Bigger, not Badder: Safely Scaling BFT Protocols

被引:0
|
作者
Chu, David C. Y. [1 ]
Liu, Chris [1 ]
Crooks, Natacha [1 ]
Hellerstein, Joseph M. [1 ]
Howard, Heidi [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Microsoft, Redmond, WA USA
关键词
D O I
10.1145/3642976.3653033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Byzantine Fault Tolerant (BFT) protocols provide powerful guarantees in the presence of arbitrary machine failures, yet they do not scale. The process of creating new, scalable BFT protocols requires expert analysis and is often error-prone. Recent work suggests that localized, rule-driven rewrites can be mechanically applied to scale existing (non-BFT) protocols, including Paxos. We modify these rewritesdecoupling and partitioning-so they can be safely applied to BFT protocols, and apply these rewrites to the critical path of PBFT, improving its throughput by 5x. We prove the correctness of the modified rewrites on any BFT protocol by formally modeling the arbitrary logic of a Byzantine node. We define the Borgesian simulator, a theoretical node that simulates a Byzantine node through randomness, and show that in any BFT protocol, the messages that a Borgesian simulator can generate before and after optimization is the same. Our initial results point the way towards an automatic optimizer for BFT protocols.
引用
收藏
页码:30 / 36
页数:7
相关论文
共 50 条
  • [11] An Experimental Evaluation of BFT Protocols for Blockchains
    Jalalzai, Mohammad M.
    Richard, Golden, III
    Busch, Costas
    BLOCKCHAIN - ICBC 2019, 2019, 11521 : 34 - 48
  • [12] Dumbo: Faster Asynchronous BFT Protocols
    Guo, Bingyong
    Lu, Zhenliang
    Tang, Qiang
    Xu, Jing
    Zhang, Zhenfeng
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 803 - 818
  • [13] Making BFT Protocols Really Adaptive
    Bahsoun, Jean-Paul
    Guerraoui, Rachid
    Shoker, Ali
    2015 IEEE 29TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), 2015, : 904 - 913
  • [14] BFTGym: An Interactive Playground for BFT Protocols
    Qin, Haoyun
    Wu, Chenyuan
    Amiri, Mohammad Javad
    Marcus, Ryan
    Loo, Boon Thau
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2024, 17 (12): : 4261 - 4264
  • [15] BFT-Bench: Towards a Practical Evaluation of Robustness and Effectiveness of BFT Protocols
    Gupta, Divya
    Perronne, Lucas
    Bouchenak, Sara
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2016, 2016, 9687 : 115 - 128
  • [16] Towards Efficient and Robust BFT Protocols with ER-BFT (Short Paper)
    Perronne, Lucas
    Bouchenak, Sara
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2016, 2016, 10083 : 298 - 303
  • [17] DO SMALL MENU COSTS CAUSE BIGGER AND BADDER BUSINESS CYCLES IN MONOPOLISTIC MACROECONOMIES
    ROWE, N
    JOURNAL OF MACROECONOMICS, 1989, 11 (01) : 25 - 48
  • [18] BFT in Blockchains: From Protocols to Use Cases
    Wang, Xin
    Duan, Sisi
    Clavin, James
    Zhang, Haibin
    ACM COMPUTING SURVEYS, 2022, 54 (10S)
  • [19] BFT-Bench: A Framework to Evaluate BFT Protocols [Work-In-Progress Paper]
    Gupta, Divya
    Perronne, Lucas
    Bouchenak, Sara
    PROCEEDINGS OF THE 2016 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE'16), 2016, : 109 - 112
  • [20] Safely composing security protocols
    Cortier, Veronique
    Delaitre, Jeremie
    Delaune, Stephanie
    FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 352 - 363