Randomized View Reconciliation in Permissionless Distributed Systems - - PowerPoint PPT Presentation

randomized view reconciliation in permissionless
SMART_READER_LITE
LIVE PREVIEW

Randomized View Reconciliation in Permissionless Distributed Systems - - PowerPoint PPT Presentation

Randomized View Reconciliation in Permissionless Distributed Systems Ruomu Hou Irvan Jahja Loi Luu Prateek Saxena Haifeng Yu Presenter IEEE International Conference on Computer Communications 15-19 April 2018 // Honolulu, HI //


slide-1
SLIDE 1

Randomized View Reconciliation in Permissionless Distributed Systems

Ruomu Hou Irvan Jahja Loi Luu Prateek Saxena Haifeng Yu

IEEE International Conference on Computer Communications 15-19 April 2018 // Honolulu, HI // USA

Presenter

slide-2
SLIDE 2

Our Contributions in a Nutshell

2

Running time Andrychowicz et al, CRYPTO 2015 θ(N) Our contribution θ(ln N / ln ln N)

Protocol for view divergence

slide-3
SLIDE 3

Permissionless Distributed System

  • N honest nodes
  • Nodes join the system without permission
  • No central authority
  • Set of nodes and N are not known

3

slide-4
SLIDE 4

Sybil Attack

4

Controls Sybil Nodes Controls

slide-5
SLIDE 5

Computational Puzzle

  • Non-trivial computation

○ E.g., reversing a hash function ■ Given y, find any x such that: hash(x) = y

  • Challenge ⟶ Solution
  • Adversary has limited computational power

5

challenge solution

slide-6
SLIDE 6

6

A B C D E

A C D E

Node A’s view

C D E C D E B

... ... ... ...

slide-7
SLIDE 7

7

A B C D E E B C D A D A C D E

A C D E A C D A C D B C E B E D View divergence

C A

slide-8
SLIDE 8

View Divergence

  • View divergence breaks the basis of many protocols
  • Protocols in distributed algorithms traditionally are

permissioned and requires same views

○ “Authenticated algorithms for byzantine agreement” (Dolev et. al, 1983) ○ “The byzantine general problem” (Lamport et. al, 1982) ○ “Protocols for secure computations” (Yao, 1982)

  • Overlay protocols requires same view for bootstrapping

○ “Towards a scalable and robust DHT” (Awerbuch et al, 2009) ○ “Highly dynamic distributed computing with byzantine failures” (Guerraoui

  • et. al, 2009)

8

slide-9
SLIDE 9

B E D

View Reconciliation Protocol

  • Andrychowicz and Dziembowski (CRYPTO 2015)

Agree on a final, common view

9

A B C D E

A C D E A C D E A C D B C E A C D E

slide-10
SLIDE 10

Our Contributions

  • Recall N = number of honest nodes

10

Running time Total communication Andrychowicz et al, CRYPTO 2015 θ(N) θ(N2) Katz et al, 2014 θ(N) θ(N2) Our contribution θ(ln N / ln ln N) θ(N ln2 N / ln ln N)

slide-11
SLIDE 11

Our Contributions

  • Alleviates bottleneck issue

○ Many security protocols have polylog complexity

■ “Towards a scalable and robust DHT” (Awerbuch et al, 2009) ■ “Highly dynamic distributed computing with byzantine failures” (Guerraoui et. al, 2009)

○ The overhead of previous θ(N) view reconciliation protocols would have been the bottleneck!

11

State-of-the-art θ(N) θ(N2) Our contribution θ(ln N / ln ln N) θ(N ln2 N / ln ln N)

slide-12
SLIDE 12

On View Divergence in BitCoin

  • BitCoin does not solve view divergence
  • E.g., Eclipse attack

○ “Eclipse attacks on bitcoins peer-to-peer network” (Heilman et. al, 2015)

  • Our protocol together with existing overlay protocols

would prevent such an attack on BitCoin!

12

slide-13
SLIDE 13

Our Approach

  • Existing protocols are deterministic
  • Randomization

○ Has δ error, similar to many security protocols ■ 256-bit AES: attacker has at least 2256 probability of guessing the key correctly ○ Our complexity scales with log (1\δ)

13

slide-14
SLIDE 14

Our Approach

  • RandomizedViewReconcile (RVR)
  • RVR uses randomization to obtain better performance

○ Utilize computational puzzles to elect a leader probabilistically ■ Traditionally puzzles used only to challenge computational power limitation of adversary ○ Randomized sampling and gossipping

14

slide-15
SLIDE 15

15

A B C D E

B E D

Leader

A C D E A C D E A C D B C E

C C C C C

A C D E

slide-16
SLIDE 16

Some Challenges

  • How to handle malicious leader, missing leader, multiple

leaders?

  • How to spread leader’s proposal efficiently?
  • No common estimate on N: How to determine when the

protocol should finish?

  • All results were proven, details in the paper

16

slide-17
SLIDE 17

T !

Conclusions

  • We presented the first view reconciliation protocol with

polylog(N) time complexity ○ Previously known protocol has θ(N) tc

  • Bridges many existing permissioned security protocols to

work under the permissionless settings

17

RVR solves view divergence with probability 1 - δ. RVR has a time complexity of and communication complexity of