Skip to main content

Adaptive Byzantine Fault-Tolerant ConsensusProtocol

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13828))

Included in the following conference series:

  • 773 Accesses

Abstract

The existing blockchain consensus protocol has reached the level of availability in replicas in small-scale scenarios. However, if the blockchain system is composed of hundreds or even thousands of replicas, the throughput and delay will significantly decrease as the number of replicas increases, which makes it difficult to apply it in large-scale scenarios. This paper proposes an Adaptive Byzantine Fault-Tolerant (AdBFT) consensus protocol, which introduces the optimistic response assumption and proposes an adaptive approach to reach consensus with a latency of 2Δ in steady state, while providing the advantage of tolerating up to half of Byzantine failures, which can ensure security in a weaker synchronization model. Under the optimistic response condition, O(Δ) latency is achieved when the leader is honest and more than three-quarters of the replicas respond, and up to 1/3 of the Byzantine failures can be tolerated under synchronization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gai, K., Zhang, Y., Qiu, M., Thuraisingham, B.: Blockchain-enabled service optimizations in supply chain digital twin IEEE Trans. Serv. Comput. 1–12 (2022).https://doi.org/10.1109/TSC.2022.3192166

  2. Qiu, M., Qiu, H., Zhao, H., Liu, M., Thuraisingham, B.: Secure data sharing through untrusted clouds with blockchain-enabled key management. SmartBlock 2020, pp. 11–16 (2020)

    Google Scholar 

  3. Gai, K., Wu, Y., et al.: Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE TII 15(6), 3548–3558 (2019)

    Google Scholar 

  4. Tian, Z., Li, M., et al.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)

    Article  Google Scholar 

  5. Qiu, M., Qiu, H.: Review on image processing based adversarial example defenses in computer vision. In: IEEE 6th Intl Conf. BigData Security, pp. 94–99 (2020)

    Google Scholar 

  6. Qiu, H., Dong, T., Zhang, T., Lu, J., Memmi, G., Qiu, M.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 8(13), 10327–10335 (2020)

    Article  Google Scholar 

  7. Gao, X., Qiu, M.: Energy-based learning for preventing backdoor attack. Conf. KSEM. 3, 706–721 (2022)

    Google Scholar 

  8. Qiu, H., Zheng, Q., et al.: Topological graph convolutional network-based urban traffic flow and density prediction. IEEE Trans. ITS (2020)

    Google Scholar 

  9. Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multimed. Comp. Comm. App. (2016)

    Google Scholar 

  10. Natarajan, H., Krause, S., Gradstein, H.: Distributed ledger technology and blockchain (2017)

    Google Scholar 

  11. Dhumwad, S., Sukhadeve, M., Naik, C., Manjunath, K.N., Prabhu, S.: A peer to peer money transfer using SHA256 and Merkle tree. In: 2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM), September 2017

    Google Scholar 

  12. Meva, D.: Issues and challenges with blockchain: a survey. Int. J. Comput. Sci. Eng. 6(12), 488–491 (2018)

    Google Scholar 

  13. Attaran, M., Gunasekaran, A.: Blockchain principles, qualities, and business applications. In: Applications of Blockchain Technology in Business (2019)

    Google Scholar 

  14. Bellini, E., Iraqi, Y., Damiani, E.: Blockchain-based distributed trust and reputation management systems: a survey. IEEE Access 8, 21127–21151 (2020)

    Article  Google Scholar 

  15. Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: OsDI, vol. 99, No. 1999, pp. 173–186

    Google Scholar 

  16. Buchman, T.E.: Byzantine fault tolerance in the age of blockchains Doctoral dissertation, Master’s thesis at University of Guelph, Ontario

    Google Scholar 

  17. Chan, B.Y., Shi, E.: Streamlet: textbook streamlined blockchains. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies

    Google Scholar 

  18. Yin, M., Malkhi, D., Reiter, M.K., Gueta, G.G., Abraham, I.: Hotstuff: Bft consensus with linearity and responsiveness. In: 2019 ACM Symposium on Principles of Distributed Computing

    Google Scholar 

  19. Lamport, L.: Paxos made simple. In: ACM SIGACT News (Distributed Computing Column), vol. 32, no. 4, 51–58

    Google Scholar 

  20. Thakkar, P., Nathan, S., Viswanathan, B.: Performance benchmarking and optimizing hyperledger fabric blockchain platform. In: 2018 IEEE 26th Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 264–276

    Google Scholar 

  21. Clement, A., Wong, E.L., Alvisi, L., Dahlin, M., Marchetti, M.: Making byzantine fault tolerant systems tolerate byzantine faults. In: NSDI, vol. 9, pp. 153–168

    Google Scholar 

  22. Aublin, P.L., Mokhtar, S.B., Quéma, V.: RBFT: redundant byzantine fault tolerance. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems. IEEE

    Google Scholar 

  23. Kotla, R., Alvisi, L., Dahlin, M., Clement, A., Wong, E.: Zyzzyva: speculative byzantine fault tolerance. In: 21st ACM SIGOPS Symposium on Operating Systems Principles, pp. 45–58

    Google Scholar 

  24. Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. In: Concurrency: the Works of Leslie Lamport

    Google Scholar 

  25. Tsai, W.T., Yu, L.: Lessons learned from developing permissioned blockchains. In: IEEE Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, pp. 1–10 (2018)

    Google Scholar 

  26. Tsai, W.T., Blower, R., Zhu, Y., Yu, L.: A system view of financial blockchains. In: 2016 IEEE Symposium on Service-Oriented System Engineering, SOSE 2016 (2016)

    Google Scholar 

  27. Zhang, C., Wang, R., Tsai, W.T., He, J., Liu, C., Li, Q.: Actor-based model for concurrent byzantine fault-tolerant algorithm. In: IEEE International Conference on CNCI 2019 (2019)

    Google Scholar 

  28. Abraham, I., Malkhi, D., Nayak, K., Ren, L., Yin, M.: Sync hotstuff: simple and practical synchronous state machine replication. In: 2020 IEEE Symposium on Security and Privacy (SP) (2020)

    Google Scholar 

  29. Miller, A., Xia, Y., Croman, K., Shi, E., Song, D.: The honey badger of BFT protocols. In: 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)

    Google Scholar 

  30. Guo, B., Lu, Z., Tang, Q., Xu, J., Zhang, Z.: Dumbo: faster asynchronous BFT protocols. In: 2020 ACM SIGSAC Conference on Computer and Communications Security (2020)

    Google Scholar 

  31. Lu, Y., Lu, Z., Tang, Q., Wang, G.: Dumbo-MVBA: optimal multi-valued validated asynchronous byzantine agreement, revisited. In: 39th Symposium on Principles of Distributed Computing

    Google Scholar 

Download references

Acknowledgment

This research was funded by the Chinese Ministry of Science and Technology (Grant No. 2018YFB1402700).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, R., Tsai, WT., Zhang, F., Yu, L., Zhang, H., Zhang, Y. (2023). Adaptive Byzantine Fault-Tolerant ConsensusProtocol. In: Qiu, M., Lu, Z., Zhang, C. (eds) Smart Computing and Communication. SmartCom 2022. Lecture Notes in Computer Science, vol 13828. Springer, Cham. https://doi.org/10.1007/978-3-031-28124-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28124-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28123-5

  • Online ISBN: 978-3-031-28124-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics