Skip to main content

Showing 1–29 of 29 results for author: Malkhi, D

  1. arXiv:2407.00030  [pdf, other

    cs.DC cs.PF

    On Orchestrating Parallel Broadcasts for Distributed Ledgers

    Authors: Peiyao Sheng, Chenyuan Wu, Dahlia Malkhi, Michael K. Reiter, Chrysoula Stathakopoulou, Michael Wei, Maofan Yin

    Abstract: This paper introduces and develops the concept of ``ticketing'', through which atomic broadcasts are orchestrated by nodes in a distributed system. The paper studies different ticketing regimes that allow parallelism, yet prevent slow nodes from hampering overall progress. It introduces a hybrid scheme which combines managed and unmanaged ticketing regimes, striking a balance between adaptivity an… ▽ More

    Submitted 17 May, 2024; originally announced July 2024.

  2. arXiv:2311.08091  [pdf, ps, other

    cs.DC

    Lumiere: Making Optimal BFT for Partial Synchrony Practical

    Authors: Andrew Lewis-Pye, Dahlia Malkhi, Oded Naor, Kartik Nayak

    Abstract: The view synchronization problem lies at the heart of many Byzantine Fault Tolerant (BFT) State Machine Replication (SMR) protocols in the partial synchrony model, since these protocols are usually based on views. Liveness is guaranteed if honest processors spend a sufficiently long time in the same view during periods of synchrony, and if the leader of the view is honest. Ensuring that these cond… ▽ More

    Submitted 16 March, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

  3. arXiv:2310.06335  [pdf, other

    cs.DC

    BBCA-CHAIN: Low Latency, High Throughput BFT Consensus on a DAG

    Authors: Dahlia Malkhi, Chrysoula Stathakopoulou, Maofan Yin

    Abstract: This paper presents a partially synchronous BFT consensus protocol powered by BBCA, a lightly modified Byzantine Consistent Broadcast (BCB) primitive. BBCA provides a Complete-Adopt semantic through an added probing interface to allow either aborting the broadcast by correct nodes or exclusively, adopting the message consistently in case of a potential delivery. It does not introduce any extra typ… ▽ More

    Submitted 24 May, 2024; v1 submitted 10 October, 2023; originally announced October 2023.

  4. arXiv:2306.14757  [pdf, other

    cs.DC

    BBCA-LEDGER: High Throughput Consensus meets Low Latency

    Authors: Chrysoula Stathakopoulou, Michael Wei, Maofan Yin, Hongbo Zhang, Dahlia Malkhi

    Abstract: This paper presents BBCA-LEDGER, a Byzantine log replication technology for partially synchronous networks enabling blocks to be broadcast in parallel, such that each broadcast is finalized independently and instantaneously into an individual slot in the log. Every finalized broadcast is eventually committed to the total ordering, so that all network bandwidth has utility in disseminating blocks.… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

  5. arXiv:2305.13556  [pdf, other

    cs.DC

    Lessons from HotStuff

    Authors: Dahlia Malkhi, Maofan Yin

    Abstract: This article will take you on a journey to the core of blockchains, their Byzantine consensus engine, where HotStuff emerged as a new algorithmic foundation for the classical Byzantine generals consensus problem. The first part of the article underscores the theoretical advances HotStuff enabled, including several models in which HotStuff-based solutions closed problems which were opened for dec… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

  6. arXiv:2208.00940  [pdf, other

    cs.CR cs.DC

    Maximal Extractable Value (MEV) Protection on a DAG

    Authors: Dahlia Malkhi, Pawel Szalachowski

    Abstract: Many cryptocurrency platforms are vulnerable to Maximal Extractable Value (MEV) attacks, where a malicious consensus leader can inject transactions or change the order of user transactions to maximize its profit. A promising line of research in MEV mitigation is to enhance the Byzantine fault tolerance (BFT) consensus core of blockchains by new functionalities, like hiding transaction contents, su… ▽ More

    Submitted 23 December, 2022; v1 submitted 1 August, 2022; originally announced August 2022.

  7. arXiv:2203.06871  [pdf, other

    cs.DC cs.PF

    Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing

    Authors: Rati Gelashvili, Alexander Spiegelman, Zhuolun Xiang, George Danezis, Zekun Li, Dahlia Malkhi, Yu Xia, Runtian Zhou

    Abstract: Block-STM is a parallel execution engine for smart contracts, built around the principles of Software Transactional Memory. Transactions are grouped in blocks, and every execution of the block must yield the same deterministic outcome. Block-STM further enforces that the outcome is consistent with executing transactions according to a preset order, leveraging this order to dynamically detect depen… ▽ More

    Submitted 25 August, 2022; v1 submitted 14 March, 2022; originally announced March 2022.

  8. arXiv:2110.00960  [pdf, other

    cs.DC

    Be Aware of Your Leaders

    Authors: Shir Cohen, Rati Gelashvili, Lefteris Kokoris Kogias, Zekun Li, Dahlia Malkhi, Alberto Sonnino, Alexander Spiegelman

    Abstract: Advances in blockchains have influenced the State-Machine-Replication (SMR) world and many state-of-the-art blockchain-SMR solutions are based on two pillars: Chaining and Leader-rotation. A predetermined round-robin mechanism used for Leader-rotation, however, has an undesirable behavior: crashed parties become designated leaders infinitely often, slowing down overall system performance. In this… ▽ More

    Submitted 3 October, 2021; originally announced October 2021.

  9. arXiv:2101.03715  [pdf, ps, other

    cs.DC cs.CR

    Strengthened Fault Tolerance in Byzantine Fault Tolerant Replication

    Authors: Zhuolun Xiang, Dahlia Malkhi, Kartik Nayak, Ling Ren

    Abstract: Byzantine fault tolerant (BFT) state machine replication (SMR) is an important building block for constructing permissioned blockchain systems. In contrast to Nakamoto Consensus where any block obtains higher assurance as buried deeper in the blockchain, in BFT SMR, any committed block is secure has a fixed resilience threshold. In this paper, we investigate strengthened fault tolerance (SFT) in B… ▽ More

    Submitted 11 January, 2021; originally announced January 2021.

  10. arXiv:2004.10617  [pdf, other

    cs.CR

    Twins: BFT Systems Made Robust

    Authors: Shehar Bano, Alberto Sonnino, Andrey Chursin, Dmitri Perelman, Zekun Li, Avery Ching, Dahlia Malkhi

    Abstract: This paper presents Twins, an automated unit test generator of Byzantine attacks. Twins implements three types of Byzantine behaviors: (i) leader equivocation, (ii) double voting, and (iii) losing internal state such as forgetting 'locks' guarding voted values. To emulate interesting attacks by a Byzantine node, it instantiates twin copies of the node instead of one, giving both twins the same ide… ▽ More

    Submitted 14 January, 2022; v1 submitted 22 April, 2020; originally announced April 2020.

  11. arXiv:1909.11590  [pdf, other

    cs.DC

    Rainblock: Faster Transaction Processing in Public Blockchains

    Authors: Soujanya Ponnapalli, Aashaka Shah, Amy Tai, Souvik Banerjee, Vijay Chidambaram, Dahlia Malkhi, Michael Wei

    Abstract: Public blockchains like Ethereum use Merkle trees to verify transactions received from untrusted servers before applying them to the blockchain. We empirically show that the low throughput of such blockchains is due to the I/O bottleneck associated with using Merkle trees for processing transactions. We present RAINBLOCK, a new architecture for public blockchains that increases throughput without… ▽ More

    Submitted 15 October, 2020; v1 submitted 25 September, 2019; originally announced September 2019.

  12. arXiv:1909.05204  [pdf, ps, other

    cs.DC

    Cogsworth: Byzantine View Synchronization

    Authors: Oded Naor, Mathieu Baudet, Dahlia Malkhi, Alexander Spiegelman

    Abstract: Most methods for Byzantine fault tolerance (BFT) in the partial synchrony setting divide the local state of the nodes into views, and the transition from one view to the next dictates a leader change. In order to provide liveness, all honest nodes need to stay in the same view for a sufficiently long time. This requires \emph{view synchronization}, a requisite of BFT that we extract and formally d… ▽ More

    Submitted 6 February, 2020; v1 submitted 11 September, 2019; originally announced September 2019.

  13. arXiv:1906.03819  [pdf, other

    cs.DC

    FairLedger: A Fair Blockchain Protocol for Financial Institutions

    Authors: Kfir Lev-Ari, Alexander Spiegelman, Idit Keidar, Dahlia Malkhi

    Abstract: Financial institutions are currently looking into technologies for permissioned blockchains. A major effort in this direction is Hyperledger, an open source project hosted by the Linux Foundation and backed by a consortium of over a hundred companies. A key component in permissioned blockchain protocols is a byzantine fault tolerant (BFT) consensus engine that orders transactions. However, current… ▽ More

    Submitted 10 June, 2019; originally announced June 2019.

  14. arXiv:1904.10067  [pdf, other

    cs.CR cs.DC

    Flexible Byzantine Fault Tolerance

    Authors: Dahlia Malkhi, Kartik Nayak, Ling Ren

    Abstract: This paper introduces Flexible BFT, a new approach for BFT consensus solution design revolving around two pillars, stronger resilience and diversity. The first pillar, stronger resilience, involves a new fault model called alive-but-corrupt faults. Alive-but-corrupt replicas may arbitrarily deviate from the protocol in an attempt to break safety of the protocol. However, if they cannot break safet… ▽ More

    Submitted 30 May, 2019; v1 submitted 22 April, 2019; originally announced April 2019.

  15. arXiv:1811.01332  [pdf, ps, other

    cs.DC

    Validated Asynchronous Byzantine Agreement with Optimal Resilience and Asymptotically Optimal Time and Word Communication

    Authors: Ittai Abraham, Dahlia Malkhi, Alexander Spiegelman

    Abstract: We provide a new protocol for Validated Asynchronous Byzantine Agreement. Validated (multi-valued) Asynchronous Byzantine Agreement is a key building block in constructing Atomic Broadcast and fault-tolerant state machine replication in the asynchronous setting. Our protocol can withstand the optimal number $f<n/3$ of Byzantine failures and reaches agreement in the asymptotically optimal expected… ▽ More

    Submitted 4 November, 2018; originally announced November 2018.

  16. arXiv:1807.03720  [pdf, other

    cs.CR

    sAVSS: Scalable Asynchronous Verifiable Secret Sharing in BFT Protocols

    Authors: Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer

    Abstract: This paper introduces a new way to incorporate verifiable secret sharing (VSS) schemes into Byzantine Fault Tolerance (BFT) protocols. This technique extends the threshold guarantee of classical Byzantine Fault Tolerant algorithms to include privacy as well. This provides applications with a powerful primitive: a threshold trusted third party, which simplifies many difficult problems such as a fai… ▽ More

    Submitted 21 December, 2018; v1 submitted 10 July, 2018; originally announced July 2018.

  17. arXiv:1804.01626  [pdf, other

    cs.DC

    SBFT: a Scalable and Decentralized Trust Infrastructure

    Authors: Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu

    Abstract: SBFT is a state of the art Byzantine fault tolerant permissioned blockchain system that addresses the challenges of scalability, decentralization and world-scale geo-replication. SBFTis optimized for decentralization and can easily handle more than 200 active replicas in a real world-scale deployment. We evaluate \sysname in a world-scale geo-replicated deployment with 209 replicas withstanding f=… ▽ More

    Submitted 2 January, 2019; v1 submitted 4 April, 2018; originally announced April 2018.

  18. arXiv:1803.05069  [pdf, other

    cs.DC

    HotStuff: BFT Consensus in the Lens of Blockchain

    Authors: Maofan Yin, Dahlia Malkhi, Michael K. Reiter, Guy Golan Gueta, Ittai Abraham

    Abstract: We present HotStuff, a leader-based Byzantine fault-tolerant replication protocol for the partially synchronous model. Once network communication becomes synchronous, HotStuff enables a correct leader to drive the protocol to consensus at the pace of actual (vs. maximum) network delay--a property called responsiveness--and with communication complexity that is linear in the number of replicas. To… ▽ More

    Submitted 23 July, 2019; v1 submitted 13 March, 2018; originally announced March 2018.

    Comments: a shorter version of this paper has been published in PODC'19, which does not include interpretation of other protocols using the framework, system evaluation or additional proofs in appendices

  19. arXiv:1803.03620  [pdf, other

    cs.DC

    Stable and Consistent Membership at Scale with Rapid

    Authors: Lalith Suresh, Dahlia Malkhi, Parikshit Gopalan, Ivan Porto Carreiro, Zeeshan Lokhandwala

    Abstract: We present the design and evaluation of Rapid, a distributed membership service. At Rapid's core is a scheme for multi-process cut detection (CD) that revolves around two key insights: (i) it suspects a failure of a process only after alerts arrive from multiple sources, and (ii) when a group of processes experience problems, it detects failures of the entire group, rather than conclude about each… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

    Comments: 15 pages

  20. arXiv:1801.10022  [pdf, ps, other

    cs.DC

    Revisiting Fast Practical Byzantine Fault Tolerance: Thelma, Velma, and Zelma

    Authors: Ittai Abraham, Guy Gueta, Dahlia Malkhi, Jean-Philippe Martin

    Abstract: In a previous note (arXiv:1712.01367 [cs.DC]) , we observed a safety violation in Zyzzyva and a liveness violation in FaB. In this manuscript, we sketch fixes to both. The same view-change core is applied in the two schemes, and additionally, applied to combine them and create a single, enhanced scheme that has the benefits of both approaches.

    Submitted 26 January, 2018; originally announced January 2018.

    Comments: arXiv admin note: text overlap with arXiv:1712.01367

  21. arXiv:1712.01367  [pdf, ps, other

    cs.DC

    Revisiting Fast Practical Byzantine Fault Tolerance

    Authors: Ittai Abraham, Guy Gueta, Dahlia Malkhi, Lorenzo Alvisi, Rama Kotla, Jean-Philippe Martin

    Abstract: In this note, we observe a safety violation in Zyzzyva and a liveness violation in FaB. To demonstrate these issues, we require relatively simple scenarios, involving only four replicas, and one or two view changes. In all of them, the problem is manifested already in the first log slot.

    Submitted 4 December, 2017; originally announced December 2017.

  22. arXiv:1612.02916  [pdf, other

    cs.CR cs.DC cs.GT

    Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    Authors: Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman

    Abstract: The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another challenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol bas… ▽ More

    Submitted 18 November, 2017; v1 submitted 8 December, 2016; originally announced December 2016.

  23. arXiv:1608.06696  [pdf, other

    cs.DC

    Flexible Paxos: Quorum intersection revisited

    Authors: Heidi Howard, Dahlia Malkhi, Alexander Spiegelman

    Abstract: Distributed consensus is integral to modern distributed systems. The widely adopted Paxos algorithm uses two phases, each requiring majority agreement, to reliably reach consensus. In this paper, we demonstrate that Paxos, which lies at the foundation of many production systems, is conservative. Specifically, we observe that each of the phases of Paxos may use non-intersecting quorums. Majority qu… ▽ More

    Submitted 23 August, 2016; originally announced August 2016.

    ACM Class: C.2.4

  24. arXiv:1402.2701  [pdf, ps, other

    cs.DS cs.DC

    Optimal Gossip with Direct Addressing

    Authors: Bernhard Haeupler, Dahlia Malkhi

    Abstract: Gossip algorithms spread information by having nodes repeatedly forward information to a few random contacts. By their very nature, gossip algorithms tend to be distributed and fault tolerant. If done right, they can also be fast and message-efficient. A common model for gossip communication is the random phone call model, in which in each synchronous round each node can PUSH or PULL information t… ▽ More

    Submitted 11 February, 2014; originally announced February 2014.

  25. arXiv:cs/0507034  [pdf, ps, other

    cs.DC cs.NI

    Papillon: Greedy Routing in Rings

    Authors: Ittai Abraham, Dahlia Malkhi, Gurmeet Singh Manku

    Abstract: We study {\sc greedy} routing over $n$ nodes placed in a ring, with the \emph{distance} between two nodes defined to be the clockwise or the absolute distance between them along the ring. Such graphs arise in the context of modeling social networks and in routing networks for peer-to-peer systems. We construct the first network over $n$ nodes in which {\sc greedy} routing takes… ▽ More

    Submitted 13 July, 2005; originally announced July 2005.

  26. arXiv:cs/9908011  [pdf, ps, other

    cs.DC cs.CR

    The Load and Availability of Byzantine Quorum Systems

    Authors: Dahlia Malkhi, Michael Reiter, Avishai Wool

    Abstract: Replicated services accessed via {\em quorums} enable each access to be performed at only a subset (quorum) of the servers, and achieve consistency across accesses by requiring any two quorums to intersect. Recently, $b$-masking quorum systems, whose intersections contain at least $2b+1$ servers, have been proposed to construct replicated services tolerant of $b$ arbitrary (Byzantine) server fai… ▽ More

    Submitted 12 August, 1999; originally announced August 1999.

    Comments: preprint of a paper to appear in the SIAM Journal of Computing

    ACM Class: C.2.4; C.4

  27. arXiv:cs/9908010  [pdf, ps, other

    cs.DC cs.CR

    On Propagating Updates in a Byzantine Environment

    Authors: Dahlia Malkhi, Yishay Mansour, Michael Reiter

    Abstract: We study how to efficiently diffuse updates to a large distributed system of data replicas, some of which may exhibit arbitrary (Byzantine) failures. We assume that strictly fewer than $t$ replicas fail, and that each update is initially received by at least $t$ correct replicas. The goal is to diffuse each update to all correct replicas while ensuring that correct replicas accept no updates gen… ▽ More

    Submitted 12 August, 1999; originally announced August 1999.

    ACM Class: C.2.0; C.2.4; C.4

  28. arXiv:cs/9908009  [pdf, ps, other

    cs.CR cs.NI

    Secure Execution of Java Applets using a Remote Playground

    Authors: Dahlia Malkhi, Michael Reiter

    Abstract: Mobile code presents a number of threats to machines that execute it. We introduce an approach for protecting machines and the resources they hold from mobile code, and describe a system based on our approach for protecting host machines from Java 1.1 applets. In our approach, each Java applet downloaded to the protected domain is rerouted to a dedicated machine (or set of machines), the {\em pl… ▽ More

    Submitted 12 August, 1999; originally announced August 1999.

    Comments: preprint of a paper to appear in IEEE Transactions on Software Engineering

    ACM Class: C.2.0

  29. arXiv:cs/9908008  [pdf, ps, other

    cs.CR cs.DC

    Secure Multicast in a WAN

    Authors: Dahlia Malkhi, Michael Merritt, Ohad Rodeh

    Abstract: A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the malicious efforts of fewer than a third of the total number of processes, including the sender. This has been sh own to be a useful tool in building secure distributed services, albeit with a cost that typically grows linearly… ▽ More

    Submitted 12 August, 1999; originally announced August 1999.

    Comments: preprint of a paper to appear in the Distributed Computing Journal

    ACM Class: c.2.0; c.2.4; c.4