6 research outputs found
Grassroots Flash: A Payment System for Grassroots Cryptocurrencies
The goal of grassroots cryptocurrencies is to provide a foundation with which
local digital economies can emerge independently of each other and of global
digital platforms and global cryptocurrencies; can form and grow without
initial capital or external credit; can trade with each other; and can
gradually merge into a global digital economy. Grassroots cryptocurrencies turn
mutual trust into liquidity and thus could be a powerful means for 'banking the
unbanked'. Grassroots cryptocurrencies have not been provided yet with a
payment system, which is the goal of this paper. Here, we present Grassroots
Flash, a payment system for grassroots cryptocurrencies that employs the
blocklace -- a DAG-like counterpart of the blockchain data structure. We
analyze its security (safety, liveness, and privacy) and efficiency, prove that
it is indeed grassroots
A Modular Approach to Construct Signature-Free BRB Algorithms Under a Message Adversary
This paper explores how reliable broadcast can be implemented without signatures when facing a dual adversary that can both corrupt processes and remove messages. More precisely, we consider an asynchronous n-process message-passing system in which up to t processes are Byzantine and where, at the network level, for each message broadcast by a correct process, an adversary can prevent up to d processes from receiving it (the integer d defines the power of the message adversary). So, unlike previous works, this work considers that not only can computing entities be faulty (Byzantine processes), but, in addition, that the network can also lose messages. To this end, the paper adopts a modular strategy and first introduces a new basic communication abstraction denoted k2?-cast, which simplifies quorum engineering, and studies its properties in this new adversarial context. Then, the paper deconstructs existing signature-free Byzantine-tolerant asynchronous broadcast algorithms and, with the help of the k2?-cast communication abstraction, reconstructs versions of them that tolerate both Byzantine processes and message adversaries. Interestingly, these reconstructed algorithms are also more efficient than the Byzantine-tolerant-only algorithms from which they originate
Good-case Early-Stopping Latency of Synchronous Byzantine Reliable Broadcast: The Deterministic Case (Extended Version)
This paper considers the good-case latency of Byzantine Reliable Broadcast
(BRB), i.e., the time taken by correct processes to deliver a message when the
initial sender is correct. This time plays a crucial role in the performance of
practical distributed systems. Although significant strides have been made in
recent years on this question, progress has mainly focused on either
asynchronous or randomized algorithms. By contrast, the good-case latency of
deterministic synchronous BRB under a majority of Byzantine faults has been
little studied. In particular, it was not known whether a goodcase latency
below the worst-case bound of t + 1 rounds could be obtained. This work answers
this open question positively and proposes a deterministic synchronous
Byzantine reliable broadcast that achieves a good-case latency of max(2, t + 3
-- c) rounds, where t is the upper bound on the number of Byzantine processes
and c the number of effectively correct processes
Asynchronous Byzantine Reliable Broadcast With a Message Adversary
This paper considers the problem of reliable broadcast in asynchronous authenticated systems, in which n processes communicate using signed messages and up to t processes may behave arbitrarily (Byzantine processes). In addition, for each message m broadcast by a correct (i.e., non-Byzantine) process, a message adversary may prevent up to d correct processes from receiving m. (This message adversary captures network failures such as transient disconnections, silent churn, or message losses.) Considering such a "double" adversarial context and assuming n > 3t + 2d, a reliable broadcast algorithm is presented. Interestingly, when there is no message adversary (i.e., d = 0), the algorithm terminates in two communication steps (so, in this case, this algorithm is optimal in terms of both Byzantine tolerance and time efficiency). It is then shown that the condition n > 3t + 2d is necessary for implementing reliable broadcast in the presence of both Byzantine processes and a message adversary (whether the underlying system is enriched with signatures or not)
A Modular Approach to Construct Signature-Free BRB Algorithms under a Message Adversary
International audienceThis paper explores how reliable broadcast can be implemented without signatures when facing a dual adversary that can both corrupt processes and remove messages. More precisely, we consider an asynchronous n-process message-passing system in which up to t processes are Byzantine and where, at the network level, for each message broadcast by a correct process, an adversary can prevent up to d processes from receiving it (the integer d defines the power of the message adversary). So, unlike previous works, this work considers that not only can computing entities be faulty (Byzantine processes), but, in addition, that the network can also lose messages. To this end, the paper adopts a modular strategy and first introduces a new basic communication abstraction denoted k2-cast, which simplifies quorum engineering, and studies its properties in this new adversarial context. Then, the paper deconstructs existing signature-free Byzantine-tolerant asynchronous broadcast algorithms and, with the help of the k2-cast communication abstraction, reconstructs versions of them that tolerate both Byzantine processes and message adversaries. Interestingly, these reconstructed algorithms are also more efficient than the Byzantine-tolerant-only algorithms from which they originate
Money Transfer Made Simple: a Specification, a Generic Algorithm, and its Proof
International audienceIt has recently been shown that, contrarily to a common belief, money transfer in the presence of faulty (Byzantine) processes does not require strong agreement such as consensus. This article goes one step further: namely, it first proposes a non-sequential specification of the money-transfer object, and then presents a generic algorithm based on a simple FIFO order between each pair of processes that implements it. The genericity dimension lies in the underlying reliable broadcast ab- straction which must be suited to the appropriate failure model. Interestingly, whatever the failure model, the money transfer algorithm only requires adding a single sequence number to its messages as control information. Moreover, as a side effect of the proposed algorithm, it follows that money transfer is a weaker problem than the construction of a safe/regular/atomic read/write register in the asynchronous message-passing crash-prone model