Loading [MathJax]/extensions/MathZoom.js
How to Trust Strangers: Composition of Byzantine Quorum Systems | IEEE Conference Publication | IEEE Xplore

How to Trust Strangers: Composition of Byzantine Quorum Systems


Abstract:

Trust is the basis of any distributed, fault-tolerant, or secure system. A trust assumption specifies the failures that a system, such as a blockchain network, can tolera...Show More

Abstract:

Trust is the basis of any distributed, fault-tolerant, or secure system. A trust assumption specifies the failures that a system, such as a blockchain network, can tolerate and determines the conditions under which it operates correctly. In systems subject to Byzantine faults, the trust assumption is usually specified through sets of processes that may fail together. Trust has traditionally been symmetric, such that all processes in the system adhere to the same, global assumption about potential faults. Recently, asymmetric trust models have also been considered, especially in the context of blockchains, where every participant is free to choose who to trust. In both cases, it is an open question how to compose trust assumptions. Consider two or more systems, run by different and possibly disjoint sets of participants, with different assumptions about faults: how can they work together? This work answers this question for the first time and offers composition rules for symmetric and for asymmetric quorum systems. These rules are static and do not require interaction or agreement on the new trust assumption among the participants. Moreover, they ensure that if the original systems allow for running a particular protocol (guaranteeing consistency and availability), then so will the joint system. At the same time, the composed system tolerates as many faults as possible, subject to the underlying consistency and availability properties. Reaching consensus with asymmetric trust in the model of personal Byzantine quorum systems (Losa et al., DISC 2019) was shown to be impossible, if the trust assumptions of the processes diverge from each other. With asymmetric quorum systems, and by applying our composition rule, we show how consensus is actually possible, even with the combination of disjoint sets of processes.
Date of Conference: 20-23 September 2021
Date Added to IEEE Xplore: 22 November 2021
ISBN Information:

ISSN Information:

Conference Location: Chicago, IL, USA

Funding Agency:

No metrics found for this document.

I. Introduction

Secure distributed systems rely on trust. A security assumption defines the failures and attacks that can be tolerated and names conditions under which the system may operate. Implicitly, this determines the trust in certain components to be correct. In fault-tolerant replicated systems, trust has traditionally been expressed globally, through a symmetric assumption on the number or kind of faulty processes, which is shared by all processes. An example of this is the well-known threshold fault assumption: the system tolerates up to a finite and limited number of faulty processes in the system; no guarantees can be given beyond this about the correct execution of protocols. More generally, a symmetric trust assumption is defined through afail-prone system, which is a collection of subsets of processes, such that each of them contains all the processes that may at most fail together during a protocol execution.

Usage
Select a Year
2025

View as

Total usage sinceNov 2021:253
02468101214JanFebMarAprMayJunJulAugSepOctNovDec3213000000000
Year Total:18
Data is updated monthly. Usage includes PDF downloads and HTML views.
Contact IEEE to Subscribe

References

References is not available for this document.