最新区块链论文速读--CCF A会议 CCS 2023 共25篇 附pdf下载(2/4)

图片

Conference:ACM Conference on Computer and Communications Security (CCS)

CCF level:CCF A

Categories:network and information security

Year:2023

Num:25

第1~7篇区块链文章请点击此处查看上篇

8

Title: 

ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path

ParBFT:具有并行优化路径的更快异步BFT共识

Authors

图片

Key words:

Byzantine fault tolerance, Byzantine generals, consensus, blockchain

拜占庭容错,拜占庭将军,共识,区块链

Abstract

To reduce latency and communication overhead of asynchronous Byzantine Fault Tolerance (BFT) consensus, an optimistic path is often added, with Ditto and BDT as state-of-the-art representatives. These protocols first attempt to run an optimistic path that is typically adapted from partially-synchronous BFT and promises good performance in good situations. If the optimistic path fails to make progress, these protocols switch to a pessimistic path after a timeout, to guarantee liveness in an asynchronous network. This design crucially relies on an accurate estimation of the network delay Δ to set the timeout parameter correctly. A wrong estimation of Δ can lead to either premature or delayed switching to the pessimistic path, hurting the protocol's efficiency in both cases. To address the above issue, we propose ParBFT, which employs a parallel optimistic path. As long as the leader of the optimistic path is non-faulty, ParBFT ensures low latency without requiring an accurate estimation of the network delay. We propose two variants of ParBFT, namely ParBFT1 and ParBFT2, with a trade-off between latency and communication. ParBFT1 simultaneously launches the two paths, achieves lower latency under a faulty leader, but has a quadratic message complexity even in good situations. ParBFT2 reduces the message complexity in good situations by delaying the pessimistic path, at the cost of a higher latency under a faulty leader. Experimental results demonstrate that ParBFT outperforms Ditto or BDT. In particular, when the network condition is bad, ParBFT can reach consensus through the optimistic path, while Ditto and BDT suffer from path switching and have to make progress using the pessimistic path.

为了减少异步拜占庭容错(BFT)共识的延迟和通信开销,通常会增加一条乐观路径,其中最先进的代表是 Ditto 和 BDT。这些协议首先尝试运行一条乐观路径,该路径通常由部分同步 BFT 改编而来,并承诺在良好的情况下具有良好的性能。如果乐观路径无法取得进展,这些协议会在超时后切换到悲观路径,以保证异步网络中的有效性。这种设计主要依赖于对网络延迟 Δ 的准确估计,以正确设置超时参数。对 Δ 的错误估计会导致过早或延迟切换到悲观路径,在这两种情况下都会损害协议的效率。为解决上述问题,我们提出了采用并行乐观路径的 ParBFT。只要乐观路径的领导者没有问题,ParBFT 就能确保低延迟,而无需准确估计网络延迟。我们提出了 ParBFT 的两个变体,即 ParBFT1 和 ParBFT2,并在延迟和通信之间进行了权衡。ParBFT1 可同时启动两条路径,在领导者出现故障的情况下可实现较低的延迟,但即使在良好的情况下也会产生二次信息复杂度。ParBFT2 通过延迟悲观路径降低了良好情况下的信息复杂度,但代价是在领导者出错的情况下延迟时间较长。实验结果表明,ParBFT 优于 Ditto 或 BDT。特别是当网络状况不佳时,ParBFT 可以通过乐观路径达成共识,而 Ditto 和 BDT 则受到路径切换的影响,不得不使用悲观路径取得进展。

图片

图片

注:Provable Broadcast (PB),Asynchronous Binary Agreement (ABA) protocol,Validated Asynchronous Byzantine Agreement (VABA) protocols

图片

图片

Pdf link:

https://dl.acm.org/doi/10.1145/3576915.3623101

9

Title: 

Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus

Abraxas:吞吐量高效的混合异步共识

Authors

图片

Key words:

State Machine Replication, Asynchrony, Hybrid Protocol

状态机复制、异步、混合协议

Abstract

Protocols for state-machine replication (SMR) often trade off performance for resilience to network delay. In particular, protocols for asynchronous SMR tolerate arbitrary network delay but sacrifice throughput/latency when the network is fast, while partially synchronous protocols have good performance in a fast network but fail to make progress if the network experiences high delay. Existing hybrid protocols are resilient to arbitrary network delay and have good performance when the network is fast, but suffer from high overhead (''thrashing'') if the network repeatedly switches between being fast and slow, e.g., in a network that is typically fast but has intermittent message delays. We propose Abraxas, a generic approach for constructing a hybrid protocol from any ''fast'' protocol Πfast and asynchronous protocolΠslow to achieve (1) security and performance equivalent to Πslow under arbitrary network behavior, and (2) performance equivalent to Πfast when conditions are favorable. We instantiate Abraxas with the best existing protocols for Πfast (Jolteon) and Πslow (2-chain VABA), and show experimentally that the resulting protocol significantly outperforms Ditto, the previous state-of-the-art hybrid protocol.

状态机复制(SMR)协议通常以性能换取对网络延迟的适应能力。特别是,异步状态机复制协议可容忍任意网络延迟,但在网络速度较快时,会牺牲吞吐量/延迟,而部分同步协议在快速网络中性能良好,但如果网络延迟较高,则无法取得进展。现有的混合协议能抵御任意网络延迟,在网络快速时性能良好,但如果网络在快速和慢速之间反复切换,例如,在通常快速但有间歇性信息延迟的网络中,则会出现高开销(“thrashing”)。我们提出的 Abraxas 是一种通用方法,用于从任意 “快 ”协议Πfast 和异步协议Πslow 构建混合协议,以实现:(1) 在任意网络行为下等同于Πslow 的安全性和性能;(2) 在条件有利时等同于Πfast 的性能。我们将 Abraxas 与现有的最佳 Πfast 协议(Jolteon)和 Πslow 协议(2-chain VABA)进行实例化,并通过实验证明,所产生的协议大大优于之前最先进的混合协议 Ditto。 

图片

图片

Pdf link:

https://dl.acm.org/doi/10.1145/3576915.3623191

10

Title: 

Analyzing the Real-World Security of the Algorand Blockchain

分析 Algorand 区块链在现实世界中的安全性

Authors

图片

Key words:

State Machine Replication, Asynchrony, Blockchain

状态机复制、异步、区块链

Abstract

The Algorand consensus protocol is interesting both in theory and in practice. On the theoretical side, to achieve adaptive security, it introduces the novel idea of player replaceability, where each step of the protocol is executed by a different randomly selected committee whose members remain secret until they send their first and only message. The protocol provides consistency under arbitrary network conditions and liveness under intermittent network partitions. On the practical side, the protocol is used to secure the Algorand cryptocurrency, whose total value is approximately 850M at the time of writing. The Algorand protocol in use differs substantially from the protocols described in the published literature on Algorand. Despite its significance, it lacks a formal analysis. In this work, we describe and analyze the Algorand consensus protocol as deployed today in Algorand's ecosystem. We show that the overall protocol framework is sound by characterizing network conditions and parameter settings under which the protocol can be proven secure.

Algorand 共识协议在理论和实践上都很有趣。在理论方面,为了实现自适应安全性,该协议引入了 “参与者可替换性 ”的新理念,即协议的每一步都由随机选择的不同委员会执行,这些委员会的成员在发送第一条也是唯一一条信息之前都是保密的。该协议可在任意网络条件下保持一致性,并在间歇性网络分区下保持有效性。在实际应用方面,该协议用于保护 Algorand 加密货币的安全,在撰写本文时,该加密货币的总价值约为 8.5 亿美元。使用中的 Algorand 协议与已发表的 Algorand 文献中描述的协议有很大不同。尽管它非常重要,但却缺乏正式的分析。在这项工作中,我们描述并分析了目前部署在 Algorand 生态系统中的 Algorand 共识协议。我们通过描述网络条件和参数设置来证明整个协议框架是合理的,在这些条件和参数设置下,协议可以被证明是安全的。

图片

Pdf link:

https://dl.acm.org/doi/10.1145/3576915.3623167

11

Title: 

Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees

既成事实委员会的选择:改善基于stake的委员会的规模与安全权衡

Authors

图片

Key words:

Consensus; Delegation; Distributed ledgers; Committee selection

共识;授权;分布式账本;委员会选举

Abstract

We study the problem of committee selection in the context of proof-of-stake consensus mechanisms or distributed ledgers. These settings determine a family of participating parties---each of which has been assigned a non-negative ''stake''---and are subject to an adversary that may corrupt a subset of the parties. The challenge is to select a committee of participants that accurately reflects the proportion of corrupt and honest parties, as measured by stake, in the full population. The trade-off between committee size and the probability of selecting a committee that over-represents the corrupt parties is a fundamental factor in both security and efficiency of proof-of-stake consensus, as well as committee-run layer-two protocols. We propose and analyze several new committee selection schemes that improve upon existing techniques by adopting low-variance assignment of certain committee members that hold significant stake. These schemes provide notable improvements to the size--security trade-off arising from the stake distributions of many deployed ledgers.

我们在权益证明共识机制或分布式账本的背景下研究委员会选择问题。这些设置确定了一系列参与方——每个参与方都被分配了一个非负的“股份”——并且受到可能破坏参与方子集的对手的影响。面临的挑战是选择一个参与者委员会,该委员会能够准确反映腐败团体和诚实团体在全体中的比例(按股份衡量)。委员会规模和选择一个过多代表腐败方的委员会的可能性之间的权衡是权益证明共识以及委员会运行的第二层协议的安全性和效率的基本因素。我们提出并分析了几种新的委员会选择方案,这些方案通过对持有大量股份的某些委员会成员采用低方差分配来改进现有技术。这些方案显着改善了许多已部署账本的权益分配带来的规模安全权衡。

图片

Pdf link:

https://dl.acm.org/doi/10.1145/3576915.3623194

12

Title: 

LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures

LedgerLocks:基于适配器签名的区块链协议安全框架

Authors

图片

Key words:

Adaptor Signatures, Universal Composability, Security

适配器签名、通用可组合性、安全性

Abstract

The scalability and interoperability challenges in current cryptocurrencies have motivated the design of cryptographic protocols that enable efficient applications on top and across widely used cryptocurrencies such as Bitcoin or Ethereum. Examples of such protocols include (virtual) payment channels, atomic swaps, oracle-based contracts, deterministic wallets, and coin mixing services. Many of these protocols are built upon minimal core functionalities supported by a wide range of cryptocurrencies. Most prominently, adaptor signatures (AS) have emerged as a powerful tool for constructing blockchain protocols that are (mostly) agnostic to the specific logic of the underlying cryptocurrency. Even though AS-based protocols are built upon the same cryptographic principles, there exists no modular and faithful way for reasoning about their security. Instead, all the works analyzing such protocols focus on reproving how adaptor signatures are used to cryptographically link transactions while considering highly simplified blockchain models that do not capture security-relevant aspects of transaction execution in blockchain-based consensus. To help this, we present LedgerLocks, a framework for the secure design of AS-based blockchain applications in the presence of a realistic blockchain. LedgerLocks defines the concept of AS-locked transactions, transactions whose publication is bound to the knowledge of a cryptographic secret. We argue that AS-locked transactions are the common building block of AS-based blockchain protocols and we define GLedgerLocks a realistic ledger model in the Universal Composability framework with built-in support for AS-locked transactions. As LedgerLocks abstracts from the cryptographic realization of AS-locked transactions, it allows protocol designers to focus on the blockchain-specific security considerations instead.

当前加密货币的可扩展性和互操作性挑战促使人们设计加密协议,以便在广泛使用的加密货币(如比特币或以太坊)之上和之间实现高效的应用。此类协议的示例包括(虚拟)支付渠道、原子交换、基于预言机的合约、确定性钱包和硬币混合服务。许多此类协议都建立在各种加密货币支持的最小核心功能之上。最突出的是,适配器签名 (AS) 已成为构建区块链协议的强大工具,这些协议(大部分)与底层加密货币的特定逻辑无关。即使基于 AS 的协议建立在相同的加密原理之上,也没有模块化和可靠的方法来推理它们的安全性。相反,所有分析此类协议的工作都侧重于证明如何使用适配器签名以加密方式链接交易,同时考虑高度简化的区块链模型,这些模型不会捕获基于区块链的共识中交易执行的安全相关方面。为了实现这一点,我们提出了 LedgerLocks,这是一个在存在现实区块链的情况下基于 AS 的区块链应用程序的安全设计框架。LedgerLocks 定义了 AS 锁定交易的概念,即交易的发布与加密秘密的知识绑定在一起。我们认为 AS 锁定交易是基于 AS 的区块链协议的共同构建块,我们在 Universal Composability 框架中定义了 GLedgerLocks 这个现实的账本模型,内置了对 AS 锁定交易的支持。由于 LedgerLocks 从 AS 锁定交易的加密实现中抽象出来,因此它允许协议设计者专注于特定于区块链的安全考虑。

图片

图片

图片

图片

图片

图片

Pdf link:

https://dl.acm.org/doi/10.1145/3576915.3623149

13

Title: 

Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos

Phoenix:通过上下文敏感混沌检测和定位区块链中的弹性问题

Authors

图片

Key words:

blockchain systems, chaos engineering, bug reproduce

区块链系统、混沌工程、bug重现

Abstract

Resilience is vital to blockchain systems and helps them automatically adapt and continue providing their service when adverse situations occur, e.g., node crashing and data discarding. However, due to the vulnerabilities in their implementation, blockchain systems may fail to recover from the error situations, resulting in permanent service disruptions. Such vulnerabilities are called resilience issues. In this paper, we propose Phoenix, a system that helps detect and locate blockchain systems' resilience issues by context-sensitive chaos. First, we identify two typical types of resilience issues in blockchain systems: node unrecoverable and data unrecoverable. Then, we design three context-sensitive chaos strategies tailored to the blockchain feature. Additionally, we create a coordinator to effectively trigger resilience issues by scheduling these strategies. To better analyze them, we collect and sort all strategies into a pool and generate a reproducing sequence to locate and reproduce those issues. We evaluated Phoenix on 5 widely used commercial blockchain systems and detected 13 previous-unknown resilience issues. Besides, Phoenix successfully reproduces all of them, with 5.15 steps on average. The corresponding developers have fixed these issues. After that, the chaos resistance time of blockchains is improved by 143.9% on average. This indicates that Phoenix can significantly improve the resilience of these blockchains.

弹性对于区块链系统至关重要,可帮助它们在发生不利情况(例如节点崩溃和数据丢弃)时自动适应并继续提供服务。但是,由于其实施中的漏洞,区块链系统可能无法从错误情况中恢复,从而导致永久性服务中断。此类漏洞称为弹性问题。在本文中,我们提出了 Phoenix,这是一个通过上下文敏感混沌帮助检测和定位区块链系统弹性问题的系统。首先,我们确定了区块链系统中两种典型的弹性问题:节点不可恢复和数据不可恢复。然后,我们设计了三种针对区块链特性的上下文敏感混沌策略。此外,我们创建了一个协调器,通过调度这些策略来有效触发弹性问题。为了更好地分析它们,我们将所有策略收集并分类到一个池中,并生成一个重现序列来定位和重现这些问题。我们在 5 个广泛使用的商业区块链系统上评估了 Phoenix,并检测到 13 个以前未知的弹性问题。此外,Phoenix 成功重现了所有问题,平均需要 5.15 步。相应的开发人员已经修复了这些问题。之后区块链的抗混乱时间平均提升了143.9%,这意味着Phoenix可以显著提高这些区块链的弹性。

图片

图片

图片

图片

图片

图片

图片

Pdf link:

https://dl.acm.org/doi/10.1145/3576915.3623071

篇幅有限,下篇文章将继续分享剩余论文

图片

关注ccfsci,持续接收区块链最新论文

洞察区块链技术发展趋势

Follow us to keep receiving the latest blockchain papers

Insight into Blockchain Technology Trends

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/850116.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

【C/C++】IO流

目录 前言: 一,C语言的I/O流 二,C的I/O流 2-1,C标准IO流 2-2,IO流的连续输入 前言: “流”即是流动的意思,是物质从一处向另一处流动的过程,是对一种有序连续且具有方向性的数据…

测试基础11:测试用例设计方法-等价类划分

课程大纲 1、概述 1.1测试用例设计方法意义 穷举测试:每种输入都测一次。最完备,但不现实。 使用设计方法,用最少的数据(成本),实现最大的测试覆盖。 1.2常用设计方法 ①等价类划分 ②边界值分析 ③错误推…

Python采集东方财富网股票数据建立LSTM模型预测

Python采集东方财富网股票数据建立LSTM模型预测 一、数据爬取流程二、爬虫完整代码三、LSTM模型建模预测3.1 项目背景3.2 建模预测流程3.3 数据预处理3.4 数据可视化3.5 特征工程3.6 数据缩放3.7 数据转换3.8 模型创建3.9 评价模型3.10 可视化结果3.11 总结一、数据爬取流程 先…

运维开发(DevOps):加速软件交付的关键方法

1. 什么是运维开发 运维开发(DevOps)是将软件开发(Development)与信息技术运维(Operations)的流程整合在一起的实践方法。DevOps的目标是通过增强开发和运维团队之间的协作,提高软件产品的发布…

Linux路由设置

添加路由 一:使用 route 命令添加 使用route 命令添加的路由,机器重启或者网卡重启后路由就失效了,方法: //添加到主机的路由 # route add –host 192.168.1.11 dev eth0 # route add –host 192.168.1.12 gw 192.168.1.1 //添…

【计算机视觉】数字图像处理基础:以像素为单位的图像基本运算(点运算、代数运算、逻辑运算、几何运算、插值)

0、前言 在上篇文章中,我们对什么是数字图像、以及数字图像的组成(离散的像素点)进行了讲解🔗【计算机视觉】数字图像处理基础知识:模拟和数字图像、采样量化、像素的基本关系、灰度直方图、图像的分类。 我们知道&a…

【ARM Cache 与 MMU 系列文章 7.3 – ARMv8/v9 MMU 块描述符与页表描述符】

请阅读【ARM Cache 及 MMU/MPU 系列文章专栏导读】 及【嵌入式开发学习必备专栏】 上篇文章:【ARM Cache 系列文章 7.2 – ARMv8/v9 MMU 页表配置详细介绍 03 】 文章目录 MMU 块描述符与页描述符Block DescriptorBlock descriptor formatsBlock Entry 介绍Block En…

Linux驱动应用编程(四)IIC(获取BMP180温度/压力数据)

本文目录 一、基础1. 查看开发板手册,获取可用IIC总线2. 挂载从机,查看从机地址。3. 查看BMP180手册,使用命令读/写某寄存器值。4. 查看BMP180手册通信流程。 二、IIC常用API1. iic数据包/报2. ioctl函数 三、数据包如何被处理四、代码编写流…

transformers 阅读:BERT 模型

前言 想深入理解 BERT 模型&#xff0c;在阅读 transformers 库同时记录一下。 笔者小白&#xff0c;错误的地方请不吝指出。 Embedding 为了使 BERT 能处理大量下游任务&#xff0c;它的输入可以明确表示单一句子或句子对&#xff0c;例如<问题&#xff0c;答案>。 …

基本算法-枚举、模拟、递推(上)

目录 递归实现指数型枚举 题目描述 运行代码 代码思路 递归实现组合型枚举 题目描述 运行代码 代码思路 递归实现排列型枚举 题目描述 运行代码 代码思路 递归实现指数型枚举 题目描述 登录—专业IT笔试面试备考平台_牛客网 运行代码 #include<iostream> …

数据结构篇其六-串

数据结构—串 前置说明 由于学习Java面向对象语言走火入魔&#xff0c;试图在C语言中模拟实现面向对象设计。里面加入了大量的函数指针配合结构体来模拟类中的成员方法 故此篇&#xff0c;亦可称: 面向对象的C语言程序设计 用C语言实现串这种数据结构&#xff0c;并将它应用到…

运动会信息管理系统(Springboot+MySQL)

本课题旨在实现对运动会信息的全面管理&#xff0c;提供用户友好的界面和高效的操作体验。系统的基础功能包括运动员报名比赛、比赛成绩查询、资讯留言等。为了确保系统的高扩展性和稳定性&#xff0c;选用主流的开发技术&#xff0c;实现规范的项目结构和高效的性能。 技术选型…

算法—字符串操作

394. 字符串解码 - 力扣&#xff08;LeetCode&#xff09; class Solution { public:string longestCommonPrefix(vector<string>& strs) { string retstrs[0];//***1***记得先要初始化ret&#xff0c;作为第一个比较值for(int i0;i<strs.size();i){retfoundcom…

Zookeeper 详解:分布式协调服务的核心概念与实践

Zookeeper 详解&#xff1a;分布式协调服务的核心概念与实践 Apache Zookeeper 是一个分布式协调服务&#xff0c;广泛用于分布式应用程序的配置管理、服务发现、集群管理等。它提供了简单的分布式锁服务和命名服务&#xff0c;使开发者能够更加方便地构建高可靠性、高可用性的…

在 Windows 资源管理器中打开 FTP 站点终极解决方法 ftp打开方式更改为资源管理器

日常工作中&#xff0c;经常会用到FTP&#xff0c;一般情况下&#xff0c;FTP站点在IE中&#xff08;尤其是IE7以后版本&#xff09;打开&#xff0c;默认都不是以文件夹视图方式打开的&#xff0c;这时IE也会给你提示“若要在 Windows 资源管理器中查看此 FTP 站点&#xff0c…

Vue Router——hash模式和 history模式

在 Vue.js 中&#xff0c;Vue Router 是官方提供的路由管理器&#xff0c;它允许你以单页面应用&#xff08;SPA&#xff09;的方式构建你的Vue应用。Vue Router 支持两种路由模式&#xff1a;hash 模式和 history 模式。这两种模式的主要区别在于它们如何与浏览器的历史记录&a…

鸿蒙? 车载?Flutter? React Native? 为什么我劝你三思,说点不一样的

本文首发于公众号“AntDream”&#xff0c;欢迎微信搜索“AntDream”或扫描文章底部二维码关注&#xff0c;和我一起每天进步一点点 引言 当今信息技术领域日新月异&#xff0c;各种新技术和新平台层出不穷。鸿蒙&#xff08;HarmonyOS&#xff09;、Flutter、以及车载应用开发…

使用 Scapy 库编写 ICMP 不可达攻击脚本

一、介绍 ICMP不可达攻击是一种利用ICMP&#xff08;Internet Control Message Protocol&#xff09;不可达消息来干扰或中断目标系统的网络通信的攻击类型。通过发送伪造的ICMP不可达消息&#xff0c;攻击者可以诱使目标系统认为某些网络路径或主机不可达&#xff0c;从而导致…

前端开发高频面试题

好的&#xff0c;以下是对您提出的问题的详细回答&#xff1a; 说说vue动态权限绑定渲染列表&#xff08;权限列表渲染&#xff09; Vue中动态权限绑定渲染列表通常涉及以下步骤&#xff1a; 首先&#xff0c;通过API请求从服务器获取当前用户的权限数据。在Vue组件中&#xff…

《数据库原理与应用》

计算题 设有关系模式R(ABCDEF),F={ A→BC,CD→E,B→DA }1)求R的所有候选码。2)R最高属于第几范式 AE,BE 三个关系如下:教学管理系统包括下面3个表:Students (Sno, Sname, Sex, Birthday, Enrollyear, Speciality, Dno) Courses (Cno, Cname, Period, Credit) SC (…