2005
DOI: 10.1145/1095809.1095817
|View full text |Cite
|
Sign up to set email alerts
|

Fault-scalable Byzantine fault-tolerant services

Abstract: A fault-scalable service can be configured to tolerate increasing numbers of faults without significant decreases in performance. The Query/Update (Q/U) protocol is a new tool that enables construction of fault-scalable Byzantine faulttolerant services. The optimistic quorum-based nature of the Q/U protocol allows it to provide better throughput and fault-scalability than replicated state machines using agreement-based protocols. A prototype service built using the Q/U protocol outperforms the same service bui… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 135 publications
(19 citation statements)
references
References 38 publications
0
19
0
Order By: Relevance
“…Singh et al [21] provided the simulation framework BFT-Sim to evaluate BFT protocols. It builds upon the high-level declarative language P2 to implement three different BFT protocols [2], [10], [22] as well as ns-2, to explore various network conditions.…”
Section: B Bft Modelsmentioning
confidence: 99%
“…Singh et al [21] provided the simulation framework BFT-Sim to evaluate BFT protocols. It builds upon the high-level declarative language P2 to implement three different BFT protocols [2], [10], [22] as well as ns-2, to explore various network conditions.…”
Section: B Bft Modelsmentioning
confidence: 99%
“…Byzantine agreement has been the subject of extensive research and has seen a recent renewal of interest due to its application in blockchains [9]. To tolerate 𝑓 faults, Byzantine agreement algorithms typically require 3𝑓 +1 replicas [11,17,36], and some even require 5𝑓 +1 replicas [1,50]. This bound can be lowered, for example, to 2𝑓 + 1 if synchrony and digital signatures are assumed [2].…”
Section: Related Workmentioning
confidence: 99%
“…Column matrix W is used in the heuristic mode only, with the same constraints as matrix V. The operator "•" represents Hadamard multiplication, and the operator " BFT mode for the task at hand. The flavors of BFT algorithms for the DABFT to choose from include, but not limited to, DBFT and PBFT (Practical BFT), as well as Q/U (Abd-El- Malek et al 2005), HQ (Cowling et al 2006), Zyzzyva (Kotla et al 2009), Quorum (Guerraoui et al 2010), Chain (Guerraoui et al 2010), Ring (Guerraoui et al 2011), and RBFT (Redundant BFT) (Aublin et al 2013), etc. Figure 3 shows the consensus process for several mainstream BFT algorithms.…”
Section: Consensus Building Processmentioning
confidence: 99%