Skip to main content
Version: 0.1.0

The Hare Protocol

Description#

The Hare protocol is a consensus protocol that achieves consensus on a set of values. In our case, we want to achieve consensus on a set of block ids (the set of values) in a specific layer (the instance/layer id).

The general problem is the Byzantine Agreement Problem. Our protocol is based on the ADDNR18 paper and differs mainly on the fact that we want to achieve consensus on a set of values rather than a single value.

It is known in advance when an agreement process should start for each layer. On the other hand, the time it takes to achieve agreement can vary, depending on the number of faulty/malicious participants in the consensus. Hence, multiple consensus instances may be run concurrently.

On this page we will discuss the core protocol concepts and clarify it. Please note we do not intend to talk about the implementation itself, we might mention practical ways that overlap with it.

Definitions#

N - The number of active participants

f - The number of active dishonest participants

Pi - A participant in the consensus

Si - The current set of values observed by Pi

ISi - The initial set of Pi

Round - the duration in which messages are sent and received. It is assumed by the protocol that messages that are sent (by honest) at the beginning of the round are received (by honest) no later than the end of that round. Since we are using the P2P to broadcast messages, it follows that the round duration is no less than the expected propagation in the P2P network.

Byzantine Agreement on Sets#

Parties {Pi} are said to achieve byzantine agreement on sets {Si} if three conditions are satisfied:

  1. Consistency: Every honest party outputs the same set S'
  2. Validity 1 (“all honest witnessed”): If for every honest party Pi value v is in ISi then v is in S'
  3. Validity 2 (“no honest witness”): If for no honest party Pi value v in ISi then v is not in S'. In other words, all values in S' should have had at least one honest witness.
  4. Termination - All honest participants terminate with overwhelming probability.

Active Participants#

In each round, a new committee is selected randomly by the oracle (which we assume its existence). Picking a random committee over having all the nodes participate in the protocol is good for two main reasons:

  1. Less participants means lower communication requirements.
  2. Random election of participants means the participants are not predicted hence less likely to be exposed to DDOS attacks (for example). In the proposal round, the expected number of participants is low (1 for example). In all other rounds we expect N (active) participants.

Commit Certificate - C(S,K)#

A proof that consists of f+1 commit messages on the same set S for the same iteration K. f+1 commit messages implies at least one of them is honest and hence the set S is ensured to be valid.

Safe Value Proof (SVP)#

The SVP is used to prove a proposal sent by the leader. There are two types of SVP proofs, both consist of f+1 status messages: Type A - assumes that no honest participant has committed to a set yet. In that case, any proposal is valid and we validate it by checking the validity of the status messages which are provable by the pre-round messages. Type B - assumes an honest has already committed. From this moment, we know there is a certificate (the Commit Certificate) we should consider. We must Validate the certificate and check that the certificate is at least not older than the last certificate we know of.


The Protocol#

Pre-Round The protocol begins with one pre-round. This round is executed only once and its goal is to remove values which shouldn't be considered at all according to Validity 2

  • At the beginning of the pre-round each active party sends his set of values ISi
  • At the end of the pre-round, each value that hasn't received f+1 witnesses is removed. This ensures that we are left only with values that has at least one honest witness and therefore satisfying validity 2

The protocol repeatedly iterates through up to 4 rounds until a consensus is reached.

Each round longs a constant time. A Roles Oracle is used to generate roles in each round.

Status Round

  • Active participants broadcast their current status to the network (S, k , ki)
  • At the end of this round, a participant can form an SVP based on the statuses he collected during the round

Proposal Round

  • The leader can now give his proposal which provides a set T with the corresponding SVP P to the network
  • Each participant can validate the proposition sent by the leader and consider that set T as a candidate of a set to commit on Note: we say candidate (opposed to accepted) since it is possible that the sender is malicious, sending more than one proposal during this round. We call it equivocation. During the following round we will be able to detect equivocation.

Commit Round

  • Active participants announce their will to commit to the proposed set T by broadcasting (S, k, ki)
  • At the end of the round, observing f+1 commit messages that indicate the set T implies at least one honest is willing to commit to T. This f+1 commit message can now form the certificate on the set T which is the proof that will be provided to the rest of the network in the following round.
  • If equivocation is detected by a party P, P doesn't commit to T. Note: accepted proposals must have been received no later than the end of the proposal round. Hence, any accepted proposal will arrive to all honest participants no later than this commit round and that is why we are ensured to detect equivocation.

Notify Round

  • An (active) participant that were able to form a certificate at the end of the commit round, broadcasts a notify message which includes (S, k, ki, C(S, k))
  • Upon receiving a valid notify message the participant updates his internal state according to the attached set

Termination If at any point of the protocol, a participant P receives f+1 notify messages on the same set S, it commits to S and terminates. Note: it is hereby follows that all honest participants will receive f+1 notifications no later than the following round and hence will terminate also.

Eligibility Oracle#

Eligibility to participate in a round (being active) is determined by the oracle mechanism. The oracle is required to provide three main properties: A. Eligibility is under consensus - meaning all honest participant who receive a message will either classify it as active or as passive. B. The eligibility can be calculated in advance only up to some configurable limit of time before it can be used to participate. C. Eligibility is determined for each round in a layer separately and at random.

Proof & Validation#

The Threshold Thresholding a random input can be used to determine eligibility. I.e. we can set the threshold a participant should pass in order to participate. For example, we can set a threshold of X participants over the space of a 32 bit uint which is simply X/2^32. Randomly picking numbers in [0,2^32-1] will result in an expected number of X participants passing the threshold and hence X actives.

Proof A participant who wants to prove eligibility attaches the signature of the VRF message. The VRF message is the tuple {agreed value, Layer, Round}. Signing the layer and the round is what ensures property C. The value is provided by the Hare Beacon. It aims to ensure that the value is under consensus. I.e. all participants will use the same value (hence complying with property A). The value, for example, can be taken from some point in the past of the mesh which complies with property B. The reason we use a VRF signature is that we want to make sure the signing process is not grindable. This is ensured by the property of VRF messages where each output has a single source.

Validation In order to validate the vrf message the receiver should:

  1. Reconstruct the matching VRF message and check the signature against that message.
  2. Validate the the hash of signature of the VRF message passes the threshold.

Leadership The leader eligibility is derived by the same process described above. The only difference is that the expected number of actives is set to 1. Since eligibility is random, it is possible that more than one leader will exist in the same (proposal) round. To handle this, we agree on a way to order the signatures in order to decide who is the real accepted leader. For example, this can be done by comparing bytes and accepting lowest ranked leader.

Message Validation & Processing Flow#

Eligibility & Signature Validation#

Each message received (no matter of what type) is checked for:

  • Validity of signature (the message signature)
  • Validity of eligibility (the role proof signature and the threshold as specified under EligibilityOracle

Note: messages that form a commit certificate or an SVP should also be validated for eligibility and signature.

Contextual Validity#

A message M(TYPE, K) where K is the round counter (K%4 is the round K/4 is the iteration) is said to be contextually valid iff the receiver received the message on round K%4 of iteration K/4. For example, a message of type status round should arrive during the status round and in addition if K=8 then the receiver should be in the second iteration. A message that arrives at the correct iteration but one round before the correct round is considered early. A late message is a contextually invalid message.

Syntactic Validity#

Syntax validity assures the structure of the message is correct. For example if it is a proposal message then it should include an SVP.

Commit Certificate Validation#

Reminder: a commit certificate is a collection of commit messages. Validations:

  • validate that all messages are of type commit
  • validate that all (commit) messages state the same iteration number
  • uniqueness of sender across all commit messages
  • validate that all messages state the same set (in the implementation the set is optimized-out of the commit message and attached to the certificate only once)

Proposal & SVP Validation#

Reminder: SVP consists of f+1 status messages. Validations:

  • validate all messages are of type status
  • validate all (status) messages state the same iteration number
  • uniqueness of sender across all commit messages
  • for each status messsages(S, K , Ki):
    • if ki > 0 look for a certificate on (S,K)
    • if ki = -1 prove by preround messages
  • Validate SVP type:
    • Type A - the proposal states the union of all status messages
    • Type B - the proposal states the set S for which ki is maximal

Message Validation Round 1 Round 2 Round 3 Round 4

Last updated on by Aviv Eyal