397 lines
24 KiB
TeX
397 lines
24 KiB
TeX
|
|
\subsection{Model extension}
|
|
We consider a static set $\Pi$ of $n$ processes with known identities, communicating by reliable point-to-point channels, in a complete graph. Messages are uniquely identifiable. At most $f$ processes may be Byzantine, and we assume $n > 3f$.
|
|
|
|
\paragraph{Synchrony.} The network is asynchronous.
|
|
|
|
\paragraph{Communication.} Processes can exchange through a Reliable Broadcast ($\RB$) primitive (defined below) which is invoked with the functions $\RBcast(m)$ and $m = \RBreceived()$. There exists a shared object called DenyList ($\DL$) (defined below) that is interfaced with a set $O$ of operations. There exist three types of these operations: $\APPEND(x)$, $\PROVE(x)$ and $\READ()$.
|
|
|
|
\paragraph{Byzantine behaviour}
|
|
A process is said to exhibit Byzantine behaviour if it deviates arbitrarily from the prescribed algorithm. Such deviations may, for instance, consist in invoking primitives ($\RBcast$, $\APPEND$, $\PROVE$, etc.) with invalid inputs or inputs crafted maliciously, colluding with other Byzantine processes in an attempt to manipulate the system state or violate its guarantees, deliberately delaying or accelerating the delivery of messages to selected nodes so as to disrupt the expected timing of operations, or withholding messages and responses in order to induce inconsistencies in the system state.
|
|
|
|
Byzantine processes are constrained by the following. They cannot forge valid cryptographic signatures or threshold shares without access to the corresponding private keys. They cannot violate the termination, validity, or anti-flickering properties of the $\DL$ object. They also cannot break the integrity, no-duplicates, or validity properties of the $\RB$ primitive.
|
|
|
|
|
|
\paragraph{Notation.} For any indice $k$ we defined by $\DL[k]$ as the $k$-th DenyList object. For a given $\DL[k]$ and any indice $x$ we defined by $\Pi_x^k$ a subset of $\Pi$. Still for a given $k$ we consider $\Pi_M^k \subseteq \Pi$ and $\Pi_V^k \subseteq \Pi$ two authorization subsets for $\DL[k]$. Indice $i \in \Pi$ refer to processes, and $p_i$ denotes the process with identifier $i$. Let $\mathcal{M}$ denote the universe of uniquely identifiable messages, with $m \in \mathcal{M}$. Let $\mathcal{R} \subseteq \mathbb{N}$ be the set of round identifiers; we write $r \in \mathcal{R}$ for a round. We use the precedence relation $\prec_k$ for the $\DL[k]$ linearization: $x \prec_k y$ means that operation $x$ appears strictly before $y$ in the linearized history of $\DL[k]$. For any finite set $A \subseteq \mathcal{M}$, \ordered$(A)$ returns a deterministic total order over $A$ (e.g., lexicographic order on $(\textit{senderId},\textit{messageId})$ or on message hashes).
|
|
For any operation $F \in O$,$F_i(...)$ denotes that the operation $F$ is invoked by process $p_i$, and by $F_i^k(...)$ the same operation invoked on the $\DL[k]$ object.
|
|
|
|
% ------------------------------------------------------------------------------
|
|
\subsection{Primitives}
|
|
|
|
\subsubsection{t-BFT-DL}
|
|
|
|
We consider a t-Byzantine Fault Tolerant DenyList (t-$\BFTDL$) with the following properties.
|
|
There are 3 operations : $\BFTPROVE(x), \BFTAPPEND(x), \BFTREAD()$ such that :
|
|
|
|
\paragraph{Termination.} Every operation $\BFTAPPEND(x)$, $\BFTPROVE(x)$, and $\BFTREAD()$ invoked by a correct process always returns.
|
|
|
|
\paragraph{PROVE Validity.} The invocation of $op = \BFTPROVE(x)$ by a correct process is valid iff there exist a set of correct process $C$ such that $\forall c \in C$, $c$ invoke $op_2 = \BFTAPPEND(x)$ with $op_2 \prec op_1$ and $|C| \leq t$
|
|
|
|
\paragraph{PROVE Anti-Flickering.} If the invocation of a operation $op = \BFTPROVE(x)$ by a correct process $p \in \Pi_V$ is invalid, then any $\BFTPROVE(x)$ operation that appears after $op$ in $\Seq$ is invalid.
|
|
|
|
\paragraph{READ Liveness.} Let $op = \BFTREAD()$ invoke by a correct process such that $R$ is the result of $op$. For all $(i, \PROVEtrace(x)) \in R$ there exist a valid invocation of $\BFTPROVE(x)$ by $p_i$.
|
|
|
|
\paragraph{READ Anti-Flickering.} Let $op_1, op_2$ two $\BFTREAD()$ operations that returns respectively $R_1, R_2$. Iff $op_1 \prec op_2$ then $R_2 \subseteq R_1$. Otherwise $R_1 \subseteq R_2$.
|
|
|
|
\paragraph{READ Safety.} Let $op_1, op_2$ respectively a valid $\BFTPROVE(x)$ operation submited by the process $p_i$ and a $\BFTREAD()$ operation submited by any correct process such that $op_1 \prec op_2$. Let $R$ the result of $op_2$ then $R \ni (i, x)$
|
|
|
|
\subsection{DL $\Rightarrow$ t-BFT-DL}
|
|
|
|
|
|
Fix $3t < |M|$. Let
|
|
\[
|
|
\mathcal{U} = \{\, U \subseteq M \mid |U| = |M| - t \,\}.
|
|
\]
|
|
For each $U \in \mathcal{U}$, we instantiate one DenyList object $DL_U$ whose authorization sets are
|
|
\[
|
|
\Pi_M(DL_T) = S_T = U
|
|
\qquad\text{and}\qquad
|
|
\Pi_V(DL_T) = V.
|
|
\]
|
|
|
|
\[
|
|
|\mathcal{U}| = \binom{|M|}{|M| - t}.
|
|
\]
|
|
|
|
\begin{algorithm}
|
|
\caption{t-BFT-DL implementation using multiple DL objects}
|
|
|
|
\Fn{$\BFTAPPEND(x)$}{
|
|
\For{\textbf{each } $U \in \mathcal{U}$ st $i \in U$}{
|
|
$DL_U.\APPEND(x)$\;
|
|
}
|
|
}
|
|
|
|
\vspace{1em}
|
|
|
|
\Fn{$\BFTPROVE(x)$}{
|
|
$state \gets false$\;
|
|
\For{\textbf{each } $U \in \mathcal{U}$}{
|
|
$state \gets state \textbf{ OR } DL_U.\PROVE(x)$\;\nllabel{code:prove-or}
|
|
}
|
|
\Return{$state$}\;
|
|
}
|
|
|
|
\vspace{1em}
|
|
|
|
\Fn{$\BFTREAD()$}{
|
|
$results \gets \emptyset$\;
|
|
\For{\textbf{each } $U \in \mathcal{U}$}{
|
|
$results \gets results \cup DL_U.\READ()$\;
|
|
}
|
|
\Return{$results$}\;
|
|
}
|
|
\end{algorithm}
|
|
|
|
\begin{lemma}[BFT-PROVE Validity]\label{lem:bft-prove-validity}
|
|
The invocation of $op = \BFTPROVE(x)$ by a correct process is invalid iff there exist at least $t+1$ distinct processes in $M$ that invoked a valid $\BFTAPPEND(x)$ before $op$ in $\Seq$.
|
|
\end{lemma}
|
|
|
|
\begin{proof}
|
|
Let $op=\BFTPROVE(x)$ be an invocation by a correct process $p_i$. Let $A\subseteq M$ be the set of distinct issuers that invoked $\BFTAPPEND(x)$ before $op$ in $\Seq$.
|
|
|
|
\begin{itemize}
|
|
\item \textbf{Case (i): $|A|\ge t+1$.}
|
|
Fix any $U\in\mathcal{U}$. $A\cap U\neq\emptyset$. Pick $j\in A\cap U$. Since $j\in U$, the call $\BFTAPPEND_j(x)$ triggers $DL_U.\APPEND(x)$, and because $\BFTAPPEND_j(x)\prec op$ in $\Seq$, this induces a valid $DL_U.\APPEND(x)$ that appears before the induced $DL_U.\PROVE(x)$ by $p_i$. By \textbf{PROVE Validity} of $\DL$, the induced $DL_U.\PROVE(x)$ is invalid. As this holds for every $U\in\mathcal{U}$, there is \emph{no} component $DL_U$ where $\PROVE(x)$ is valid, so the field $state$ at line~\ref{code:prove-or} is never becoming true, and $op$ return false.
|
|
|
|
\item \textbf{Case (ii): $|A|\le t$.}
|
|
There exists $U^\star\in\mathcal{U}$ such that $A\cap U^\star=\emptyset$. For any $j\in A$, we have $j\notin U^\star$, so $\BFTAPPEND_j(x)$ does \emph{not} call $DL_{U^\star}.\APPEND(x)$. Hence no valid $DL_{U^\star}.\APPEND(x)$ appears before the induced $DL_{U^\star}.\PROVE(x)$. Since also $i\in \Pi_V(DL_{U^\star})$, by \textbf{PROVE Validity} of $\DL$ the induced $DL_{U^\star}.\PROVE(x)$ is valid. Therefore, there exists a component with a valid $\PROVE(x)$, so $op$ is valid.
|
|
\end{itemize}
|
|
|
|
\smallskip
|
|
Combining the cases yields the claimed characterization of invalidity.
|
|
\end{proof}
|
|
|
|
\begin{lemma}[BFT-PROVE Anti-Flickering]
|
|
If the invocation of a operation $op = \BFTPROVE(x)$ by a correct process $p \in \Pi_V$ is invalid, then any $\BFTPROVE(x)$ operation that appears after $op$ in $\Seq$ is invalid.
|
|
\end{lemma}
|
|
|
|
\begin{proof}
|
|
Let $op=\BFTPROVE(x)$ be an invocation by a correct process $p_i$ that is \emph{invalid} in $\Seq$.
|
|
By BFT-PROVE Validity, this implies that there exist at least $t+1$ \emph{distinct} processes in $M$ that invoked a \emph{valid} $\BFTAPPEND(x)$ before $op$ in $\Seq$. Let $A\subseteq M$ denote that set, with $|A|\ge t+1$.
|
|
|
|
Fix any $U\in\mathcal{U}$. We have $A\cap U\neq\emptyset$. Pick $j\in A\cap U$. Since $j\in U$, the call $\BFTAPPEND_j(x)$ triggers a call $DL_U.\APPEND(x)$. Moreover, because $\BFTAPPEND_j(x)\prec op$ in $\Seq$, the induced $DL_U.\APPEND(x)$ appears before the induced $DL_U.\PROVE(x)$ of $op$ in the projection $\Seq_U$.
|
|
|
|
Hence, in $\Seq_U$, there exists a \emph{valid} $DL_U.\APPEND(x)$ that appears before the $DL_U.\PROVE(x)$ induced by $op$. By \textbf{PROVE Validity} the base $\DL$ object, the induced $DL_U.\PROVE(x)$ is therefore \emph{invalid} in $\Seq_U$.
|
|
|
|
Let $op'=\BFTPROVE(x)$ be any invocation such that $op\prec op'$ in $\Seq$. Fix again any $U\in\mathcal{U}$. Hence, the $DL_U.\PROVE(x)$ induced by $op'$ appears after the $DL_U.\PROVE(x)$ induced by $op$ in $\Seq_U$. Since the induced $DL_U.\PROVE(x)$ of $op$ is invalid, by \textbf{PROVE Anti-Flickering} of $\DL$, \emph{every} subsequent $DL_U.\PROVE(x)$ in $\Seq_U$ is invalid.
|
|
|
|
As this holds for every $U\in\mathcal{U}$, there is no component $DL_U$ in which the induced $\PROVE(x)$ of $op'$ is valid.
|
|
\end{proof}
|
|
|
|
\begin{lemma}[BFT-READ Liveness]
|
|
Let $op = \BFTREAD()$ invoke by a correct process such that $R$ is the result of $op$. For all $(i, x) \in R$ there exist a valid invocation of $\BFTPROVE(x)$ by $p_i$.
|
|
\end{lemma}
|
|
|
|
\begin{proof}
|
|
Let $R$ the result of a $READ()$ operation submit by any correct process. $(i, \PROVEtrace(x)) \in R$ implie that $\exists U^\star \in \mathcal{U}$ such that $(i, x) \in R^{U^\star}$ with $R^{U^\star}$ the result of $DL_{U^\star}.\READ()$. By \textbf{READ Validity} $(i, x) \in R^{U^\star}$ implie that there exist a valid $DL_{U^\star}.\PROVE_i(x)$. The for loop in the $\BFTPROVE(x)$ implementation return true iff there at least one valid $DL_{U}.\PROVE_i(x)$ for any $U \in \mathcal{U}$.
|
|
|
|
Hence because there exist a $U^\star$ such that $DL_{U^\star}.\PROVE_i(x)$, there exist a valid $\BFTPROVE_i(x)$.
|
|
|
|
$(i, x) \in R \implies \exists \BFTPROVE_i(x)$
|
|
\end{proof}
|
|
|
|
\begin{lemma}[BFT-READ Anti-Flickering]
|
|
Let $op_1, op_2$ two $\BFTREAD()$ operations that returns respectively $R_1, R_2$. Iff $op_1 \prec op_2$ then $R_2 \subseteq R_1$. Otherwise $R_1 \subseteq R_2$.
|
|
\end{lemma}
|
|
|
|
\begin{proof}
|
|
Let $R_1, R_2$ respectively the output of two $\BFTREAD()$ operations $op_1, op_2$ such that $op_1 \prec op_2$.
|
|
By the implementation of $\BFTREAD$, $R_k = \bigcup_{U \in \mathcal{U}} R_k^U$ where $R_k^U$ is the result of $DL_U.\READ()$ during $op_k$.
|
|
|
|
Because $op_1 \prec op_2$ for any $U \in \mathcal{U}$, the $DL_U.\READ()$ induced by $op_1$ happen before the $DL_U.\READ()$ induced by $op_2$. Hence we have for all $U, R_2^U \subseteq R_1^U$.
|
|
Therefore
|
|
\[
|
|
\bigcup_U R_2^U \subseteq \bigcup_U R_1^U \implies
|
|
R_2 \subseteq R_1
|
|
\]
|
|
\end{proof}
|
|
|
|
\begin{lemma}[BFT-READ Safety]\label{lem:bft-read-safety}
|
|
Let $op_1, op_2$ respectively a valid $\BFTPROVE(x)$ operation submited by the process $p_i$ and a $\BFTREAD()$ operation submited by any correct process such that $op_1 \prec op_2$. Let $R$ the result of $op_2$ then $R \ni (i, x)$
|
|
\end{lemma}
|
|
|
|
\begin{proof}
|
|
Let $op_1 = \BFTPROVE_i(x)$ be a valid operation by a correct process $p_i$ and $op_2 = \BFTREAD()$ be any $\BFTREAD()$ operation such that $op_1 \prec op_2$ in $\Seq$.
|
|
By BFT-PROVE Validity, there exist at most $t$ distinct processes in $M$ that invoked a valid $\BFTAPPEND(x)$ before $op_1$ in $\Seq$. Let $A\subseteq M$ denote that set, with $|A|\le t$.
|
|
|
|
There exists $U^\star\in\mathcal{U}$ such that $A\cap U^\star=\emptyset$. For any $j\in A$, we have $j\notin U^\star$, so $\BFTAPPEND^{(j)}(x)$ does \emph{not} call $DL_{U^\star}.\APPEND(x)$. Hence no valid $DL_{U^\star}.\APPEND(x)$ appears before the induced $DL_{U^\star}.\PROVE(x)$ of $op_1$. Since also $i\in \Pi_V(DL_{U^\star})$, by \textbf{PROVE Validity} of $\DL$ the induced $DL_{U^\star}.\PROVE_i(x)$ is valid.
|
|
|
|
Now, because $op_1 \prec op_2$ in $\Seq$, the induced $DL_{U^\star}.\PROVE_i(x)$ appears before the induced $DL_{U^\star}.\READ()$ of $op_2$ in $\Seq_{U^\star}$. By \textbf{READ Safety} of $\DL$, the result $R^{U^\star}$ of the induced $DL_{U^\star}.\READ()$ contains $(i, x)$.
|
|
|
|
Finally, by the implementation of $\BFTREAD()$, we have $R = \bigcup_{U \in \mathcal{U}} R^U$, so $(i, x) \in R$.
|
|
\end{proof}
|
|
|
|
\begin{theorem}
|
|
For any fixed value $t$ such that $3t < |M|$, multiple DenyList Object can be used to implement a t-Byzantine Fault Tolerant DenyList Object.
|
|
\end{theorem}
|
|
|
|
\begin{proof}
|
|
Follows directly from the previous lemmas.
|
|
\end{proof}
|
|
|
|
\subsection{Algorithm}
|
|
|
|
\begin{algorithm}[H]
|
|
\caption{t-BFT ARB at process $p_i$}\label{alg:bft-arb}
|
|
|
|
\SetKwBlock{LocalVars}{Local Variables:}{}
|
|
\LocalVars{
|
|
$\mathit{unordered} \gets \emptyset$,
|
|
$\mathit{ordered} \gets \epsilon$,
|
|
$\mathit{delivered} \gets \epsilon$\;
|
|
$\mathit{prop}[r][j] \gets \bot, \forall j, r \in \Pi \times \mathbb{N}$\;
|
|
$\mathit{done}[r] \gets \emptyset, \forall r \in \mathbb{N}$\;
|
|
}
|
|
|
|
\vspace{0.3em}
|
|
|
|
\For{$r = 1, 2, \ldots$}{
|
|
\textbf{wait until} $\mathit{unordered} \setminus \mathit{ordered} \neq \emptyset$\;
|
|
$S \gets \mathit{unordered} \setminus \mathit{ordered}$;
|
|
$\RBcast(i, \texttt{PROP}, S, r)$\;
|
|
|
|
\textbf{wait until} $|\textsf{validated}(r)| \geq n - t$\;
|
|
|
|
\ForEach{$j \in \Pi$}{
|
|
$\BFTAPPEND(\langle j, r\rangle)$\;
|
|
}
|
|
|
|
\ForEach{$j \in \Pi$}{
|
|
$\textsf{send}(j, \texttt{DONE}, r)$\;
|
|
}
|
|
\textbf{wait until} $|\mathit{done}[r]| \geq n - t$\;
|
|
|
|
$\mathit{winners}[r] \gets \textsf{validated}(r)$\;
|
|
|
|
\textbf{wait until} $\forall j \in \mathit{winners}[r],\ \mathit{prop}[r][j] \neq \bot$\;
|
|
$M \gets \bigcup_{j \in \mathit{winners}[r]} \mathit{prop}[r][j]$\;\nllabel{code:Mcompute}
|
|
$\mathit{ordered} \gets \mathit{ordered} \cdot \ordered(M)$\;
|
|
}
|
|
|
|
\vspace{0.3em}
|
|
|
|
\Fn{\textsf{validated}($r$)}{
|
|
\Return{$\{j: |\{k: (k, r) \in \BFTREAD()\}| \geq t+1\}$}\;
|
|
}
|
|
|
|
\vspace{0.3em}
|
|
|
|
\Upon{$\ABbroadcast(m)$}{
|
|
$\mathit{unordered} \gets \mathit{unordered} \cup \{m\}$\;
|
|
}
|
|
|
|
\vspace{0.3em}
|
|
|
|
\Upon{$\textsf{rdeliver}(\texttt{PROP}, S, \langle j, r \rangle)$ from process $p_j$}{
|
|
$\mathit{unordered} \gets \mathit{unordered} \cup S$;
|
|
$\mathit{prop}[r][j] \gets S$\;
|
|
$\BFTPROVE(\langle j, r\rangle)$\;
|
|
}
|
|
|
|
\vspace{0.3em}
|
|
|
|
\Upon{$\textsf{receive}(\texttt{DONE}, r)$ from process $p_j$}{
|
|
$\mathit{done}[r] \gets \mathit{done}[r] \cup \{j\}$\;
|
|
}
|
|
|
|
\vspace{0.3em}
|
|
|
|
\Upon{$\ABdeliver()$}{
|
|
\If{$\mathit{ordered} \setminus \mathit{delivered} = \emptyset$}{
|
|
\Return{$\bot$}
|
|
}
|
|
let $m$ be the first message in $\mathit{ordered} \setminus \mathit{delivered}$\;
|
|
$\mathit{delivered} \gets \mathit{delivered} \cdot \{m\}$\;
|
|
\Return{$m$}
|
|
}
|
|
|
|
\end{algorithm}
|
|
|
|
\textbf{Everything below has to be updated}
|
|
|
|
\begin{definition}[BFT Closed round for $k$]
|
|
Given $Seq^{k}$ the linearization of the $\BFTDL$ $Y[k]$, a round $r \in \mathcal{R}$ is \emph{closed} in $\Seq$ iff there exist at least $n - f$ distinct processes $j \in \Pi$ such that $\BFTAPPEND_j(r)$ appears in $\Seq^k$. Let call $\BFTAPPEND(r)^\star$ the $(n-f)^{th}$ $\BFTAPPEND(r)$.
|
|
\end{definition}
|
|
|
|
\begin{definition}[BFT Closed round]\label{def:bft-closed-round}
|
|
A round $r \in \mathcal{R}$ is \emph{closed} iff for all $\DL[k]$, $r$ is closed in $\Seq^k$.
|
|
\end{definition}
|
|
|
|
\subsection{Proof of correctness}
|
|
|
|
\begin{remark}[BFT Stable round closure]\label{rem:bft-stable-round-closure}
|
|
If a round $r$ is closed, no more $\BFTPROVE(r)$ can be valid and thus linearized. In other words, once $\BFTAPPEND(r)^\star$ is linearized, no more process can make a proof on round $r$, and the set of valid proofs for round $r$ is fixed. Therefore $\Winners_r$ is fixed.
|
|
\end{remark}
|
|
|
|
\begin{proof}
|
|
By definition $r$ closed means that for all process $p_i$, there exist at least $n - f$ distinct processes $j \in \Pi$ such that $\BFTAPPEND_j(r)$ appears in $\Seq^k$. By BFT-PROVE Validity, any subsequent $\BFTPROVE(r)$ is invalid because at least $n - f$ processes already invoked a valid $\BFTAPPEND(r)$ before it. Thus no new valid $\BFTPROVE(r)$ can be linearized after $\BFTAPPEND(r)^\star$. Hence the set of valid proofs for round $r$ is fixed, and so is $\Winners_r$.
|
|
\end{proof}
|
|
|
|
\begin{lemma}[BFT Across rounds]\label{lem:bft-across-rounds}
|
|
For any $r, r'$ such that $r < r'$, if $r'$ is closed, $r$ is also closed.
|
|
\end{lemma}
|
|
|
|
\begin{proof}
|
|
Let $r \in \mathcal{R}$. By \cref{def:bft-closed-round}, if $r + 1$ is closed, then for all $\DL[k]$, $r + 1$ is closed in $\Seq^k$. By the implementation, a process can only invoke $\BFTAPPEND(r + 1)$ after observing at least $n - f$ valid $\BFTPROVE(r)$, which means that for all $\DL[k]$, $r$ is closed in $\Seq^k$. Hence by \cref{def:bft-closed-round}, $r$ is closed.
|
|
|
|
Because $r$ is monotonically increasing, we can reccursively apply the same argument to conclude that for any $r, r'$ such that $r < r'$, if $r'$ is closed, $r$ is also closed.
|
|
\end{proof}
|
|
|
|
\begin{lemma}[BFT Progress]\label{lem:bft_progress}
|
|
For any correct process $p_i$ such that
|
|
\[
|
|
\received \setminus (\delivered \cup (\cup_{r' < r} \cup_{j \in W[r'] \prop[r'][j]})) \neq \emptyset
|
|
\]
|
|
with $r$ the highest closed round in the $\DL$ linearization. Eventually $r+1$ will be closed.
|
|
\end{lemma}
|
|
|
|
\begin{lemma}[BFT Winners invariant]\label{lem:bft-winners-invariant}
|
|
For any closed round $r$, define
|
|
\[
|
|
\Winners_r = \{j: \BFTPROVE_j(r) \prec \BFTAPPEND^\star(r)\}
|
|
\]
|
|
called the unique set of winners of round $r$.
|
|
\end{lemma}
|
|
|
|
\begin{lemma}[BFT n-f lower-bounded Winners]
|
|
Let $r$ a closed round, $|W[r]| \geq n-f$.
|
|
\end{lemma}
|
|
|
|
\begin{remark}\label{rem:correct-in-winners}
|
|
Because we assume $n \geq 2f+ 1$, if $|W[r]| \geq n-f$ at least 1 correct have to be in $W[r]$ to progress.
|
|
\end{remark}
|
|
|
|
\begin{lemma}[BFT Winners must purpose]\label{lem:bft-winners-purpose}
|
|
Let $r$ a closed round, for all process $p_j$ such that $j \in W[r]$, $p_j$ must have executed $\RBcast(j, PROP, \_, r)$ and hence any correct will eventually set $\prop[r][j]$ to a non-$\bot$ value.
|
|
\end{lemma}
|
|
|
|
\begin{lemma}[BFT Messages Incariant]\label{lem:bft-messages-invariant}
|
|
For any closed round $r$ and any correct process $p_i$ such that $\forall j \in \Winners_r$: $\prop^{(i)}[r][j] \neq \bot$ define
|
|
\[
|
|
\Messages_r = \cup_{j \in \Winners_r} prop^{(i)}[r][j]
|
|
\]
|
|
as the set of messages proposed by the winners of round $r$
|
|
\end{lemma}
|
|
|
|
\begin{lemma}[BFT EVentual proposal closure]\label{lem:bft-eventual-proposal-closure}
|
|
If a correct process $p_i$ define $M$ at line~\ref{code:Mcompute}, then for every $j \in \Winners_r$, $\prop^{(i)}[r][j] \neq \bot$.
|
|
\end{lemma}
|
|
|
|
\begin{lemma}[BFT Unique proposal per sender per round]\label{lem:bft-unique-proposal}
|
|
For any round $r$ and any process $p_i$, if $p_i$ invokes two $\RBcast$ call for the same round, such that $\RBcast(i, PROP, S, r) \prec \RBcast(i, PROP, S', r)$. Then for any correct process $p_j$, $\prop^{(j)}[r][i] \in \{\bot, S\}$
|
|
\end{lemma}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
% \begin{lemma}[BFT $W_r$ as grow only set]\label{lem:bft-wr-grow-only}
|
|
% For any correct process $p_i$. If $p_i$ computes $W_r$ at two different times $t_1$ and $t_2$ with $t_1 < t_2$, then $W_r^{t_1} \subseteq W_r^{t_2}$.
|
|
% \end{lemma}
|
|
|
|
% \begin{proof}
|
|
% By the implementation, $W_r$ is computed exclusively from the results of $\{j: (j, \PROVEtrace(r)) \in \bigcup_{k \in \Pi} Y[k].\BFTREAD()\}$.
|
|
|
|
% We know by BFT-READ Anti-Flickering that for any two $\BFTREAD()$ operations $op_1, op_2$ such that $op_1 \prec op_2$, the result of $op_2$ is included in the result of $op_1$. Therefore, if $p_i$ computes $W_r$ at two different times $t_1$ and $t_2$ with $t_1 < t_2$, then $W_r^{t_1} \subseteq W_r^{t_2}$.
|
|
% \end{proof}
|
|
|
|
% \begin{lemma}[BFT well defined winners]\label{lem:bft-well-defined-winners}
|
|
% For any closed round $r$, if a correct process $p_i$ compute $W_r$, then $W_r = \Winners_r$ with $|W_r| \geq n - f$.
|
|
% \end{lemma}
|
|
|
|
% \begin{proof}
|
|
% By \Cref{lem:bft-read-safety}, any correct process $p_i$ computing $W_r$ after round $r$ is closed includes all valid $\BFTPROVE(r)$ in its computation of $W_r$. Therefore $W_r = \Winners_r$.
|
|
|
|
% By \Cref{def:bft-closed-round}, at least $n - f$ distinct processes invoked a valid $\BFTAPPEND(r)$ before $\BFTAPPEND(r)^\star$. By the implementation in algorithm D, if a process correct $j$ invoked a valid $\BFTAPPEND(r)$, thats means that he observed at least $n - f$ valid $\BFTPROVE(r)$ submitted by distinct processes. By \Cref{lem:bft-wr-grow-only}, once $p_j$ observed $n - f$ valid $\BFTPROVE(r)$, any correct process computing $W_r$ will eventually observe at least these $n - f$ valid $\BFTPROVE(r)$. By \Cref{lem:bft-stable-round-closure}, no more valid $\BFTPROVE(r)$ can be linearized after round $r$ is closed, so any correct process computing the same fixed set $W_r$ of at least $n - f$ distinct processes.
|
|
% \end{proof}
|
|
|
|
% \begin{lemma}[BFT Non-empty winners proposal]\label{lem:bft-non-empty-winners-proposal}
|
|
% For every process $p_i$ such as $i \in W_r$, eventually $\prop[r][i] \neq \bot$.
|
|
% \end{lemma}
|
|
|
|
% \begin{proof}
|
|
% By the implementation, if $i \in W_r$, then $(i, \PROVEtrace(r))$ is included in the result of at least one $\BFTREAD()$ operation. Hence there exist a valid $\BFTPROVE(r)$ operation.
|
|
% By \Cref{lem:bft-prove-validity}, this implies that there exist at least $f + 1$ valid $\PROVE(r)$ operation invoked by processes. At least one of these processes is correct, say $p_j$. By the implementation, $p_j$ invoked $\BFTPROVE(r)$ after receiving a $Rdeliver(j, \texttt{PROP}, S, r)$ message from $p_i$. Therefore, by the reliable broadcast properties, the message will eventually be delivered to every correct process, hence eventually for any correct process $\prop[r][i] \neq \bot$.
|
|
% \end{proof}
|
|
|
|
% \begin{definition}[BFT Message invariant]\label{def:bft-message-invariant}
|
|
% For any closed round $r$, for any correct process $p_i$, such that $\nexists j \in W_r : \prop[r][j] = \bot$, twe define the set
|
|
% \[
|
|
% \Messages_r = \bigcup_{j \in \Winners_r} \prop[r][j]
|
|
% \]
|
|
% as the unique set of messages proposed during round $r$.
|
|
% \end{definition}
|
|
|
|
% \begin{lemma}[BFT Proposal convergence]\label{lem:bft-proposal-convergence}
|
|
% For any closed round $r$, for any correct process $p_i$, that define $M_r$ at line B10, we have $M_r = \Messages_r$.
|
|
% \end{lemma}
|
|
|
|
% \begin{proof}
|
|
% By \Cref{lem:bft-well-defined-winners}, any correct process $p_i$ computing $W_r$ after round $r$ is closed has $W_r = \Winners_r$.
|
|
% By \Cref{lem:bft-non-empty-winners-proposal}, for any correct process $p_i$, such as $i \in W_r$, eventually $\prop[r][i] \neq \bot$.
|
|
|
|
% Therefore, eventually for any correct process $p_i$, at line B10 we have
|
|
% \[
|
|
% M_r = \bigcup_{j \in W_r} \prop[r][j] = \bigcup_{j \in \Winners_r} \prop[r][j] = \Messages_r
|
|
% \]
|
|
% \end{proof}
|
|
|
|
% \begin{lemma}[BFT Inclusion]\label{proof:bft-inclusion}
|
|
% If a correct process $p_i$ ABroadcasts a message $m$, then eventually any correct process $p_j$ ADelivers $m$.
|
|
% \end{lemma}
|
|
|
|
% \begin{proof}
|
|
% Let $m$ be a message ABroadcast by a correct process $p_i$ and eventually exit the \texttt{ABroadcast} function at line A10.
|
|
|
|
% By the implementation, if $p_i$ exits the \texttt{ABroadcast} function at line A10, then there exists a round $r'$ such that $m \in \prop[r'][j]$ for some $j \in W_{r'}$.
|
|
|
|
% Since $p_i$ is correct, seeing that $m \in \prop[r'][j]$ for some $j \in W_{r'}$ implies that $p_i$ received a $Rdeliver(j, \texttt{PROP}, S, r')$ message from $p_j$ such that $m \in S$. And because $p_j$ is in $W_{r'}$, at least $n - f$ correct processes invoked a valid $Y[j].\BFTPROVE(r')$ before the round $r'$ were closed. By the reliable broadcast properties, the $Rdeliver(j, \texttt{PROP}, S, r')$ message will eventually be delivered to every correct process, hence eventually for any correct process $m \in \prop[r'][j]$ with $j \in W_{r'}$. Hence $m$ will eventually be included in the set $\Messages_{r'}$ defined in \Cref{def:bft-message-invariant} and thus eventually be ADelivered by any correct process.
|
|
% \end{proof}
|
|
|
|
\begin{theorem}
|
|
The algorithm implements a BFT Atomic Reliable Broadcast.
|
|
\end{theorem}
|