256 research outputs found
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees
Typically, protocols for Byzantine agreement (BA) are designed to run in either a synchronous network (where all messages are guaranteed to be delivered within some known time from when they are sent) or an asynchronous network (where messages may be arbitrarily delayed). Protocols designed for synchronous networks are generally insecure if the network in which they run does not ensure synchrony; protocols designed for asynchronous networks are (of course) secure in a synchronous setting as well, but in that case tolerate a lower fraction of faults than would have been possible if synchrony had been assumed from the start.
Fix some number of parties , and . We ask whether it is possible (given a public-key infrastructure) to design a BA protocol that (1) is resilient to corruptions when run in a synchronous network and (2) remains resilient to faults even if the network happens to be asynchronous. We show matching feasibility and infeasibility results demonstrating that this is possible if and only if
In Search for an Optimal Authenticated Byzantine Agreement
In this paper, we challenge the conventional approach of state machine replication systems to design deterministic agreement protocols in the eventually synchronous communication model. We first prove that no such protocol can guarantee bounded communication cost before the global stabilization time and propose a different approach that hopes for the best (synchrony) but prepares for the worst (asynchrony). Accordingly, we design an optimistic byzantine agreement protocol that first tries an efficient deterministic algorithm that relies on synchrony for termination only, and then, only if an agreement was not reached due to asynchrony, the protocol uses a randomized asynchronous protocol for fallback that guarantees termination with probability 1.
We formally prove that our protocol achieves optimal communication complexity under all network conditions and failure scenarios. We first prove a lower bound of ?(ft+ t) for synchronous deterministic byzantine agreement protocols, where t is the failure threshold, and f is the actual number of failures. Then, we present a tight upper bound and use it for the synchronous part of the optimistic protocol. Finally, for the asynchronous fallback, we use a variant of the (optimal) VABA protocol, which we reconstruct to safely combine it with the synchronous part.
We believe that our adaptive to failures synchronous byzantine agreement protocol has an independent interest since it is the first protocol we are aware of which communication complexity optimally depends on the actual number of failures
A Fair and Resilient Decentralized Clock Network for Transaction Ordering
Traditional blockchain design gives miners or validators full control over
transaction ordering, i.e., they can freely choose which transactions to
include or exclude, as well as in which order. While not an issue initially,
the emergence of decentralized finance has introduced new transaction order
dependencies allowing parties in control of the ordering to make a profit by
front-running others' transactions. In this work, we present the Decentralized
Clock Network, a new approach for achieving fair transaction ordering. Users
submit their transactions to the network's clocks, which run an agreement
protocol that provides each transaction with a timestamp of receipt which is
then used to define the transactions' order. By separating agreement from
ordering, our protocol is efficient and has a simpler design compared to other
available solutions. Moreover, our protocol brings to the blockchain world the
paradigm of asynchronous fallback, where the algorithm operates with stronger
fairness guarantees during periods of synchronous use, switching to an
asynchronous mode only during times of increased network delay.Comment: In Proceedings of 27th International Conference on Principles of
Distributed Systems (OPODIS
Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus
In the consensus problem, parties want to agree on a common value, even if some of them are corrupt and arbitrarily misbehave. If the parties have a common input , then they must agree on .
Protocols solving consensus assume either a synchronous communication network, where messages are delivered within a known time, or an asynchronous network with arbitrary delays. Asynchronous protocols only tolerate corrupt parties. Synchronous ones can tolerate corruptions with setup, but their security completely breaks down if the synchrony assumptions are violated.
Network-agnostic consensus protocols, as introduced by Blum, Katz, and Loss [TCC\u2719], are secure regardless of network conditions, tolerating up to corruptions with synchrony and without, under provably optimal assumptions and . Despite efforts to improve their efficiency, all known network-agnostic protocols fall short of the asymptotic complexity of state-of-the-art purely synchronous protocols.
In this work, we introduce a novel technique to compile any synchronous and any asynchronous consensus protocols into a network-agnostic one. This process only incurs a small constant number of overhead rounds, so that the compiled protocol matches the optimal round complexity for synchronous protocols. Our compiler also preserves under a variety of assumptions the asymptotic communication complexity of state-of-the-art synchronous and asynchronous protocols. Hence, it closes the current efficiency gap between synchronous and network-agnostic consensus.
As a plus, our protocols support -bit inputs, and can be extended to achieve communication complexity under the assumptions for which this is known to be possible for purely synchronous protocols
Mandator and Sporades: Robust Wide-Area Consensus with Efficient Request Dissemination
Consensus algorithms are deployed in the wide area to achieve high
availability for geographically replicated applications. Wide-area consensus is
challenging due to two main reasons: (1) low throughput due to the high latency
overhead of client request dissemination and (2) network asynchrony that causes
consensus protocols to lose liveness. In this paper, we propose Mandator and
Sporades, a modular state machine replication algorithm that enables high
performance and resiliency in the wide-area setting.
To address the high client request dissemination overhead challenge, we
propose Mandator, a novel consensus-agnostic asynchronous dissemination layer.
Mandator separates client request dissemination from the critical path of
consensus to obtain high performance. Composing Mandator with Multi-Paxos
(Mandator-Paxos) delivers significantly high throughput under synchronous
networks. However, under asynchronous network conditions, Mandator-Paxos loses
liveness which results in high latency. To achieve low latency and robustness
under asynchrony, we propose Sporades, a novel omission fault-tolerant
consensus algorithm. Sporades consists of two modes of operations --
synchronous and asynchronous -- that always ensure liveness. The combination of
Mandator and Sporades (Mandator-Sporades) provides a robust and high-performing
state machine replication system.
We implement and evaluate Mandator-Sporades in a wide-area deployment running
on Amazon EC2. Our evaluation shows that in the synchronous execution,
Mandator-Sporades achieves 300k tx/sec throughput in less than 900ms latency,
outperforming Multi-Paxos, EPaxos and Rabia by 650\% in throughput, at a modest
expense of latency. Furthermore, we show that Mandator-Sporades outperforms
Mandator-Paxos, Multi-Paxos, and EPaxos in the face of targeted distributed
denial-of-service attacks
Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback
Protocols for Byzantine agreement (BA) and secure multi-party computation (MPC) can be classified according to the underlying communication model. The two most commonly considered models are the synchronous one and the asynchronous one. Synchronous protocols typically lose their security guarantees as soon as the network violates the synchrony assumptions. Asynchronous protocols remain secure regardless of the network conditions, but achieve weaker security guarantees even when the network is synchronous.
Recent works by Blum, Katz and Loss [TCC\u2719], and Blum, Liu-Zhang and Loss [CRYPTO\u2720] introduced BA and MPC protocols achieving security guarantees in both settings: security up to corruptions in a synchronous network, and up to corruptions in an asynchronous network, under the provably optimal threshold trade-offs and . However, current solutions incur a high synchronous round complexity when compared to state-of-the-art purely synchronous protocols. When the network is synchronous, the round complexity of BA protocols is linear in the number of parties, and the round complexity of MPC protocols also depends linearly on the depth of the circuit to evaluate.
In this work, we provide round-efficient constructions for both primitives with optimal resilience: fixed-round and expected constant-round BA protocols, and an MPC protocol whose round complexity is independent of the circuit depth
- β¦