order 0 and the consistent command vector 0 i , and at least one loyal LT j receives the order 1 and the consistent command vector 1 j . In this scenario, it does not matter what the remaining disloyal lieutenant generals do at the end of ( Round 2 ). Accordingly, at the end of ( Round 2 ), LT i communicates to every other lieutenant general his initial decision 0 and proof 0 i , and LT j communicates to every other lieutenant general his initial decision 1 and proof 1 j . Then, during ( Round 3 ), all loyal lieutenant generals set their intermediary decision to ⊥, and, during ( Round 4 ), all loyal lieutenant generals set their final decision to ⊥, thereby achieving agreement by aborting at the end of the protocol.
  • During ( Round 2 ) some loyal lieutenant generals receive and verify the same order from Alice, which, without loss of generality, we may suppose that is 0, and the remaining loyal lieutenant generals receive inconsistent command vectors from Alice. By employing the arguments used in the previous case, it is straightforward to conclude that all loyal lieutenant generals reach agreement in any eventuality.
Ergo, all loyal lieutenant generals will reach agreement. □

References

  1. Lamport, L.; Shostak, R.; Pease, M. The Byzantine Generals Problem. ACM Trans. Program. Lang. Syst. 1982, 4, 382–401. [Google Scholar] [CrossRef] [Green Version]
  2. Pease, M.; Shostak, R.; Lamport, L. Reaching Agreement in the Presence of Faults. J. ACM 1980, 27, 228–234. [Google Scholar] [CrossRef] [Green Version]
  3. Chow, J.; Dial, O.; Gambetta, J. IBM Quantum Breaks the 100-Qubit Processor Barrier. 2021. Available online: https://research.ibm.com/blog/127-qubit-quantum-processor-eagle (accessed on 3 March 2023).
  4. Newsroom, I. IBM Unveils 400 Qubit-Plus Quantum Processor. 2022. Available online: https://newsroom.ibm.com/2022-11-09-IBM-Unveils-400-Qubit-Plus-Quantum-Processor-and-Next-Generation-IBM-Quantum-System-Two (accessed on 3 March 2023).
  5. Shor, P. Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994. [Google Scholar] [CrossRef]
  6. Grover, L. A Fast Quantum Mechanical Algorithm for Database Search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996. [Google Scholar] [CrossRef] [Green Version]
  7. Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
  8. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  9. Gisin, N.; Ribordy, G.; Zbinden, H.; Stucki, D.; Brunner, N.; Scarani, V. Towards practical and fast quantum cryptography. arXiv 2004, arXiv:quant-ph/0411022. [Google Scholar]
  10. Inoue, K.; Waks, E.; Yamamoto, Y. Differential phase shift quantum key distribution. Phys. Rev. Lett. 2002, 89, 037902. [Google Scholar] [CrossRef]
  11. Guan, J.Y.; Cao, Z.; Liu, Y.; Shen-Tu, G.L.; Pelc, J.S.; Fejer, M.; Peng, C.Z.; Ma, X.; Zhang, Q.; Pan, J.W. Experimental passive round-robin differential phase-shift quantum key distribution. Phys. Rev. Lett. 2015, 114, 180502. [Google Scholar] [CrossRef] [Green Version]
  12. Waks, E.; Takesue, H.; Yamamoto, Y. Security of differential-phase-shift quantum key distribution against individual attacks. Phys. Rev. A 2006, 73, 012344. [Google Scholar] [CrossRef] [Green Version]
  13. Ampatzis, M.; Andronikos, T. QKD Based on Symmetric Entangled Bernstein-Vazirani. Entropy 2021, 23, 870. [Google Scholar] [CrossRef]
  14. Ampatzis, M.; Andronikos, T. A Symmetric Extensible Protocol for Quantum Secret Sharing. Symmetry 2022, 14, 1692. [Google Scholar] [CrossRef]
  15. Ampatzis, M.; Andronikos, T. Quantum Secret Aggregation Utilizing a Network of Agents. Cryptography 2023, 7, 5. [Google Scholar] [CrossRef]
  16. Attasena, V.; Darmont, J.; Harbi, N. Secret sharing for cloud data security: A survey. VLDB J. 2017, 26, 657–681. [Google Scholar] [CrossRef] [Green Version]
  17. Ermakova, T.; Fabian, B. Secret Sharing for Health Data in Multi-Provider Clouds. In Proceedings of the 2013 IEEE 15th Conference on Business Informatics, Vienna, Austria, 15–18 July 2013; pp. 93–100. [Google Scholar]
  18. Cha, J.; Singh, S.K.; Kim, T.W.; Park, J.H. Blockchain-empowered cloud architecture based on secret sharing for smart city. J. Inf. Secur. Appl. 2021, 57, 102686. [Google Scholar] [CrossRef]
  19. Sun, X.; Kulicki, P.; Sopek, M. Multi-Party Quantum Byzantine Agreement without Entanglement. Entropy 2020, 22, 1152. [Google Scholar] [CrossRef]
  20. Qu, Z.; Zhang, Z.; Liu, B.; Tiwari, P.; Ning, X.; Muhammad, K. Quantum detectable Byzantine Agreement for distributed data trust management in blockchain. Inf. Sci. 2023, 637, 118909. [Google Scholar] [CrossRef]
  21. Fitzi, M.; Gisin, N.; Maurer, U. Quantum Solution to the Byzantine Agreement Problem. Phys. Rev. Lett. 2001, 87, 217901. [Google Scholar] [CrossRef] [Green Version]
  22. Cabello, A. Solving the liar detection problem using the four-qubit singlet state. Phys. Rev. A 2003, 68, 012304. [Google Scholar] [CrossRef] [Green Version]
  23. Neigovzen, R.; Rodó, C.; Adesso, G.; Sanpera, A. Multipartite continuous-variable solution for the Byzantine Agreement problem. Phys. Rev. A 2008, 77, 062307. [Google Scholar] [CrossRef] [Green Version]
  24. Feng, Y.; Shi, R.; Zhou, J.; Liao, Q.; Guo, Y. Quantum Byzantine Agreement with Tripartite Entangled States. Int. J. Theor. Phys. 2019, 58, 1482–1498. [Google Scholar] [CrossRef]
  25. Meyer, D.A. Quantum strategies. Phys. Rev. Lett. 1999, 82, 1052. [Google Scholar] [CrossRef] [Green Version]
  26. Eisert, J.; Wilkens, M.; Lewenstein, M. Quantum games and quantum strategies. Phys. Rev. Lett. 1999, 83, 3077. [Google Scholar] [CrossRef] [Green Version]
  27. Andronikos, T.; Sirokofskich, A.; Kastampolidou, K.; Varvouzou, M.; Giannakis, K.; Singh, A. Finite Automata Capturing Winning Sequences for All Possible Variants of the PQ Penny Flip Game. Mathematics 2018, 6, 20. [Google Scholar] [CrossRef] [Green Version]
  28. Andronikos, T.; Sirokofskich, A. The Connection between the PQ Penny Flip Game and the Dihedral Groups. Mathematics 2021, 9, 1115. [Google Scholar] [CrossRef]
  29. Andronikos, T. Conditions that enable a player to surely win in sequential quantum games. Quantum Inf. Process. 2022, 21, 268. [Google Scholar] [CrossRef]
  30. Giannakis, K.; Theocharopoulou, G.; Papalitsas, C.; Fanarioti, S.; Andronikos, T. Quantum Conditional Strategies and Automata for Prisoners’ Dilemmata under the EWL Scheme. Appl. Sci. 2019, 9, 2635. [Google Scholar] [CrossRef] [Green Version]
  31. Giannakis, K.; Papalitsas, C.; Kastampolidou, K.; Singh, A.; Andronikos, T. Dominant Strategies of Quantum Games on Quantum Periodic Automata. Computation 2015, 3, 586–599. [Google Scholar] [CrossRef] [Green Version]
  32. Andronikos, T.; Stefanidakis, M. A Two-Party Quantum Parliament. Algorithms 2022, 15, 62. [Google Scholar] [CrossRef]
  33. Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  34. Dolev, D.; Strong, H.R. Authenticated Algorithms for Byzantine Agreement. SIAM J. Comput. 1983, 12, 656–666. [Google Scholar] [CrossRef]
  35. Fischer, M.J.; Lynch, N.A.; Merritt, M. Easy impossibility proofs for distributed consensus problems. Distrib. Comput. 1986, 1, 26–39. [Google Scholar] [CrossRef]
  36. Fitzi, M.; Garay, J.A.; Maurer, U.; Ostrovsky, R. Minimal Complete Primitives for Secure Multi-party Computation. In Advances in Cryptology—CRYPTO 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 80–100. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Qubits belonging to the same EPR pair are drawn in the same color. Red is used to indicate the EPR pairs shared between Alice and Bob, which occupy the odd-numbered positions in their quantum registers. Green is used for the EPR pairs shared between Alice and Charlie that occupy the even-numbered positions in their quantum registers. The gray qubits represent those in the | + state that occupy the remaining positions.
Figure 1. Qubits belonging to the same EPR pair are drawn in the same color. Red is used to indicate the EPR pairs shared between Alice and Bob, which occupy the odd-numbered positions in their quantum registers. Green is used for the EPR pairs shared between Alice and Charlie that occupy the even-numbered positions in their quantum registers. The gray qubits represent those in the | + state that occupy the remaining positions.
Applsci 13 08405 g001
Figure 2. This figure gives a visual representation regarding the correlations among corresponding bits. As before bits resulting from the same EPR pair are drawn with the same color.
Figure 2. This figure gives a visual representation regarding the correlations among corresponding bits. As before bits resulting from the same EPR pair are drawn with the same color.
Applsci 13 08405 g002
Figure 3. This figure shows the contents of Alice, Bob and Charlie’s registers after the measurement.
Figure 3. This figure shows the contents of Alice, Bob and Charlie’s registers after the measurement.
Applsci 13 08405 g003
Figure 4. Qubits of the same EPR pair are shown in the same color. Green is used to indicate the EPR pairs shared between Alice and LT 0 , which occupy those positions k that satisfy the relation k 0 mod ( n 1 ) in their quantum registers. Analogously, red is used for the EPR pairs shared between Alice and LT 1 occupying positions k that satisfy the relation k 1 mod ( n 1 ) in their quantum registers, and blue indicates EPR pairs shared between Alice and LT n 2 occupying positions k that satisfy the relation k n 2 mod ( n 1 ) . The gray qubits represent those in the | + state that occupy the remaining positions in the quantum registers of the lieutenant generals.
Figure 4. Qubits of the same EPR pair are shown in the same color. Green is used to indicate the EPR pairs shared between Alice and LT 0 , which occupy those positions k that satisfy the relation k 0 mod ( n 1 ) in their quantum registers. Analogously, red is used for the EPR pairs shared between Alice and LT 1 occupying positions k that satisfy the relation k 1 mod ( n 1 ) in their quantum registers, and blue indicates EPR pairs shared between Alice and LT n 2 occupying positions k that satisfy the relation k n 2 mod ( n 1 ) . The gray qubits represent those in the | + state that occupy the remaining positions in the quantum registers of the lieutenant generals.
Applsci 13 08405 g004
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Andronikos, T.; Sirokofskich, A. A Quantum Detectable Byzantine Agreement Protocol Using Only EPR Pairs. Appl. Sci. 2023, 13, 8405. https://doi.org/10.3390/app13148405

AMA Style

Andronikos T, Sirokofskich A. A Quantum Detectable Byzantine Agreement Protocol Using Only EPR Pairs. Applied Sciences. 2023; 13(14):8405. https://doi.org/10.3390/app13148405

Chicago/Turabian Style

Andronikos, Theodore, and Alla Sirokofskich. 2023. "A Quantum Detectable Byzantine Agreement Protocol Using Only EPR Pairs" Applied Sciences 13, no. 14: 8405. https://doi.org/10.3390/app13148405

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop