Bigger, not Badder: Safely Scaling BFT Protocols

被引:0
|
作者
Chu, David C. Y. [1 ]
Liu, Chris [1 ]
Crooks, Natacha [1 ]
Hellerstein, Joseph M. [1 ]
Howard, Heidi [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Microsoft, Redmond, WA USA
关键词
D O I
10.1145/3642976.3653033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Byzantine Fault Tolerant (BFT) protocols provide powerful guarantees in the presence of arbitrary machine failures, yet they do not scale. The process of creating new, scalable BFT protocols requires expert analysis and is often error-prone. Recent work suggests that localized, rule-driven rewrites can be mechanically applied to scale existing (non-BFT) protocols, including Paxos. We modify these rewritesdecoupling and partitioning-so they can be safely applied to BFT protocols, and apply these rewrites to the critical path of PBFT, improving its throughput by 5x. We prove the correctness of the modified rewrites on any BFT protocol by formally modeling the arbitrary logic of a Byzantine node. We define the Borgesian simulator, a theoretical node that simulates a Byzantine node through randomness, and show that in any BFT protocol, the messages that a Borgesian simulator can generate before and after optimization is the same. Our initial results point the way towards an automatic optimizer for BFT protocols.
引用
收藏
页码:30 / 36
页数:7
相关论文
共 50 条
  • [21] Safely composing security protocols
    Cortier, Veronique
    Delaune, Stephanie
    FORMAL METHODS IN SYSTEM DESIGN, 2009, 34 (01) : 1 - 36
  • [22] Safely composing security protocols
    Véronique Cortier
    Stéphanie Delaune
    Formal Methods in System Design, 2009, 34 : 1 - 36
  • [23] Raising the AWAREness of BFT Protocols for Soaring Network Delays
    Nischwitz, Martin
    Esche, Marko
    Tschorsch, Florian
    PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, : 387 - 390
  • [24] Exploring Scalability of BFT Blockchain Protocols through Network Simulations
    Berger, Christian
    BEN Toumia, Sadok
    Reiser, Hans p.
    FORMAL ASPECTS OF COMPUTING, 2024, 36 (04)
  • [25] A Comparison of Message Exchange Patterns in BFT Protocols (Experience Report)
    Silva, Fabio
    Alonso, Ana
    Pereira, Jose
    Oliveira, Rui
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2020, 2020, 12135 : 104 - 120
  • [26] Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols
    Basu, Soumya
    Tomescu, Alin
    Abraham, Ittai
    Malkhi, Dahlia
    Reiter, Michael K.
    Sirer, Emin Gun
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2387 - 2402
  • [27] SAFELY SCALING UP AZIDE CHEMISTRY
    不详
    CHEMICAL & ENGINEERING NEWS, 2012, 90 (43) : 35 - 35
  • [28] Bernoulli Meets PBFT: Modeling BFT Protocols in the Presence of Dynamic Failures
    Nischwitz, Martin
    Esche, Marko
    Tschorsch, Florian
    PROCEEDINGS OF THE 2021 16TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2021, : 291 - 300
  • [29] BFT Protocols for Heterogeneous Resource Allocations in Distributed SDN Control Plane
    Sakic, Ermin
    Kellerer, Wolfgang
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [30] SCALING PIGEONS CHOICE OF FEEDS - BIGGER IS BETTER
    KILLEEN, PR
    CATE, H
    TRAN, T
    JOURNAL OF THE EXPERIMENTAL ANALYSIS OF BEHAVIOR, 1993, 60 (01) : 203 - 217