Flexible Byzantine Fault Tolerant Protocol Using Message Delay Upper Bound For Client Commit Decision

MALKHI; Dahlia ;   et al.

Patent Application Summary

U.S. patent application number 17/720092 was filed with the patent office on 2022-07-28 for flexible byzantine fault tolerant protocol using message delay upper bound for client commit decision. The applicant listed for this patent is VMware, Inc.. Invention is credited to Dahlia MALKHI, Kartik Ravidas NAYAK, Ling REN.

Application Number20220237180 17/720092
Document ID /
Family ID
Filed Date2022-07-28

United States Patent Application 20220237180
Kind Code A1
MALKHI; Dahlia ;   et al. July 28, 2022

FLEXIBLE BYZANTINE FAULT TOLERANT PROTOCOL USING MESSAGE DELAY UPPER BOUND FOR CLIENT COMMIT DECISION

Abstract

A replicated service comprises N replicas deployed on compute nodes of a computer network, wherein upon receiving qr*N first votes from other replicas on a proposed transaction by a leader of the N replicas, each of the N replicas certifies the proposed transaction to a client of the replicated service, where qr is a fractional value between 0 and 1 that represents a quorum required for certification. A method of approving a transaction in the replicated service includes receiving the certifications from the N replicas, determining whether or not the certifications are received from at least qc*N replicas, where qc is a fractional value between 0 and 1 that represents a quorum required for transaction approval and qc>qr, and transmitting an approval of the transaction to the replicas for recording by the replicas upon determining that the certifications have been received from at least qc*N replicas.


Inventors: MALKHI; Dahlia; (Palo Alto, CA) ; NAYAK; Kartik Ravidas; (Chapel Hill, NC) ; REN; Ling; (Champaign, IL)
Applicant:
Name City State Country Type

VMware, Inc.

Palo Alto

CA

US
Appl. No.: 17/720092
Filed: April 13, 2022

Related U.S. Patent Documents

Application Number Filing Date Patent Number
16520882 Jul 24, 2019 11334561
17720092

International Class: G06F 16/23 20060101 G06F016/23; G06Q 20/38 20060101 G06Q020/38; G06F 16/27 20060101 G06F016/27; G06Q 20/06 20060101 G06Q020/06; G06Q 20/36 20060101 G06Q020/36

Claims



1. A method of approving a transaction in a replicated service that comprises N replicas, the method comprising: deploying the N replicas on compute nodes of a computer network, N being a positive integer; exchanging, among a plurality of the N replicas over the computer network, first votes on a value for a transaction proposed by a leader of the N replicas; transforming, by each of the plurality of the N replicas, the first votes into a certificate in response to receiving a number of the first votes satisfying a threshold qr*N of the N replicas, where qr is a fractional value between 0 and 1 and represents a quorum required for certification; receiving, at the client from the plurality of the N replicas over the computer network, a plurality of certificates; transforming, by the client, the plurality of certificates into an approval of the transaction in response to receiving a number of the plurality of certificates satisfying a threshold qc*N of the N replicas where qc is a fractional value between 0 and 1 that represents a quorum required for transaction approval and qc>qr; and transmitting, by the client over the computer network, the approval of the transaction to the N replicas for recording by the N replicas.

2. The method of claim 1, further comprising: setting the fractional value qc based on an expected number of alive-but-corrupt replicas and Byzantine replicas.

3. The method of claim 2, wherein qc is set such that the expected number of alive-but-corrupt replicas and Byzantine replicas is less than (qc+qr-1)*N.

4. The method of claim 2, wherein the number of first votes change when one or more of the alive-but-corrupt replicas and the Byzantine replicas withdraw the first vote.

5. The method of claim 4, wherein the first vote is a YES vote, and the alive-but-corrupt replicas and the Byzantine replicas withdraw the first vote by transmitting a NO vote in place of the YES vote.

6. The method of claim 1, wherein the transaction proposal is for a monetary transaction, and wherein the client sets qc based on an amount of the monetary transaction.

7. The method of claim 1, wherein the transaction proposal is for a block chain transaction.

8. A non-transitory computer-readable medium comprising instructions that are executable on a processor of a computer system, wherein the instructions when executed on the processor cause the computer system to carry out a method of approving a transaction in a replicated service that comprises N replicas, the method comprising: deploying the N replicas on compute nodes of a computer network, N being a positive integer; exchanging, among a plurality of the N replicas over the computer network, first votes on a value for a transaction proposed by a leader of the N replicas; transforming, by each of the plurality of the N replicas, the first votes into a certificate in response to receiving a number of the first votes satisfying a threshold qr*N of the N replicas, where qr is a fractional value between 0 and 1 and represents a quorum required for certification; receiving, at the client from the plurality of the N replicas over the computer network, a plurality of certificates; transforming, by the client, the plurality of certificates into an approval of the transaction in response to receiving a number of the plurality of certificates satisfying a threshold qc*N of the N replicas where qc is a fractional value between 0 and 1 that represents a quorum required for transaction approval and qc>qr; and transmitting, by the client over the computer network, the approval of the transaction to the N replicas for recording by the N replicas.

9. The non-transitory computer-readable medium of claim 8, wherein the method further comprises: setting the fractional value qc based on an expected number of alive-but-corrupt replicas and Byzantine replicas.

10. The non-transitory computer-readable medium of claim 9, wherein qc is set such that the expected number of alive-but-corrupt replicas and Byzantine replicas is less than (qc+qr-1)*N.

11. The non-transitory computer-readable medium of claim 9, wherein the number of first votes change when one or more of the alive-but-corrupt replicas and the Byzantine replicas withdraw the first vote.

12. The non-transitory computer-readable medium of claim 11, wherein the first vote is a YES vote, and the alive-but-corrupt replicas and the Byzantine replicas withdraw the first vote by transmitting a NO vote in place of the YES vote.

13. The non-transitory computer-readable medium of claim 8, wherein the transaction proposal is for a monetary transaction, and wherein the client sets qc based on an amount of the monetary transaction.

14. The non-transitory computer-readable medium of claim 8, wherein the transaction proposal is for a block chain transaction.

15. A computer system for approving a transaction in a replicated service that comprises N replicas, the computer system comprising a processor programmed to carry out the steps of: deploying the N replicas on compute nodes of a computer network, N being a positive integer; exchanging, among a plurality of the N replicas over the computer network, first votes on a value for a transaction proposed by a leader of the N replicas; transforming, by each of the plurality of the N replicas, the first votes into a certificate in response to receiving a number of the first votes satisfying a threshold qr*N of the N replicas, where qr is a fractional value between 0 and 1 and represents a quorum required for certification; receiving, at the client from the plurality of the N replicas over the computer network, a plurality of certificates; transforming, by the client, the plurality of certificates into an approval of the transaction in response to receiving a number of the plurality of certificates satisfying a threshold qc*N of the N replicas where qc is a fractional value between 0 and 1 that represents a quorum required for transaction approval and qc>qr; and transmitting, by the client over the computer network, the approval of the transaction to the N replicas for recording by the N replicas.

16. The computer system of claim 15, wherein the processor is further programmed to carry out the step of: setting the fractional value qc based on an expected number of alive-but-corrupt replicas and Byzantine replicas.

17. The computer system of claim 16, wherein qc is set such that the expected number of alive-but-corrupt replicas and Byzantine replicas is less than (qc+qr-1)*N.

18. The computer system of claim 17, wherein the first vote is a YES vote, and the number of first votes change when one or more of the alive-but-corrupt replicas and the Byzantine replicas withdraw the first vote, and the alive-but-corrupt replicas and the Byzantine replicas withdraw the first vote by transmitting a NO vote in place of the YES vote.

19. The computer system of claim 15, wherein the transaction proposal is for a monetary transaction, and wherein the client sets qc based on an amount of the monetary transaction.

20. The computer system of claim 15, wherein the transaction proposal is for a block chain transaction.
Description



CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application is a continuation of and claims benefit of U.S. patent application Ser. No. 16/520,882, which is incorporated by reference herein in its entirety.

BACKGROUND

[0002] Byzantine fault tolerant (BFT) protocols are used to build replicated services. Recently, they have received revived interest as the algorithmic foundation of what are known as decentralized ledgers, or blockchains, such as those used for BitCoin transactions.

[0003] In conventional approaches to BFT protocol designs, a protocol designer or a service administrator first picks a set of assumptions (e.g., the fraction of Byzantine faults and certain timing assumptions) and then devises a protocol (or chooses an existing one) tailored for the particular set of assumptions. The assumptions made by the protocol designer are imposed upon all parties involved, including every replica maintaining the service as well as every client using the service. Such a protocol collapses if deployed under a set of assumptions that differ from the one it is designed for. In particular, optimal-resilience partially synchronous solutions completely break down and provide inaccurate results if the fraction of Byzantine faults exceeds 1/3. Similarly, optimal-resilience synchronous solutions break down and provide inaccurate results if the fraction of Byzantine faults exceeds 1/2 or if the synchrony bound is violated.

[0004] BFT protocols operate within a replicated service that takes requests from clients and provides clients an interface of a single non-faulty server, i.e., it provides clients with the same totally ordered sequence of values. Internally, the replicated service uses multiple non-faulty servers, also referred to herein as replicas, to tolerate some number of faulty servers. The total number of replicas is denoted by n. When one considers a set of replicas, the set size may be denoted as its fraction over n. For example, a set of m replicas may be referred to as "q replicas" where q=m/n.

[0005] Such a replicated service within which BFT protocols may operate has three logical actors: proposers capable of sending new values, acceptors who add these values to a totally ordered sequence (called a blockchain), and learners who decide on a sequence of values based on the transcript of the protocol and execute them on a state machine. Conventional replication protocols provide the following two properties:

[0006] (Safety) Any two learners learn the same sequence of values.

[0007] (Liveness) A value proposed by a proposer will eventually be executed by every learner.

[0008] In conventional BFT protocols, the learners are assumed to be homogeneous, i.e., they interpret a transcript using the same rules and hence decide on the same sequence of values. Conventional BFT protocols are designed to handle a certain number of Byzantine replicas, or Byzantine faults. Byzantine replicas are capable of behaving arbitrarily, such that a Byzantine replica may output one result to one replica in a group of replicas, or it may output a different result to another replica in the group of replicas, or in an attempt to corrupt the replicated service, it may not output any result to yet another replica in the group of replicas.

[0009] As stated above, research has shown that, for conventional BFT protocols, partially synchronous network scenarios completely break down and provide inaccurate results if the fraction of Byzantine faults (that is, the fraction of Byzantine replicas) exceeds 1/3. Similarly, synchronous network scenarios break down and provide inaccurate results if the fraction of Byzantine faults exceeds 1/2 or if the synchrony bound is violated.

SUMMARY

[0010] A replicated service comprises N replicas deployed on compute nodes of a computer network, N being a positive integer, wherein upon receiving qr*N first votes from other replicas on a proposed transaction by a leader of the N replicas, each of one or more of the N replicas certifies the proposed transaction to a client of the replicated service, where qr is a fractional value between 0 and 1 that represents a quorum required for certification. A method of approving a transaction in the replicated service, according to an embodiment, includes receiving the one or more certifications from the N replicas, determining whether or not the certifications are received from at least qc*N replicas, where qc is a fractional value between 0 and 1 that represents a quorum required for transaction approval and qc>qr, and transmitting an approval of the transaction to the replicas for recording by the replicas upon determining that the certifications have been received from at least qc*N replicas.

[0011] Transactions that may be approved in accordance with one or more embodiments include crypto-currency transactions, such as Bitcoin transactions, as well as supply chain transactions involving clients such as product manufacturers, retailers, wholesalers, brick-and-mortar stores, purchasers of products. Each of these clients has different needs and different responsibilities associated with a potential transaction, for which their part of the transaction may be approved by way of a replicated service using Flexible BFT according to one or more embodiments to be described in detail hereinbelow. Such a potential transaction may correspond to the sale of 100 pairs of basketball shoes made by a shoe manufacturer (client #1), sold by the shoe manufacturer to a shoe store (retailer, client #2), transported from the shoe manufacturer to the shoe store by a transport company (client #3), to be purchased by a client (Basketball team, client #4).

[0012] Further embodiments include, without limitation, a non-transitory computer-readable storage medium that includes instructions for a processor to carry out the above method, and a computer system that includes a processor programmed to carry out the above method.

BRIEF DESCRIPTION OF THE DRAWINGS

[0013] FIG. 1 is a block diagram of a computer system in which one or more embodiments may be implemented.

[0014] FIG. 2 is a diagram showing a set of replicas in a replicated service that comprises honest replicas and a Byzantine replica.

[0015] FIG. 3 is a flow diagram of a conventional replicated service BFT protocol that may operate with the set of replicas shown in FIG. 2.

[0016] FIG. 4 is a diagram showing a set of replicas in a replicated service that comprises honest replicas, Byzantine replicas, and alive-but-corrupt replicas, in which a Flexible BFT protocol may operate, according to one or more embodiments.

[0017] FIG. 5 is a flow diagram of a Flexible BFT protocol that may operate with the set of replicas shown in FIG. 4 by using different quorum sizes, according to one or more embodiments.

[0018] FIG. 6 is a diagram shown two different clients operating in a replicated service using Flexible BFT protocol in which each client has its own fault criteria and synchrony/partial synchrony network criteria, according to one or more embodiments.

[0019] FIG. 7 is a flow diagram of a Flexible BFT protocol that may operate with the set of replicas shown in FIG. 4 by using a maximum network delay value for use by a client in a commit decision, according to one or more embodiments.

[0020] FIG. 8 is a flow diagram of a Flexible BFT protocol applied to a block chain, according to one or more embodiments.

[0021] FIG. 9 is a flow diagram showing the steady state and view change protocols for Flexible BFT applied to block chain, according to one or more embodiments.

[0022] FIG. 10 is a graph showing the fault tolerant capabilities of Flexible BFT with respect to fraction of total faults/fraction of Byzantine faults with clients supported at q.sub.r=2/3, according to one or more embodiments.

[0023] FIG. 11 is a graph showing the fault tolerant capabilities of Flexible BFT with respect to fraction of total faults/fraction of Byzantine faults with clients supported at different values of q.sub.r, according to one or more embodiments.

DETAILED DESCRIPTION

[0024] FIG. 1 is a block diagram of a computer system 100 in which one or more embodiments may be implemented. Computer system 100 includes one or more applications 101 that are running on top of system software 110. System software 110 includes a kernel 111, drivers 112 and other modules 113 that manage hardware resources provided by a hardware platform 120. In one embodiment, system software 110 is an operating system (OS), such as operating systems that are commercially available. In another embodiment, system software 110 is a hypervisor that supports virtual machine applications running thereon, e.g., a hypervisor that is included as a component of VMware's vSphere.RTM. product, which is commercially available from VMware, Inc. of Palo Alto, Calif. Hardware platform 120 includes one or more physical central processing units (pCPUs) 121, system memory 122 (e.g., dynamic random access memory (DRAM)), read-only-memory (ROM) 123, one or more network interface cards (NICs) 124 that connect computer system 100 to a network 130, and one or more host bus adapters (HBAs) 126 that connect to storage device(s) 127, which may be a local storage device or provided on a storage area network. Computer system may correspond to a replica in a group of replicas to be described below in which NICs 124 may be used to communicate with other replicas in the group of replicas via network 130, or it may correspond to a client that relies on output from a group of replicas to make a commit decision and that receives information (e.g., votes) from the replicas via the network 130 using NICs 124, according to one or more embodiments.

[0025] FIG. 2 is a diagram showing a set of replicas 200 in a replicated service that comprises four honest replicas 210a, 210b, 210c, 210d and one Byzantine replica 220 in a group of five (5) replicas, in which a conventional BFT protocol may operate. The four honest replicas 210a, 210b, 210c, 210d will not output corrupt information to the other replicas within the group of five replicas. The Byzantine replica 220, in contrast, may output different results to different replicas in the group, and it may also output nothing to one or more replicas in the group. By way of example, honest replicas 210a, 210b, 210c, 210d output a consistent result, a vote=Yes, to the other replicas in the group, whereas Byzantine replica 220 outputs a first vote=Yes to replicas 210a, 210b, a second vote=No to replica 210c, and it does not output anything to replica 210d. Byzantine replica 220 does this in an attempt to subvert a vote made by the five replicas in a current view, in which a client (not shown in FIG. 2) makes a commit decision based on information provided by the five replicas 210a, 210b, 210c, 210d, 220.

[0026] Conventional BFT protocols operate in a replicated service such as the one shown in FIG. 2. In more detail, conventional BFT protocols for solving consensus in a partially synchronous setting with optimal 1/3-resilience revolve around voting by Byzantine quorums of replicas. Two properties of Byzantine quorums are utilized for achieving safety and liveness. First, any two quorums intersect at one honest replica, thereby providing quorum intersection. Second, there exists a quorum that contains no Byzantine faulty replicas, thereby providing quorum availability. Concretely, when less than 1/3 the replicas are Byzantine replicas, quorums are set to size q.sub.r=2/3. This guarantees an intersection of size at least 2q.sub.r-1=1/3, hence at least one honest replica in the intersection. As for availability, there exists q.sub.r=2/3 honest replicas to form a quorum.

[0027] To dissect the use of quorums in conventional BFT protocols, a description is provided herein of the operation of a conventional Practical BFT, or PBFT protocol, which provides safety and liveness. PBFT operates in a view-by-view manner, in which each view has a unique leader and consists of the steps shown in FIG. 3.

[0028] In step 310, which corresponds to a `propose` step, a leader L of the replicas proposes a value b. The value may correspond to a "Yes" or a "No" vote with respect to a transaction attempted to be made by a client, for example. The transaction may be an attempted purchase of a vehicle using crypto-currency, whereby the replicas vote on the transaction with a "Yes" (valid transaction) or a "No" vote (invalid transaction for some reason).

[0029] In step 320, a first vote is made by the replicas in a current view. In more detail, on receiving the proposed value b from the leader in step 310, a replica votes for b if it is safe, as determined by a locking mechanism described below. A set of q.sub.r votes forms a certificate C.sup.qr (b).

[0030] A replica `locks` on b, in step 330, on collecting C.sup.qr (b) certificates from other replicas, and votes for C.sup.qr (b).

[0031] A client learns, in step 340, on collecting q.sub.r certificates for C.sup.qr (b), that the proposal b becomes a committed decision. If a replica locks on a value b in a view, then it votes only for b in subsequent views unless it "unlocks" from b. A replica "unlocks" from b if it learns that q.sub.r replicas are not locked on b in that view or a future view, since those replicas may be locked on other values or they may not be locked at all.

[0032] The properties of Byzantine quorums are harnessed in PBFT for safety and liveness as follows: [0033] Quorum intersection within a view. Safety within a view is ensured by the first round of votes. A replica votes only once per view. For two distinct values to both obtain certificates, one honest replica needs to vote for both, which cannot happen. [0034] Quorum intersection across views. Safety across views is ensured by the locking mechanism. If b becomes a committed decision in a view, then a quorum of replicas lock on b in that view. For an honest replica among them to unlock from b, a quorum of replicas need to claim they are not locked on b. At least one replica in the intersection is honest and would need to falsely claim it is not locked, which cannot happen. [0035] Quorum availability within a view. Liveness within each view is guaranteed by having an honest quorum respond to a non-faulty leader.

[0036] Flexible BFT protocol according to one or more embodiments improves on the capabilities of PBFT, by introducing another type of fault or replica, called an alive-but-corrupt fault or an alive-but-corrupt replica. The goal of alive-but-corrupt replicas is to attack safety but to preserve liveness. In deriving Flexible BFT, an assumption is made that the adversary is static, i.e., the adversary determines which replicas are Byzantine and alive-but-corrupt before the start of the protocol. Based on this new alive-but-corrupt fault model developed by the inventors of this application, the safety proof treats alive-but-corrupt replicas similarly to Byzantine replicas. Then, once safety is proved, the liveness proof treats alive-but-corrupt replicas similarly to honest replicas.

[0037] FIG. 4 is a diagram showing a set of replicas 400 in a replicated service that comprises honest replicas, Byzantine replicas, and alive-but-corrupt replicas, in which a Flexible BFT protocol may operate, according to one or more embodiments. In FIG. 4, the set of five replicas includes a Byzantine replica 410, three honest replicas 420, 430, 440 and one alive-but-corrupt replica 450. Byzantine replica 410 is capable of outputting a first result ("Yes") to honest replica 420, a second result ("No") different from the first result to honest replica 430 and to the honest replica 440, and no result to alive-but-corrupt replica 450. Honest replicas 420, 430, 440 only output honest results, in this case "Yes", to the other replicas in the group of replicas. Alive-but-corrupt replicas 450 outputs a first result "No" to Byzantine replica 410 and to honest replica 430, and a second result "Yes" to honest replica 420 and honest replica 440. Note that alive-but-corrupt replica 450 must output a result to the other replicas, unlike the Byzantine replica 410 that may not output a result to one or more of the other replicas in a view.

[0038] FIG. 5 is a flow diagram of a Flexible BFT protocol that may operate with the set of replicas shown in FIG. 4, according to one or more embodiments. The Flexible BFT protocol separates the quorums used in BFT protocols for the replicas (acceptors) from the quorums used for learning when a decision becomes committed. More specifically, the quorum used for forming certificates (locking) is denoted by q.sub.lck and the quorum used for unlocking is denoted by q.sub.ulck. The quorum employed by clients for learning certificate uniqueness is denoted by q.sub.unq, and the quorum used for learning commit safety is denoted by q.sub.cmt. In other words, clients mandate q.sub.unq first-round votes and q.sub.cmt second-round votes in a view in order to commit a decision. In essence, Flexible BFT operates as a modified PBFT-like protocol that uses different quorum sizes, referred to as flexible byzantine quorums, instead of a single quorum size q, to provide both safety and liveness.

[0039] A leader of the replicas proposes a value b in step 510. The leader may be elected in each view on a round robin basis, by way of example, whereby the leader changes for each succeeding view. The replicas in the group of replicas make a first vote on the proposed value b in step 520. In more detail, on receiving the first value b for a view v, a replica votes for b if it is safe to do so, as determined by a locking mechanism described below. A replica collects a set of q.sub.lck votes in step 530, and forms a certificate C.sup.qlck (b) in the view.

[0040] A replica "locks" on vote b and votes for C.sup.qlck (b) in step 540 on collecting C.sup.qlck (b) certificates from the other replicas in the view.

[0041] A client learns, in step 550, that proposal b becomes a committed decision on collecting q.sub.unq votes for b and q.sub.cmt votes for C.sup.qlck (b) in the view, and thereby commits to the proposal b.

[0042] Note that, if a replica locks on a value b in a view, then that replica votes only for b in subsequent views unless the replica "unlocks" from b by learning that q.sub.ulck replicas are not locked on b in a subsequent view.

[0043] By way of the Flexible BFT protocol as shown in FIG. 5 having two separate quorums, one for the replicas to vote and one for the client to commit, the protocol can be disengaged from the client requirements, and thereby allow for different types of clients with different criteria to operate in the same replicated service with the same Flexible BFT protocol.

[0044] Other advantages due to the use of flexible quorums, one for the replicas and one for the client or clients, in Flexible BFT are delineated below.

[0045] Flexible quorum intersection within a view. In contrast to PBFT, in Flexible BFT, a pair of q.sub.lck certificates need not necessarily intersect in an honest replica. This is due to locking on a value not precluding conflicting locks. Flexible BFT only mandates that every q.sub.lck quorum intersects with every q.sub.unq quorum at at least one honest replica. Thus, for safety in Flexible BFT, the fraction of faulty replicas is less than q.sub.ick+q.sub.unq-1.

[0046] Flexible quorum intersection across views. If a client commits to a value b in a view, q.sub.cmt replicas lock on b in that view. For an honest replica among them to unlock from b, q.sub.ulck replicas need to claim they are not locked on b. This property mandates that every q.sub.ulck quorum intersects with every q.sub.cmt quorum at at least one honest replica. Thus, for safety, the fraction of faulty replicas is less than q.sub.ulck+q.sub.cmt-1.

[0047] Flexible quorum availability within each view. For liveness, Byzantine replicas cannot exceed 1-max(q.sub.unq, q.sub.cmt, q.sub.lck, q.sub.ulck), so that the aforementioned quorums can be formed at different stages of the Flexible BFT protocol.

[0048] Given the above analysis, Flexible BFT ensures safety if the fraction of faulty replicas is less than min(q.sub.unq+q.sub.lck-1, q.sub.cmt+q.sub.ulck-1), and provides liveness if the fraction of Byzantine replicas is at most 1-max(q.sub.unq, q.sub.cmt, q.sub.lck, q.sub.ulck). One may optimally use balanced quorum sizes where q.sub.lck=q.sub.ulck and q.sub.unq=q.sub.cmt. To obtain this optimal quorum size, first note that q.sub.unq+q.sub.lck=q.sub.cmt+q.sub.ulck; otherwise, suppose the right-hand side is smaller, then setting (q.sub.cmt, q.sub.ulck) to equal (q.sub.unq, q.sub.lck) improves safety tolerance without affecting liveness tolerance. Next, note that if q.sub.unq+q.sub.lck=q.sub.cmt+q.sub.ulck but q.sub.lck>q.sub.ulck (and hence q.sub.unq<q.sub.cmt), then once again setting (q.sub.cmt, q.sub.ulck) to equal (q.sub.unq, q.sub.lck) improves safety tolerance without affecting liveness tolerance.

[0049] Thus, for Flexible BFT, q.sub.lck=q.sub.r and q.sub.unq=q.sub.cmt. Since replicas use q.sub.r votes to lock, these votes can always be used by the clients to commit q.sub.cmt quorums. Thus, q.sub.c.gtoreq.q.sub.r. The Flexible Byzantine Quorum requirements thereby collapse into the following two conditions.

[0050] Flexible quorum intersection. The fraction of faulty replicas is <q.sub.c+q.sub.r-1.

[0051] Flexible quorum availability. The fraction of Byzantine replicas is .ltoreq.1-q.sub.c.

[0052] Tolerating alive-but-corrupt faults. If all faults in the system are Byzantine faults, then the best parameter choice is q.sub.c>2/3 for <1/3 fault tolerance, and Flexible Byzantine Quorums degenerates to basic Byzantine quorums. However, alive-but-corrupt replicas are only interested in attacking safety but not liveness. This allows Flexible BFT to tolerate q.sub.c+q.sub.r-1 total faults (Byzantine plus alive-but-corrupt faults), which can be more than 1/3. For example, if q.sub.r=0.7 and q.sub.c=0.8, then such a protocol can tolerate 0.2 Byzantine faults plus 0.3 alive-but-corrupt faults.

[0053] Separating client commit rules from the replica protocol. One property of the Flexible BFT and its use of Flexible Byzantine Quorums is that it decouples the BFT protocol from client commit rules. The decoupling allows clients assuming different fault models to utilize the same (Flexible BFT) protocol. In Flexible BFT, the propose and two voting steps are executed by the replicas and they are only parameterized by q.sub.r. The commit step can be carried by different clients using different commit thresholds q.sub.c. Thus, a fixed q.sub.r determines a possible set of clients with varying commit rules (in terms of Byzantine and alive-but-corrupt adversaries). A Byzantine adversary can behave arbitrarily and thus may not provide liveness whereas an alive-but-corrupt adversary only intends to attack safety but not liveness. Thus, a client who believes that a large fraction of the adversary may attempt to break safety, not progress, can choose a larger q.sub.c. By doing so, it seeks stronger safety against dishonest replicas, while trading liveness. Conversely, a client that assumes that a large fraction of the adversary attacks liveness must choose a smaller q.sub.c. As such, the Flexible BFT protocol according to one or more embodiments supports heterogeneous clients having different criteria regarding network characteristics and different criteria regarding transaction approval parameters.

[0054] FIG. 6 is a diagram shown two different clients operating in a replicated service comprising Replicas 610a, 610b, . . . , 610n, using Flexible BFT protocol in which each client has its own fault criteria, according to one or more embodiments. Client #1 620 chooses q.sub.c=0.7, whereas client #2 630 chooses q.sub.c=0.8, whereas q.sub.r is chosen by the administrator to be 0.7. Based on the Flexible BFT equations provided above, for client #1 620, the fraction of Byzantine replicas that the replicated service can handle .ltoreq.1-0.7=0.3, and the fraction of faulty replicas <0.7+0.7 -1=0.4, thereby resulting in the replicated service capable of handling 0.3 Byzantine replicas and 0.1 alive-but-corrupt replicas. That is, for 10 replicas, the replicated service is capable of handling 0.3*10=3 Byzantine replicas and 0.1*10=1 alive-but-corrupt replica in the group of 10 replicas in a view while still guaranteeing an uncorrupted vote by the replicas in the view.

[0055] For client #2 630, the fraction of Byzantine replicas that the replicated service can handle .ltoreq.1-0.8=0.2, and the fraction of faulty replicas <0.8+0.7-1=0.5, thereby resulting in the replicated service capable of handling 0.2 Byzantine replicas and 0.3 alive-but-corrupt replicas. That is, for 10 replicas, the replicated service is capable of handling 0.2*10=2 Byzantine replicas and 0.3*10=3 alive-but-corrupt replicas in a view while still guaranteeing an uncorrupted vote by the replicas in the view.

[0056] One useful property of the Flexible BFT is that it decouples the BFT protocol from client commit rules. The decoupling allows clients assuming different fault models to utilize the same protocol. In Flexible BFT with different quorum sizes for the replicas and for the client, the propose and two voting steps are executed by the replicas and they are only parameterized by q.sub.r. The commit step may be carried by different clients using different commit thresholds q.sub.c. Thus, a fixed q.sub.r determines a possible set of clients with varying commit rules (in terms of Byzantine and alive-but-corrupt adversaries). As stated earlier, a Byzantine adversary can behave arbitrarily and thus may not provide liveness, whereas an alive-but-corrupt adversary only intends to attack safety but not liveness. Thus, a client who believes that a large fraction of the adversary may attempt to break safety, not progress, can choose a larger q.sub.c. By doing so, it seeks stronger safety against dishonest replicas, while trading liveness. Conversely, a client that assumes that a large fraction of the adversary attacks liveness should choose a smaller q.sub.c.

[0057] FIG. 7 is a flow diagram of a Flexible BFT protocol that may operate with the set of replicas, such as the replicas shown in FIG. 4 for example, by using a maximum network delay for use by a client in a commit decision, according to one or more embodiments. The Flexible BFT protocol based on maximum network delay value operates at the network speed for the replicas in a view, such that the replicas run a partially synchronous protocol and do not rely on synchrony at any point. Clients, on the other hand, rely on synchrony bounds to commit. This separation is what allows the Flexible BFT protocol to support clients with different assumptions on the maximum network delay A (i.e., the maximum expected network delay, which corresponds to the maximum amount of time it takes for one replica to send a vote to another replica via a network connection in a view). In addition, the Flexible BFT protocol tolerates a combined Byzantine plus alive-but-corrupt fault ratio greater than a half (Byzantine fault tolerance is still less than half), which is an improvement over conventional BFT protocols.

[0058] For ease in explanation, the Flexible BFT protocol that uses maximum network delay A for a client commit decision is described hereinbelow with respect to a single shot consensus, whereby this may be generalized for achieving a consensus on a sequence of values such as a block-chain implementation.

[0059] The Flexible BFT protocol that uses maximum network delay A for a client commit decision is described with respect to FIG. 7, in which it runs in a sequence of views. Each view has a designated leader who may be selected in a round robin order or in some other a priori manner. The leader drives consensus in that view. In each view, the protocol runs in two steps--propose and vote. In the propose step, the leader proposes a value b. In the vote step, replicas vote for the value if it is safe to do so. The vote also acts as a re-proposal of the value. If a replica observes a set of q.sub.r votes on b, called a certificate C.sup.qr (b), it "locks" on b. The set of votes q.sub.r.gtoreq.1/2 is required to be received by a replica in order for that replica to obtain a certificate. In subsequent views, a replica will not vote for a value other than b unless it learns that q.sub.r replicas are not locked on b. In addition, the replicas switch views (i.e., changes the leader) if they either observe an equivocation or if they do not receive a proposal from the leader within some timeout. A client commits to b if q.sub.r replicas state that there exists a view in which b is certified and no equivocating value or view change was observed at a time before 2.DELTA. after it was certified. Again, .DELTA. represents is the maximum expected network delay.

[0060] The protocol ensures safety if there are fewer than q.sub.r faulty replicas. The proof for safety in Flexible BFT is based on the following: If an honest replica h satisfies the commit condition for some value b in a view, then (a) no other value can be certified and (b) all honest replicas are locked on b at the end of that view. To elaborate, satisfying the commit condition implies that some honest replica h has observed an undisturbed 2.DELTA. period after it locked on b, i.e., it did not observe an equivocation or a view change. Suppose the condition is satisfied at time t. This implies that other replicas did not observe an equivocation or a view change before t-.DELTA.. The two properties above hold if the quorum honesty conditions below hold. For liveness, if Byzantine leaders equivocate or do not propose a safe value, they will be blamed and a view change will ensue. Eventually there will be an honest leader to drive consensus if quorum availability holds.

[0061] The following advantages of Flexible BFT based on use of network delay A for a client commit decision is detailed below.

[0062] Quorum honesty within a view. Since the undisturbed period starts after b is certified, h must have voted (and re-proposed) b at a time earlier than t-2.DELTA.. Every honest replica must have received b before t-.DELTA.. Since they had not voted for an equivocating value by then, they must have voted for b. Since the number of faults is less than q.sub.r, every certificate needs to contain an honest replica's vote. Thus, no certificate for any other value can be formed in this view.

[0063] Quorum honesty across views. Honest replica h sends C.sup.qr (b) at time t-2.DELTA.. All honest replicas in the group of replicas receive C.sup.qr (b) by time t-.DELTA. and become locked on b. For an honest replica to unlock from b in subsequent views, q.sub.r replicas need to claim that they are not locked on b. At least one of them is honest and would need to falsely claim it is not locked, which cannot happen.

[0064] With reference now to FIG. 7, which shows a method of Flexible BFT using maximum network delay A for a client commit decision, the leader L of view proposes a value b (i.e., vote "Yes") in step 710.

[0065] A replica broadcasts b and votes for b if it is safe to do so, in step 720, on receiving the first value b in a view v, as determined by a locking mechanism described below. If the replica collects q.sub.r votes on b, denoted as certificate C.sup.qr (b) of b from view v, then it "locks" on b in step 730 and records the lock time as t-lock.sub.v.

[0066] If the replica observes an equivocating value signed by L at any time after entering view v, it records the time of equivocation as t-equiv.sub.v. The replica then blames the leader by broadcasting (blame, v). and the equivocating values. If the replica does not receive a proposal for sufficient time in view v, it times out and broadcasts (blame, v). If the replica collects a set of q.sub.r (blame, v) messages in a view, it records the time as t-viewchange.sub.v, broadcasts the set of blame messages, and enters view v+1.

[0067] If a replica locks on a value b in a view, then it votes only for b in subsequent views unless it "unlocks" from b by learning that q.sub.r replicas are not locked on b in that view or higher (they may be locked on other values or they may not be locked at all).

[0068] A client commits to a value b in a view in step 740 if q.sub.r replicas report that there exists a view v such that: [0069] 1. b is certified, i.e., C.sub.v.sup.qr (b) exists. [0070] 2. b is undisturbed, i.e., no equivocating value or view change was observed at a time before 2.DELTA. after it was certified, or more formally, min(current-time, t-equiv.sub.v, t-viewchange.sub.v)-t-lock.sub.v.gtoreq.2.DELTA..

[0071] The above-described Flexible BFT using maximum network delay A for a client commit decision has the following capabilities:

[0072] Quorum availability. Byzantine replicas do not exceed 1-q.sub.r, so that q.sub.r replicas respond to the leader.

[0073] Tolerating alive-but-corrupt faults. If there are only honest and Byzantine replicas (and no alive-but-corrupt replicas) in a set of replicas, quorum honesty requires the fraction of Byzantine replicas B<q.sub.r. Quorum availability requires B.ltoreq.1-q.sub.r. If optimization is performed for maximizing B, then the following equation is obtained: q.sub.r.gtoreq.1/2. Now, if P represents the fraction of alive-but-corrupt replicas, quorum honesty requires B+P<q.sub.r, and quorum availability requires B.ltoreq.1-q.sub.r. Thus, the protocol supports varying values of B and P at different values of q.sub.r.gtoreq.1/2 such that safety and liveness are both preserved.

[0074] Separating client synchrony assumption from the replica protocol. Another aspect of Flexible BFT using network delay A for a client commit decision is the separation of the client commit rule from the protocol design. In particular, although this is a synchronous protocol, the replica protocol does not rely on any synchrony bound. This allows clients to choose their own message delay bounds. Thus, any client that uses a correct message delay bound enjoys safety.

[0075] FIG. 8 is a flow diagram of a Flexible BFT protocol applied to a block chain transaction, according to one or more embodiments. In more detail, the Flexible BFT protocol applied to a block chain transaction includes the features of client commit based on a different quorum size as used by replicas according to one or more embodiments described above, together with a client commit decision based on use of maximum network delay (or maximum message delay) A between replicas according to one or more other embodiments described above, to achieve a combined Flexible BFT protocol that supports all types of clients. That is, a client can either assume partial synchrony, with freedom to choose q.sub.c as described in the previous section, or assume synchrony with its own choice of A, as described above with respect to some embodiments in which Replicas execute a protocol at the network speed with a parameter q.sub.r according to other embodiments.

[0076] For better understanding of the Flexible BFT protocol applied to a block chain transaction, some data structures and terminologies of the Flexible BFT protocol are defined below. In block chain terminology, a block chain contains all of the transactions completed since the beginning of a particular ledger. The block chain may be considered as a ledger book, in which each block is a page in the ledger and each transaction is an individual asset transfer on a ledger page. In that sense, a block chain corresponds to a digitized, decentralized public ledger of all transactions, such as all cryptocurrency transactions. Each node in the block chain network maintains its own local ledger, in which transactions are added to the set of transactions in the local ledger maintained by the node. That way, each time a new transaction gets added, all of the copies of the local ledger get updated to reflect the new transaction. With reference to FIG. 1, the local ledger for a replica corresponding to computer system 100 may be stored in system memory 122 and/or in storage device 127.

[0077] Block format. The pipelined protocol forms a chain of values. The term block refers to each value in the chain. A block's position in the chain is referred to as its height. A block B.sub.k at height k has the following format: B.sub.k:=(b.sub.k, h.sub.k-1), where b.sub.k denotes a proposed value at height k and h.sub.k-1:=H(B.sub.k-1) is a hash digest of the predecessor block. The first block B.sub.1=(b.sub.1, .perp.) has no predecessor. Every subsequent block B.sub.k must specify a predecessor block B.sub.k-1 by including a hash of it. If B.sub.k is an ancestor (not necessarily a proper ancestor) of B.sub.l (1.gtoreq.k), we say B.sub.1 extends B.sub.k. A block is valid if (i) its predecessor is valid or .perp., and (ii) its proposed value meets application-level validity conditions and is consistent with its chain of ancestors (e.g., does not double spend a transaction in one of its ancestor blocks). replicas in view v. In the Flexible BFT protocol applied to a block chain transaction, replicas vote for blocks by signing them. C.sup.qr(B.sub.k) denotes a set of signatures on h.sub.k=H(B.sub.k) by q.sub.r replicas in view v, where q.sub.r is a parameter fixed for the protocol instance. C.sup.qr(B.sub.k) is referred to as a certificate for B.sub.k from view v. Certified blocks are ranked first by the views in which they are certified and then by their heights. In other words, a block B.sub.k certified in view v is ranked higher than a block B.sub.kt certified in view v.sup.j if either (i) v>v.sup.j or (ii) v=v.sup.j and k>k.sup.j.

[0078] At any time, a replica locks the highest certified block to its knowledge. During the Flexible BFT protocol applied to block chain transaction execution, each replica keeps track of all signatures for all blocks and keeps updating its locked block. The notion of locked block is used in Flexible BFT protocol applied to a block chain transaction to guard the safety of a client commit.

[0079] Turning now to FIG. 8, the replica protocol progresses in a view-by-view manner. Each view has a designated leader who is responsible for driving consensus on a sequence of blocks. As discussed previously, leaders can be chosen statically, e.g., round robin, or randomly using more sophisticated techniques (e.g., the replica who was not made a leader for the longest amount of time as compared to the other replicas becomes the next leader). In FIG. 8, around robin selection of leaders is assumed, i.e., (v mod n) is the leader of view v.

[0080] At a high level, the Flexible BFT protocol applied to block chain transaction does the following. The leader proposes a block to all replicas, as shown in step 810. The replicas vote on it if safe to do so, as shown in step 820. The block becomes certified once q.sub.r replicas vote on it, as provided in step 830. The leader will then propose another block extending the previous one, chaining blocks one after another at increasing heights, as shown in step 840. Unlike BFT conventional consensus protocols where replicas determine when a block is committed, in Flexible BFT for block chain implementations, replicas only certify blocks and committing is offloaded to the clients. If at any time replicas detect malicious leader behavior or lack of progress in a view, they blame the leader and engage in a view change protocol to replace the leader and move to the next view. The new leader collects a status from different replicas and continues to propose blocks based on this status. The steady state and view change protocols are detailed below, with reference to the method 900 shown in FIG. 9.

[0081] For the discussion herein, let v designate the current view number, and replica L designate the leader in the view. Leader L broadcasts, in step 910, a proposed vote, corresponding to message (propose, B.sub.k, v, C.sub.v.sup.qr(B.sub.k-1), S).sub.L. Here, Bk=(bk, hk-1) is the newly proposed block and it should extend the highest certified block known to Leader L. In the steady state, an honest leader L would extend the previous block it proposed, in which case v'=v and S=.perp.. Immediately after a view change, Leader L determines the highest certified block from the status S received during the view change.

[0082] Each replica R receives, in step 920, the message (propose, B.sub.k, v, C.sub.v.sup.qr(B.sub.k-1), S).sub.L output by Leader L.

[0083] Each replica R broadcasts, in step 930, the proposal and a vote (vote, B.sub.k v).sub.R if: i) R does not hold any lock, or ii) B.sub.k extends R's locked block, or iii) S indicates that q.sub.r replicas are not locked on R's locked block.

[0084] Each replica R keeps track of, in step 940, the number of votes received for this block B.sub.k in this view v, as q.sub.Bk,v.

[0085] Each replica R marks, in step 950, Block B.sub.k-1 as a locked block if it has been proposed in a view v, and the replica R records the lock time as t-lock.sub.k-1,v.

[0086] Each replica R stores, in step 960, for any block that equivocates with B.sub.k-1 proposed in view v, the timestamp tequiv.sub.k-1,v corresponding to the time when an equivocating block or vote is received.

[0087] Each replica R enters the next iteration in step 970, and if replica R does not observe any progress or has observed more than one height-k block in the same view v, i) quits view v, ii) stops voting in view v, and iii) sends (blame, v).sub.r message to all other replicas.

[0088] In the steady state, there is a unique leader L who, in an iteration, proposes a block, waits for votes from q.sub.r replicas and moves to the next iteration. In the steady state, an honest leader always extends the previous block it proposed. However, immediately after a view change, since the previous leaders could have been a Byzantine replica and may have proposed multiple conflicting blocks, the new leader needs to determine a safe block to propose. It does so by collecting a status of locked blocks from q.sub.r replicas denoted by S.

[0089] For a replica R in the steady state, on receiving a proposal for block B.sub.k, a replica votes for it if (i) R does not hold any lock, or (ii) B.sub.k extends R's locked block, or (iii) the status indicates that q.sub.r replicas are not locked on to R's locked block. Replica R can potentially receive blocks out of order and thus receive B.sub.k before its ancestor blocks. In this case, replica R waits until it receives the ancestor blocks, verifies the validity of those blocks and B.sub.k before voting for B.sub.k. In addition, replica R records the following to aid a client commit.

[0090] A replica records the number of votes received for B.sub.k in view v as q.sub.B.sub.k,v. In Flexible BFT applied to block chain transaction, votes are broadcast by all replicas and the number of votes for a block can be greater than q.sub.r. The number of votes received, q.sub.B.sub.k,v, is updated each time that the replica learns about a new vote in view v.

[0091] If B.sub.k-1 was proposed in the same view v, it locks B.sub.k-1 and records the locked time as t-lock.sub.k-1,v.

[0092] If the replica ever observes an equivocating block at height k in view v through a proposal or vote, it stores the time of equivocation as t-equiv.sub.k,v.

[0093] The locked time t-lock.sub.k-1,v and equivocation time t-equiv.sub.k-1,v will be used by clients with synchrony assumptions to commit, and the number of votes q.sub.B.sub.k,v will be used by clients with partial-synchrony assumptions to commit.

[0094] If a replica detects a lack of progress in view v or observes malicious leader behavior such as more than one height-k blocks in the same view, it blames the leader of view v by broadcasting a (blame, v) message. The replica quits view v and stops voting and broadcasting blocks in view v. To determine lack of progress, the replicas may simply guess a time bound for message arrival or use increasing timeouts for each view.

[0095] The view change protocol is described below. If a replica gathers q.sub.r blame messages from distinct replicas, it forwards them to all other replicas and enters a new view v+1. [0096] (Step (i)). The replica records the time at which it received the blame certificate as t-viewchange.sub.v. Upon entering a new view, a replica reports to the leader of the new view L.sup.j its locked block and transitions to the steady state [0097] (Step (ii)). q.sub.r status messages form the status S. The first block L.sup.j proposes in the new view extends the highest certified block among these q.sub.r status messages.

[0098] The client commit rules applicable to Flexible BFT for block chain transaction application are provided below, according to one or more embodiments.

[0099] Client Commit Rules [0100] Partially-synchronous commit (CR1). A block B.sub.k is committed under the partially synchronous rule with parameter qc iff there exists 1.gtoreq.k and v such that [0101] (a) C.sub.v.sup.qr(B) and C.sub.v.sup.qr(B.sub.l+1) exist where B.sub.l+1 extends B.sub.l and B.sub.k (if l=k, B.sub.l=B.sub.k). [0102] (b) q.sub.Bl, v.gtoreq.q.sub.c and q.sub.Bl+1, v.gtoreq.q.sub.c. [0103] Synchronous commit (CR2). A block bk is committed assuming A-synchrony iff the following holds for q.sub.r replicas. There exist l.gtoreq.k and v (possibly different across replicas) such that, [0104] (a) C.sub.v.sup.qr(B.sub.l) exists where B.sub.l extends B.sub.k (if l=k, B.sub.l=B.sub.k). [0105] (b) An undisturbed 2.DELTA. period is observed after B.sub.l+1 is obtained, i.e., no equivocating blocks or votes at height l or view v were observed before 2.DELTA. time after B.sub.l+1 was obtained, i.e.,

[0105] min .function. ( current time , t equiv l , v , t viewchange v ) - t lock l , v .times. v .gtoreq. 2 .times. .DELTA. ##EQU00001##

[0106] Flexible BFT according to the embodiments described above supports clients with different network and fault assumptions. Clients in Flexible BFT can learn the state of the protocol from the replicas, and, based on their own assumptions, determine whether a block has been committed. Flexible BFT supports two types of clients: those who believe in synchrony and those who believe in partial synchrony.

[0107] A client with partial-synchrony assumptions deduces whether a block has been committed based on the number of votes received by a block. A block B.sub.l (together with its ancestors) is committed with parameter q.sub.c if and only if (iff) B.sub.l and its immediate successor both receive .gtoreq.q.sub.c votes in the same view.

[0108] A commit by a client of a block B.sub.l with partial-synchrony assumptions based on q.sub.c votes is safe against <q.sub.c+q.sub.r-1 faulty replicas (Byzantine plus alive-but-corrupt). Note that if B.sub.l gets q.sub.c votes in view v, due to flexible quorum intersection, a conflicting block cannot be certified in view v, unless .gtoreq.q.sub.c+q.sub.r-1 replicas are faulty. Moreover, B.sub.l+1 extending B.sub.l has also received q.sub.c votes in view v. Thus, q.sub.c replicas lock block B.sub.l in view v. In subsequent views, honest replicas that have locked on B.sub.l will only vote for a block that extends B.sub.l unless they unlock. However, due to flexible quorum intersection, they will not unlock unless q.sub.c+q.sub.r 1 replicas are faulty.

[0109] A commit by a client of a block B.sub.k with Synchrony Assumptions involves q.sub.r replicas collectively stating that a block B.sub.l extending B.sub.k encounters no "bad event" within "sufficient time" in a view. Here, a bad event refers to either leader equivocation or view change (the latter indicates sufficient replicas believe leader is faulty) and the"sufficient time" is 2.DELTA., where .DELTA. is a synchrony bound chosen by the client. More formally, a replica states that a synchronous commit for block B.sub.k for a given parameter .DELTA. (set by a client) is satisfied iff the following holds. There exists B.sub.l+1 that extends B.sub.l and B.sub.k, and the replica observes an undisturbed-2.DELTA. period after obtaining B.sub.l+1, i.e., within 2.DELTA. time after B.sub.l+1 was obtained, (i) no equivocating block is observed at height l, and (ii) no blame certificate/view change certificate for view v was obtained, i.e., min(current-time, t-equiv.sub.l,v, t-viewchange.sub.v)-t-lock.sub.l,v.gtoreq.2.DELTA. where t-equiv.sub.l,v denotes the time equivocation for B.sub.l in view v was observed (o if no equivocation), t-viewchange.sub.v denotes the time at which view change happened from view v to v+1 (if no view change has happened yet), and t-lock.sub.l,v denotes the time at which B.sub.l was locked (or B.sub.l+1 was proposed) in view v. Note that the client does not require the q.sub.r fraction of replicas to report the same height/or view v. A client believing in synchrony assumes that all messages between replicas arrive within .DELTA. time after they were sent. If the client's chosen .DELTA. is a correct upper bound on message delay, then a full synchrony commit is safe against q.sub.r faulty replicas (Byzantine plus alive-but-corrupt), as explained below. If less than q.sub.r replicas are faulty, at least one honest replica h reported an undisturbed-2.DELTA. period. From h's perspective, an undisturbed 2.DELTA. period ensures safety. Observe that replicas in Flexible BFT forward the proposal when voting. If .DELTA.-synchrony holds, every other honest replica learns about the proposal B.sub.l at most .DELTA. time after h learns about it. If any honest replica voted for a conflicting block or quit view v, h would have known within 2.DELTA. time.

[0110] Based on the above descriptions, a block is committed directly under the partial synchrony assumption if the block and its immediate successor both get q.sub.c votes in the same view. A block is committed directly under the full synchrony assumption if some honest replica reports an undisturbed-2.DELTA. period after its successor block was obtained. A block is committed indirectly if neither condition applies to it but it is committed as a result of a block extending it being committed directly.

[0111] As described above, three parameters q.sub.r, q.sub.c, and .DELTA. may be used to determine the Flexible BFT protocol according to one or more embodiments. The parameter q.sub.r is the only parameter for the replicas and is picked by the service administrator. The choice of q.sub.r determines a set of client assumptions that can be supported. q.sub.c and .DELTA. are chosen by clients to commit blocks. Client fault assumptions that may be supported by a given q.sub.r, and the trade-offs between different choices of q.sub.r with respect to one or more embodiments are described below.

[0112] FIG. 10 is a graph showing clients supported at q.sub.r=2/3, where the x-axis represents Byzantine faults and the y-axis represents total faults (Byzantine plus alive-but-corrupt). Each point on the graph represents a client fault assumption as a pair: (Byzantine faults, total faults). The area 1005 beneath line 1000 indicates an "invalid area" since there cannot be fewer total faults than Byzantine replicas. A missing dimension in FIG. 10 is the choice of upper message delay bound A. Thus, the synchrony guarantee shown in this figure is for clients that choose a correct upper message delay bound. Clients with partial-synchrony assumptions can get fault tolerance on (or below) line 1010 (shown as a hatched area 1020 in FIG. 10). The right most point on the line 1010 is (1/3, 1/3), i.e., it tolerates less than a third of Byzantine replicas and no additional alive-but-corrupt replicas. This is the setting of existing partially synchronous consensus protocols. Flexible BFT generalizes these protocols by giving clients the option of moving up-left along the line, i.e., tolerating fewer Byzantine and more total faults. By choosing q.sub.c>q.sub.r, a client tolerates <q.sub.c+q.sub.r-1 total faults for safety and .ltoreq.1-q.sub.c Byzantine faults for liveness. In other words, as a client moves left on line 1010, for every additional vote it requires, it tolerates one fewer Byzantine fault and one more total fault (i.e., two more alive-but-corrupt faults). The left most point on line 1010 corresponds to Byzantine Faults/Total Faults (0, 2/3), and thus that point does not tolerate any Byzantine replicas but tolerates the highest fraction (2/3 of the total replicas participating in a view) of alive-but-corrupt replicas.

[0113] Moreover, for clients who believe in synchrony, if their maximum network delay A assumption is correct, those clients enjoy 1/3 Byzantine tolerance and 2/3 total tolerance as represented by plot point 1040. This is because synchronous commit rules are not parameterized by the number of votes received.

[0114] In FIG. 10, the portion of the plot labeled as area 1020 represents fault tolerance provided by the partially synchronous commit rule described above. Specifically, setting q.sub.c to the total fault fraction yields the necessary commit rule. On the other hand, if a client's required fault tolerance lies in the portion of the plot labeled as area 1030, then the synchronous commit rule described above with an appropriate .DELTA. picked by the client yields the necessary commit rule. Finally, if a client's target fault tolerance corresponds to the other regions of the plot above line 1000, then it is not achievable with the chosen value of q.sub.r equal to 2/3.

[0115] If a client has made an incorrect assumption with respect to the fault threshold or synchrony parameter .DELTA., then it can lose safety or liveness. If a client believing in synchrony picks too small a .DELTA. and commits a value b, it is possible that a conflicting value P may also be certified. Replicas may choose to extend the branch containing b.sup.j, effectively reverting b and causing a safety violation. Whenever a client detects such a safety violation, it may need to revert some of its commits and increase .DELTA. to recover.

[0116] For a client with partial-synchrony assumption, if it loses safety, it can update its fault model to move left along the line 1010, i.e., tolerate higher total faults but fewer Byzantine faults. On the other hand, if it observes no progress as its threshold q.sub.c is not met, then it moves towards the right on line 1010. However, if the true fault model is in the hatched region labeled as area 1030 in FIG. 10, then the client cannot find a partially synchronous commit rule that is both safe and live and eventually has to switch to using a synchronous commit rule.

[0117] As explained above, the goal of alive-but-corrupt replicas is to attack safety. Thus, clients with incorrect assumptions may be exploited by alive-but-corrupt replicas for their own gain (e.g., by double-spending). When a client updates to a correct assumption and recovers from unsafe commits, their subsequent commits would be safe and final. This is remotely analogous to how a Bltcoin block chain operates, in which if a client commits to a transaction when it is a few blocks deep and a powerful adversary succeeds in creating an alternative longer fork, the commit is reverted.

[0118] Similar to the choice of q.sub.c and .DELTA. by the client as explained above, the choice of q.sub.r by the service administrator should be carefully chosen. In general, the service administrator's goal is to tolerate a large number of Byzantine and alive-but-corrupt faults, i.e., move towards top and/or right of the figure. FIG. 11 shows the trade-offs in terms of clients supported by different q.sub.r values besides q.sub.r=2/3 as shown in FIG. 10 when using Flexible BFT according to one or more embodiments. Specifically, FIG. 11 shows the five respective partial-synchrony fault lines achievable for q.sub.r=0.5, 0.6, 0.67, 0.75, and 0.8, and FIG. 11 also shows the five respective synchrony fault points achievable for those same q.sub.r values. Thus, for the synchrony assumption, a fraction of Byzantine faults equal to 0.5 and a fraction of total faults equal to 0.5 is achievable by using q.sub.r=0.5 as shown by plot point 1110, whereas a fraction of Byzantine faults equal to 0.2 and a fraction of total faults equal to 0.8 is achievable by using q.sub.r=0.8 as shown by plot point 1120. The other fault operating points for q.sub.r=0.75, 0.67 and 0.6 are shown in FIG. 10 going along a downward diagonal path from the q.sub.r=0.8 operating point 1120 to the q.sub.r=0.5 operating point 1110. For the partial synchrony assumption, the line 1130 that runs diagonally downward from the point (0.8, 0.0) Fraction of Total Faults/Fraction of Byzantine Faults to the point (0.5, 0.2) Fraction of Total Faults/Fraction of Byzantine Faults corresponds to the achievable fault models by using q.sub.r=0.8. The other fault lines that follow the same diagonal downward path for q.sub.r=0.75, 0.67, 0.6, and 0.5 are shown in FIG. 11 below the q.sub.r=0.8 fault line 1030.

[0119] As can be seen from FIG. 10 and FIG. 11, for clients with partial-synchrony assumptions, q.sub.r.gtoreq.2/3 dominates q.sub.r<2/3. Note that the fraction of Byzantine replicas (B) are bounded by B<q.sub.c+q.sub.r-1 and B.ltoreq.1-q.sub.c, so B.ltoreq.q.sub.r/2. Thus, as q.sub.r decreases, Byzantine fault tolerance decreases. Moreover, since the total fault tolerance is q.sub.c+q.sub.r-1, a lower q.sub.r also tolerates a smaller fraction of total faults for a fixed q.sub.c.

[0120] For q.sub.r.gtoreq.2/3 or for clients believing in synchrony, no value of q.sub.r is Pareto optimal. For clients with partial-synchrony assumptions, as q.sub.r increases, the total fault tolerance for safety increases. But since q.sub.c.gtoreq.q.sub.r, this leads to B.ltoreq.1-q.sub.r, and hence the Byzantine tolerance for liveness decreases. For clients believing in synchrony, the total fault tolerance for safety is <q.sub.r and the Byzantine fault tolerance for liveness is .ltoreq.1-q.sub.r. In both cases, the choice of q.sub.r represents a safety-liveness trade-off.

[0121] The various embodiments described herein may employ various computer-implemented operations involving data stored in computer systems. For example, these operations may require physical manipulation of physical quantities--usually, though not necessarily, these quantities may take the form of electrical or magnetic signals, where they or representations of them are capable of being stored, transferred, combined, compared, or otherwise manipulated. Further, such manipulations are often referred to in terms, such as producing, identifying, determining, or comparing. Any operations described herein that form part of one or more embodiments of the invention may be useful machine operations. In addition, one or more embodiments of the invention also relate to a device or an apparatus for performing these operations. The apparatus may be specially constructed for specific required purposes, or it may be a general purpose computer selectively activated or configured by a computer program stored in the computer. In particular, various general purpose machines may be used with computer programs written in accordance with the teachings herein, or it may be more convenient to construct a more specialized apparatus to perform the required operations.

[0122] The various embodiments described herein may be practiced with other computer system configurations including hand-held devices, microprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like.

[0123] One or more embodiments of the present invention may be implemented as one or more computer programs or as one or more computer program modules embodied in one or more computer readable media. The term computer readable medium refers to any data storage device that can store data which can thereafter be input to a computer system--computer readable media may be based on any existing or subsequently developed technology for embodying computer programs in a manner that enables them to be read by a computer. Examples of a computer readable medium include a hard drive, network attached storage (NAS), read-only memory, random-access memory (e.g., a flash memory device), a CD (Compact Discs) --CD-ROM, a CD-R, or a CD-RW, a DVD (Digital Versatile Disc), a magnetic tape, and other optical and non-optical data storage devices. The computer readable medium can also be distributed over a network coupled computer system so that the computer readable code is stored and executed in a distributed fashion.

[0124] Although one or more embodiments of the present invention have been described in some detail for clarity of understanding, it will be apparent that certain changes and modifications may be made within the scope of the claims. Accordingly, the described embodiments are to be considered as illustrative and not restrictive, and the scope of the claims is not to be limited to details given herein, but may be modified within the scope and equivalents of the claims. In the claims, elements and/or steps do not imply any particular order of operation, unless explicitly stated in the claims.

[0125] Many variations, modifications, additions, and improvements are possible. Boundaries between various components, operations and data stores are somewhat arbitrary, and particular operations are illustrated in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of the invention(s). In general, structures and functionality presented as separate components in exemplary configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements may fall within the scope of the appended claim(s).

* * * * *


uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed