Bigger, not Badder: Safely Scaling BFT Protocols

被引:0
|
作者
Chu, David C. Y. [1 ]
Liu, Chris [1 ]
Crooks, Natacha [1 ]
Hellerstein, Joseph M. [1 ]
Howard, Heidi [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Microsoft, Redmond, WA USA
关键词
D O I
10.1145/3642976.3653033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Byzantine Fault Tolerant (BFT) protocols provide powerful guarantees in the presence of arbitrary machine failures, yet they do not scale. The process of creating new, scalable BFT protocols requires expert analysis and is often error-prone. Recent work suggests that localized, rule-driven rewrites can be mechanically applied to scale existing (non-BFT) protocols, including Paxos. We modify these rewritesdecoupling and partitioning-so they can be safely applied to BFT protocols, and apply these rewrites to the critical path of PBFT, improving its throughput by 5x. We prove the correctness of the modified rewrites on any BFT protocol by formally modeling the arbitrary logic of a Byzantine node. We define the Borgesian simulator, a theoretical node that simulates a Byzantine node through randomness, and show that in any BFT protocol, the messages that a Borgesian simulator can generate before and after optimization is the same. Our initial results point the way towards an automatic optimizer for BFT protocols.
引用
收藏
页码:30 / 36
页数:7
相关论文
共 50 条
  • [41] Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEs
    Stathakopoulou, Chrysoula
    Ruesch, Signe
    Brandenburger, Marcus
    Vukolic, Marko
    2021 40TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2021), 2021, : 34 - 45
  • [42] Allometric scaling for therapeutic protocols in wildlife medicine
    Freitas, Gabrielle Coelho
    Carregaro, Adriano Bonfim
    CIENCIA RURAL, 2013, 43 (02): : 297 - 304
  • [43] Scaling Laws for Consensus Protocols Subject to Noise
    Jadbabaie, Ali
    Olshevsky, Alex
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (04) : 1389 - 1402
  • [44] Clinical evaluation of three different loudness scaling protocols
    Kiessling, J
    Pfreimer, C
    Dyrlund, O
    SCANDINAVIAN AUDIOLOGY, 1997, 26 (02): : 117 - 121
  • [45] Asymmetric scaling in large deviations for rare values bigger or smaller than the typical value
    Monthus, Cecile
    JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2019,
  • [46] Bigger Bipeds, Shorter Arms: Inter-Limb Scaling in Hominins and Theropod Dinosaurs
    Yegian, A. K.
    INTEGRATIVE AND COMPARATIVE BIOLOGY, 2019, 59 : E257 - E257
  • [47] Ordered Racing Protocols for Automatically Configuring Algorithms for Scaling Performance
    Styles, James
    Hoos, Holger
    GECCO'13: PROCEEDINGS OF THE 2013 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2013, : 551 - 558
  • [48] Entanglement Entropy Scaling Transition under Competing Monitoring Protocols
    Van Regemortel, Mathias
    Cian, Ze-Pei
    Seif, Alireza
    Dehghani, Hossein
    Hafezi, Mohammad
    PHYSICAL REVIEW LETTERS, 2021, 126 (12)
  • [49] Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks
    Gu, Wenjun
    Chellappan, Sriram
    Bai, Xiaole
    Wang, Honggang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (04) : 1370 - 1381
  • [50] Scaling of spatial reuse and saturation throughput in a class of MAC Protocols
    Ye, Fengji
    Yi, Su
    Sikdar, Biplab
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (10) : 3529 - 3533