Consensus in the Unknown-Participation Message-Adversary Model (2301.04817v2)
Abstract: We propose a new distributed-computing model, inspired by permissionless distributed systems such as Bitcoin and Ethereum, that allows studying permissionless consensus in a mathematically regular setting. Like in the sleepy model of Pass and Shi, we consider a synchronous, round-by-round message-passing system in which the set of online processors changes each round. Unlike the sleepy model, the set of processors may be infinite. Moreover, processors never fail; instead, an adversary can temporarily or permanently impersonate some processors. Finally, processors have access to a strong form of message-authentication that authenticates not only the sender of a message but also the round in which the message was sent. Assuming that, each round, the adversary impersonates less than 1/2 of the online processors, we present two consensus algorithms. The first ensures deterministic safety and constant latency in expectation, assuming a probabilistic leader-election oracle. The second ensures deterministic safety and deterministic liveness assuming irrevocable impersonation and eventually-stabilizing participation. The model is unrealistic in full generality. However, if we assume finitely many processes and that the set of faulty processes remains constant, the model coincides with a practically-motivated model: the static version of the sleepy model.
- “A simple characterization of asynchronous computations” In Theoretical Computer Science 561, Part B, 2015 DOI: 10.1016/j.tcs.2014.07.022
- “Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability” In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018 DOI: 10.1145/3243734.3243848
- P. Berman, J.A. Garay and K.J. Perry “Towards optimal distributed consensus” In Proceedings of the 30th Annual Symposium on Foundations of Computer Science, 1989 DOI: 10.1109/SFCS.1989.63511
- “Verifiable Delay Functions” In Advances in Cryptology – CRYPTO 2018, Lecture Notes in Computer Science Cham: Springer International Publishing DOI: 10.1007/978-3-319-96884-1˙25
- “A Simple Algorithmically Reasoned Characterization of Wait-free Computation (Extended Abstract)” In Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997 DOI: 10.1145/259380.259439
- “Algorand: A secure and efficient distributed ledger” In Theoretical Computer Science 777, 2019 DOI: 10.1016/j.tcs.2019.02.001
- “No More Attacks on Proof-of-Stake Ethereum?” In arXiv preprint arXiv:2209.03255, 2022
- Phil Daian, Rafael Pass and Elaine Shi “Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake” In Financial Cryptography and Data Security, 2019 DOI: 10.1007/978-3-030-32101-7˙2
- “Authenticated Algorithms for Byzantine Agreement” In SIAM Journal on Computing 12, 1983 DOI: 10.1137/0212045
- Michael J. Fischer, Nancy A. Lynch and Michael S. Paterson “Impossibility of Distributed Consensus with One Faulty Process” In Journal of the ACM 32, 1985 DOI: 10.1145/3149.214121
- Eli Gafni “Round-by-round Fault Detectors (Extended Abstract): Unifying Synchrony and Asynchrony” In Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998 DOI: 10.1145/277697.277724
- “Synchrony/Asynchrony vs. Stationary/Mobile? The Latter is Superior…in Theory”, 2023 DOI: 10.48550/arXiv.2302.05520
- Vipul Goyal, Hanjun Li and Justin Raizes “Instant Block Confirmation in the Sleepy Model” In Financial Cryptography and Data Security, 2021 DOI: 10.1007/978-3-662-64331-0˙4
- “Permissionless Consensus”, 2023 DOI: 10.48550/arXiv.2304.14701
- Giuliano Losa “nano-o/dynamic-participation-supplemental: TLA+ specification and Isabelle/HOL theory” Zenodo, 2023 DOI: 10.5281/zenodo.8418165
- Dahlia Malkhi, Atsuki Momose and Ling Ren “Byzantine Consensus under Fully Fluctuating Participation” Report Number: 1448, 2022 URL: https://eprint.iacr.org/archive/2022/1448/20230910:162058
- Dahlia Malkhi, Atsuki Momose and Ling Ren “Towards Practical Sleepy BFT” Publication info: Published elsewhere. ACM CCS 2023, 2023 URL: https://eprint.iacr.org/2022/1448
- S. Micali, M. Rabin and S. Vadhan “Verifiable random functions” In 40th Annual Symposium on Foundations of Computer Science, 1999 DOI: 10.1109/SFFCS.1999.814584
- “Constant Latency in Sleepy Consensus” In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022 DOI: 10.1145/3548606.3559347
- “The Sleepy Model of Consensus” In Advances in Cryptology – ASIACRYPT 2017, 2017 DOI: 10.1007/978-3-319-70697-9˙14
- Youer Pu, Lorenzo Alvisi and Ittay Eyal “Safe Permissionless Consensus” In 36th International Symposium on Distributed Computing (DISC 2022) 246, 2022 DOI: 10.4230/LIPIcs.DISC.2022.33
- “Gorilla: Safe Permissionless Byzantine Consensus” arXiv, 2023 DOI: 10.48550/arXiv.2308.04080
- “Time is not a healer” In Proceedings of the 6th Annual Symposium on Theoretical Aspects of Computer Science on STACS 89, 1989
- “Agreement in synchronous networks with ubiquitous faults” In Theoretical Computer Science 384, 2007 DOI: 10.1016/j.tcs.2007.04.036