Skip to main content

Showing 1–21 of 21 results for author: Vukolić, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.06955  [pdf, other

    cs.CR

    Security Analysis of Filecoin's Expected Consensus in the Byzantine vs Honest Model

    Authors: Xuechao Wang, Sarah Azouvi, Marko Vukolić

    Abstract: Filecoin is the largest storage-based open-source blockchain, both by storage capacity (>11EiB) and market capitalization. This paper provides the first formal security analysis of Filecoin's consensus (ordering) protocol, Expected Consensus (EC). Specifically, we show that EC is secure against an arbitrary adversary that controls a fraction $β$ of the total storage for $βm< 1- e^{-(1-β)m}$, where… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

    Comments: AFT 2023

  2. arXiv:2211.12050  [pdf, ps, other

    cs.CR cs.DC

    Modeling Resources in Permissionless Longest-chain Total-order Broadcast

    Authors: Sarah Azouvi, Christian Cachin, Duc V. Le, Marko Vukolic, Luca Zanolini

    Abstract: Blockchain protocols implement total-order broadcast in a permissionless setting, where processes can freely join and leave. In such a setting, to safeguard against Sybil attacks, correct processes rely on cryptographic proofs tied to a particular type of resource to make them eligible to order transactions. For example, in the case of Proof-of-Work (PoW), this resource is computation, and the pro… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  3. arXiv:2208.05408  [pdf, other

    cs.CR

    Pikachu: Securing PoS Blockchains from Long-Range Attacks by Checkpointing into Bitcoin PoW using Taproot

    Authors: Sarah Azouvi, Marko Vukolić

    Abstract: Blockchain systems based on a reusable resource, such as proof-of-stake (PoS), provide weaker security guarantees than those based on proof-of-work. Specifically, they are vulnerable to long-range attacks, where an adversary can corrupt prior participants in order to rewrite the full history of the chain. To prevent this attack on a PoS chain, we propose a protocol that checkpoints the state of th… ▽ More

    Submitted 13 October, 2022; v1 submitted 10 August, 2022; originally announced August 2022.

    Comments: To appear at ConsensusDay 22 (ACM CCS 2022 Workshop)

  4. arXiv:2203.05681  [pdf, other

    cs.DC

    State-Machine Replication Scalability Made Simple (Extended Version)

    Authors: Chrysoula Stathakopoulou, Matej Pavlovic, Marko Vukolić

    Abstract: Consensus, state-machine replication (SMR) and total order broadcast (TOB) protocols are notorious for being poorly scalable with the number of participating nodes. Despite the recent race to reduce overall message complexity of leader-driven SMR/TOB protocols, scalability remains poor and the throughput is typically inversely proportional to the number of nodes. We present Insanely Scalable State… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  5. arXiv:2109.03913  [pdf, other

    cs.CR cs.DC

    BMS: Secure Decentralized Reconfiguration for Blockchain and BFT Systems

    Authors: Selma Steinhoff, Chrysoula Stathakopoulou, Matej Pavlovic, Marko Vukolić

    Abstract: Reconfiguration of long-lived blockchain and Byzantine fault-tolerant (BFT) systems poses fundamental security challenges. In case of state-of-the-art Proof-of-Stake (PoS) blockchains, stake reconfiguration enables so-called long-range attacks, which can lead to forks. Similarly, permissioned blockchain systems, typically based on BFT, reconfigure internally, which makes them susceptible to a simi… ▽ More

    Submitted 8 September, 2021; originally announced September 2021.

  6. arXiv:2010.08274  [pdf, other

    cs.CR cs.DC

    Multi-Shard Private Transactions for Permissioned Blockchains

    Authors: Elli Androulaki, Angelo De Caro, Kaoutar Elkhiyaoui, Christian Gorenflo, Alessandro Sorniotti, Marko Vukolic

    Abstract: Traditionally, blockchain systems involve sharing transaction information across all blockchain network participants. Clearly, this introduces barriers to the adoption of the technology by the enterprise world, where preserving the privacy of the business data is a necessity. Previous efforts to bring privacy and blockchains together either still leak partial information, are restricted in their f… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

  7. arXiv:2006.13087  [pdf, other

    cs.DC cs.CR

    On the Interoperability of Decentralized Exposure Notification Systems

    Authors: Marko Vukolic

    Abstract: This report summarizes the requirements and proposes a high-level solution for interoperability across recently proposed COVID-19 exposure notification efforts. Our focus is on interoperability across exposure notification (EN) applications which are based on the decentralized Bluetooth Low Energy (BLE) protocol driven by Google/Apple Exposure Notifications API (including DP3T and similar protocol… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

    Comments: 15 pages, 5 figures

  8. arXiv:1911.07966  [pdf, other

    cs.DC

    Can 100 Machines Agree?

    Authors: Rachid Guerraoui, Jad Hamza, Dragos-Adrian Seredinschi, Marko Vukolic

    Abstract: Agreement protocols have been typically deployed at small scale, e.g., using three to five machines. This is because these protocols seem to suffer from a sharp performance decay. More specifically, as the size of a deployment---i.e., degree of replication---increases, the protocol performance greatly decreases. There is not much experimental evidence for this decay in practice, however, notably f… ▽ More

    Submitted 18 November, 2019; originally announced November 2019.

  9. arXiv:1906.05552  [pdf, other

    cs.DC

    Mir-BFT: High-Throughput Robust BFT for Decentralized Networks

    Authors: Chrysoula Stathakopoulou, Tudor David, Matej Pavlovic, Marko Vukolić

    Abstract: This paper presents Mir-BFT, a robust Byzantine fault-tolerant (BFT) total order broadcast protocol aimed at maximizing throughput on wide-area networks (WANs), targeting deployments in decentralized networks, such as permissioned and Proof-of-Stake permissionless blockchain systems. Mir-BFT is the first BFT protocol that allows multiple leaders to propose request batches independently (i.e., pa… ▽ More

    Submitted 22 January, 2021; v1 submitted 13 June, 2019; originally announced June 2019.

    Comments: 27 pages

  10. arXiv:1808.08406  [pdf, other

    cs.DC

    StreamChain: Rethinking Blockchain for Datacenters

    Authors: Lucas Kuhring, Zsolt István, Alessandro Sorniotti, Marko Vukolić

    Abstract: Permissioned blockchains promise secure decentralized data management in business-to-business use-cases. In contrast to Bitcoin and similar public blockchains which rely on Proof-of-Work for consensus and are deployed on thousands of geo-distributed nodes, business-to-business use-cases (such as supply chain management and banking) require significantly fewer nodes, cheaper consensus, and are ofte… ▽ More

    Submitted 10 February, 2020; v1 submitted 25 August, 2018; originally announced August 2018.

    Comments: 10 pages

  11. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains

    Authors: Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, Jason Yellick

    Abstract: Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first truly extensible blockchain system for running distributed applications. It supports modular consensus protocols, which allows the system to be tailored to particular use cases and… ▽ More

    Submitted 17 April, 2018; v1 submitted 30 January, 2018; originally announced January 2018.

    Comments: Appears in proceedings of EuroSys 2018 conference

  12. arXiv:1709.06921  [pdf, other

    cs.CR cs.DC

    A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform

    Authors: João Sousa, Alysson Bessani, Marko Vukolić

    Abstract: Hyperledger Fabric (HLF) is a flexible permissioned blockchain platform designed for business applications beyond the basic digital coin addressed by Bitcoin and other existing networks. A key property of HLF is its extensibility, and in particular the support for multiple ordering services for building the blockchain. Nonetheless, the version 1.0 was launched in early 2017 without an implementati… ▽ More

    Submitted 20 September, 2017; originally announced September 2017.

  13. arXiv:1707.01873  [pdf, ps, other

    cs.DC

    Blockchain Consensus Protocols in the Wild

    Authors: Christian Cachin, Marko Vukolić

    Abstract: A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received… ▽ More

    Submitted 7 July, 2017; v1 submitted 6 July, 2017; originally announced July 2017.

  14. arXiv:1609.05113  [pdf, other

    cs.DB cs.DC

    Bleach: A Distributed Stream Data Cleaning System

    Authors: Yongchao Tian, Pietro Michiardi, Marko Vukolic

    Abstract: In this paper we address the problem of rule-based stream data cleaning, which sets stringent requirements on latency, rule dynamics and ability to cope with the unbounded nature of data streams. We design a system, called Bleach, which achieves real-time violation detection and data repair on a dirty data stream. Bleach relies on efficient, compact and distributed data structures to maintain th… ▽ More

    Submitted 16 September, 2016; originally announced September 2016.

  15. arXiv:1609.05096  [pdf, other

    cs.DB cs.DC

    DiNoDB: an Interactive-speed Query Engine for Ad-hoc Queries on Temporary Data

    Authors: Yongchao Tian, Ioannis Alagiannis, Erietta Liarou, Anastasia Ailamaki, Pietro Michiardi, Marko Vukolic

    Abstract: As data sets grow in size, analytics applications struggle to get instant insight into large datasets. Modern applications involve heavy batch processing jobs over large volumes of data and at the same time require efficient ad-hoc interactive analytics on temporary data. Existing solutions, however, typically focus on one of these two aspects, largely ignoring the need for synergy between the two… ▽ More

    Submitted 16 September, 2016; originally announced September 2016.

  16. arXiv:1603.07351  [pdf, ps, other

    cs.DC cs.CR

    Non-determinism in Byzantine Fault-Tolerant Replication

    Authors: Christian Cachin, Simon Schubert, Marko Vukolić

    Abstract: Service replication distributes an application over many processes for tolerating faults, attacks, and misbehavior among a subset of the processes. The established state-machine replication paradigm inherently requires the application to be deterministic. This paper distinguishes three models for dealing with non-determinism in replicated services, where some processes are subject to faults and ar… ▽ More

    Submitted 19 December, 2016; v1 submitted 23 March, 2016; originally announced March 2016.

    ACM Class: C.2.4; D.1.3

  17. arXiv:1512.00168  [pdf, other

    cs.DC

    Consistency in Non-Transactional Distributed Storage Systems

    Authors: Paolo Viotti, Marko Vukolić

    Abstract: Over the years, different meanings have been associated to the word consistency in the distributed systems community. While in the '80s "consistency" typically meant strong consistency, later defined also as linearizability, in recent years, with the advent of highly available and scalable systems, the notion of "consistency" has been at the same time both weakened and blurred. In this paper we… ▽ More

    Submitted 12 April, 2016; v1 submitted 1 December, 2015; originally announced December 2015.

    ACM Class: H.3.4

  18. arXiv:1502.05831  [pdf, other

    cs.DC

    XFT: Practical Fault Tolerance Beyond Crashes

    Authors: Shengyun Liu, Paolo Viotti, Christian Cachin, Vivien Quéma, Marko Vukolić

    Abstract: Despite years of intensive research, Byzantine fault-tolerant (BFT) systems have not yet been adopted in practice. This is due to additional cost of BFT in terms of resources, protocol complexity and performance, compared with crash fault-tolerance (CFT). This overhead of BFT comes from the assumption of a powerful adversary that can fully control not only the Byzantine faulty machines, but at the… ▽ More

    Submitted 8 November, 2016; v1 submitted 20 February, 2015; originally announced February 2015.

  19. arXiv:1402.4958  [pdf, ps, other

    cs.DC

    Erasure-Coded Byzantine Storage with Separate Metadata

    Authors: Elli Androulaki, Christian Cachin, Dan Dobre, Marko Vukolic

    Abstract: Although many distributed storage protocols have been introduced, a solution that combines the strongest properties in terms of availability, consistency, fault-tolerance, storage complexity and the supported level of concurrency, has been elusive for a long time. Combining these properties is difficult, especially if the resulting solution is required to be efficient and incur low cost. We presen… ▽ More

    Submitted 20 February, 2014; originally announced February 2014.

  20. arXiv:1305.4868  [pdf, other

    cs.DC

    Asynchronous BFT Storage with 2t+1 Data Replicas

    Authors: Christian Cachin, Dan Dobre, Marko Vukolic

    Abstract: The cost of Byzantine Fault Tolerant (BFT) storage is the main concern preventing its adoption in practice. This cost stems from the need to maintain at least 3t+1 replicas in different storage servers in the asynchronous model, so that t Byzantine replica faults can be tolerated. In this paper, we present MDStore, the first fully asynchronous read/write BFT storage protocol that reduces the numbe… ▽ More

    Submitted 13 February, 2014; v1 submitted 21 May, 2013; originally announced May 2013.

  21. arXiv:1212.3555  [pdf, other

    cs.DC cs.CR

    Proofs of Writing for Efficient and Robust Storage

    Authors: Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic

    Abstract: We present PoWerStore, the first efficient robust storage protocol that achieves optimal latency without using digital signatures. PoWerStore's robustness comprises tolerating asynchrony, maximum number of Byzantine storage servers, any number of Byzantine readers and crash-faulty writers, and guaranteeing wait-freedom and linearizability of read/write operations. PoWerStore's efficiency stems fro… ▽ More

    Submitted 24 December, 2012; v1 submitted 14 December, 2012; originally announced December 2012.