BFT in Blockchains: From Protocols to Use Cases
نویسندگان
چکیده
A blockchain is a distributed system that achieves strong security guarantees in storing, managing, and processing data. All blockchains achieve common goal: building decentralized provides trustworthy service an untrustworthy environment. builds Byzantine fault-tolerant (BFT) which nodes run protocol to reach agreement on the state. In this article, we focus research of BFT protocols. particular, categorize protocols according both models workflow. We seek answer these important questions: How has evolved past four decades, especially with rise blockchains? What are driven needs for future?
منابع مشابه
BFT Protocols Under Fire
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), with relatively little evaluation under typical, practical conditions (WAN delays, packet loss, transient disconnection, shared resources). This makes it difficult for system designers to choose the appropriate protoco...
متن کاملTowards Efficient and Robust BFT Protocols
Byzantine Fault Tolerant (BFT) protocols rely on state machine replication to handle arbitrary behaviors. Significant efforts have been recently made to strengthen these protocols in order to minimize the performance degradation in presence of faulty components. In this paper, we focus on the potential damages that could be introduced from the client side of such protocols. In order to deal wit...
متن کاملConflict-free Quorum-based BFT Protocols
Quorum-based Byzantine fault-tolerant protocols for replicated state machines allow replicas to respond to client requests without explicitly agreeing on the request ordering. As long as concurrent write operations do not conflict, quorum-based protocols are more efficient than agreement-based protocols. However, resolving conflicting writes and bringing replicas up-to-date with each other is a...
متن کاملFrom Use Cases to Activity Cases
Use cases can be used to capture requirements and to subdivide IT-systems into functionally coherent units. Information systems are activity systems that carry out important business activities. Many systems development methods recognize activity modeling as an important development activity. Use cases are based on a set of assumptions that makes them unsuitable for general activity modeling. T...
متن کاملIntrusion Tolerance: The “killer app” for BFT Protocols (?)
An intrusion-tolerant (IT) system is one that maintains its security properties (i.e., confidentiality, integrity and availability) despite some of its components being compromised by an adversary [4]. The term was coined by Fraga and Powell in 1985 and was almost forgotten for 15 years due to the prohibitive performance costs of the mechanisms required to implement IT systems. Byzantine fault-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Computing Surveys
سال: 2022
ISSN: ['0360-0300', '1557-7341']
DOI: https://doi.org/10.1145/3503042