Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3460120.3484554acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Multi-Threshold Byzantine Fault Tolerance

Published: 13 November 2021 Publication History

Abstract

Classic Byzantine fault tolerant (BFT) protocols are designed for a specific timing model, most often one of the following: synchronous, asynchronous or partially synchronous. It is well known that the timing model and fault tolerance threshold present inherent trade-offs. Synchronous protocols tolerate up to n/2 Byzantine faults, while asynchronous or partially synchronous protocols tolerate only up to n/3 Byzantine faults. In this work, we generalize the fault thresholds of BFT and introduce a new problem called multi-threshold BFT. Multi-threshold BFT has four separate fault thresholds for safety and liveness under synchrony and asynchrony (or partial-synchrony), respectively. Decomposing the fault thresholds in this way allows us to design protocols that provide meaningful fault tolerance under both synchrony and asynchrony (or partial synchrony). We establish tight fault thresholds bounds for multi-threshold BFT and present protocols achieving them. As an example, we show a BFT state machine replication (SMR) protocol that tolerates up to 2n/3 faults for safety under synchrony while tolerating up to n/3 faults for other scenarios (liveness under synchrony as well as safety and liveness under partial synchrony). This is strictly stronger than classic partially synchronous SMR protocols. We also present a general framework to transform known partially synchronous or asynchronous BFT SMR protocols to additionally enjoy the optimal 2n/3 fault tolerance for safety under synchrony.

Supplementary Material

MP4 File (CCS21-fp163.mp4)
A Byzantine fault tolerant (BFT) distributed algorithm solves the desired problem even in the presence of a certain threshold of malicious nodes. Classic BFT design first selects its timing assumption and a fault threshold, which present an inherent trade-off. We generalize the BFT problem and introduce Multi-threshold BFT, which has four fault thresholds for safety and liveness under synchrony and asynchrony separately. This separation of fault thresholds provides us with a new insight: It is possible to tolerate higher fault for safety under synchrony without compromising the other thresholds. As an example, we present a BFT SMR protocol that tolerates 2n/3 faults for safety under synchrony while preserving the classic n/3 fault tolerance for the other cases. We believe this result helps improve the security of safety-critical systems in the real world.

References

[1]
Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, and Ling Ren. 2019 a. Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n2) Communication, and Optimal Resilience. In Financial Cryptography and Data Security (FC). Springer, 320--334.
[2]
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Maofan Yin. 2020 a. Sync HotStuff: Simple and Practical Synchronous State Machine Replication. In IEEE Symposium on Security and Privacy (S&P). IEEE, 106--118.
[3]
Ittai Abraham, Dahlia Malkhi, and Alexander Spiegelman. 2019 b. Asymptotically optimal validated asynchronous byzantine agreement. In ACM Symposium on Principles of Distributed Computing (PODC). 337--346.
[4]
Ittai Abraham, Kartik Nayak, Ling Ren, and Zhuolun Xiang. 2020 b. Optimal Good-case Latency for Byzantine Broadcast and State Machine Replication. arXiv preprint arXiv:2003.13155 (2020).
[5]
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, et al. 2018. Hyperledger fabric: a distributed operating system for permissioned blockchains. In Thirteenth EuroSys Conference. ACM, 30.
[6]
Mathieu Baudet, Avery Ching, Andrey Chursin, George Danezis, Francc ois Garillot, Zekun Li, Dahlia Malkhi, Oded Naor, Dmitri Perelman, and Alberto Sonnino. [n.d.]. State machine replication in the Libra Blockchain.
[7]
Erica Blum, Jonathan Katz, and Julian Loss. 2019. Synchronous consensus with optimal asynchronous fallback guarantees. In Theory of Cryptography Conference (TCC). Springer, 131--150.
[8]
Erica Blum, Jonathan Katz, and Julian Loss. 2020 a. Network-Agnostic State Machine Replication. arXiv preprint arXiv:2002.03437 (2020).
[9]
Erica Blum, Chen-Da Liu-Zhang, and Julian Loss. 2020 b. Always have a backup plan: fully secure synchronous MPC with asynchronous fallback. In Annual International Cryptology Conference (CRYPTO). Springer, 707--731.
[10]
Gabriel Bracha. 1987. Asynchronous Byzantine agreement protocols. Information and Computation, Vol. 75, 2 (1987), 130--143.
[11]
Mike Burrows. 2006. The Chubby lock service for loosely-coupled distributed systems. In 7th Symposium on Operating Systems Design and Implementation (OSDI). 335--350.
[12]
Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 (2017).
[13]
Christian Cachin, Klaus Kursawe, Frank Petzold, and Victor Shoup. 2001. Secure and efficient asynchronous broadcast protocols. In Annual International Cryptology Conference (CRYPTO). Springer, 524--541.
[14]
Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine fault tolerance. In 3rd Symposium on Operating Systems Design and Implementation (OSDI). USENIX, 173--186.
[15]
T-H Hubert Chan, Rafael Pass, and Elaine Shi. 2018. PiLi: An Extremely Simple Synchronous Blockchain. IACR Cryptology ePrint Archive, Report 2018/980 (2018).
[16]
J.P.Morgan Chase. 2018. Quorum Whitepaper. (2018). https://github.com/jpmorganchase/quorum/blob/master/docs/Quorum Whitepaper v0.2.pdf.
[17]
Allen Clement, Flavio Junqueira, Aniket Kate, and Rodrigo Rodrigues. 2012. On the (limited) power of non-equivocation. In ACM Symposium on Principles of Distributed Computing (PODC). 301--308.
[18]
Allen Clement, Manos Kapritsos, Sangmin Lee, Yang Wang, Lorenzo Alvisi, Mike Dahlin, and Taylor Riche. 2009. Upright cluster services. In 22nd ACM SIGOPS Symposium on Operating Systems Principles (SOSP). 277--290.
[19]
James C Corbett, Jeffrey Dean, Michael Epstein, Andrew Fikes, Christopher Frost, Jeffrey John Furman, Sanjay Ghemawat, Andrey Gubarev, Christopher Heiser, Peter Hochschild, et al. 2013. Spanner: Google's globally distributed database. ACM Transactions on Computer Systems (TOCS), Vol. 31, 3 (2013), 1--22.
[20]
Danny Dolev and H. Raymond Strong. 1983. Authenticated algorithms for Byzantine agreement. SIAM J. Comput., Vol. 12, 4 (1983), 656--666.
[21]
Sisi Duan, Michael K Reiter, and Haibin Zhang. 2018. BEAT: Asynchronous BFT made practical. In ACM SIGSAC Conference on Computer and Communications Security (CCS). 2028--2041.
[22]
Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. 1988. Consensus in the presence of partial synchrony. J. ACM, Vol. 35, 2 (1988), 288--323.
[23]
Paul Feldman and Silvio Micali. 1988. Optimal algorithms for Byzantine agreement. In 20th Annual ACM Symposium on Theory of Computing (STOC). 148--161.
[24]
Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling byzantine agreements for cryptocurrencies. In 26th Symposium on Operating Systems Principles (SOSP). 51--68.
[25]
Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael Reiter, Dragos-Adrian Seredinschi, Orr Tamir, and Alin Tomescu. 2019. SBFT: a scalable and decentralized trust infrastructure. In 2019 49th Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, 568--580.
[26]
Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2020. Dumbo: Faster asynchronous bft protocols. In ACM SIGSAC Conference on Computer and Communications Security (CCS). 803--818.
[27]
Yue Guo, Rafael Pass, and Elaine Shi. 2019. Synchronous, with a chance of partition tolerance. In Annual International Cryptology Conference (CRYPTO). Springer, 499--529.
[28]
Martin Hirt, Ard Kastrati, and Chen-Da Liu-Zhang. 2020. Multi-Threshold Asynchronous Reliable Broadcast and Consensus. In 24th International Conference on Principles of Distributed Systems (OPODIS) .
[29]
Patrick Hunt, Mahadev Konar, Flavio Paiva Junqueira, and Benjamin Reed. 2010. ZooKeeper: Wait-free Coordination for Internet-scale Systems. In USENIX annual technical conference, Vol. 8.
[30]
Jonathan Katz and Chiu-Yuen Koo. 2009. On expected constant-round protocols for byzantine agreement. J. Comput. System Sci., Vol. 75, 2 (2009), 91--112.
[31]
Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmund Wong. 2007. Zyzzyva: speculative byzantine fault tolerance. In 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP). 45--58.
[32]
Michael Kumhof and Clare Noone. 2018. Central bank digital currencies-design principles and balance sheet implications. (2018).
[33]
Leslie Lamport. 2019. The part-time parliament. In Concurrency: the Works of Leslie Lamport. 277--317.
[34]
Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, Vol. 4, 3 (1982), 382--401.
[35]
Shengyun Liu, Paolo Viotti, Christian Cachin, Vivien Quéma, and Marko Vukoli?. 2016. XFT: Practical fault tolerance beyond crashes. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 485--500.
[36]
Yuan Lu, Zhenliang Lu, Qiang Tang, and Guiling Wang. 2020. Dumbo-mvba: Optimal multi-valued validated asynchronous byzantine agreement, revisited. In ACM Symposium on Principles of Distributed Computing (PODC). 129--138.
[37]
Dahlia Malkhi, Kartik Nayak, and Ling Ren. 2019. Flexible byzantine fault tolerance. In ACM SIGSAC Conference on Computer and Communications Security (CCS). 1041--1053.
[38]
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In ACM SIGSAC Conference on Computer and Communications Security (CCS). 31--42.
[39]
Atsuki Momose, Jason Paul Cruz, and Yuichi Kaji. 2020. Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience. IACR Cryptology ePrint Archive, Report 2020/406 (2020).
[40]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).
[41]
Joachim Neu, Ertem Nusret Tas, and David Tse. 2020. Ebb-and-flow protocols: A resolution of the availability-finality dilemma. arXiv preprint arXiv:2009.04987 (2020).
[42]
Rafael Pass and Elaine Shi. 2017. Hybrid consensus: Efficient consensus in the permissionless model. In International Symposium on Distributed Computing (DISC). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.
[43]
Rafael Pass and Elaine Shi. 2018. Thunderella: Blockchains with optimistic instant confirmation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Springer, 3--33.
[44]
Marshall Pease, Robert Shostak, and Leslie Lamport. 1980. Reaching agreement in the presence of faults. Journal of the ACM (JACM), Vol. 27, 2 (1980), 228--234.
[45]
Fred B Schneider. 1990. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys (CSUR), Vol. 22, 4 (1990), 299--319.
[46]
Nibesh Shrestha, Ittai Abraham, Ling Ren, and Kartik Nayak. 2020. On the Optimality of Optimistic Responsiveness. In ACM SIGSAC Conference on Computer and Communications Security (CCS). 839--857.
[47]
Maofan Yin, Dahlia Malkhi, Michael K Reiter, Guy Golan Gueta, and Ittai Abraham. 2019. Hotstuff: Bft consensus with linearity and responsiveness. In ACM Symposium on Principles of Distributed Computing (PODC). ACM, 347--356.

Cited By

View all
  • (2024)RAC-Chain: An Asynchronous Consensus-based Cross-chain Approach to Scalable Blockchain for MetaverseACM Transactions on Multimedia Computing, Communications, and Applications10.1145/358601120:7(1-24)Online publication date: 27-Mar-2024
  • (2024)Blockchain-Enhanced Time-Variant Mean Field-Optimized Dynamic Computation Sharing in Mobile NetworkIEEE Transactions on Wireless Communications10.1109/TWC.2024.338841123:9(12140-12156)Online publication date: Sep-2024
  • (2024)Optimal Flexible Consensus and its Application to Ethereum2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00135(3885-3903)Online publication date: 19-May-2024
  • Show More Cited By

Index Terms

  1. Multi-Threshold Byzantine Fault Tolerance

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 2021
    3558 pages
    ISBN:9781450384544
    DOI:10.1145/3460120
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blockchain
    2. byzantine fault tolerance
    3. distributed systems

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS '21
    Sponsor:
    CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 15 - 19, 2021
    Virtual Event, Republic of Korea

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)131
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)RAC-Chain: An Asynchronous Consensus-based Cross-chain Approach to Scalable Blockchain for MetaverseACM Transactions on Multimedia Computing, Communications, and Applications10.1145/358601120:7(1-24)Online publication date: 27-Mar-2024
    • (2024)Blockchain-Enhanced Time-Variant Mean Field-Optimized Dynamic Computation Sharing in Mobile NetworkIEEE Transactions on Wireless Communications10.1109/TWC.2024.338841123:9(12140-12156)Online publication date: Sep-2024
    • (2024)Optimal Flexible Consensus and its Application to Ethereum2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00135(3885-3903)Online publication date: 19-May-2024
    • (2023)GriDB: Scaling Blockchain Database via Sharding and Off-Chain Cross-Shard MechanismProceedings of the VLDB Endowment10.14778/3587136.358714316:7(1685-1698)Online publication date: 1-Mar-2023
    • (2023)A Survey of Blockchain Consensus ProtocolsACM Computing Surveys10.1145/357984555:13s(1-35)Online publication date: 13-Jul-2023
    • (2023)ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic PathProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623101(504-518)Online publication date: 15-Nov-2023
    • (2023)Cross-Chain-Based Trustworthy Node Identity Governance in Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.330813010:24(21580-21594)Online publication date: 15-Dec-2023
    • (2023)Prophet: Conflict-Free Sharding Blockchain via Byzantine-Tolerant Deterministic OrderingIEEE INFOCOM 2023 - IEEE Conference on Computer Communications10.1109/INFOCOM53939.2023.10228939(1-10)Online publication date: 17-May-2023
    • (2023)Oracle Agreement: From an Honest Super Majority to Simple Majority2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS57875.2023.00025(714-725)Online publication date: Jul-2023
    • (2023)Research on the Reasoning Credibility of Privacy Infringement Risk Monitoring System Based on Blockchain2023 International Conference on Blockchain Technology and Information Security (ICBCTIS)10.1109/ICBCTIS59921.2023.00040(217-224)Online publication date: Jun-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media