Circular Image

R.M. Chotkan

7 records found

Authored

Reliable communication is a fundamental distributed communication abstraction that allows any two nodes of a network to communicate with each other. It is necessary for more powerful communication primitives, such as broadcast and consensus. Using different authentication models, ...

Decentralised Autonomous Organisations (DAOs) have the capability of being a disruptive Web3 technology. Their usage of cryptographically secure distributed ledgers shows promise of replacing existing technical and financial intermediaries. However, this promise has not been f ...

Self-Sovereign Identity (SSI) aspires to create a standardised identity layer for the Internet by placing citizens at the centre of their data, thereby weakening the grip of big tech on current digital identities. However, as millions of both physical and digital identities are l ...

Contributed

This paper explores the integration of weighted vot-ing mechanisms into DAG-based consensus proto-cols, such as Tusk [EuroSys’22], which promise high throughput and low latency. Weighted voting,
pioneered by protocols like WHEAT [SRDS’15] and AWARE [TDSC’20], aims to optimize ...
Streamlined Byzantine Fault Tolerant (BFT) protocols, such as HotStuff [PODC'19], and weighted voting represent two possible strategies to improve consensus in the distributed systems world. Several studies have been conducted on both techniques, but the research on ...

Using Weighted Voting to Accelerate Blockchain Consensus

Intrusion tolerance during performance degradation attacks

This paper examines the impact of faulty nodes on Practical Byzantine Fault Tolerance (PBFT) algorithms, focusing on the AWARE optimization. While AWARE improves average-case latency by assigning larger voting weights to well-connected nodes, it is vulnerable to exploitation by ...
Blockchain-based payment systems typically assume a synchronous communication network and a limited workload to confirm transactions within a bounded timeframe. These assumptions make such systems less effective in scenarios where reliable network access is not guaranteed.
Of ...