skip to main content
10.1145/3548606.3559346acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT

Authors Info & Claims
Published:07 November 2022Publication History

ABSTRACT

An urgent demand of deploying BFT consensus (e.g., atomic broadcast) over the Internet is raised for implementing (permissioned) blockchain services. The deterministic synchronous protocols can be simple and fast in good network conditions, but are subject to denial-of-service (or even safety vulnerability) when synchrony assumption fails. Asynchronous protocols, on the contrary, are robust against the adversarial network, but are substantially more complicated and slower for the inherent use of randomness.

Facing the issues, optimistic asynchronous atomic broadcast (Kursawe-Shoup, 2002; Ramasamy-Cachin, 2005) was proposed to improve the normal-case performance of the slow asynchronous consensus. They run a deterministic fastlane if the network condition remains good, and can fall back to a fully asynchronous protocol via a pace-synchronization mechanism (analog to view-change with asynchronous securities) if the fastlane fails. Unfortunately, existing pace-synchronization directly uses a heavy tool of asynchronous multi-valued validated Byzantine agreement (MVBA). When such fallback frequently occurs in the fluctuating wide-area network setting, the benefits of adding fastlane can be eliminated.

We present Bolt-Dumbo Transformer (BDT), a generic framework for practical optimistic asynchronous atomic broadcast. At the core of BDT, we set forth a new fastlane abstraction that is simple and fast, while preparing honest parties to gracefully face potential fastlane failures caused by malicious leader or bad network. This enables a highly efficient pace-synchronization to handle fallback. The resulting design reduces a cumbersome MVBA to a variant of the conceptually simplest binary agreement only. Besides detailed security analyses, we also give concrete instantiations of our framework and implement them. Extensive experiments demonstrate that BDT can enjoy both the low latency of deterministic protocols (e.g., 2-chain version of HotStuff and the robustness of state-of-the-art asynchronous protocols in practice.

Skip Supplemental Material Section

Supplemental Material

CCS22-fp0103.mp4

mp4

14.2 MB

References

  1. Bug in ABA protocol's use of Common Coin. https://github.com/amiller/ HoneyBadgerBFT/issues/59Google ScholarGoogle Scholar
  2. Ittai Abraham, Naama Ben-David, and Sravya Yandamuri. 2022. Efficient and Adaptively Secure Asynchronous Binary Agreement via Binding Crusader Agreement. In Proc. PODC 2022. 381--391.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ittai Abraham, Danny Dolev, and Joseph Y Halpern. An almost-surely terminating polynomial protocol for asynchronous byzantine agreement with optimal resilience. In Proc. PODC 2008. 405--414.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, and Alin Tomescu. 2021. Reaching consensus for asynchronous distributed key generation. In Proc. PODC 2021. 363--373.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Maofan Yin. 2020. Sync hotstuff: Simple and practical synchronous state machine replication. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 106--118.Google ScholarGoogle ScholarCross RefCross Ref
  6. Ittai Abraham, Dahlia Malkhi, and Alexander Spiegelman. Asymptotically Optimal Validated Asynchronous Byzantine Agreement. In Proc. PODC 2019. 337--346.Google ScholarGoogle Scholar
  7. Ittai Abraham, Kartik Nayak, Ling Ren, and Zhuolun Xiang. Good-Case Latency of Byzantine Broadcast: A Complete Categorization. In Proc. PODC 2021.Google ScholarGoogle Scholar
  8. Yair Amir, Brian Coan, Jonathan Kirsch, and John Lane. 2010. Prime: Byzantine replication under attack. IEEE transactions on dependable and secure computing, Vol. 8, 4 (2010), 564--577.Google ScholarGoogle Scholar
  9. Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru, and Sara Tucci-Piergiovanni. Correctness of tendermint-core blockchains. In Proc. OPODIS 2019.Google ScholarGoogle Scholar
  10. Hagit Attiya and Jennifer Welch. 2004. Distributed computing: fundamentals, simulations, and advanced topics. Vol. 19. John Wiley & Sons.Google ScholarGoogle Scholar
  11. Pierre-Louis Aublin, Rachid Guerraoui, Nikola Kneƃević, Vivien Quéma, and Marko Vukolić. 2015. The next 700 BFT protocols. ACM Transactions on Computer Systems (TOCS), Vol. 32, 4 (2015), 1--45.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Pierre-Louis Aublin, Sonia Ben Mokhtar, and Vivien Quéma. 2013. Rbft: Redundant byzantine fault tolerance. In Proc. ICDCS 2013. 297--306.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Michael Ben-Or. Another advantage of free choice (Extended Abstract) Completely asynchronous agreement protocols. In Proc. PODC 1983. 27--30.Google ScholarGoogle Scholar
  14. Michael Ben-Or and Ran El-Yaniv. 2003. Resilient-optimal interactive consistency in constant time. Distributed Computing, Vol. 16, 4 (2003), 249--262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Michael Ben-Or, Boaz Kelmer, and Tal Rabin. Asynchronous secure computations with optimal resilience. In Proc. PODC 1994. 183--192.Google ScholarGoogle Scholar
  16. Alysson Bessani, Jo ao Sousa, and Eduardo EP Alchieri. 2014. State machine replication for the masses with BFT-SMaRt. In Proc. DSN 2014. 355--362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Erica Blum, Jonathan Katz, and Julian Loss. Synchronous consensus with optimal asynchronous fallback guarantees. In Proc. TCC 2019. 131--150.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Erica Blum, Jonathan Katz, and Julian Loss. 2021. Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 547--572.Google ScholarGoogle Scholar
  19. Erica Blum, Chen-Da Liu-Zhang, and Julian Loss. 2020. Always have a backup plan: fully secure synchronous MPC with asynchronous fallback. In Annual International Cryptology Conference. Springer, 707--731.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Alexandra Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In Proc. PKC 2003. 31--46.Google ScholarGoogle ScholarCross RefCross Ref
  21. Gabriel Bracha. 1987. Asynchronous Byzantine agreement protocols. Information and Computation, Vol. 75, 2 (1987), 130--143.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Vitalik Buterin et al. 2014. A next-generation smart contract and decentralized application platform. white paper, Vol. 3, 37 (2014).Google ScholarGoogle Scholar
  23. Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, and Reto Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. In Proc. CCS 2002. 88--97.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Christian Cachin, Klaus Kursawe, Frank Petzold, and Victor Shoup. Secure and efficient asynchronous broadcast protocols. In Proc. CRYPTO 2001. 524--541.Google ScholarGoogle ScholarCross RefCross Ref
  25. Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography. In Proc. PODC 2020. 123--132.Google ScholarGoogle Scholar
  26. Christian Cachin and Stefano Tessaro. Asynchronous verifiable information dispersal. In Proc. SRDS 2005. 191--201.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Christian Cachin and Marko Vukolic. Blockchain Consensus Protocols in the Wild (Keynote Talk). In Proc. DISC 2017.Google ScholarGoogle Scholar
  28. Ran Canetti and Tal Rabin. Fast asynchronous Byzantine agreement with optimal resilience. In Proc. STOC 1993. 42--51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Miguel Castro and Barbara Liskov. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), Vol. 20, 4 (2002), 398--461.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Miguel Castro, Barbara Liskov, et al. Practical Byzantine fault tolerance. In Proc. OSDI 1999. 173--186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Benjamin Y Chan and Elaine Shi. Streamlet: Textbook streamlined blockchains. In Proc. AFT 2020. 1--11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Allen Clement, Edmund L Wong, Lorenzo Alvisi, Michael Dahlin, and Mirco Marchetti. Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults.. In Proc. NSDI 2009, Vol. 9. 153--168.Google ScholarGoogle Scholar
  33. Miguel Correia, Nuno Ferreira Neves, and Paulo Veríssimo. 2006. From consensus to atomic broadcast: Time-free Byzantine-resistant protocols without signatures. Comput. J., Vol. 49, 1 (2006), 82--96.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Tyler Crain. 2020. Two More Algorithms for Randomized Signature-Free Asynchronous Binary Byzantine Consensus with t<n/3 and O(n2) Messages and O(1) Round Expected Termination. arXiv preprint arXiv:2002.08765 (2020).Google ScholarGoogle Scholar
  35. George Danezis, Lefteris Kokoris-Kogias, Alberto Sonnino, and Alexander Spiegelman. 2022. Narwhal and Tusk: a DAG-based mempool and efficient BFT consensus. In Proc. EuroSys 2022. 34--50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Sourav Das, Zhuolun Xiang, and Ling Ren. 2021. Asynchronous data dissemination and its applications. In Proc. CCS 2021. 2705--2721.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, and Ling Ren. 2022. Practical Asynchronous Distributed Key Generation. 2022 IEEE Symposium on Security and Privacy (SP). 2518--2534.Google ScholarGoogle Scholar
  38. Sisi Duan, Michael K Reiter, and Haibin Zhang. BEAT: Asynchronous BFT made practical. In Proc. CCS 2018. 2028--2041.Google ScholarGoogle Scholar
  39. Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. 1988. Consensus in the presence of partial synchrony. JACM, Vol. 35, 2 (1988), 288--323.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Michael J Fischer, Nancy A Lynch, and Michael S Paterson. 1985. Impossibility of Distributed Consensus with One Faulty Process. Journal of the Assccktion for Computing Machinery, Vol. 32, 2 (1985), 374--382.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Matthias Fitzi and Juan A Garay. 2003. Efficient player-optimal protocols for strong and differential consensus. In Proceedings of the twenty-second annual symposium on Principles of distributed computing. 211--220.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency. In Proc. CCS 2022.Google ScholarGoogle Scholar
  43. Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2022. Efficient Asynchronous Byzantine Agreement without Private Setups. In Proc. ICDCS 2022.Google ScholarGoogle ScholarCross RefCross Ref
  44. Rati Gelashvili, Lefteris Kokoris-Kogias, Alberto Sonnino, Alexander Spiegelman, and Zhuolun Xiang. 2021a. Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback. arXiv preprint arXiv:2106.10362 (2021).Google ScholarGoogle Scholar
  45. Rati Gelashvili, Lefteris Kokoris-Kogias, Alexander Spiegelman, and Zhuolun Xiang. 2021b. Be Prepared When Network Goes Bad: An Asynchronous View-Change Protocol. arXiv preprint arXiv:2103.03181 (2021).Google ScholarGoogle Scholar
  46. Rosario Gennaro, Stanisław Jarecki, Hugo Krawczyk, and Tal Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Proc. EUROCRYPT 1999. 295--310.Google ScholarGoogle ScholarCross RefCross Ref
  47. Rachid Guerraoui, Nikola Knevz ević, Vivien Quéma, and Marko Vukolić. 2010. The next 700 BFT protocols. In Proc. EuroSys 2010. 363--376.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael Reiter, Dragos-Adrian Seredinschi, Orr Tamir, and Alin Tomescu. SBFT: a Scalable and Decentralized Trust Infrastructure. In Proc. DSN 2019. 568--580.Google ScholarGoogle Scholar
  49. Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2022. Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice. In The 29th Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle ScholarCross RefCross Ref
  50. Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. Dumbo: Faster asynchronous bft protocols. In Proc. CCS 2020. 803--818.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Aniket Kate and Ian Goldberg. Distributed key generation for the internet. In Proc. ICDCS 2009. 119--128.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Idit Keidar, Eleftherios Kokoris-Kogias, Oded Naor, and Alexander Spiegelman. 2021. All you need is dag. In Proc. PODC 2021. 165--175.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Eleftherios Kokoris Kogias, Dahlia Malkhi, and Alexander Spiegelman. Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.. In Proc. CCS 2020. 1751--1767.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Klaus Kursawe and Victor Shoup. first announced in 2002. Optimistic asynchronous atomic broadcast. In Proc. ICALP 2005. 204--215.Google ScholarGoogle Scholar
  55. Julian Loss and Tal Moran. 2018. Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds. IACR Cryptol. ePrint Arch., Vol. 2018 (2018), 235.Google ScholarGoogle Scholar
  56. Yuan Lu, Zhenliang Lu, and Qiang Tang. 2021. Bolt-dumbo transformer: Asynchronous consensus as fast as the pipelined bft. arXiv preprint arXiv:2103.09425 (2021).Google ScholarGoogle Scholar
  57. Yuan Lu, Zhenliang Lu, Qiang Tang, and Guiling Wang. Dumbo-mvba: Optimal multi-valued validated asynchronous byzantine agreement, revisited. In Proc. PODC 2020. 129--138.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. The honey badger of BFT protocols. In Proc. CCS 2016. 31--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Atsuki Momose, Jason Paul Cruz, and Yuichi Kaji. 2020. Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience. IACR Cryptol. ePrint Arch., Vol. 2020 (2020), 406.Google ScholarGoogle Scholar
  60. Atsuki Momose and Ling Ren. Multi-Threshold Byzantine Fault Tolerance. In Proc. CCS 2021.Google ScholarGoogle Scholar
  61. Achour Mostefaoui, Hamouma Moumen, and Michel Raynal. Signature-free asynchronous byzantine consensus with t<n/3 and O(n2) messages. In Proc. PODC 2014. 2--9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google ScholarGoogle Scholar
  63. Rafael Pass and Elaine Shi. 2017. The sleepy model of consensus. In Advances in Cryptology -- ASIACRYPT 2017. 380--409.Google ScholarGoogle ScholarCross RefCross Ref
  64. Arpita Patra. Error-free multi-valued broadcast and Byzantine agreement with optimal communication complexity. In Proc. OPODIS 2011. 34--49.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Arpita Patra, Ashish Choudhary, and Chandrasekharan Pandu Rangan. Simple and efficient asynchronous byzantine agreement with optimal resilience. In Proc. PODC 2009. 92--101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Torben Pryds Pedersen. A Threshold Cryptosystem without a Trusted Party. Proc. EUROCRYPT 1991. 522--526.Google ScholarGoogle ScholarCross RefCross Ref
  67. R. Pass, and E. Shi. 2018. Thunderella: Blockchains with optimistic instant confirmation. In Proc. EUROCRYPT 2019. 3--33.Google ScholarGoogle Scholar
  68. Michael O Rabin. 1983. Randomized byzantine generals. In 24th Annual Symposium on Foundations of Computer Science. IEEE, 403--409.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. HariGovind V Ramasamy and Christian Cachin. Parsimonious asynchronous byzantine-fault-tolerant atomic broadcast. In Proc. OPODIS 2005. 88--102.Google ScholarGoogle Scholar
  70. Muhammad Saad, Afsah Anwar, Srivatsan Ravi, and David Mohaisen. 2021. Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality. In Proc. CCS 2021. 988--1005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Nibesh Shrestha, Ittai Abraham, Ling Ren, and Kartik Nayak. On the Optimality of Optimistic Responsiveness. In Proc. CCS 2020. 839--857.Google ScholarGoogle Scholar
  72. Alexander Spiegelman. 2021. In Search for an Optimal Authenticated Byzantine Agreement. In Proc. DISC 2021.Google ScholarGoogle Scholar
  73. Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, and Lau Cheuk Lung. Spin one's wheels? Byzantine fault tolerance with a spinning primary. In Proc. SRDS 2009. 135--144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Lei Yang, Seo Jin Park, Mohammad Alizadeh, Sreeram Kannan, and David Tse. DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks. In Proc. NSDI 2022.Google ScholarGoogle Scholar
  75. Maofan Yin, Dahlia Malkhi, Michael K Reiter, Guy Golan Gueta, and Ittai Abraham. 2019. Hotstuff: Bft consensus with linearity and responsiveness. In Proc. PODC 2019. 347--356.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Haibing Zhang and Sisi Duan. PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement. In Proc. CCS 2022.Google ScholarGoogle Scholar

Index Terms

  1. Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
        November 2022
        3598 pages
        ISBN:9781450394505
        DOI:10.1145/3548606

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 November 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader