Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol

IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS IEEE Transactions on Information Forensics and Security Pub Date : 2025-02-20 DOI:10.1109/TIFS.2025.3544034
Ximing Fu;Mo Li;Qingming Zeng;Tianyang Li;Shenghao Yang;Yonghui Guan;Chuanyi Liu
{"title":"Hamster: A Fast Synchronous Byzantine Fault Tolerant Protocol","authors":"Ximing Fu;Mo Li;Qingming Zeng;Tianyang Li;Shenghao Yang;Yonghui Guan;Chuanyi Liu","doi":"10.1109/TIFS.2025.3544034","DOIUrl":null,"url":null,"abstract":"This paper presents Hamster, a novel synchronous Byzantine Fault Tolerant protocol that achieves high throughput and weaker dependency on synchrony. Specifically, Hamster is the first to introduce coding techniques into synchronous BFT, addressing the challenges posed by higher fault tolerance requirements and significantly reducing communication complexity. Consequently, Hamster achieves linear throughput gains as the number of nodes increases, surpassing Sync HotStuff. Additionally, with minor modifications, Hamster can operate effectively in mobile sluggish environments, further reducing its dependency on strict synchrony. We implement Hamster, and experimental results highlight its performance advantages. Specifically, Hamster achieves <inline-formula> <tex-math>$2.5\\times $ </tex-math></inline-formula> the throughput of Sync HotStuff in a network of 9 nodes, with this gain growing to <inline-formula> <tex-math>$10\\times $ </tex-math></inline-formula> as the network scales to 65 nodes. This increasing throughput advantage makes Hamster more applicable to large-scale distributed systems.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"2664-2676"},"PeriodicalIF":8.0000,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10896734/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper presents Hamster, a novel synchronous Byzantine Fault Tolerant protocol that achieves high throughput and weaker dependency on synchrony. Specifically, Hamster is the first to introduce coding techniques into synchronous BFT, addressing the challenges posed by higher fault tolerance requirements and significantly reducing communication complexity. Consequently, Hamster achieves linear throughput gains as the number of nodes increases, surpassing Sync HotStuff. Additionally, with minor modifications, Hamster can operate effectively in mobile sluggish environments, further reducing its dependency on strict synchrony. We implement Hamster, and experimental results highlight its performance advantages. Specifically, Hamster achieves $2.5\times $ the throughput of Sync HotStuff in a network of 9 nodes, with this gain growing to $10\times $ as the network scales to 65 nodes. This increasing throughput advantage makes Hamster more applicable to large-scale distributed systems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
仓鼠:一个快速同步拜占庭容错协议
提出了一种新的同步拜占庭容错协议Hamster,该协议具有高吞吐量和对同步依赖性较弱的特点。具体来说,Hamster是第一个将编码技术引入同步BFT的公司,解决了更高容错要求带来的挑战,并显著降低了通信复杂性。因此,随着节点数量的增加,Hamster实现了线性吞吐量增长,超过了Sync HotStuff。此外,稍加修改,仓鼠可以在移动缓慢的环境中有效地运行,进一步减少了对严格同步的依赖。我们实现了Hamster,实验结果显示了它的性能优势。具体来说,Hamster在9个节点的网络中实现了同步HotStuff的2.5倍吞吐量,随着网络扩展到65个节点,这一收益增长到10倍。这种不断增加的吞吐量优势使Hamster更适用于大规模分布式系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security 工程技术-工程:电子与电气
CiteScore
14.40
自引率
7.40%
发文量
234
审稿时长
6.5 months
期刊介绍: The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features
期刊最新文献
Assessing and Improving DNN Robustness against Adversarial Examples from the Perspective of Fully Connected Layers On the security of Sequential Multi-signer Ring Signature for Secure Medical Data Sharing in IoMT Interpretability-Oriented UAV Recognition via Frequency-Aware Networks: A Coarse-to-Fine Framework for Enhanced Accuracy and Insight Privacy-Preserving Multi-Modal Object Fusion for Connected Autonomous Vehicles: Resilience Against Malicious Third-Party Attacks Filter, Obstruct and Dilute: Defending Against Backdoor Attacks on Semi-Supervised Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1