Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
91 tokens/sec
GPT-4o
12 tokens/sec
Gemini 2.5 Pro Pro
o3 Pro
5 tokens/sec
GPT-4.1 Pro
15 tokens/sec
DeepSeek R1 via Azure Pro
33 tokens/sec
Gemini 2.5 Flash Deprecated
12 tokens/sec
2000 character limit reached

Consensus in the Unknown-Participation Message-Adversary Model (2301.04817v2)

Published 12 Jan 2023 in cs.DC

Abstract: We propose a new distributed-computing model, inspired by permissionless distributed systems such as Bitcoin and Ethereum, that allows studying permissionless consensus in a mathematically regular setting. Like in the sleepy model of Pass and Shi, we consider a synchronous, round-by-round message-passing system in which the set of online processors changes each round. Unlike the sleepy model, the set of processors may be infinite. Moreover, processors never fail; instead, an adversary can temporarily or permanently impersonate some processors. Finally, processors have access to a strong form of message-authentication that authenticates not only the sender of a message but also the round in which the message was sent. Assuming that, each round, the adversary impersonates less than 1/2 of the online processors, we present two consensus algorithms. The first ensures deterministic safety and constant latency in expectation, assuming a probabilistic leader-election oracle. The second ensures deterministic safety and deterministic liveness assuming irrevocable impersonation and eventually-stabilizing participation. The model is unrealistic in full generality. However, if we assume finitely many processes and that the set of faulty processes remains constant, the model coincides with a practically-motivated model: the static version of the sleepy model.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (24)
  1. “A simple characterization of asynchronous computations” In Theoretical Computer Science 561, Part B, 2015 DOI: 10.1016/j.tcs.2014.07.022
  2. “Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability” In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018 DOI: 10.1145/3243734.3243848
  3. P. Berman, J.A. Garay and K.J. Perry “Towards optimal distributed consensus” In Proceedings of the 30th Annual Symposium on Foundations of Computer Science, 1989 DOI: 10.1109/SFCS.1989.63511
  4. “Verifiable Delay Functions” In Advances in Cryptology – CRYPTO 2018, Lecture Notes in Computer Science Cham: Springer International Publishing DOI: 10.1007/978-3-319-96884-1˙25
  5. “A Simple Algorithmically Reasoned Characterization of Wait-free Computation (Extended Abstract)” In Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997 DOI: 10.1145/259380.259439
  6. “Algorand: A secure and efficient distributed ledger” In Theoretical Computer Science 777, 2019 DOI: 10.1016/j.tcs.2019.02.001
  7. “No More Attacks on Proof-of-Stake Ethereum?” In arXiv preprint arXiv:2209.03255, 2022
  8. Phil Daian, Rafael Pass and Elaine Shi “Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake” In Financial Cryptography and Data Security, 2019 DOI: 10.1007/978-3-030-32101-7˙2
  9. “Authenticated Algorithms for Byzantine Agreement” In SIAM Journal on Computing 12, 1983 DOI: 10.1137/0212045
  10. Michael J. Fischer, Nancy A. Lynch and Michael S. Paterson “Impossibility of Distributed Consensus with One Faulty Process” In Journal of the ACM 32, 1985 DOI: 10.1145/3149.214121
  11. Eli Gafni “Round-by-round Fault Detectors (Extended Abstract): Unifying Synchrony and Asynchrony” In Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998 DOI: 10.1145/277697.277724
  12. “Synchrony/Asynchrony vs. Stationary/Mobile? The Latter is Superior…in Theory”, 2023 DOI: 10.48550/arXiv.2302.05520
  13. Vipul Goyal, Hanjun Li and Justin Raizes “Instant Block Confirmation in the Sleepy Model” In Financial Cryptography and Data Security, 2021 DOI: 10.1007/978-3-662-64331-0˙4
  14. “Permissionless Consensus”, 2023 DOI: 10.48550/arXiv.2304.14701
  15. Giuliano Losa “nano-o/dynamic-participation-supplemental: TLA+ specification and Isabelle/HOL theory” Zenodo, 2023 DOI: 10.5281/zenodo.8418165
  16. Dahlia Malkhi, Atsuki Momose and Ling Ren “Byzantine Consensus under Fully Fluctuating Participation” Report Number: 1448, 2022 URL: https://eprint.iacr.org/archive/2022/1448/20230910:162058
  17. Dahlia Malkhi, Atsuki Momose and Ling Ren “Towards Practical Sleepy BFT” Publication info: Published elsewhere. ACM CCS 2023, 2023 URL: https://eprint.iacr.org/2022/1448
  18. S. Micali, M. Rabin and S. Vadhan “Verifiable random functions” In 40th Annual Symposium on Foundations of Computer Science, 1999 DOI: 10.1109/SFFCS.1999.814584
  19. “Constant Latency in Sleepy Consensus” In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 DOI: 10.1145/3548606.3559347
  20. “The Sleepy Model of Consensus” In Advances in Cryptology – ASIACRYPT 2017, 2017 DOI: 10.1007/978-3-319-70697-9˙14
  21. Youer Pu, Lorenzo Alvisi and Ittay Eyal “Safe Permissionless Consensus” In 36th International Symposium on Distributed Computing (DISC 2022) 246, 2022 DOI: 10.4230/LIPIcs.DISC.2022.33
  22. “Gorilla: Safe Permissionless Byzantine Consensus” arXiv, 2023 DOI: 10.48550/arXiv.2308.04080
  23. “Time is not a healer” In Proceedings of the 6th Annual Symposium on Theoretical Aspects of Computer Science on STACS 89, 1989
  24. “Agreement in synchronous networks with ubiquitous faults” In Theoretical Computer Science 384, 2007 DOI: 10.1016/j.tcs.2007.04.036
Citations (5)

Summary

We haven't generated a summary for this paper yet.