What Is The Byzantine Generals Problem

12/14/2022, 4:02:39 AM
The Byzantine Generals Problem is a situational description of the distributed consensus problem.

Introduction

The Byzantine Generals Problem, also known as the Two Generals’ Problem, was proposed in Leslie Lambert’s paper on the fault tolerance of distributed peer-to-peer network communication in 1982. In the communication of the distributed system, some local problems may cause the computer to send error messages and destroy the system’s consistency. Therefore, the Byzantine Generals Problem is essentially a problem of consensus in point-to-point communication.

Origin

The Byzantine Generals Problem originated in the middle ages. Due to the vast territory of Byzantium, the communication between armies can only rely on messengers. If there is a traitor deliberately misrepresenting the information of the army leaders, it will lead to inconsistent operational plans, resulting in the “Byzantine failures”.

In order to solve this problem, there are two solutions: one is to send messengers to each other by oral agreement, and reach a consensus by simple majority, but it is difficult to distinguish potential traitors; the second is to send messengers in the form of written agreements to deliver written messages with exclusive signatures, which should be seconded by each army, but if the transmission is too slow, the signatures may be lost. As both solutions can only solve part of the problem, and it takes too much time and resources to reach a consensus, they are not useful.

Byzantine Generals Problem in the Internet

The Byzantine Generals Problem in the Internet means that in the process of channel transmission, it may be difficult for some nodes to achieve information synchronization due to excessive workload or some malicious attacks. In 1999, Miguel Castro and Barbara Liskov proposed the Byzantine Fault Tolerance (BFT). They believed that if two-thirds of the nodes in the system worked normally, the consistency and correctness of the system could be guaranteed. Later, Satoshi Nakamoto proposed the proof of work (PoW) mechanism and asymmetric cryptographic algorithm of Bitcoin, which provided a new solution to the Byzantine Generals Problem.

Byzantine Fault Tolerance

Suppose there are n generals and t traitors. Say n=3, t=1, so one of A, B and C is a traitor. If A issues the [attack] command, but traitor B tells C to [retreat], then C cannot make a judgment; If traitor B sends [attack] command to A and [retreat] command to C, then A and C cannot reach an agreement. Therefore, when the number of traitors is greater than or equal to 1/3, the Byzantine Generals Problem cannot be solved.

Similarly, assuming that the total number of network nodes is N and the number of malicious nodes is T, the problem can be solved only when N>=3T+1, that is, the number of normal nodes in the network is at least (2/3) N, so as to ensure the consistency of information. In reliable network communication, Byzantine Fault Tolerance can solve the problem of node failure to a certain extent, so that the system can reach a consensus.

Proof of Work (PoW) Mechanism

Suppose general A first issues the [attack] command and attaches his signature. After receiving it, if other generals also plan to attack, they will follow the [attack] command and his signature after general A’s command. If A does not execute the [attack] command after A sends it, other generals can judge A as a traitor and use it to distinguish the right information.

Similarly, multiple participating nodes will get a result through a series of work, and the first node that gets the result will broadcast it to the whole network. If the result is correct, other nodes will add the result to their own ledgers to prepare for calculation in order to win the right to record transactions on the blockchain.

A Hacker must have more than 51% computing power to destroy network security or publish fake blocks. The cost is far greater than the return. Therefore, this mechanism can reduce the possibility of false information and make the system reach a consensus faster.

Asymmetric-key Algorithms

The encryption and decryption of the asymmetric-key algorithms need two separate secret keys - public key and private key, which usually appear in pairs. If A wants to send a message to B, A needs B’s public key to encrypt the information, and B needs his/her own private key to decrypt the information. If B wants to show his/her identity, he/she can sign the private key, write a “signature text” and broadcast it. Others can verify his/her identity according to B’s public key.

Because the identity and signature can not be forged, the asymmetric-key algorithms ensure the privacy of the transmission and the trusted signature.

Author: Jiji
Translator: Joy
Reviewer(s): Hugo, Cecilia, Ashley
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.
* This article may not be reproduced, transmitted or copied without referencing Gate. Contravention is an infringement of Copyright Act and may be subject to legal action.

Share

Crypto Calendar

Project Updates
Etherex will launch the token REX on August 6.
REX
22.27%
2025-08-06
Rare Dev & Governance Day in Las Vegas
Cardano will host the Rare Dev & Governance Day in Las Vegas, from August 6 to 7, featuring workshops, hackathons and panel discussions focused on technical development and governance topics.
ADA
-3.44%
2025-08-06
Blockchain.Rio in Rio De Janeiro
Stellar will participate in the Blockchain.Rio conference, scheduled to be held in Rio de Janeiro, from August 5 to 7. The program will include keynotes and panel discussions featuring representatives of the Stellar ecosystem in collaboration with partners Cheesecake Labs and NearX.
XLM
-3.18%
2025-08-06
Webinar
Circle has announced a live Executive Insights webinar titled “The GENIUS Act Era Begins”, scheduled for August 7, 2025, at 14:00 UTC. The session will explore the implications of the newly passed GENIUS Act—the first federal regulatory framework for payment stablecoins in the United States. Circle’s Dante Disparte and Corey Then will lead the discussion on how the legislation impacts digital asset innovation, regulatory clarity, and the US’s leadership in global financial infrastructure.
USDC
-0.03%
2025-08-06
AMA on X
Ankr will host an AMA on X on August 7th at 16:00 UTC, focusing on DogeOS’s work in building the application layer for DOGE.
ANKR
-3.23%
2025-08-06

Related Articles

In-depth Explanation of Yala: Building a Modular DeFi Yield Aggregator with $YU Stablecoin as a Medium
Beginner

In-depth Explanation of Yala: Building a Modular DeFi Yield Aggregator with $YU Stablecoin as a Medium

Yala inherits the security and decentralization of Bitcoin while using a modular protocol framework with the $YU stablecoin as a medium of exchange and store of value. It seamlessly connects Bitcoin with major ecosystems, allowing Bitcoin holders to earn yield from various DeFi protocols.
11/29/2024, 10:10:11 AM
Solana Need L2s And Appchains?
Advanced

Solana Need L2s And Appchains?

Solana faces both opportunities and challenges in its development. Recently, severe network congestion has led to a high transaction failure rate and increased fees. Consequently, some have suggested using Layer 2 and appchain technologies to address this issue. This article explores the feasibility of this strategy.
6/24/2024, 1:39:17 AM
The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline
Beginner

The Future of Cross-Chain Bridges: Full-Chain Interoperability Becomes Inevitable, Liquidity Bridges Will Decline

This article explores the development trends, applications, and prospects of cross-chain bridges.
12/27/2023, 7:44:05 AM
Sui: How are users leveraging its speed, security, & scalability?
Intermediate

Sui: How are users leveraging its speed, security, & scalability?

Sui is a PoS L1 blockchain with a novel architecture whose object-centric model enables parallelization of transactions through verifier level scaling. In this research paper the unique features of the Sui blockchain will be introduced, the economic prospects of SUI tokens will be presented, and it will be explained how investors can learn about which dApps are driving the use of the chain through the Sui application campaign.
6/13/2024, 8:23:51 AM
BTC and Projects in The BRC-20 Ecosystem
Beginner

BTC and Projects in The BRC-20 Ecosystem

This article introduces BTC ecological related projects in detail.
1/25/2024, 7:37:36 AM
Navigating the Zero Knowledge Landscape
Advanced

Navigating the Zero Knowledge Landscape

This article introduces the technical principles, framework, and applications of Zero-Knowledge (ZK) technology, covering aspects from privacy, identity (ID), decentralized exchanges (DEX), to oracles.
1/4/2024, 4:01:13 PM
Start Now
Sign up and get a
$100
Voucher!