Skip to main content

The Unique Chain Rule and Its Applications

Publication ,  Conference
Bhat, A; Bandarupalli, A; Bagchi, S; Kate, A; K. Reiter, M
Published in: Lecture Notes in Computer Science
January 1, 2024

Most existing Byzantine fault-tolerant State Machine Replication (SMR) protocols rely explicitly on either equivocation detection or quorum certificate formations to ensure protocol safety. These mechanisms inherently require O(n2) communication overhead among n participating servers. This work proposes the Unique Chain Rule (UCR), a simple rule for hash chains where extending a block by including its hash in the next block, is treated as a vote for the proposed block and its ancestors. When a block obtains a vote from at least one correct server, we can commit the block and its ancestors. While this idea was used implicitly earlier in conjunction with equivocation detection or quorum certificate generation, this work employs it explicitly to show safety. We present three applications of UCR. We design Apollo, and Artemis: two novel synchronous SMR protocols with linear best-case communication complexity using round-robin, and stable leaders, respectively as the first two applications. Next, we employ UCR in a black-box fashion toward making any SMR commits publicly verifiable, where clients will no longer have to wait for 2 t+ 1 confirmations on every block, where t is the number of Byzantine faults tolerated by the protocol, but can instead collect a UCR proof consisting of min (κ, t) + 1 extensions on a block, where κ is a security parameter. This results in faster syncing times for clients as the publicly verifiable proofs can also be gossiped with every new block extension confirming a new block.

Duke Scholars

Published In

Lecture Notes in Computer Science

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2024

Volume

13950

Start / End Page

38 / 55

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Bhat, A., Bandarupalli, A., Bagchi, S., Kate, A., & K. Reiter, M. (2024). The Unique Chain Rule and Its Applications. In Lecture Notes in Computer Science (Vol. 13950, pp. 38–55). https://doi.org/10.1007/978-3-031-47754-6_3
Bhat, A., A. Bandarupalli, S. Bagchi, A. Kate, and M. K. Reiter. “The Unique Chain Rule and Its Applications.” In Lecture Notes in Computer Science, 13950:38–55, 2024. https://doi.org/10.1007/978-3-031-47754-6_3.
Bhat A, Bandarupalli A, Bagchi S, Kate A, K. Reiter M. The Unique Chain Rule and Its Applications. In: Lecture Notes in Computer Science. 2024. p. 38–55.
Bhat, A., et al. “The Unique Chain Rule and Its Applications.” Lecture Notes in Computer Science, vol. 13950, 2024, pp. 38–55. Scopus, doi:10.1007/978-3-031-47754-6_3.
Bhat A, Bandarupalli A, Bagchi S, Kate A, K. Reiter M. The Unique Chain Rule and Its Applications. Lecture Notes in Computer Science. 2024. p. 38–55.

Published In

Lecture Notes in Computer Science

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2024

Volume

13950

Start / End Page

38 / 55

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences