Byzantine Fault Tolerance For Distributed Ledgers Revisited

Yongge Wang
{"title":"Byzantine Fault Tolerance For Distributed Ledgers Revisited","authors":"Yongge Wang","doi":"10.1145/3538227","DOIUrl":null,"url":null,"abstract":"\n The problem of Byzantine Fault Tolerance (BFT) has received a lot of attention in the last 30 years. Due to the popularity of Proof of Stake (PoS) blockchains in recent years, several BFT protocols have been deployed in the large scale of Internet environment. We analyze several popular BFT protocols such as Capser FFG/CBC-FBC for Ethereum 2.0 and GRANDPA for Polkadot. Our analysis shows that the security models for these BFT protocols are slightly different from the models commonly accepted in the academic literature. For example, we show that, if the adversary has a full control of the message delivery order in the underlying network, then none of the BFT protocols for Ethereum blockchain 2.0 and Polkadot blockchain could achieve liveness even in a synchronized network. Though it is not clear whether a practical adversary could\n actually\n control and re-order the underlying message delivery system (at Internet scale) to mount these attacks, it raises an interesting question on security model gaps between academic BFT protocols and deployed BFT protocols in the Internet scale. With these analysis, this article proposes a Casper CBC-FBC style binary BFT protocol and shows its security in the traditional academic security model with complete asynchronous networks. For partial synchronous networks, we propose a multi-value BFT protocol BDLS based on the seminal DLS protocol and show that it is one of the most efficient practical BFT protocols at large scale networks in the traditional academic BFT security model. The implementation of BDLS is available at\n https://github.com/yonggewang/bdls\n . Finally, we propose a multi-value BFT protocol XP for complete asynchronous networks and show its security in the traditional academic BFT security model.\n","PeriodicalId":377055,"journal":{"name":"Distributed Ledger Technol. Res. Pract.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Distributed Ledger Technol. Res. Pract.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3538227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The problem of Byzantine Fault Tolerance (BFT) has received a lot of attention in the last 30 years. Due to the popularity of Proof of Stake (PoS) blockchains in recent years, several BFT protocols have been deployed in the large scale of Internet environment. We analyze several popular BFT protocols such as Capser FFG/CBC-FBC for Ethereum 2.0 and GRANDPA for Polkadot. Our analysis shows that the security models for these BFT protocols are slightly different from the models commonly accepted in the academic literature. For example, we show that, if the adversary has a full control of the message delivery order in the underlying network, then none of the BFT protocols for Ethereum blockchain 2.0 and Polkadot blockchain could achieve liveness even in a synchronized network. Though it is not clear whether a practical adversary could actually control and re-order the underlying message delivery system (at Internet scale) to mount these attacks, it raises an interesting question on security model gaps between academic BFT protocols and deployed BFT protocols in the Internet scale. With these analysis, this article proposes a Casper CBC-FBC style binary BFT protocol and shows its security in the traditional academic security model with complete asynchronous networks. For partial synchronous networks, we propose a multi-value BFT protocol BDLS based on the seminal DLS protocol and show that it is one of the most efficient practical BFT protocols at large scale networks in the traditional academic BFT security model. The implementation of BDLS is available at https://github.com/yonggewang/bdls . Finally, we propose a multi-value BFT protocol XP for complete asynchronous networks and show its security in the traditional academic BFT security model.
重新审视分布式账本的拜占庭容错
近30年来,拜占庭容错(BFT)问题受到了广泛的关注。由于近年来权益证明(PoS)区块链的普及,一些BFT协议已经在大规模的互联网环境中部署。我们分析了几种流行的BFT协议,如以太坊2.0的Capser FFG/CBC-FBC和Polkadot的爷爷。我们的分析表明,这些BFT协议的安全模型与学术文献中普遍接受的模型略有不同。例如,我们表明,如果对手完全控制底层网络中的消息传递顺序,那么以太坊区块链2.0和Polkadot区块链的BFT协议即使在同步网络中也无法实现活动。虽然目前还不清楚一个实际的对手是否可以实际控制和重新排序底层消息传递系统(在互联网规模)来发动这些攻击,但它提出了一个有趣的问题,即学术BFT协议和部署BFT协议在互联网规模上的安全模型差距。在此基础上,本文提出了一种Casper CBC-FBC风格的二进制BFT协议,并在完全异步网络的传统学术安全模型下展示了其安全性。对于部分同步网络,我们在开创性的DLS协议的基础上提出了一种多值BFT协议BDLS,并表明它是传统学术BFT安全模型中大规模网络中最有效的实用BFT协议之一。BDLS的实现可从https://github.com/yonggewang/bdls获得。最后,我们提出了一种适用于完全异步网络的多值BFT协议XP,并在传统的学术BFT安全模型中展示了其安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信