Zum Hauptinhalt springen

Showing 1–18 of 18 results for author: Van Renesse, R

Searching in archive cs. Search in all archives.
.
  1. Trees and Turtles: Modular Abstractions for State Machine Replication Protocols

    Authors: Natalie Neamtu, Haobin Ni, Robbert van Renesse

    Abstract: We present two abstractions for designing modular state machine replication (SMR) protocols: trees and turtles. A tree captures the set of possible state machine histories, while a turtle represents a subprotocol that tries to find agreement in this tree. We showcase the applicability of these abstractions by constructing crash-tolerant SMR protocols out of abstract tree turtles and providing exam… ▽ More

    Submitted 6 May, 2023; v1 submitted 16 April, 2023; originally announced April 2023.

    Comments: Full version of the paper published in PaPoC '23, including full proofs and discussion of BFT protocols

  2. arXiv:2011.08253  [pdf, other

    cs.DC cs.CR cs.DB

    Heterogeneous Paxos: Technical Report

    Authors: Isaac Sheff, Xinwen Wang, Robbert van Renesse, Andrew C. Myers

    Abstract: In distributed systems, a group of $\textit{learners}$ achieve $\textit{consensus}$ when, by observing the output of some $\textit{acceptors}$, they all arrive at the same value. Consensus is crucial for ordering transactions in failure-tolerant systems. Traditional consensus algorithms are homogeneous in three ways: - all learners are treated equally, - all acceptors are treated equally, and… ▽ More

    Submitted 8 December, 2020; v1 submitted 16 November, 2020; originally announced November 2020.

  3. arXiv:2005.13762  [pdf, other

    cs.DB

    CedrusDB: Persistent Key-Value Store with Memory-Mapped Lazy-Trie

    Authors: Maofan Yin, Hongbo Zhang, Robbert van Renesse, Emin Gün Sirer

    Abstract: As a result of RAM becoming cheaper, there has been a trend in key-value store design towards maintaining a fast in-memory index (such as a hash table) while logging user operations to disk, allowing high performance under failure-free conditions while still being able to recover from failures. This design, however, comes at the cost of long recovery times or expensive checkpoint operations. This… ▽ More

    Submitted 21 July, 2021; v1 submitted 27 May, 2020; originally announced May 2020.

  4. arXiv:1908.10716  [pdf, other

    cs.DC

    Asynchronous Consensus Without Rounds

    Authors: Robbert van Renesse

    Abstract: Fault tolerant consensus protocols usually involve ordered rounds of voting between a collection of processes. In this paper, we derive a general specification of fault tolerant asynchronous consensus protocols and present a class of consensus protocols that refine this specification without using rounds. Crash-tolerant protocols in this class use 3f+1 processes, while Byzantine-tolerant protocols… ▽ More

    Submitted 28 August, 2019; originally announced August 2019.

    Comments: 12 pages

  5. arXiv:1906.08936  [pdf, other

    cs.DC

    Scalable and Probabilistic Leaderless BFT Consensus through Metastability

    Authors: Team Rocket, Maofan Yin, Kevin Sekniqi, Robbert van Renesse, Emin Gün Sirer

    Abstract: This paper introduces a family of leaderless Byzantine fault tolerance protocols, built around a metastable mechanism via network subsampling. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries while their concurrent and leaderless nature enables them to achieve high throughput and scalability. Unlike blockchains that rely on proof-of-work, the… ▽ More

    Submitted 24 August, 2020; v1 submitted 20 June, 2019; originally announced June 2019.

  6. arXiv:1905.03888  [pdf, other

    cs.DC cs.CR

    Charlotte: Composable Authenticated Distributed Data Structures, Technical Report

    Authors: Isaac Sheff, Xinwen Wang, Haobin Ni, Robbert van Renesse, Andrew C. Myers

    Abstract: We present Charlotte, a framework for composable, authenticated distributed data structures. Charlotte data is stored in blocks that reference each other by hash. Together, all Charlotte blocks form a directed acyclic graph, the blockweb; all observers and applications use subgraphs of the blockweb for their own data structures. Unlike prior systems, Charlotte data structures are composable: appli… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

  7. arXiv:1806.06978  [pdf, other

    cs.DC cs.DB

    A Web of Blocks

    Authors: Isaac Sheff, Xinwen Wang, Andrew C. Myers, Robbert van Renesse

    Abstract: Blockchains offer a useful abstraction: a trustworthy, decentralized log of totally ordered transactions. Traditional blockchains have problems with scalability and efficiency, preventing their use for many applications. These limitations arise from the requirement that all participants agree on the total ordering of transactions. To address this fundamental shortcoming, we introduce Charlotte, a… ▽ More

    Submitted 18 June, 2018; originally announced June 2018.

  8. arXiv:1801.03998  [pdf, other

    cs.CR

    Decentralization in Bitcoin and Ethereum Networks

    Authors: Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, Emin Gün Sirer

    Abstract: Blockchain-based cryptocurrencies have demonstrated how to securely implement traditionally centralized systems, such as currencies, in a decentralized fashion. However, there have been few measurement studies on the level of decentralization they achieve in practice. We present a measurement study on various decentralization metrics of two of the leading cryptocurrencies with the largest market c… ▽ More

    Submitted 29 March, 2018; v1 submitted 11 January, 2018; originally announced January 2018.

    Comments: Financial Cryptography and Data Security 2018

    Journal ref: Financial Cryptography and Data Security (FC) 2018

  9. arXiv:1612.03457  [pdf, ps, other

    cs.DC

    Consus: Taming the Paxi

    Authors: Robert Escriva, Robbert van Renesse

    Abstract: Consus is a strictly serializable geo-replicated transactional key-value store. The key contribution of Consus is a new commit protocol that reduces the cost of executing a transaction to three wide area message delays in the common case. Augmenting the commit protocol are multiple Paxos implementations optimized for different purposes. Together the different implementations and optimizations comp… ▽ More

    Submitted 11 December, 2016; originally announced December 2016.

  10. arXiv:1611.06816  [pdf, other

    cs.CR cs.DC

    Service-Oriented Sharding with Aspen

    Authors: Adem Efe Gencer, Robbert van Renesse, Emin Gün Sirer

    Abstract: The rise of blockchain-based cryptocurrencies has led to an explosion of services using distributed ledgers as their underlying infrastructure. However, due to inherently single-service oriented blockchain protocols, such services can bloat the existing ledgers, fail to provide sufficient security, or completely forego the property of trustless auditability. Security concerns, trust restrictions,… ▽ More

    Submitted 21 November, 2016; originally announced November 2016.

  11. arXiv:1611.03562  [pdf, other

    cs.DC

    Moving Participants Turtle Consensus

    Authors: Stavros Nikolaou, Robbert van Renesse

    Abstract: We present Moving Participants Turtle Consensus (MPTC), an asynchronous consensus protocol for crash and Byzantine-tolerant distributed systems. MPTC uses various moving target defense strategies to tolerate certain Denial-of-Service (DoS) attacks issued by an adversary capable of compromising a bounded portion of the system. MPTC supports on the fly reconfiguration of the consensus strategy as we… ▽ More

    Submitted 21 November, 2016; v1 submitted 10 November, 2016; originally announced November 2016.

    Comments: 31 pages, 4 figures, OPODIS

  12. arXiv:1608.04841  [pdf, other

    cs.DC cs.CR

    Safe Serializable Secure Scheduling: Transactions and the Trade-off Between Security and Consistency

    Authors: Isaac Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse

    Abstract: Modern applications often operate on data in multiple administrative domains. In this federated setting, participants may not fully trust each other. These distributed applications use transactions as a core mechanism for ensuring reliability and consistency with persistent data. However, the coordination mechanisms needed for transactions can both leak confidential information and allow unauthori… ▽ More

    Submitted 21 August, 2016; v1 submitted 16 August, 2016; originally announced August 2016.

    Comments: Technical Report

  13. arXiv:1510.02037  [pdf, other

    cs.CR

    Bitcoin-NG: A Scalable Blockchain Protocol

    Authors: Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, Robbert van Renesse

    Abstract: Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a… ▽ More

    Submitted 11 November, 2015; v1 submitted 7 October, 2015; originally announced October 2015.

  14. arXiv:1412.3136  [pdf, other

    cs.DC cs.CR cs.DB cs.PL

    Distributed Protocols and Heterogeneous Trust: Technical Report

    Authors: Isaac C. Sheff, Robbert van Renesse, Andrew C. Myers

    Abstract: The robustness of distributed systems is usually phrased in terms of the number of failures of certain types that they can withstand. However, these failure models are too crude to describe the different kinds of trust and expectations of participants in the modern world of complex, integrated systems extending across different owners, networks, and administrative domains. Modern systems often exi… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    Comments: This is the technical report of a submission for EuroSys 2015. 26 Pages 6 figures

  15. Cache Serializability: Reducing Inconsistency in Edge Transactions

    Authors: Ittay Eyal, Ken Birman, Robbert van Renesse

    Abstract: Read-only caches are widely used in cloud infrastructures to reduce access latency and load on backend databases. Operators view coherent caches as impractical at genuinely large scale and many client-facing caches are updated in an asynchronous manner with best-effort pipelines. Existing solutions that support cache consistency are inapplicable to this scenario since they require a round trip to… ▽ More

    Submitted 26 April, 2015; v1 submitted 29 September, 2014; originally announced September 2014.

    Comments: Ittay Eyal, Ken Birman, Robbert van Renesse, "Cache Serializability: Reducing Inconsistency in Edge Transactions," Distributed Computing Systems (ICDCS), IEEE 35th International Conference on, June~29 2015--July~2 2015

  16. arXiv:1309.5671  [pdf, other

    cs.DC

    Vive la Différence: Paxos vs. Viewstamped Replication vs. Zab

    Authors: Robbert Van Renesse, Nicolas Schiper, Fred B. Schneider

    Abstract: Paxos, Viewstamped Replication, and Zab are replication protocols that ensure high-availability in asynchronous environments with crash failures. Various claims have been made about similarities and differences between these protocols. But how does one determine whether two protocols are the same, and if not, how significant the differences are? We propose to address these questions using refine… ▽ More

    Submitted 27 February, 2014; v1 submitted 22 September, 2013; originally announced September 2013.

    Comments: 16 pages

  17. arXiv:1210.5443  [pdf, ps, other

    cs.CR

    Secure Abstraction with Code Capabilities

    Authors: Robbert van Renesse, Håvard Johansen, Nihar Naigaonkar, Dag Johansen

    Abstract: We propose embedding executable code fragments in cryptographically protected capabilities to enable flexible discretionary access control in cloud-like computing infrastructures. We are developing this as part of a sports analytics application that runs on a federation of public and enterprise clouds. The capability mechanism is implemented completely in user space. Using a novel combination of X… ▽ More

    Submitted 19 October, 2012; originally announced October 2012.

  18. arXiv:1109.5111  [pdf, other

    cs.DC

    Nerio: Leader Election and Edict Ordering

    Authors: Robbert van Renesse, Fred B. Schneider, Johannes Gehrke

    Abstract: Coordination in a distributed system is facilitated if there is a unique process, the leader, to manage the other processes. The leader creates edicts and sends them to other processes for execution or forwarding to other processes. The leader may fail, and when this occurs a leader election protocol selects a replacement. This paper describes Nerio, a class of such leader election protocols.

    Submitted 26 September, 2011; v1 submitted 23 September, 2011; originally announced September 2011.