How Robust Are Synchronous Consensus Protocols?

Authors Nenad Milošević , Daniel Cason , Zarko Milošević , Fernando Pedone



PDF
Thumbnail PDF

File

LIPIcs.OPODIS.2024.20.pdf
  • Filesize: 1.15 MB
  • 25 pages

Document Identifiers

Author Details

Nenad Milošević
  • Università della Svizzera italiana (USI), Lugano, Switzerland
Daniel Cason
  • Informal Systems, Toronto, Canada
Zarko Milošević
  • Informal Systems, Toronto, Canada
Fernando Pedone
  • Università della Svizzera italiana (USI), Lugano, Switzerland

Cite As Get BibTex

Nenad Milošević, Daniel Cason, Zarko Milošević, and Fernando Pedone. How Robust Are Synchronous Consensus Protocols?. In 28th International Conference on Principles of Distributed Systems (OPODIS 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 324, pp. 20:1-20:25, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024) https://doi.org/10.4230/LIPIcs.OPODIS.2024.20

Abstract

Synchronous Byzantine fault-tolerant (BFT) protocols have long been a reality in an academic setting, yet their practicality remains debated. The main concern of skeptics of synchronous systems is that the correctness of these protocols depends on the timely delivery of all messages within a predefined synchronous bound, Δ. This dependency creates a challenging tradeoff between protocol correctness and performance, as Δ directly impacts both. In this paper, we examine this tradeoff in detail. Specifically, we introduce BoundBFT, a new synchronous BFT consensus protocol. We analyze how BoundBFT’s correctness can be compromised and use this analysis to design and implement the most effective attack strategies that malicious processes could employ. Furthermore, we experimentally determine the synchronous bound Δ that provides sufficient confidence in maintaining protocol correctness even in the presence of malicious replicas. Finally, we apply this discovered bound to BoundBFT, evaluate its performance, and compare it to state-of-the-art synchronous and partially synchronous protocols.

Subject Classification

ACM Subject Classification
  • Computer systems organization → Reliability
  • Computer systems organization → Availability
  • Computer systems organization → Redundancy
  • Computing methodologies → Distributed algorithms
Keywords
  • Synchronous Consensus
  • Byzantine Failures
  • Blockchain

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Libp2p. https://libp2p.io. [Accessed 2023-01-12].
  2. Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Maofan Yin. Sync HotStuff: Simple and practical synchronous state machine replication. In 2020 IEEE Symposium on Security and Privacy (SP), May 2020. URL: https://doi.org/10.1109/sp40000.2020.00044.
  3. Ittai Abraham, Kartik Nayak, and Nibesh Shrestha. Optimal good-case latency for rotating leader synchronous BFT. In 25th International Conference on Principles of Distributed Systems (OPODIS 2021), pages 27:1-27:19, 2022. URL: https://doi.org/10.4230/LIPICS.OPODIS.2021.27.
  4. Michael Ben-Or. Another advantage of free choice: Completely asynchronous agreement protocols (extended abstract). In Robert L. Probert, Nancy A. Lynch, and Nicola Santoro, editors, Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, August 17-19, 1983, PODC'83, pages 27-30. ACM, August 1983. URL: https://doi.org/10.1145/800221.806707.
  5. Ethan Buchman, Jae Kwon, and Zarko Milosevic. The latest gossip on BFT consensus. CoRR, July 2018. URL: https://doi.org/10.48550/arXiv.1807.04938.
  6. Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, and Dominic Williams. Internet computer consensus. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, PODC'22, pages 81-91, July 2022. URL: https://doi.org/10.1145/3519270.3538430.
  7. Miguel Castro and Barbara Liskov. Practical byzantine fault tolerance. In Margo I. Seltzer and Paul J. Leach, editors, Proceedings of the Third USENIX Symposium on Operating Systems Design and Implementation (OSDI), New Orleans, Louisiana, USA, February 22-25, 1999, OSDI '99, pages 173-186, USA, 1999. USENIX Association. URL: https://dl.acm.org/citation.cfm?id=296824.
  8. T-H. Hubert Chan, Rafael Pass, and Elaine Shi. Pili: An extremely simple synchronous blockchain. Cryptology ePrint Archive, Paper 2018/980, 2018. URL: https://eprint.iacr.org/2018/980.
  9. Byung-Gon Chun, Petros Maniatis, Scott Shenker, and John Kubiatowicz. Attested append-only memory: making adversaries stick to their word. In Thomas C. Bressoud and M. Frans Kaashoek, editors, Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, SOSP 2007, Stevenson, Washington, USA, October 14-17, 2007, volume 41(6), pages 189-204. ACM, October 2007. URL: https://doi.org/10.1145/1294261.1294280.
  10. Miguel Correia, Nuno Ferreira Neves, and Paulo Veríssimo. How to tolerate half less one byzantine nodes in practical distributed systems. In 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 18-20 October 2004, Florianpolis, Brazil, pages 174-183. IEEE Computer Society, August 2004. URL: https://doi.org/10.1109/RELDIS.2004.1353018.
  11. Jérémie Decouchant, David Kozhaya, Vincent Rahli, and Jiangshan Yu. DAMYSUS: streamlined bft consensus leveraging trusted components. In Proceedings of the Seventeenth European Conference on Computer Systems. ACM, March 2022. URL: https://doi.org/10.1145/3492321.3519568.
  12. Danny Dolev and H. Strong. Authenticated algorithms for byzantine agreement. SIAM J. Comput., 12:656-666, November 1983. URL: https://doi.org/10.1137/0212045.
  13. Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. Consensus in the presence of partial synchrony. Journal of the ACM (JACM), 35(2):288-323, April 1988. URL: https://doi.org/10.1145/42282.42283.
  14. Pesech Feldman and Silvio Micali. An optimal probabilistic protocol for synchronous byzantine agreement. SIAM Journal on Computing, 26(4):873-933, August 1997. URL: https://doi.org/10.1137/s0097539790187084.
  15. Michael J. Fischer, Nancy A. Lynch, and Michael Merritt. Easy impossibility proofs for distributed consensus problems. Distributed Comput., 1(1):26-39, January 1986. URL: https://doi.org/10.1007/BF01843568.
  16. Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson. Impossibility of distributed consensus with one faulty process. Journal of ACM, 32(2):374-382, April 1985. URL: https://doi.org/10.1145/3149.214121.
  17. Matthias Fitzi. Generalized communication and security models in Byzantine agreement. PhD thesis, ETH Zurich, Zürich, Switzerland, March 2003. Reprint as vol. 4 of ETH Series in Information Security and Cryptography, ISBN 3-89649-853-3, Hartung-Gorre Verlag, Konstanz, 2003. URL: https://d-nb.info/967397375.
  18. Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. Dumbo-ng: Fast asynchronous BFT consensus with throughput-oblivious latency. In Heng Yin, Angelos Stavrou, Cas Cremers, and Elaine Shi, editors, Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, CCS '22, pages 1187-1201, New York, NY, USA, 2022. ACM. URL: https://doi.org/10.1145/3548606.3559379.
  19. Rati Gelashvili, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman, and Zhuolun Xiang. Jolteon and ditto: Network-adaptive efficient consensus with asynchronous fallback. CoRR, abs/2106.10362, June 2021. URL: https://doi.org/10.48550/arXiv.2106.10362.
  20. Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, October 28-31, 2017, SOSP '17, pages 51-68, New York, NY, USA, 2017. ACM. URL: https://doi.org/10.1145/3132747.3132757.
  21. Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. Speeding dumbo: Pushing asynchronous bft closer to practice. Cryptology ePrint Archive, Paper 2022/027, 2022. URL: https://eprint.iacr.org/2022/027.
  22. Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. Dumbo: Faster asynchronous BFT protocols. In Jay Ligatti, Xinming Ou, Jonathan Katz, and Giovanni Vigna, editors, CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, CCS '20, pages 803-818, New York, NY, USA, 2020. ACM. URL: https://doi.org/10.1145/3372297.3417262.
  23. Yue Guo, Rafael Pass, and Elaine Shi. Synchronous, with a chance of partition tolerance. In Advances in Cryptology - CRYPTO 2019, pages 499-529, August 2019. URL: https://doi.org/10.1007/978-3-030-26948-7_18.
  24. Timo Hanke, Mahnush Movahedi, and Dominic Williams. DFINITY technology overview series, consensus system. CoRR, abs/1805.04548, May 2018. https://arxiv.org/abs/1805.04548, URL: https://doi.org/10.48550/arXiv.1805.04548.
  25. Bert Hubert, Gregory Maxwell, Martijn van Oosterhout, Remco van Mook, Paul B. Schroeder, et al. Linux advanced routing & traffic control HOWTO. https://lartc.org/lartc.html, 2002. [Accessed 2024-22-5].
  26. Jonathan Katz and Chiu-Yuen Koo. On expected constant-round protocols for byzantine agreement. In Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, volume 4117 of Lecture Notes in Computer Science, pages 445-462. Springer, 2006. URL: https://doi.org/10.1007/11818175_27.
  27. Klaus Kursawe and Victor Shoup. Optimistic asynchronous atomic broadcast. IACR Cryptol. ePrint Arch., page 22, 2001. URL: http://eprint.iacr.org/2001/022.
  28. Leslie Lamport, Robert E. Shostak, and Marshall C. Pease. The byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382-401, July 1982. URL: https://doi.org/10.1145/357172.357176.
  29. Dave Levin, John R Douceur, Jacob R Lorch, and Thomas Moscibroda. TrInc: Small trusted hardware for large distributed systems. In NSDI, volume 9, pages 1-14, 2009. URL: http://www.usenix.org/events/nsdi09/tech/full_papers/levin/levin.pdf.
  30. Shengyun Liu, Paolo Viotti, Christian Cachin, Vivien Quéma, and Marko Vukolic. XFT: practical fault tolerance beyond crashes. In Kimberly Keeton and Timothy Roscoe, editors, 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2-4, 2016, OSDI'16, pages 485-500, USA, 2016. USENIX Association. URL: https://www.usenix.org/conference/osdi16/technical-sessions/presentation/liu.
  31. Yuan Lu, Zhenliang Lu, and Qiang Tang. Bolt-dumbo transformer: Asynchronous consensus as fast as pipelined BFT. CoRR, abs/2103.09425, 2021. https://arxiv.org/abs/2103.09425, URL: https://doi.org/10.48550/arXiv.2103.09425.
  32. Dahlia Malkhi and Kartik Nayak. Extended abstract: Hotstuff-2: Optimal two-phase responsive BFT. IACR Cryptol. ePrint Arch., page 397, 2023. URL: https://eprint.iacr.org/2023/397.
  33. Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. The honey badger of BFT protocols. In Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi, editors, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, CCS '16, pages 31-42, New York, NY, USA, 2016. ACM. URL: https://doi.org/10.1145/2976749.2978399.
  34. Michael O. Rabin. Randomized byzantine generals. In 24th Annual Symposium on Foundations of Computer Science (sfcs 1983), November 1983. URL: https://doi.org/10.1109/sfcs.1983.48.
  35. HariGovind V. Ramasamy and Christian Cachin. Parsimonious asynchronous byzantine-fault-tolerant atomic broadcast. IACR Cryptol. ePrint Arch., page 82, 2006. URL: http://eprint.iacr.org/2006/082.
  36. Dmitry Tanana. Avalanche blockchain protocol for distributed computing security. In 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). IEEE, June 2019. URL: https://doi.org/10.1109/blackseacom.2019.8812863.
  37. Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, and Paulo Verissimo. Efficient byzantine fault-tolerance. IEEE Transactions on Computers, 62(1):16-30, 2013. URL: https://doi.org/10.1109/TC.2011.221.
  38. Sravya Yandamuri, Ittai Abraham, Kartik Nayak, and Michael K. Reiter. Communication-efficient bft protocols using small trusted hardware to tolerate minority corruption. Cryptology ePrint Archive, Paper 2021/184, 2021. URL: https://eprint.iacr.org/2021/184.
  39. Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan Gueta, and Ittai Abraham. HotStuff: BFT consensus with linearity and responsiveness. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, PODC'19, pages 347-356, July 2019. URL: https://doi.org/10.1145/3293611.3331591.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail