A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol

ABGP (Authenticated Byzantine Gossip Protocol) is a consensus algorithm combining the efficiency of gossip protocols with Byzantine Fault Tolerance and authentication mechanisms. Designed for partially synchronous systems where all nodes are known, ABGP ensures liveness and safety through multisignature validation and ECC cryptography. Positioned as an alternative to private ledger frameworks like Hyperledger, it offers a secure, lightweight approach to distributed consensus.


This content originally appeared on HackerNoon and was authored by EScholar: Electronic Academic Papers for Scholars

:::info Author:

(1) Egor Zuev (zyev.egor@gmail.com)

:::

Abstract and 1. Introduction

  1. System model

  2. Initial node state

  3. Append process

    4.1 Local append

    4.2 Append from another node

    4.3 Record validation

    4.4 State consistency

  4. Replication process

  5. Proof of correctness

  6. M-of-N connections

  7. Extensions and optimizations

References

Abstract

ABGP refers to Authenticated Byzantine Gossip Protocol. The ABGP is a partial-synchronous, weak consistent, BFT based consensus algorithm. The algorithm implements the gossip protocol, but with BFT features inside (like multisig record approval). The algorithm has been developed as an alternative to classic private ledger solutions, like Hyperledger.

1. Introduction

ABGP is a partial-synchronous, weak consistent BFT algorithm. The algorithm implies that all nodes in network are known. To make sure, that there is no malicious node connected to network, ABGP use authentication approach. This means, that all proposed state mutations should be signed by nodes who propose it, or accept (until the final mutli-signature will be built). The replication between nodes happens by standard gossip protocol in one step: one node request for new changes from another, and another node sends back either new changes, or an empty array, if there are no new changes. On new record replication, the acceptor node, validate this record’s signature, in order to make sure that it has been signed by known nodes. The algorithm offers both liveness and safety for at most 𝑁 = 2𝑓 + 1 with quorum of 𝑄 = 𝑓 + 1, where N – the number of nodes in cluster and 𝑓 – is the number of faulty nodes in case of N-to-N connections. However, in case of M-of-N connections, the quorum may be much smaller.

2. System model

The system model represents a partially synchronous system, where nodes are connected by the network. We assume that the network may duplicate, fail to deliver, or deliver with delays messages. We also assume, that every node may become failed. By failed we mean malicious behavior, or just out-of-order.

\ The system is partially synchronous, which means that we expect delays / duplicates / message lost in the system. The communication between node is bi-directional, which means, if node A sends message to node B, then node B should send message to node A as a reply (like an HTTP request).

\ The system requires to be aware of all other nodes in the system. It means, that each node should have a bootstrapped list of all other nodes in the network. This bootstrap list should include address of node (which is optional in case of M-of-N connections) and public keys of all other nodes.

\ The algorithm uses ECC cryptography for signing purpose. Once enough nodes sign the hash of the record, the last node, which signed the hash – creates a multisignature. This is a part of “authentication mechanism”.

\ The term “authentication” means, that all mutation actions in algorithm should be signed and validated by its members (i.e. nodes). While “sign” action – means signing the record, the validation – means signature / multisignature validation.

\ The replication process inherits the gossip protocol properties: node choose randomly another peer in network and ask recent updates.

\ The algorithm guarantees safety and liveness as long as 𝑁 ≥ 2𝑓 + 1 for N-of-N connections. The safety property means that all healthy nodes agree on the certain change, sign it and apply to the state. The liveness means that even if 𝑓 nodes fail, the network will still be operatable.

3. Initial node state

Before the boot phase, each node should have the following properties (or settings):

\

| Property | Description | Data type | Example | |----|----|----|----| | Private key | generated with secp256k1 standard | String | “edca08af903bbd7afd356bb2d6fdf54901fad8770c734416456d382012b0608b” | | Public key | generated with secp256k1 standard (from private key) | String | “02b68e80e752f13906179688171d6a0345a6c6edd20b52f24ea489275668fa1eac” | | Min gossip interval | Minimum gossip interval (ms) | Number | 150 | | Max gossip interval | maximum gossip interval (ms) | Number | 300 | | Proof expiration | How long the proof is valid (ms) | Number | 300 | | Nodes | An array of nodes (peers) addresses (should include network address + public key of the peer) | [string] | [ “tcp://127.0.0.1:2000/ 036032cc7790000ac98fc2dbc200c486b073e74e8e4ff5fba15beb01c153f4c458” ] |

Consensus parameters

\ After the boot phase, the gossip protocol starts and local API (for appending new records) becomes available.

\ \

:::info This paper is available on arxiv under CC0 1.0 UNIVERSAL license.

:::

\


This content originally appeared on HackerNoon and was authored by EScholar: Electronic Academic Papers for Scholars


Print Share Comment Cite Upload Translate Updates
APA

EScholar: Electronic Academic Papers for Scholars | Sciencx (2025-10-02T07:30:07+00:00) A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol. Retrieved from https://www.scien.cx/2025/10/02/a-beginners-guide-to-the-authenticated-byzantine-gossip-protocol/

MLA
" » A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol." EScholar: Electronic Academic Papers for Scholars | Sciencx - Thursday October 2, 2025, https://www.scien.cx/2025/10/02/a-beginners-guide-to-the-authenticated-byzantine-gossip-protocol/
HARVARD
EScholar: Electronic Academic Papers for Scholars | Sciencx Thursday October 2, 2025 » A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol., viewed ,<https://www.scien.cx/2025/10/02/a-beginners-guide-to-the-authenticated-byzantine-gossip-protocol/>
VANCOUVER
EScholar: Electronic Academic Papers for Scholars | Sciencx - » A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2025/10/02/a-beginners-guide-to-the-authenticated-byzantine-gossip-protocol/
CHICAGO
" » A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol." EScholar: Electronic Academic Papers for Scholars | Sciencx - Accessed . https://www.scien.cx/2025/10/02/a-beginners-guide-to-the-authenticated-byzantine-gossip-protocol/
IEEE
" » A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol." EScholar: Electronic Academic Papers for Scholars | Sciencx [Online]. Available: https://www.scien.cx/2025/10/02/a-beginners-guide-to-the-authenticated-byzantine-gossip-protocol/. [Accessed: ]
rf:citation
» A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol | EScholar: Electronic Academic Papers for Scholars | Sciencx | https://www.scien.cx/2025/10/02/a-beginners-guide-to-the-authenticated-byzantine-gossip-protocol/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.