BFT in Blockchains: From Protocols to Use Cases

نویسندگان

چکیده

A blockchain is a distributed system that achieves strong security guarantees in storing, managing, and processing data. All blockchains achieve common goal: building decentralized provides trustworthy service an untrustworthy environment. builds Byzantine fault-tolerant (BFT) which nodes run protocol to reach agreement on the state. In this article, we focus research of BFT protocols. particular, categorize protocols according both models workflow. We seek answer these important questions: How has evolved past four decades, especially with rise blockchains? What are driven needs for future?

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BFT Protocols Under Fire

Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), with relatively little evaluation under typical, practical conditions (WAN delays, packet loss, transient disconnection, shared resources). This makes it difficult for system designers to choose the appropriate protoco...

متن کامل

Towards Efficient and Robust BFT Protocols

Byzantine Fault Tolerant (BFT) protocols rely on state machine replication to handle arbitrary behaviors. Significant efforts have been recently made to strengthen these protocols in order to minimize the performance degradation in presence of faulty components. In this paper, we focus on the potential damages that could be introduced from the client side of such protocols. In order to deal wit...

متن کامل

Conflict-free Quorum-based BFT Protocols

Quorum-based Byzantine fault-tolerant protocols for replicated state machines allow replicas to respond to client requests without explicitly agreeing on the request ordering. As long as concurrent write operations do not conflict, quorum-based protocols are more efficient than agreement-based protocols. However, resolving conflicting writes and bringing replicas up-to-date with each other is a...

متن کامل

From Use Cases to Activity Cases

Use cases can be used to capture requirements and to subdivide IT-systems into functionally coherent units. Information systems are activity systems that carry out important business activities. Many systems development methods recognize activity modeling as an important development activity. Use cases are based on a set of assumptions that makes them unsuitable for general activity modeling. T...

متن کامل

Intrusion Tolerance: The “killer app” for BFT Protocols (?)

An intrusion-tolerant (IT) system is one that maintains its security properties (i.e., confidentiality, integrity and availability) despite some of its components being compromised by an adversary [4]. The term was coined by Fraga and Powell in 1985 and was almost forgotten for 15 years due to the prohibitive performance costs of the mechanisms required to implement IT systems. Byzantine fault-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Computing Surveys

سال: 2022

ISSN: ['0360-0300', '1557-7341']

DOI: https://doi.org/10.1145/3503042