Cumulus: A Secure BFT-based Sidechain for Off-chain Scaling

被引:10
作者
Gai, Fangyu [1 ]
Niu, Jianyu [1 ]
Tabatabaee, Seyed Ali [2 ]
Feng, Chen [1 ]
Jalalzai, Mohammad [1 ]
机构
[1] Univ British Columbia, Okanagan Campus, Kelowna, BC, Canada
[2] Univ British Columbia, Vancouver Campus, Vancouver, BC, Canada
来源
2021 IEEE/ACM 29TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS) | 2021年
基金
加拿大自然科学与工程研究理事会;
关键词
Blockchain; sidechain; Byzantine fault-tolerant; off-chain scaling;
D O I
10.1109/IWQOS52092.2021.9521363
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sidechains enable off-chain scaling by sending transactions in a private network rather than broadcasting them in the public blockchain (i.e., the mainchain) network. To this end, classic Byzantine fault-tolerant (BFT) consensus protocols such as PBFT seem an excellent fit to fuel sidechains for their permissioned settings and inherent robustness. However, designing a secure and efficient BFT-based sidechain protocol remains an open challenge. This paper presents Cumulus, a novel BFT-based sidechain framework for blockchains to achieve off-chain scaling without compromising any security and efficiency properties of both sides' consensus protocols. Cumulus encompasses a novel cryptographic sortition algorithm called Proof-of-Wait to fairly select sidechain nodes to communicate with the mainchain in an efficient and decentralized manner. To further reduce the operational cost, Cumulus provides an optimistic checkpointing approach in which the mainchain will not verify checkpoints unless disputes happen. Meanwhile, end-users enjoy a two-step withdrawal protocol, ensuring that they can safely collect assets back to the mainchain without relying on the BFT committee. Our experiments show that Cumulus sidechains outperform ZK-Rollup, another promising sidechain construction, achieving one and two orders of magnitude improvement in throughput and latency while retaining comparable operational cost.
引用
收藏
页数:6
相关论文
共 23 条
[1]  
Adler J., 2019, Minimal viable merged consensus
[2]  
[Anonymous], 2018, NOCUST-A Non -Custodial 2nd -Layer Financial Intermediary
[3]  
Back A., 2014, Enabling blockchain innovations with pegged sidechains
[4]   Prism: Deconstructing the Blockchain to Approach Physical Limits [J].
Bagaria, Vivek ;
Kannan, Sreeram ;
Tse, David ;
Fanti, Giulia ;
Viswanath, Pramod .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :585-602
[5]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[6]  
Buchman E, 2016, Tendermint: Byzantine fault tolerance in the age of blockchains
[7]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[8]   Perun: Virtual Payment Hubs over Cryptocurrencies [J].
Dziembowski, Stefan ;
Eckey, Lisa ;
Faust, Sebastian ;
Malinowski, Daniel .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :106-123
[9]  
Dziembowski Stefan., IACR CRYPTOLOGY EPRI
[10]  
Ekparinya P., 2019, ATTACK CLONES PROOF, Vabs, P10244