Skip to main content
Log in

Efficient dynamic-committee BFT consensus based on HotStuff

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Traditional Byzantine Fault Tolerant (BFT) consensus protocols are designed for fixed groups and are aimed to ensure the consistency of states among the replicas in distributed systems. Dynamic-committee BFT consensus protocols allow replicas to dynamically join and leave the system, enhancing the robustness and flexibility of distributed systems. However, the state-of-the-art dynamic BFT consensus protocol in partially synchronous networks suffers from an \(O(n^4)\) worst-case authenticator complexity, where n is the number of replicas. In comparison, existing static BFT protocols have achieved \(O(n^2)\) worst-case complexity. Hence, there is a performance gap between static and dynamic BFT consensus protocols. In this paper, we propose an efficient dynamic-committee BFT consensus protocol based on HotStuff, enabling member churn with minimal impact on performance metrics. With our improved committee reconfiguration technique, we reduce the worst-case authenticator complexity of dynamic BFT consensus from \(O(n^4)\) to \(O(n^3)\), while maintaining the best-case complexity of \(O(n^2)\). Besides, our protocol inherits the pipelined property from HotStuff, thus achieving a higher throughput. Experimental results show that our protocol has a peak throughput 4.2–7.6x as high as that of BFT-SMaRt, exhibiting a better scalability. The latency of join requests increases by 25%–60% compared to regular requests, while the latency of leave requests shows no significant difference from regular requests.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

No datasets were generated or analysed during the current study.

Materials availability

Not applicable.

Notes

  1. A replica \( P \) can be honest in \( M_c \) but not \( c \)-honest, if \( P \) is removed from \(M_c\), and it is never in \(M_{c+1}\).

References

  1. Xiao Y, Zhang N, Lou W, Hou YT (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Commun Surv Tutorials 22(2):1432–1465. https://doi.org/10.1109/COMST.2020.2969706

    Article  MATH  Google Scholar 

  2. Xu J, Wang C, Jia X (2023) A survey of blockchain consensus protocols. ACM Comput Surv 55(13s):278–127835. https://doi.org/10.1145/3579845

    Article  MATH  Google Scholar 

  3. Castro M, Liskov B (1999) Practical byzantine fault tolerance. In: Proceedings of the third USENIX symposium on operating systems design and implementation (OSDI). USENIX Association, New Orleans, Louisiana, USA, pp 173–186. https://dl.acm.org/citation.cfm?id=296824

  4. Yin M, Malkhi D, Reiter MK, Golan-Gueta G, Abraham I (2019) Hotstuff: BFT consensus with linearity and responsiveness. In: Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing (PODC). ACM, Toronto, ON, Canada, pp 347–356. https://doi.org/10.1145/3293611.3331591

  5. Castro M, Liskov B (2002) Practical byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst 20(4):398–461. https://doi.org/10.1145/571637.571640

    Article  MATH  Google Scholar 

  6. Sousa P, Bessani AN, Correia M, Neves NF, Veríssimo P (2010) Highly available intrusion-tolerant services with proactive-reactive recovery. IEEE Trans Parallel Distributed Syst 21(4):452–465. https://doi.org/10.1109/TPDS.2009.83

    Article  MATH  Google Scholar 

  7. Birman KP, Joseph TA (1987) Reliable communication in the presence of failures. ACM Trans Comput Syst 5(1):47–76. https://doi.org/10.1145/7351.7478

    Article  MATH  Google Scholar 

  8. Reiter MK (1994) Secure agreement protocols: Reliable and atomic group multicast in rampart. In: Denning DE, Pyle R, Ganesan R, Sandhu RS (eds) Proceedings of the 2nd ACM Conference on Computer and Communications Security (CCS). ACM, Fairfax, Virginia, USA, pp 68–80. https://doi.org/10.1145/191177.191194

  9. Lamport L (1998) The part-time parliament. ACM Trans Comput Syst 16(2):133–169. https://doi.org/10.1145/279227.279229

    Article  MATH  Google Scholar 

  10. Ongaro D, Ousterhout JK (2014) In search of an understandable consensus algorithm. In: Proceedings of the 2014 USENIX annual technical conference (ATC). USENIX Association, Philadelphia, PA, USA, pp 305–319

  11. Bessani AN, Sousa J, Alchieri EAP (2014) State machine replication for the masses with BFT-SMART. In: 44th Annual IEEE/IFIP International conference on dependable systems and networks (DSN). IEEE Computer Society, Atlanta, GA, USA, pp 355–362. https://doi.org/10.1109/DSN.2014.43

  12. Duan S, Zhang H (2022) Foundations of dynamic BFT. In: 43rd IEEE Symposium on security and privacy. IEEE, San Francisco, CA, USA, pp 1317–1334. https://doi.org/10.1109/SP46214.2022.9833787

  13. Golan-Gueta G, Abraham I, Grossman S, Malkhi D, Pinkas B, Reiter MK, Seredinschi D, Tamir O, Tomescu A (2019) SBFT: A scalable and decentralized trust infrastructure. In: 49th Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE, Portland, OR, USA, pp 568–580. https://doi.org/10.1109/DSN.2019.00063

  14. Stathakopoulou C, Pavlovic M, Vukolic M (2022) State machine replication scalability made simple. In: Seventeenth european conference on computer systems (EuroSys). ACM, Rennes, France, pp 17–33. https://doi.org/10.1145/3492321.3519579

  15. Lamport L, Shostak RE, Pease MC (1982) The byzantine generals problem. ACM Trans Program Lang Syst 4(3):382–401. https://doi.org/10.1145/357172.357176

    Article  MATH  Google Scholar 

  16. Abraham I, Malkhi D, Nayak K, Ren L, Yin M (2020) Sync hotstuff: Simple and practical synchronous state machine replication. In: 2020 IEEE Symposium on security and privacy. IEEE, San Francisco, CA, USA, pp 106–118. https://doi.org/10.1109/SP40000.2020.00044

  17. Malkhi D, Nayak K (2023) Extended abstract: HotStuff-2: optimal two-phase responsive BFT. Preprint at https://eprint.iacr.org/2023/397

  18. Jalalzai MM, Niu J, Feng C, Gai F (2024) Fast-hotstuff: A fast and robust BFT protocol for blockchains. IEEE Trans Dependable Secur Comput 21(4):2478–2493. https://doi.org/10.1109/TDSC.2023.3308848

    Article  MATH  Google Scholar 

  19. Dwork C, Lynch NA, Stockmeyer LJ (1988) Consensus in the presence of partial synchrony. J ACM 35(2):288–323. https://doi.org/10.1145/42282.42283

    Article  MathSciNet  MATH  Google Scholar 

  20. Maram SKD, Zhang F, Wang L, Low A, Zhang Y, Juels A, Song D (2019) CHURP: dynamic-committee proactive secret sharing. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security (CCS). ACM, London, UK, pp 2369–2386. https://doi.org/10.1145/3319535.3363203

  21. Vassantlal R, Alchieri E, Ferreira B, Bessani A (2022) COBRA: dynamic proactive secret sharing for confidential BFT services. In: 43rd IEEE Symposium on security and privacy. IEEE, San Francisco, CA, USA, pp 1335–1353. https://doi.org/10.1109/SP46214.2022.9833658

  22. Hu B, Zhang Z, Chen H, Zhou Y, Jiang H, Liu J (2022) DyCAPS: asynchronous proactive secret sharing for dynamic committees. Preprint at https://eprint.iacr.org/2022/1169

Download references

Funding

This work is supported by National Key Research and Development Program of China (2022YFB2702702), National Natural Science Foundation of China (62372020, U21B2021, 72031007, 61932014), and Beijing Natural Science Foundation (L222050).

Author information

Authors and Affiliations

Authors

Contributions

Z.Z. and B.H. conceptualized this study. Z.Z., B.H., L.T., and Y.Z. developed the methodology. B.H. and L.T. proposed the protocol, conducted the formal analysis and experiments, and prepared the original draft of the manuscript. All authors (Z.Z., B.H., L.T., Y.Z., and J.L) contributed to the review and editing of the manuscript. Funding for the project was secured by Z.Z. and J.L. The study was supervised by Z.Z. and J.L. All authors reviewed and approved the final manuscript.

Corresponding authors

Correspondence to Zongyang Zhang or Jianwei Liu.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Ethics approval and consent to participate

Not applicable.

Consent for publication

We confirm that the manuscript is original, has not been published elsewhere, and is not under consideration by another publication. All authors have read and approved the final manuscript and are accountable for the content.

Conflict of interest

The authors declare no Conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy

Guest Editor: Rongxing Lu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Z., Hu, B., Tian, L. et al. Efficient dynamic-committee BFT consensus based on HotStuff. Peer-to-Peer Netw. Appl. 18, 111 (2025). https://doi.org/10.1007/s12083-025-01934-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-025-01934-9

Keywords