Gosig: Scalable Byzantine Consensus on Adversarial Wide Area Network for Blockchains

Total Page:16

File Type:pdf, Size:1020Kb

Gosig: Scalable Byzantine Consensus on Adversarial Wide Area Network for Blockchains Gosig: Scalable Byzantine Consensus on Adversarial Wide Area Network for Blockchains Peilun Li Guosai Wang Xiaoqi Chen Tsinghua University Tsinghua University Princeton University Wei Xu Tsinghua University Abstract longer have to worry about Sybil attacks [21], there are Existing Byzantine fault tolerance (BFT) protocols still some other significant challenges. face significant challenges in the consortium blockchain The blockchain is replicated to each participant, and scenario. On the one hand, we can make little assump- the key problem is how to reach consensus on these repli- tions about the reliability and security of the underlying cas. Comparing to traditional distributed transaction sys- Internet. On the other hand, the applications on consor- tems, the three biggest challenges of a blockchain are: tium blockchains demand a system as scalable as the Bit- 1) Players are from different organizations without coin but providing much higher performance, as well as mutual trust. Failures, even Byzantine failures, are com- provable safety. We present a new BFT protocol, Gosig, mon. Thus, we cannot rely on a small quorum (e.g., that combines crypto-based secret leader selection and Chubby [9] or ZooKeeper [27]) for consensus. Instead, multi-round voting in the protocol layer with implemen- we need Byzantine consensus and allow all players to tation layer optimizations such as gossip-based message participate, i.e., supporting a consensus group with thou- propagation. In particular, Gosig guarantees safety even sands of servers. in a network fully controlled by adversaries, while pro- 2) The system runs on an open Internet. The network viding provable liveness with easy-to-achieve network can drop/delay communication arbitrarily. Even worse, connectivity assumption. On a wide area testbed con- as the addresses of the participants are known to all, an sisting of 140 Amazon EC2 servers spanning 14 cities adversary can easily launch attacks targeting any chosen on five continents, we show that Gosig can achieve over participant at any time, using techniques like distributed 4,000 transactions per second with less than 1 minute denial-of-service (DDoS) [26, 49]. The adversary can transaction confirmation time. strategically choose which players to attack, and victims will remain unavailable until the adversary adaptively 1 Introduction choose to attack others. We call these attacks adaptive attacks, which strongly threatens the special nodes in a The rise of cryptocurrencies, such as Bitcoin [43], in- protocol, such as the leaders. creases the awareness and adoption of the underly- 3) Different from Bitcoin that allows temporary incon- arXiv:1802.01315v1 [cs.DC] 5 Feb 2018 ing blockchain technology. Blockchain offers a dis- sistency (i.e., a fork), people usually expect a permis- tributed ledger that serializes and records the transac- sioned chain to provide more traditional transaction se- tions. Blockchain provides attractive properties such as mantics, i.e., a committed transaction is durable. Also, full decentralization, offline-verifiability, and most im- applications on a permissioned chain [1] require much portantly, scalable Byzantine fault tolerance on the In- higher throughput and lower latency than Bitcoin. ternet. Thus, Blockchain has become popular beyond While there are many Byzantine fault-tolerant (BFT) cryptocurrencies, expanding into different areas such as protocols, most of them do not sufficiently address these payment services, logistics, healthcare, and Internet-of- three challenges. For example, PBFT [13] and its suc- Things (IoT) [8, 54, 48]. cessors [33, 38] and even some Bitcoin variants [23] all While Bitcoin provides a permissionless protocol, depend on a leader or a small quorum to participate mul- where everyone can join, we focus on consortium tiple rounds of communications, and thus they are vul- blockchains (aka permissioned blockchains), where a nerable to adaptive attacks on the leader. Other protocols participant needs offline authentication to join. It is use- that try to avoid faulty leaders by changing leaders in a ful in many commercial applications [25]. While we no fixed order [35, 42, 51,3] cannot avoid adaptive leader 1 attacks, because once the adversaries know who is the 140 nodes, and achieve promising performance results.2 next leader, they can change their target accordingly. There is a new generation of BFT protocols designed 2 Related Work to run over the Internet. To avoid adaptive attacks, Al- gorand [24] hides the leader identity. To improve scal- Bitcoin and its variants. Permissionless public ability, ByzCoin[32] combines Proof of Work (PoW) blockchains like Bitcoin [43], Ethereum [53], PP- with multi-signature-based PBFT. To tolerate arbitrary Coin [31] need proof of work (PoW) or proof of stake network failures, HoneyBadgerBFT[41] adopts asyn- (PoS) to prevent Sybil attacks. They also need incen- chronous atomic broadcast [11] and asynchronous com- tive mechanisms to encourage people to join the public mon subset (ACS) [4]. network to keep the system safe. Other designs [17, 20] Unfortunately, as we will detail in Section 3.3, none of try to avoid chain forking but retain the design of PoW these BFT protocols offer the following properties at the or PoS. We assume consortium blockchains [10, 45, 52], same time: 1) liveness under adaptive attack, 2) scalabil- and mainly focus on the performance and safety of the ity to 10,000s of nodes with low latency (15 seconds in system, instead of the other economic aspects. our simulation) for commitment, and 3) provable safety Byzantine fault tolerance. The most important fea- (i.e., no fork at any time) with arbitrary network fail- ture of a BFT protocol is safety. Unfortunately, many ure. Also, there is no straightforward way to combine open source BFT protocols are not safe [12]. There are the techniques used in these protocols. two major approaches to design provable BFT agree- We present Gosig1, a new BFT protocol for permis- ment protocols. 1) Using multi-round voting: exam- sioned blockchains. Gosig can achieve all three proper- ple systems include PBFT [13] and its successors [33, ties above, and also provide provable liveness with par- 38, 14]; 2) Using leader-less atomic broadcast: Hon- tially synchronous network (details in Section 3.2). eyBadgerBFT [41] and [16, 34]. To prevent malicious Gosig elects different leaders secretly for every block, leaders from affecting the system, Aardvark [15] use and it eliminates the leader’s involvement after it pro- performance metrics to trigger view changes and Spin- poses a block to defend against adaptive attacks on lead- ning [51], Tendermint [35] or others [3, 42] rotates leader ers. At the implementation level, we use gossip-based roles in a round robin manner. However, there methods communications to fully exploit the link redundancy on can not avoid adaptive attacks because the leader role is the Internet while keeping the source safe. Since we known to all in advance, and thus can be muted by at- need to gather signatures during gossip, we adopt asyn- tacks like DDoS right before it becomes a leader. Gosig chronous multi-signature [6, 46] to largely reduce the adopts similar voting mechanism like PBFT to get good network overhead of consensus messages. performance without failure, and keeps safety and live- We evaluate Gosig on an Amazon EC2-based 140- ness under attacks. server testbed that spans 14 cities on five continents. We In order to scale the system, many systems adopt can achieve a throughput of 4,000 tps (transactions per the “hybrid consensus” design [30, 32, 44] that uses a second) with an average transaction confirmation latency Bitcoin-like protocol to select a small quorum, and use of 1 minute. Even when 1/4 of the nodes fail, we can another (hopefully faster) BFT protocol to commit trans- still maintain over 3,500 tps with the same latency. With actions. If adversaries can instantly launch adaptive at- over 100 participants, it effectively doubles the through- tacks on leaders, it is hard for these protocols to main- put and reduces the latency by 80% comparing to Honey- tain liveness. Algorand [24] leverages secret leader elec- BadgerBFT [41], the state-of-the-art protocol that offers tion and quorum member replacement methods to keep the same level of safety guarantee. Also, using simula- liveness. Gosig lets every player participate in the con- tions, we show that Gosig is able to scale to 10K nodes. sensus, but combines similar secret leader selection with In summary, our major contributions are: signature-based voting to prevent such attacks. 1) We propose a new BFT protocol that achieves scal- We use similar methods and adversary models pro- ability, provable safety and resilient to adaptive attack. posed in Algorand [24]. We adopt the idea of multi- 2) We propose a novel method of combining secret round voting from PBFT and HoneyBadgerBFT [41], leader selection, random gossip, multi-round voting, and and the idea of multi-signature from ByzCoin [32]. multi-signature into a single BFT protocol in a compati- Gosig combines these incompatible methods in a coher- ble way. ent protocol and achieves good performance. We com- 3) We provide a real Gosig implementation, evaluate pare the key differences of these protocols in Section 3.3. it on a real-world geographically distributed testbed with Overlay network and gossip. Most BFT protocols and blockchains use broadcast as a communication primitive. 1The name is a combination of Gossip and Signature aggregation, two techniques we use. 2We will opensouce Gosig when the paper is published. 2 To improve broadcast reliability on the Internet, people Here we define safety and liveness of blocks instead often use application-layer overlay networks. We adopt of transactions for simplicity. We rely on gossip mecha- techniques like gossip from reliable multicast [5], prob- nisms to ensure that a transaction will reach most play- abilistic broadcast [22, 29] and other peer-to-peer (P2P) ers, and an honest player will pack the transaction when networks [28, 50].
Recommended publications
  • Chapter 1 from Byzantine Consensus to Blockchain Consensus
    Chapter 1 From Byzantine Consensus to Blockchain Consensus CONTENTS 1.1 Introduction ....................................................... 3 1.2 Byzantine Consensus .............................................. 6 1.2.1 On System Models ........................................ 6 1.2.2 Byzantine Consensus Definitions .......................... 7 1.2.3 FLP Impossibility ......................................... 9 1.2.4 Byzantine Consensus Patterns ............................. 12 1.2.5 Hybrid Models to Reduce Processes ....................... 13 1.2.6 Randomization ............................................ 15 1.3 Blockchains with Nakamoto Consensus ............................. 19 1.3.1 Bitcoin’s Blockchain and Consensus ....................... 19 1.3.2 Blockchain Applications ................................... 24 1.3.3 Nakamoto Consensus Variants ............................. 27 1.4 Blockchains with Byzantine Consensus ............................. 30 1.4.1 Permissioned Blockchains with Byzantine Consensus ....... 30 1.4.2 Permissionless Blockchains with Hybrid Consensus ........ 32 1.5 Conclusion ........................................................ 34 3 4 ⌅ Saunders Template 1.1 Introduction Blockchain is an exciting new technology that is making headlines worldwide. The reasons behind the success of a technology are often unclear, but in the case of block- chain it is safe to say that an important factor is that is has two killer apps, not a single one. The first killer app are cryptocurrencies, as the original blockchain is the core of Bitcoin [128], the first cryptocurrency and the one that is fostering the adoption of cryptocurrencies. The second killer app are smart contracts, first introduced in the Ethereum system [40], with their promise of computerizing legal contracts and of supporting a countless number of applications [161, 153, 90]. Moreover, the sky seems to be the limit for the applications people are imagining for blockchain. A blockchain is essentially a secure, unmodifiable, append-only, log of transac- tions.
    [Show full text]
  • A Survey of Distributed Consensus Protocols for Blockchain Networks
    1 A Survey of Distributed Consensus Protocols for Blockchain Networks Yang Xiao∗, Ning Zhang†, Wenjing Lou∗, Y. Thomas Hou∗ ∗Virginia Polytechnic Institute and State University, VA, USA †Washington University in St. Louis, MO, USA Abstract—Since the inception of Bitcoin, cryptocurrencies participants. On the other hand, blockchain is also known for and the underlying blockchain technology have attracted an providing trustworthy immutable record keeping service. The increasing interest from both academia and industry. Among block data structure adopted in a blockchain embeds the hash various core components, consensus protocol is the defining technology behind the security and performance of blockchain. of the previous block in the next block generated. The use of From incremental modifications of Nakamoto consensus protocol hash chain ensures that data written on the blockchain can not to innovative alternative consensus mechanisms, many consensus be modified. In addition, a public blockchain system supports protocols have been proposed to improve the performance of third-party auditing and some blockchain systems support a the blockchain network itself or to accommodate other specific high level of anonymity, that is, a user can transact online application needs. In this survey, we present a comprehensive review and anal- using a pseudonym without revealing his/her true identity. ysis on the state-of-the-art blockchain consensus protocols. To The security properties promised by blockchain is unprece- facilitate the discussion of our analysis, we first introduce the dented and truly inspiring. Pioneering blockchain systems such key definitions and relevant results in the classic theory of fault as Bitcoin have greatly impacted the digital payment world.
    [Show full text]
  • A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus
    future internet Article A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus Vitor Nazário Coelho 1,* , Rodolfo Pereira Araújo 2, Haroldo Gambini Santos 3, Wang Yong Qiang 4 and Igor Machado Coelho 5,* 1 OptBlocks, Avenida Jo ao Pinheiro, 274 Sala 201-Lourdes, Belo Horizonte-MG 30130-186, Brazil 2 Graduate Program in Computational Sciences (PPG-CComp), Universidade do Estado do Rio de Janeiro, Rua S ao Francisco Xavier, 524-Maracan a, Rio de Janeiro-RJ 20550-013, Brazil; [email protected] 3 Department of Computer Science, Universidade Federal de Ouro Preto, Campus Morro do Cruzeiro, Ouro Preto-MG 35400-000, Brazil; [email protected] 4 Research & Development Department, Neo Global Development, 80, Zhengxue Rd, Shanghai 200082, China; [email protected] 5 Institute of Computing, Universidade Federal Fluminense, Av. Gal. Milton Tavares de Souza, São Domingos, Niterói-RJ 24210-310, Brazil * Correspondence: [email protected] (V.N.C.); [email protected] (I.M.C.) Received: 30 September 2020; Accepted: 26 October 2020; Published: 29 October 2020 Abstract: Mixed-integer mathematical programming has been widely used to model and solve challenging optimization problems. One interesting feature of this technique is the ability to prove the optimality of the achieved solution, for many practical scenarios where a linear programming model can be devised. This paper explores its use to model very strong Byzantine adversaries, in the context of distributed consensus systems. In particular, we apply the proposed technique to find challenging adversarial conditions on a state-of-the-art blockchain consensus: the Neo dBFT. Neo Blockchain has been using the dBFT algorithm since its foundation, but, due to the complexity of the algorithm, it is challenging to devise definitive algebraic proofs that guarantee safety/liveness of the system (and adjust for every change proposed by the community).
    [Show full text]
  • Byzantine Consensus in Asynchronous Message-Passing Systems: a Survey
    Int. J. Critical Computer-Based Systems, Vol. x, No. x, xxxx 1 Byzantine Consensus in Asynchronous Message-Passing Systems: a Survey Miguel Correia*, Giuliana Santos Veronese, Nuno Ferreira Neves and Paulo Verissimo Faculdade de Ciˆenciasda Universidade de Lisboa Campo Grande, 1749-016 Lisboa, Portugal E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] *Corresponding author Abstract Consensus is a classical distributed systems problem with both theo- retical and practical interest. Asynchronous Byzantine consensus is cur- rently at the core of some solutions for the implementation of highly- resilient computing services. This paper surveys Byzantine consensus in message-passing distributed systems, by presenting the main theo- retical results in the area, the main classes of algorithms and by dis- cussing important issues like the performance and resilience of these algorithms. Keywords: distributed algorithms; distributed systems; consensus; Byzantine faults; arbitrary faults; asynchronous model; message pass- ing; Byzantine consensus Reference to this paper should be made as follows: Correia, M., Veronese, G. S., Neves, N. F. and Verissimo, P. (xxxx) ‘Byzantine Con- sensus in Asynchronous Message-Passing Systems: a Survey’, Int. J. Critical Computer-Based Systems, Vol. x, No. x, pp.xxx–xxx. Biographical notes: Miguel Correia is an assistant professor in the Department of Informatics at the Faculty of Sciences at the University of Lisboa, and an adjunct faculty member of the Carnegie Mellon In- formation Networking Institute. More information about his research can be found at http://www.di.fc.ul.pt/∼mpc.
    [Show full text]
  • Virginia Gold 212-626-0505 [email protected]
    Contact: Virginia Gold 212-626-0505 [email protected] ACM TURING AWARD GOES TO PIONEER WHO ADVANCED RELIABILITY AND CONSISTENCY OF COMPUTING SYSTEMS Microsoft’s Lamport Contributed to Theory and Practice of Building Distributed Computing Systems that Work as Intended NEW YORK, March 18, 2014 – ACM (Association for Computing Machinery) www.acm.org today named Leslie Lamport, a Principal Researcher at Microsoft Research, as the recipient of the 2013 ACM A.M. Turing Award for imposing clear, well-defined coherence on the seemingly chaotic behavior of distributed computing systems, in which several autonomous computers communicate with each other by passing messages. He devised important algorithms and developed formal modeling and verification protocols that improve the quality of real distributed systems. These contributions have resulted in improved correctness, performance, and reliability of computer systems. The ACM Turing Award, widely considered the “Nobel Prize in Computing,” carries a $250,000 prize, with financial support provided by Intel Corporation and Google Inc. ACM President Vint Cerf noted that “as an applied mathematician, Leslie Lamport had an extraordinary sense of how to apply mathematical tools to important practical problems. By finding useful ways to write specifications and prove correctness of realistic algorithms, assuring strong foundation for complex computing operations, he helped to move verification from an academic discipline to practical tool.” Lamport’s practical and widely used algorithms and tools have applications in security, cloud computing, embedded systems and database systems as well as mission-critical computer systems that rely on secure information sharing and interoperability to prevent failure. His notions of safety, where nothing bad happens, and liveness, where something good happens, contribute to the reliability and robustness of software and hardware engineering design.
    [Show full text]
  • Byzantine Fault Tolerance
    Byzantine Fault Tolerance CS 475, Spring 2019 Concurrent & Distributed Systems Review: Why P2P? • Spreads network/cache costs across users instead of provider • No server might mean: • Easier to deploy • Less chance of overload • Single failure won’t take down the system • Harder to attack J. Bell GMU CS 475 Spring 2019 !2 Review: Napster • The good: • Simple • Finding a file is really fast, regardless of how many clients there are - master has it all • The bad: • Server becomes a single point of failure • Server does a lot of processing • Server having all of metadata implies significant legal liabilities J. Bell GMU CS 475 Spring 2019 !3 Review: Gnutella • Gnutella’s search approach is called "flooding" • Cool: • Fully decentralized • Cost of search is distributed - no single node has to search through all of the data • Bad: • Search requires contacting many nodes! • Who can know when your search is done? • What if nodes leave while you are searching? J. Bell GMU CS 475 Spring 2019 !4 Review: BitTorrent • Goal: • Get large files out to as many users as possible, quickly • Usages: • Static bulk content (Big software updates, videos, etc) • User model is cooperative • While downloading a large file, also sharing the parts that you have • After you get the file, keep sharing for a while too • Approach relies on a “tracker” per file J. Bell GMU CS 475 Spring 2019 !5 Is our system well behaved? Byzantine Start talking about for P2P systems Partitions What we’ve done so far Crash-fail J. Bell GMU CS 475 Spring 2019 !6 Byzantine Failures in P2P May I have this totally legal, not copyrighted video please? Sure, here it is! J.
    [Show full text]
  • Distributed Computing Column 36 Distributed Computing: 2009 Edition
    Distributed Computing Column 36 Distributed Computing: 2009 Edition Idit Keidar Dept. of Electrical Engineering, Technion Haifa, 32000, Israel [email protected] It’s now the season for colorful reviews of 2009. While you can read elsewhere about the year in sports, top-40 pop hit charts, people of the year, and so on, I throw my share into the mix with a (biased) review of this year’s major distributed computing events. Awards First, let’s look at awards. This year we learned that two women were recognized with ACM and IEEE prestigious awards for their achievements in, (among other things), distributed computing. Barbara Liskov won the 2008 ACM Turing Award for a range of contributions to practical and theoretical foundations of programming language and system design, some of which are in distributed computing. The award citation mentions her impact on distributed programming, decentralized information flow, replicated storage, and modular upgrading of distributed systems. I include below a short reflection, by Rodrigo Rodrigues, on Barbara Liskov’s Turing Award and legacy. Looking ahead to 2010, it was recently announced that Nancy Lynch is the recipient of the prestigious 2010 IEEE Emanuel R. Piore Award1 for her contributions to foundations of distributed and concurrent computing. The award is given for outstanding contributions in the field of information processing in relation to computer science. Leslie Lamport has won the same award in 2004 for his seminal contributions to the theory and practice of concurrent programming and fault-tolerant computing. The 2009 Edsger W. Dijkstra Prize in Distributed Computing was awarded to Joseph Halpern and Yoram Moses for “Knowledge and Common Knowledge in a Distributed Environment”.
    [Show full text]
  • Leaderless Byzantine Fault Tolerance
    Leaderless Byzantine Fault Tolerance Tian Qin Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2020-121 http://www2.eecs.berkeley.edu/Pubs/TechRpts/2020/EECS-2020-121.html May 29, 2020 Copyright © 2020, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Acknowledgement I would like to express my appreciation to Jian Liu and Peng Gao for their guidance, advice, and feedbacks during this research work. Leaderless Byzantine Fault Tolerance by Tian Qin Research Project Submitted to the Department of Electrical Engineering and Computer Sciences, University of California at Berkeley, in partial satisfaction of the requirements for the degree of Master of Science, Plan II. Approval for the Report and Comprehensive Examination: Committee: Professor Dawn Song Research Advisor (Date) * * * * * * * Professor Sylvia Ratnasamy Second Reader Leaderless Byzantine Fault Tolerance ABSTRACT transaction commitment is deterministic; it is built upon a gossip In this work, we propose Leaderless Byzantine Fault Tolerance protocol to relay messages and data across the whole network, prac- (LBFT), a novel consensus algorithm that combines Snowball algo- tical Byzantine Fault Tolerance algorithm to commit transactions rithm and Practical Byzantine Fault Tolerance (pBFT) algorithm, in a deterministic manner, and Snowball to realize decentralization two existing consensus algorithms.
    [Show full text]
  • Modelling and Testing Composite Byzantine-Fault Tolerant Consensus Protocols
    Modelling and Testing Composite Byzantine-Fault Tolerant Consensus Protocols Daniel Lok Capstone Final Report for BSc (Honours) in Mathematical, Computational, and Statistical Sciences Supervised by: Dr. Ilya Sergey AY 2018/2019 i Acknowledgements This capstone would not have been possible without the support of numer- ous friends and faculty. We thank Dr. Ilya Sergey for his invaluable advice on every aspect of this project, as well as his eagerness in teaching and recommending additional sources of information. We would also like to thank Dr. Olivier Danvy for his course Functional Programming and Proving, which provided a rich foundation on which much of this capstone was built. Additionally, we would like to thank the residents and ex-residents of Elm College’s 17th floor for emotional support, and in particular, Yong Kai Yi and Cephas Tan for their helpful comments and advice on the direction, structure, and wording of this manuscript. ii YALE-NUS COLLEGE Abstract B.Sc (Hons) Modelling and Testing Composite Byzantine-Fault Tolerant Consensus Protocols by Daniel LOK Implementing distributed systems is a notoriously difficult task. Program- mers that attempt to build executable versions of published consensus pro- tocols often run into numerous bugs along the way, in part due to the often informal nature of the publications. This project provides a framework to conveniently implement and test models of distributed consensus protocols, with the intention of assisting programmers in formulating “correct” system sematics prior to actual im- plementation. This paper describes the internal workings of the framework, its API, and how to use it to model complex phenomena such as Byzantine faults, modular protocol composition, and asynchrony.
    [Show full text]
  • Enabling Secure and Resource-Efficient Blockchain Networks with VOLT
    Enabling secure and resource-efficient blockchain networks with VOLT Srinath Setty Soumya Basu? Lidong Zhou Michael L. Roberts Ramarathnam Venkatesan Microsoft Research ?Cornell University Abstract per second) at relatively low latency (e.g., a few seconds). This paper describes VOLT, a permissioned blockchain While Byzantine fault-tolerant (BFT) protocols [22, network for a group of autonomous organizations to au- 31, 36, 55] seem to solve the core consensus problem, tomate cross-organizational business processes. Specif- subtle, but fundamental, aspects render these protocols ically, VOLT ensures that a correct member—without insufficient for permissioned blockchain networks, even trusting anyone else—shares a consistent history of trans- though the underlying substrate in BFT remains relevant. actions with other members in the system. VOLT achieves These BFT protocols were primarily designed to replicate this strong security property using the concept of a self- services in a datacenter environment—to guard against verifying ledger: an append-only ledger of transactions crash failures and Byzantine behavior by a subset of the that can be checked locally by a verifier process at each replicas. In the context of permissioned blockchain net- node; the ledger also embeds succinct cryptographic mes- works, the protocol has to be carried out across trusted sages encoding views of members to enable each veri- domains with each member representing a participating fier to locally determine globally-committed transactions. organization (such as a bank), rather than a replica of a To orchestrate this concept, VOLT employs a logically replicated service typically in the same trusted domain. centralized—but untrusted—service provider. We instan- Consequently, the desirable guarantees must be defined tiate the service provider using a highly-available cloud from the perspective of each member, rather than for a service built atop a fault-tolerant cloud storage service.
    [Show full text]
  • Byzantizing Paxos by Refinement
    Byzantizing Paxos by Refinement Leslie Lamport 5 December 2010 Abstract We derive a 3f +1 process Byzantine Paxos consensus algorithm by Byzantizing a variant of the ordinary Paxos algorithm|that is, by having 2f + 1 nonfaulty processes emulate the ordinary Paxos algo- rithm despite the presence of f malicious processes. We have writ- ten a formal, machine-checked proof that the Byzantized algorithm implements the ordinary Paxos consensus algorithm under a suitable refinement mapping. Contents 1 Introduction 1 2 Consensus and Classic Paxos 2 2.1 Consensus . .2 2.2 Paxos Consensus . .2 3 Byzantizing An Algorithm 4 4 Algorithm PCon 7 5 Algorithm BPCon 8 6 Liveness and Learning About Sent Messages 10 6.1 Sending Proofs . 11 6.2 Relaying 1b Messages . 12 7 The Castro-Liskov Algorithm 13 8 The Formal Specifications and Proof 14 9 Conclusion 16 References 16 You can verb anything. Ron Ziegler (quoted by Brian Reid) 1 Introduction The Paxos algorithm [6] has become a standard tool for implementing fault- tolerant distributed systems. It uses 2f + 1 processes to tolerate the benign failure of any f of them. More recently, Castro and Liskov developed a 3f + 1 process algorithm [2] that tolerates f Byzantine (maliciously faulty) processes. Intuitively, their algorithm seems to be a Byzantine version of Paxos. Other algorithms that also seem to be Byzantine versions of Paxos have subsequently appeared [4, 11, 14]. The only previous attempt we know of to explain the relation between a Byzantine Paxos algorithm and ordinary Paxos was by Lampson [13]. He derived both from an abstract, non-distributed algorithm.
    [Show full text]
  • Asynchronous Byzantine Fault Tolerant
    A definition The Byzantine Generals Problem Leslie Lamport, Robert Shostak, and Marshall Pease • Byzantine (www.m-w.com): ACM TOPLAS 1982 1: of, relating to, or characteristic of the ancient city of Byzantium … Practical Byzantine Fault Tolerance 4b: intricately involved : labyrinthine <rules of Byzantine Miguel Castro and Barbara Liskov complexity> OSDI 1999 • Lamport’s reason: “I have long felt that, because it was posed as a cute problem about philosophers seated around a table, Dijkstra's dining philosopher's problem received much more attention than it deserves.” (http://research.microsoft.com/users/lamport/pubs/pubs.html#byz) Byzantine Generals Problem Synchronous, Byzantine world • Concerned with (binary) atomic broadcast – All correct nodes receive same value Synchronous Asynchronous – If broadcaster correct, correct nodes receive broadcasted value • Can use broadcast to build consensus protocols (aka, agreement) – Consensus: think Byzantine fault-tolerant (BFT) Paxos Fail-stop Byzantine Practical Byzantine Fault Tolerance: Cool note Asynchronous, Byzantine Example Byzantine fault-tolerant system: ! Seawolf submarine’s control system Synchronous Asynchronous Sims, J. T. 1997. Redundancy Management Software Services for Seawolf Ship Control System. In Proceedings of the 27th international Symposium on Fault-Tolerant Computing (FTCS '97) (June 25 - 27, 1997). FTCS. IEEE Computer Society, Washington, DC, 390. But it remains to be seen if commodity distributed systems are willing to pay to Fail-stop have so many replicas in a system Byzantine Distributed systems Practical Byzantine Fault Tolerance • Async BFT consensus: Need 3f+1 nodes – Sketch of proof: Divide 3f nodes into three groups of f, left, •Why async BFT? BFT: middle, right, where middle f are faulty.
    [Show full text]