Skip to main content

Showing 1–29 of 29 results for author: Cachin, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.18646  [pdf, ps, other

    cs.LO

    Synergistic Knowledge

    Authors: Christian Cachin, David Lehnherr, Thomas Studer

    Abstract: In formal epistemology, group knowledge is often modelled as the knowledge that the group would have, if the agents shared all their individual knowledge. However, this interpretation does not account for relations between agents. In this work, we propose the notion of synergistic knowledge which makes it possible to model those relationships.

    Submitted 27 March, 2024; originally announced March 2024.

  2. arXiv:2401.02811  [pdf, other

    cs.DC

    An Analysis of Avalanche Consensus

    Authors: Ignacio Amores-Sesar, Christian Cachin, Philipp Schneider

    Abstract: A family of leaderless, decentralized consensus protocols, called Snow consensus was introduced in a recent whitepaper by Yin et al. These protocols address limitations of existing consensus methods, such as those using proof-of-work or quorums, by utilizing randomization and maintaining some level of resilience against Byzantine participants. Crucially, Snow consensus underpins the Avalanche bloc… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    ACM Class: F.2.2

  3. arXiv:2312.13107  [pdf, other

    cs.DC

    Quick Order Fairness: Implementation and Evaluation

    Authors: Christian Cachin, Jovana Micic

    Abstract: Decentralized finance revolutionizes traditional financial systems by leveraging blockchain technology to reduce trust. However, some vulnerabilities persist, notably front-running by malicious actors who exploit transaction information to gain financial advantage. Consensus with a fair order aims at preventing such attacks, and in particular, the differential order fairness property addresses thi… ▽ More

    Submitted 15 March, 2024; v1 submitted 20 December, 2023; originally announced December 2023.

  4. arXiv:2311.03092  [pdf, other

    cs.DC

    We will DAG you

    Authors: Ignacio Amores-Sesar, Christian Cachin

    Abstract: DAG-based protocols have been proposed as potential solutions to the latency and throughput limitations of traditional permissionless consensus protocols. However, their adoption has been hindered by security concerns and a lack of a solid foundation to guarantee improvements in both throughput and latency. In this paper, we present a construction that rigorously demonstrates how DAG-based protoco… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

  5. arXiv:2307.02954  [pdf, other

    cs.DC

    Eating sandwiches: Modular and lightweight elimination of transaction reordering attacks

    Authors: Orestis Alpos, Ignacio Amores-Sesar, Christian Cachin, Michelle Yeo

    Abstract: Traditional blockchains grant the miner of a block full control not only over which transactions but also their order. This constitutes a major flaw discovered with the introduction of decentralized finance and allows miners to perform MEV attacks. In this paper, we address the issue of sandwich attacks by providing a construction that takes as input a blockchain protocol and outputs a new blockch… ▽ More

    Submitted 6 November, 2023; v1 submitted 6 July, 2023; originally announced July 2023.

  6. arXiv:2211.12050  [pdf, ps, other

    cs.CR cs.DC

    Modeling Resources in Permissionless Longest-chain Total-order Broadcast

    Authors: Sarah Azouvi, Christian Cachin, Duc V. Le, Marko Vukolic, Luca Zanolini

    Abstract: Blockchain protocols implement total-order broadcast in a permissionless setting, where processes can freely join and leave. In such a setting, to safeguard against Sybil attacks, correct processes rely on cryptographic proofs tied to a particular type of resource to make them eligible to order transactions. For example, in the case of Proof-of-Work (PoW), this resource is computation, and the pro… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  7. arXiv:2211.05630  [pdf, ps, other

    cs.DC

    Quorum Systems in Permissionless Network

    Authors: Christian Cachin, Giuliano Losa, Luca Zanolini

    Abstract: Fail-prone systems, and their quorum systems, are useful tools for the design of distributed algorithms. However, fail-prone systems as studied so far require every process to know the full system membership in order to guarantee safety through globally intersecting quorums. Thus, they are of little help in an open, permissionless setting, where such knowledge may not be available. We propose to g… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

  8. arXiv:2210.03423  [pdf, other

    cs.DC

    When is Spring coming? A Security Analysis of Avalanche Consensus

    Authors: Ignacio Amores-Sesar, Christian Cachin, Enrico Tedeschi

    Abstract: Avalanche is a blockchain consensus protocol with exceptionally low latency and high throughput. This has swiftly established the corresponding token as a top-tier cryptocurrency. Avalanche achieves such remarkable metrics by substituting proof of work with a random sampling mechanism. The protocol also differs from Bitcoin, Ethereum, and many others by forming a directed acyclic graph (DAG) inste… ▽ More

    Submitted 7 October, 2022; originally announced October 2022.

  9. arXiv:2112.06615  [pdf, other

    cs.DC

    Quick Order Fairness

    Authors: Christian Cachin, Jovana Mićić, Nathalie Steinhauer, Luca Zanolini

    Abstract: Leader-based protocols for consensus, i.e., atomic broadcast, allow some processes to unilaterally affect the final order of transactions. This has become a problem for blockchain networks and decentralized finance because it facilitates front-running and other attacks. To address this, order fairness for payload messages has been introduced recently as a new safety property for atomic broadcast c… ▽ More

    Submitted 12 April, 2022; v1 submitted 13 December, 2021; originally announced December 2021.

  10. arXiv:2108.13502  [pdf, other

    cs.CR cs.DC

    Generalizing Weighted Trees: A Bridge from Bitcoin to GHOST

    Authors: Ignacio Amores-Sesar, Christian Cachin, Anna Parker

    Abstract: Despite the tremendous interest in cryptocurrencies like Bitcoin and Ethereum today, many aspects of the underlying consensus protocols are poorly understood. Therefore, the search for protocols that improve either throughput or security (or both) continues. Bitcoin always selects the longest chain (i.e., the one with most work). Forks may occur when two miners extend the same block simultaneously… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

  11. arXiv:2107.11331  [pdf, ps, other

    cs.DC

    How to Trust Strangers: Composition of Byzantine Quorum Systems

    Authors: Orestis Alpos, Christian Cachin, Luca Zanolini

    Abstract: Trust is the basis of any distributed, fault-tolerant, or secure system. A trust assumption specifies the failures that a system, such as a blockchain network, can tolerate and determines the conditions under which it operates correctly. In systems subject to Byzantine faults, the trust assumption is usually specified through sets of processes that may fail together. Trust has traditionally been s… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: To appear in the proceedings of SRDS 2021

  12. arXiv:2101.05543  [pdf, other

    cs.DC cs.CR

    On the Synchronization Power of Token Smart Contracts

    Authors: Orestis Alpos, Christian Cachin, Giorgia Azzurra Marson, Luca Zanolini

    Abstract: Modern blockchains support a variety of distributed applications beyond cryptocurrencies, including smart contracts -- which let users execute arbitrary code in a distributed and decentralized fashion. Regardless of their intended application, blockchain platforms implicitly assume consensus for the correct execution of a smart contract, thus requiring that all transactions are totally ordered. It… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

  13. arXiv:2011.14816  [pdf, other

    cs.DC cs.CR

    Security Analysis of Ripple Consensus

    Authors: Ignacio Amores-Sesar, Christian Cachin, Jovana Mićić

    Abstract: The Ripple network is one of the most prominent blockchain platforms and its native XRP token currently has one of the highest cryptocurrency market capitalizations. The Ripple consensus protocol powers this network and is generally considered to a Byzantine fault-tolerant agreement protocol, which can reach consensus in the presence of faulty or malicious nodes. In contrast to traditional Byzanti… ▽ More

    Submitted 30 November, 2020; originally announced November 2020.

  14. TZ4Fabric: Executing Smart Contracts with ARM TrustZone

    Authors: Christina Müller, Marcus Brandenburger, Christian Cachin, Pascal Felber, Christian Göttel, Valerio Schiavoni

    Abstract: Blockchain technology promises to revolutionize manufacturing industries. For example, several supply-chain use-cases may benefit from transparent asset tracking and automated processes using smart contracts. Several real-world deployments exist where the transparency aspect of a blockchain is both an advantage and a disadvantage at the same time. The exposure of assets and business interaction re… ▽ More

    Submitted 23 November, 2020; v1 submitted 26 August, 2020; originally announced August 2020.

    Comments: European Commission Projet: LEGaTO - Low Energy Toolset for Heterogeneous Computing (EC-H2020-780681)

    Journal ref: 2020 International Symposium on Reliable Distributed Systems (SRDS), Shanghai, China, 2020, pp. 31-40

  15. arXiv:2006.04616  [pdf, other

    cs.DC

    Consensus Beyond Thresholds: Generalized Byzantine Quorums Made Live

    Authors: Orestis Alpos, Christian Cachin

    Abstract: Existing Byzantine fault-tolerant (BFT) consensus protocols address only threshold failures, where the participating nodes fail independently of each other, each one fails equally likely, and the protocol's guarantees follow from a simple bound on the number of faulty nodes. With the widespread deployment of Byzantine consensus in blockchains and distributed ledgers today, however, more sophistica… ▽ More

    Submitted 3 August, 2020; v1 submitted 8 June, 2020; originally announced June 2020.

    Comments: To appear in the proceedings of SRDS 2020

  16. arXiv:2005.08795  [pdf, other

    cs.DC

    From Symmetric to Asymmetric Asynchronous Byzantine Consensus

    Authors: Christian Cachin, Luca Zanolini

    Abstract: Consensus is arguably one of the most important notions in distributed computing. Among asynchronous, randomized, and signature-free implementations, the protocols of Mostéfaoui et al. (PODC 2014 and JACM 2015) represent a landmark result, which has been extended later and taken up in practical systems. The protocols achieve optimal resilience and takes, in expectation, only a constant expected nu… ▽ More

    Submitted 4 June, 2021; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: text overlap with arXiv:1906.09314

  17. arXiv:1906.09314  [pdf, other

    cs.DC cs.CR

    Asymmetric Distributed Trust

    Authors: Orestis Alpos, Christian Cachin, Björn Tackmann, Luca Zanolini

    Abstract: Quorum systems are a key abstraction in distributed fault-tolerant computing for capturing trust assumptions. They can be found at the core of many algorithms for implementing reliable broadcasts, shared memory, consensus and other problems. This paper introduces asymmetric Byzantine quorum systems that model subjective trust. Every process is free to choose which combinations of other processes i… ▽ More

    Submitted 2 May, 2024; v1 submitted 21 June, 2019; originally announced June 2019.

    Comments: This work combines multiple preliminary publications on asymmetric trust and protocols with asymmetric trust, which appeared at OPODIS 2019, DISC 2021, and ESORICS-CBT 2021

  18. arXiv:1902.10010  [pdf, other

    cs.DC

    Anonymity Preserving Byzantine Vector Consensus

    Authors: Christian Cachin, Daniel Collins, Tyler Crain, Vincent Gramoli

    Abstract: Collecting anonymous opinions finds various applications ranging from simple whistleblowing, releasing secretive information, to complex forms of voting, where participants rank candidates by order of preferences. Unfortunately, as far as we know there is no efficient distributed solution to this problem. Previously, participants had to trust third parties, run expensive cryptographic protocols or… ▽ More

    Submitted 27 April, 2020; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: In submission

  19. arXiv:1805.08541  [pdf, other

    cs.DC cs.CR

    Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric

    Authors: Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza, Alessandro Sorniotti

    Abstract: A smart contract on a blockchain cannot keep a secret because its data is replicated on all nodes in a network. To remedy this problem, it has been suggested to combine blockchains with trusted execution environments (TEEs), such as Intel SGX, for executing applications that demand privacy. Untrusted blockchain nodes cannot get access to the data and computations inside the TEE. This paper first… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

  20. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains

    Authors: Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, Jason Yellick

    Abstract: Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of the Hyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first truly extensible blockchain system for running distributed applications. It supports modular consensus protocols, which allows the system to be tailored to particular use cases and… ▽ More

    Submitted 17 April, 2018; v1 submitted 30 January, 2018; originally announced January 2018.

    Comments: Appears in proceedings of EuroSys 2018 conference

  21. arXiv:1707.01873  [pdf, ps, other

    cs.DC

    Blockchain Consensus Protocols in the Wild

    Authors: Christian Cachin, Marko Vukolić

    Abstract: A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received… ▽ More

    Submitted 7 July, 2017; v1 submitted 6 July, 2017; originally announced July 2017.

  22. arXiv:1701.00981  [pdf, other

    cs.DC

    Rollback and Forking Detection for Trusted Execution Environments using Lightweight Collective Memory

    Authors: Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza

    Abstract: Novel hardware-aided trusted execution environments, as provided by Intel's Software Guard Extensions (SGX), enable to execute applications in a secure context that enforces confidentiality and integrity of the application state even when the host system is misbehaving. While this paves the way towards secure and trustworthy cloud computing, essential system support to protect persistent applicati… ▽ More

    Submitted 19 June, 2017; v1 submitted 4 January, 2017; originally announced January 2017.

    Comments: This is the authors' version of an article published in the Proceedings of the 47th International Conference on Dependable Systems and Networks (DSN'17), Denver, USA, 26-29 June 2017

  23. arXiv:1603.07351  [pdf, ps, other

    cs.DC cs.CR

    Non-determinism in Byzantine Fault-Tolerant Replication

    Authors: Christian Cachin, Simon Schubert, Marko Vukolić

    Abstract: Service replication distributes an application over many processes for tolerating faults, attacks, and misbehavior among a subset of the processes. The established state-machine replication paradigm inherently requires the application to be deterministic. This paper distinguishes three models for dealing with non-determinism in replicated services, where some processes are subject to faults and ar… ▽ More

    Submitted 19 December, 2016; v1 submitted 23 March, 2016; originally announced March 2016.

    ACM Class: C.2.4; D.1.3

  24. arXiv:1502.05831  [pdf, other

    cs.DC

    XFT: Practical Fault Tolerance Beyond Crashes

    Authors: Shengyun Liu, Paolo Viotti, Christian Cachin, Vivien Quéma, Marko Vukolić

    Abstract: Despite years of intensive research, Byzantine fault-tolerant (BFT) systems have not yet been adopted in practice. This is due to additional cost of BFT in terms of resources, protocol complexity and performance, compared with crash fault-tolerance (CFT). This overhead of BFT comes from the assumption of a powerful adversary that can fully control not only the Byzantine faulty machines, but at the… ▽ More

    Submitted 8 November, 2016; v1 submitted 20 February, 2015; originally announced February 2015.

  25. arXiv:1502.04496  [pdf, other

    cs.DC cs.CR

    Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores

    Authors: Marcus Brandenburger, Christian Cachin, Nikola Knežević

    Abstract: Cloud services have turned remote computation into a commodity and enable convenient online collaboration. However, they require that clients fully trust the service provider in terms of confidentiality, integrity, and availability. Towards reducing this dependency, this paper introduces a protocol for verification of integrity and consistency for cloud object storage (VICOS), which enables a grou… ▽ More

    Submitted 2 September, 2016; v1 submitted 16 February, 2015; originally announced February 2015.

  26. arXiv:1402.4958  [pdf, ps, other

    cs.DC

    Erasure-Coded Byzantine Storage with Separate Metadata

    Authors: Elli Androulaki, Christian Cachin, Dan Dobre, Marko Vukolic

    Abstract: Although many distributed storage protocols have been introduced, a solution that combines the strongest properties in terms of availability, consistency, fault-tolerance, storage complexity and the supported level of concurrency, has been elusive for a long time. Combining these properties is difficult, especially if the resulting solution is required to be efficient and incur low cost. We presen… ▽ More

    Submitted 20 February, 2014; originally announced February 2014.

  27. arXiv:1305.4868  [pdf, other

    cs.DC

    Asynchronous BFT Storage with 2t+1 Data Replicas

    Authors: Christian Cachin, Dan Dobre, Marko Vukolic

    Abstract: The cost of Byzantine Fault Tolerant (BFT) storage is the main concern preventing its adoption in practice. This cost stems from the need to maintain at least 3t+1 replicas in different storage servers in the asynchronous model, so that t Byzantine replica faults can be tolerated. In this paper, we present MDStore, the first fully asynchronous read/write BFT storage protocol that reduces the numbe… ▽ More

    Submitted 13 February, 2014; v1 submitted 21 May, 2013; originally announced May 2013.

  28. Verifying the Consistency of Remote Untrusted Services with Conflict-Free Operations

    Authors: Christian Cachin, Olga Ohrimenko

    Abstract: A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of the server's responses. This paper presents the Conflict-free Operation verification Protocol (COP) that en… ▽ More

    Submitted 26 March, 2018; v1 submitted 20 February, 2013; originally announced February 2013.

    Comments: A predecessor of this paper with a slightly different title appears in the proceedings of OPODIS 2014, Lecture Notes in Computer Science, vol.~8878, Springer, 2014

  29. arXiv:0805.2068  [pdf, other

    cs.DC

    Fork Sequential Consistency is Blocking

    Authors: Christian Cachin, Idit Keidar, Alexander Shraer

    Abstract: We consider an untrusted server storing shared data on behalf of clients. We show that no storage access protocol can on the one hand preserve sequential consistency and wait-freedom when the server is correct, and on the other hand always preserve fork sequential consistency.

    Submitted 14 May, 2008; originally announced May 2008.

    Comments: 7 pages, 3 figures

    Report number: CCIT 697