Randomized View Reconciliation in Permissionless Distributed Systems
Ruomu Hou Irvan Jahja Loi Luu Prateek Saxena Haifeng Yu
IEEE International Conference on Computer Communications 15-19 April 2018 // Honolulu, HI // USA
Presenter
Randomized View Reconciliation in Permissionless Distributed Systems - - PowerPoint PPT Presentation
Randomized View Reconciliation in Permissionless Distributed Systems Ruomu Hou Irvan Jahja Loi Luu Prateek Saxena Haifeng Yu Presenter IEEE International Conference on Computer Communications 15-19 April 2018 // Honolulu, HI //
Randomized View Reconciliation in Permissionless Distributed Systems
Ruomu Hou Irvan Jahja Loi Luu Prateek Saxena Haifeng Yu
IEEE International Conference on Computer Communications 15-19 April 2018 // Honolulu, HI // USA
Presenter
Our Contributions in a Nutshell
2
Running time Andrychowicz et al, CRYPTO 2015 θ(N) Our contribution θ(ln N / ln ln N)
Protocol for view divergence
Permissionless Distributed System
3
Sybil Attack
4
Controls Sybil Nodes Controls
Computational Puzzle
○ E.g., reversing a hash function ■ Given y, find any x such that: hash(x) = y
5
challenge solution
6
A B C D E
A C D E
Node A’s view
C D E C D E B
... ... ... ...
7
A B C D E E B C D A D A C D E
A C D E A C D A C D B C E B E D View divergence
C A
View Divergence
permissioned and requires same views
○ “Authenticated algorithms for byzantine agreement” (Dolev et. al, 1983) ○ “The byzantine general problem” (Lamport et. al, 1982) ○ “Protocols for secure computations” (Yao, 1982)
○ “Towards a scalable and robust DHT” (Awerbuch et al, 2009) ○ “Highly dynamic distributed computing with byzantine failures” (Guerraoui
8
B E D
View Reconciliation Protocol
Agree on a final, common view
9
A B C D E
A C D E A C D E A C D B C E A C D E
Our Contributions
10
Running time Total communication Andrychowicz et al, CRYPTO 2015 θ(N) θ(N2) Katz et al, 2014 θ(N) θ(N2) Our contribution θ(ln N / ln ln N) θ(N ln2 N / ln ln N)
Our Contributions
○ Many security protocols have polylog complexity
■ “Towards a scalable and robust DHT” (Awerbuch et al, 2009) ■ “Highly dynamic distributed computing with byzantine failures” (Guerraoui et. al, 2009)
○ The overhead of previous θ(N) view reconciliation protocols would have been the bottleneck!
11
State-of-the-art θ(N) θ(N2) Our contribution θ(ln N / ln ln N) θ(N ln2 N / ln ln N)
On View Divergence in BitCoin
○ “Eclipse attacks on bitcoins peer-to-peer network” (Heilman et. al, 2015)
would prevent such an attack on BitCoin!
12
Our Approach
○ Has δ error, similar to many security protocols ■ 256-bit AES: attacker has at least 2256 probability of guessing the key correctly ○ Our complexity scales with log (1\δ)
13
Our Approach
○ Utilize computational puzzles to elect a leader probabilistically ■ Traditionally puzzles used only to challenge computational power limitation of adversary ○ Randomized sampling and gossipping
14
15
A B C D E
B E D
Leader
A C D E A C D E A C D B C E
C C C C C
A C D E
Some Challenges
leaders?
protocol should finish?
16
Conclusions
polylog(N) time complexity ○ Previously known protocol has θ(N) tc
work under the permissionless settings
17
RVR solves view divergence with probability 1 - δ. RVR has a time complexity of and communication complexity of