Merge remote-tracking branch 'origin/docs'

This commit is contained in:
Cheng 2024-08-02 13:38:39 +08:00
commit 295919fd69
No known key found for this signature in database
11 changed files with 336 additions and 205 deletions

View File

@ -732,7 +732,7 @@ read and write access costs a thousand times what tardigrade costs, will
cost about twelve dollars. cost about twelve dollars.
So, we should consider the blockdag as an immutable store of arbitrary So, we should consider the blockdag as an immutable store of arbitrary
typed data, a reliable broadcast channel, where some types are executable, typed data, a total order broadcast channel, where some types are executable,
and, when executed, cause a change in mutable total state, typically that and, when executed, cause a change in mutable total state, typically that
a new unspent coin record is added, and an old unspent coin record is a new unspent coin record is added, and an old unspent coin record is
deleted. deleted.

View File

@ -11,9 +11,9 @@ We want wallet chains hanging off the primary chain, and child chains. A wallet
Each wallet will be a merkle chain,that links to the consensus chain and is linked by the consensus chain, and it consists of a linear chain of transactions each, with a sequence number, each of which commits a non dust amount to a transaction output owned by the wallet - which only owns one such output, because all outputs by other people have to be committed into the destination wallet in a reasonable time. Each wallet will be a merkle chain,that links to the consensus chain and is linked by the consensus chain, and it consists of a linear chain of transactions each, with a sequence number, each of which commits a non dust amount to a transaction output owned by the wallet - which only owns one such output, because all outputs by other people have to be committed into the destination wallet in a reasonable time.
A wallet chain has a single authority, but we could also have chains hanging off it that represent the consensus of smaller groups, for example the shareholders of a company with their shares in a merkle child chain, and their own reliable broadcast channel. A wallet chain has a single authority, but we could also have chains hanging off it that represent the consensus of smaller groups, for example the shareholders of a company with their shares in a merkle child chain, and their own total order broadcast channel.
The reliable broadcast channel has to keep the complete set of hashes of the most recent transaction outputs of a wallet that commits more than a dust amount of money to the continuing wallet state and keep the path to those states around forever, but with the merkle chain structure envisaged, the path to those states will only grow logarithmically. The total order broadcast channel has to keep the complete set of hashes of the most recent transaction outputs of a wallet that commits more than a dust amount of money to the continuing wallet state and keep the path to those states around forever, but with the merkle chain structure envisaged, the path to those states will only grow logarithmically.
I discarded the data on infix and postfix positioning of parents, and the tree depicted does not allow us to reach an arbitrary item from a leaf node, but the final additional merkle vertex produced along with each leaf node does reach every item. At the cost of including a third hash for backtracking in some of the merkle vertexes. I discarded the data on infix and postfix positioning of parents, and the tree depicted does not allow us to reach an arbitrary item from a leaf node, but the final additional merkle vertex produced along with each leaf node does reach every item. At the cost of including a third hash for backtracking in some of the merkle vertexes.
@ -207,4 +207,3 @@ Every time a fresh tiny file is created, a background process is started to chec
So that files sort in the correct order, we name them in base 36, with a suffix indicating whether they are the fixed length index records, or the variable sized records that the fixed length records point into. So that files sort in the correct order, we name them in base 36, with a suffix indicating whether they are the fixed length index records, or the variable sized records that the fixed length records point into.
Although we should make the files friendly for conventional backup for the sake of cold storage, we cannot rely on conventional backup mechanisms, because we have to always have to have very latest state securely backed up before committing it into the blockchain. Which is best done by having a set of remote Sqlite files. Although we should make the files friendly for conventional backup for the sake of cold storage, we cannot rely on conventional backup mechanisms, because we have to always have to have very latest state securely backed up before committing it into the blockchain. Which is best done by having a set of remote Sqlite files.

View File

@ -1335,6 +1335,11 @@ services. Writing networking for a service with large numbers of clients is
very different between Windows and Linux, and I expect Tokio to take care very different between Windows and Linux, and I expect Tokio to take care
of the differences. of the differences.
Unfortunately rust async is beyond human comprehension, because
the borrow checker does not really know or understand what the runtime is
is up to, and the task of explaining the runtime to the borrow checker
is dropped on the shoulders of the long suffering programmer.
There really is not any good C or C++ environment for writing services There really is not any good C or C++ environment for writing services
except Wt, which is completely specialized for the case of writing a web except Wt, which is completely specialized for the case of writing a web
service whose client is the browser, and which runs only on Linux. service whose client is the browser, and which runs only on Linux.

View File

@ -106,7 +106,162 @@ resembling that is going to be needed when we have to shard.
Dumb idea. We already have the node.js solution in a Rust library. Dumb idea. We already have the node.js solution in a Rust library.
Actix and Tokio are the (somewhat Cish) solutions. Actix and Tokio are the (somewhat Cish) solutions. But Rust async is infamously
hard. The borrow checker goes mad trying figure lifetimes in async
## callbacks
In C, a callback is implemented as an ordinary function pointer, and a pointer to void,
which is then cast to a data structure of the desired type.
What the heavy C++ machinery of `std::function` does is bind the two together and then
do memory management after the fashion of `std::string`.
(but we probably need to do our own memory management, so need to write
our own equivalent of std funcction supporting a C rather than C++ api)
[compiler explorer]:https://godbolt.org/ {target="_blank"}
And `std::function`, used correctly, should compile to the identical code
merely wrapping the function pointer and the void pointer in a single struct
-- but you had better use [compiler explorer] to make sure
that you are using it correctly.
Write a callback in C, an an std::function in c++, and make sure that
the compiler generates what it should.
Ownership is going to be complicated -- since after createing and passing a callback, we
probably do not want ownership any more -- the thread is going to return
and be applied to some entirely different task. So the call that is passed the callback
as an argument by reference uses `move` to ensure that when the `std::function`
stack value in its caller pointing to the heap gets destroyed, it does not
free the value on the heap, and then stashes the moved `std::function` in some
safe place.
Another issue is that rust, python, and all the rest cannot talk to C++, they can only
talk C. On the other hand, the compiler will probably optimise the `std::function` that
consists of a lamda that is a call to function pointer and that captures a pointer to void.
Again, since compiler is designed for arcane optimization issues, have to see what happens
in [compiler explorer].
But rather than guessing about the compiler correctly guessing intent, make the
callback a C union type implementing std variant in C, being a union of `std:monostate`
a C callback taking no arguments, a C++ callback taking no arguments, C and C++ callbacks
taking a void pointer argument, a c++ callback that is a pointer to method, and
a C++ callback that is an `std::function`
In the old win32 apis, which were designed for C, and then retrofitted for C++
they would have a static member function that took an LPARAM, which was a pointer
to void pointing at the actual object, and then the static member function
would directly call the appropriate, usually virtual, actual member function.
Member function pointers have syntax that no one can wrap their brains around
so people wrap them in layers of typedefs.
Sometimes you want to have indefinitely many data structures, which are dynamically allocated
and then discarded.
Sometimes you want to have a single data structure that gets overwritten frequently. The latter is
preferable when it suffices, since it means that asynch callback code is more like sync code.
In one case, you would allocate the object every time, and when does with it, discard it.
In the other case it would be a member variable of struct that hangs around and is continually
re-used.
### C compatibility
Bind the two together in a way that C can understand:
The code that calls the callback knows nothing about how the blob is structured.
The event management code knows nothing about how the blob is structured.
But the function pointer in the blob *does* know how the blob is structured.
```C
// p points to or into a blob of data containing a pointer to the callback
// and the data that the callback needs is in a position relative to the pointer
// that is known to the callback function.
enum event_type { monovalue, reply, timeout, unreachable, unexpected_error };
struct ReplyTo;
typedef extern "C" void (*ReplyTo_)(ReplyTo * pp, void* RegardsTo, event_type evtype, void* event);
struct ReplyTo
{
ReplyTo_ p;
};
ReplyTo * pp;
RegardsTo py;
// Within the actual function in the event handling code,
// one has to cast `ReplyTo* pp` from its base type to its actual type
// that has the rest of the data, which the event despatcher code knows nothing of.
// The event despatch code should not include the headers of the event handling code,
// as this would make possible breach of separation of responsibilities.
try{
(*((*pp).p))(pp, py, evtype, event );
}
catch(...){
// log error and release event handler.
// if an exception propagates from the event handling code into the event despatch code
// it is programming error, a violation of separation of responsibilities
// and the event despatch code cannot do anything with the error.
}
```
`pp` points into a blob that contains the data needed for handling the event when it happens,
and a pointer to the code that will handle it when it happens, ptrEvent is a ptr to a
struct containing the event.
But, that C code will be quite happy if given a class whose first field is a pointer to a C calling
convention static member function that calls the next field, the
next field being a lambda whose unnameable type is known to the templated object when
it was defined, or if it is given a class whose first field is a pointer to a C calling convention
static function that does any esoteric C++, or Rust, or Lua thing.
The runtime despatches an event to an object of type `ReplyTo` once and only
once and then it is freed. Thus if for example the object is waiting for a packet that has a handle
to it, or a timeout, and two such packets arrive it is only called with the
first such packet, the next packet is silently discarded, and the timeout
event cancelled or ignored.
The object of type RegardsTo has a longer lifetime, which the runtime
does not manage. The runtime ensures that if two events reference
the same RegardsTo object, they are handled serially, except for
the case that the RegardsTo object is a nullpointer.
The next event referencing the same RegardsTo object goes into a queue
waiting on completion of the previous message.
If an event has an InRegards to, but no InReply, it goes to the static default ReplyTo handler of the InRegards object, which gets called many times
and whose lifetime is not managed by the runtime.
If a message should result in changes to many InRegards to objects
one of them has to handle it, and then send messages to the others.
Code called by the async runtime must refrain from updating or
reading data that could be changed by other code called by the
asynch runtime unless the data is atomically changed from one
valid state to another valid state. (For example a pointer pointing
to the previous valid state is atomically updated to a pointer to a newly
created valid state.)
In the normal case the ReplyTo callback is sticking to data that
is in its ReplyTo and RegardsTo object.
When an RegardsTo object tells the runtime it has finalized,
then the runtime will no longer do callbacks referencing it.
The finalization is itself an event, and results in a callback to
another event data is a pointer to the finalized object and whose
ReplyTo and RegardsTo objects are the objects that created the
now finalized object.
Thus one RegardsTo object can spawn many such objects, and
can read their contents when they finalise. (But not until they
finalise)
## Use Go ## Use Go

View File

@ -1,6 +1,10 @@
--- ---
title: title: >-
C++ Automatic Memory Management Unobvious C++
sidebar: true
notmine: false
abstract: >-
A collection of notes about the some of somewhat esoteric and unobvious aspects of C++
... ...
# Memory Safety # Memory Safety
@ -29,11 +33,14 @@ std::make_unique, std::make_shared create pointers to memory managed
objects. (But single objects, not an array, use spans for pointer objects. (But single objects, not an array, use spans for pointer
arithmetic) arithmetic)
```C++
auto sp = std::make_shared<int>(42); auto sp = std::make_shared<int>(42);
std::weak_ptr<T> wp{sp}; std::weak_ptr<T> wp{sp};
```
# Array sizing and allocation # Array sizing and allocation
```C++
/* This code creates a bunch of "brown dog" strings on the heap to test automatic memory management. */ /* This code creates a bunch of "brown dog" strings on the heap to test automatic memory management. */
char ca[]{ "red dog" }; //Automatic array sizing char ca[]{ "red dog" }; //Automatic array sizing
std::array<char,8> arr{"red dog"}; //Requires #include <array> std::array<char,8> arr{"red dog"}; //Requires #include <array>
@ -79,10 +86,11 @@ arithmetic)
MyClass()=default; // Otherwise unlikely to be POD MyClass()=default; // Otherwise unlikely to be POD
MyClass& operator=(const MyClass&) = default; // default assignment Not actually needed, but just a reminder. MyClass& operator=(const MyClass&) = default; // default assignment Not actually needed, but just a reminder.
}; };
```
### alignment ### alignment
```c++ ```C++
// every object of type struct_float will be aligned to alignof(float) boundary // every object of type struct_float will be aligned to alignof(float) boundary
// (usually 4) // (usually 4)
struct alignas(float) struct_float { struct alignas(float) struct_float {
@ -119,25 +127,46 @@ deleted.
Copy constructors Copy constructors
```C++
A(const A& a) A(const A& a)
```
Copy assignment Copy assignment
```C++
A& operator=(const A other) A& operator=(const A other)
```
Move constructors Move constructors
```C++
class_name ( class_name && other) class_name ( class_name && other)
A(A&& o) A(A&& o)
D(D&&) = default; D(D&&) = default;
```
Move assignment operator Move assignment operator
```C++
V& operator=(V&& other) V& operator=(V&& other)
```
Move constructors Move constructors
```C++
class_name ( class_name && ) class_name ( class_name && )
```
## delegating constructor
```C++
class Foo
{
public:
Foo(char x, int y) {}
Foo(int y) : Foo('a', y) {} // Foo(int) delegates to Foo(char, int)
};
```
## rvalue references ## rvalue references
@ -181,6 +210,22 @@ where `std::forward` is defined as follows:
in themselves, rather they cause the code referencing `t` to use the intended in themselves, rather they cause the code referencing `t` to use the intended
copy and intended assignment. copy and intended assignment.
## delegating constructors
calling one constructor from another.
```C++
example::example(... arguments ...):
example(...different arguments ...)
{
...
code
...
};
```
## constructors and destructors ## constructors and destructors
If you declare the destructor deleted that prevents the compiler from If you declare the destructor deleted that prevents the compiler from
@ -219,12 +264,16 @@ in the source class instead of the destination class, hence most useful
when you are converting to a generic C type, or to the type of an when you are converting to a generic C type, or to the type of an
external library that you do not want to change. external library that you do not want to change.
struct X { ```C++
struct X {
int y; int y;
operator int(){ return y; } operator int(){ return y; }
operator const int&(){ return y; } /* C habits would lead you to incorrectly expect "return &y;", which is what is implied under the hood. */ operator const int&(){ return y; } /* C habits would lead you to
incorrectly expect "return &y;", which is what is
implied under the hood. */
operator int*(){ return &y; } // Hood is opened. operator int*(){ return &y; } // Hood is opened.
}; };
```
Mpir, the Visual Studio skew of GMP infinite precision library, has some Mpir, the Visual Studio skew of GMP infinite precision library, has some
useful and ingenious template code for converting C type functions of useful and ingenious template code for converting C type functions of
@ -255,6 +304,35 @@ stack instead of 128, hardly a cost worth worrying about. And in the
common bad case, (a+b)\*(c+d) clever coding would only save one stack common bad case, (a+b)\*(c+d) clever coding would only save one stack
allocation and redundant copy. allocation and redundant copy.
# Introspection and sfinae
Almost all weird and horrific sfinae code [has been rendered unnecessary by concepts](https://www.cppstories.com/2016/02/notes-on-c-sfinae/).
```c++
template <typename T> concept HasToString
= requires(T v) {
{v.toString()} -> std::convertible_to<std::string>;
};
```
The `requires` clause is doing the sfinae behind your back to deliver a boolean.
The concept name should be chosen to carry the meaning in an error message.
And any time concepts cannot replace sfinae, sfinae can be done much better by `std::void_t`, which is syntactic sugar for "trigger substitution failure with the least possible distracting syntax"
```c++
// default template:
template< class , class = void >
struct has_toString : false_type { };
// specialized as has_member< T , void > or sfinae
template< class T>
struct has_toString< T , void_t<decltype(&T::toString)> > :
std::is_same< std::string, decltype(declval<T>().toString()) >
{ };
```
# Template specialization # Template specialization
namespace N { namespace N {
@ -272,15 +350,6 @@ implementation will not be nearly so clever.
extern template int fun(int); extern template int fun(int);
/*prevents redundant instantiation of fun in this compilation unit and thus renders the code for fun unnecessary in this compilation unit.*/ /*prevents redundant instantiation of fun in this compilation unit and thus renders the code for fun unnecessary in this compilation unit.*/
# Template traits, introspection
Template traits: C++ has no syntactic sugar to ensure that your template
is only called using the classes you intend it to be called with.
Often you want different templates for classes that implement similar functionality in different ways.
This is the entire very large topic of template time, compile time code, which is a whole new ball of wax that needs to be dealt with elsewhere
# Abstract and virtual # Abstract and virtual
An abstract base class is a base class that contains a pure virtual An abstract base class is a base class that contains a pure virtual
@ -487,115 +556,6 @@ similarly placement `new`, and `unique_ptr`.
Trouble is that an std::function object is a fixed sized object, like an `std::string`, typically sixteen bytes. which like an `std::string` points to a dynamically allocated object on the heap. Trouble is that an std::function object is a fixed sized object, like an `std::string`, typically sixteen bytes. which like an `std::string` points to a dynamically allocated object on the heap.
## callbacks
In C, a callback is implemented as an ordinary function pointer, and a pointer to void,
which is then cast to a data structure of the desired type.
What the heavy C++ machinery of `std::function` does is bind the two together and then
do memory management after the fashion of `std::string`.
[compiler explorer]:https://godbolt.org/ {target="_blank"}
And `std::function`, used correctly, should compile to the identical code
merely wrapping the function pointer and the void pointer in a single struct
-- but you had better use [compiler explorer] to make sure
that you are using it correctly.
Write a callback in C, an an std::function in c++, and make sure that
the compiler generates what it should.
Ownership is going to be complicated -- since after createing and passing a callback, we
probably do not want ownership any more -- the thread is going to return
and be applied to some entirely different task. So the call that is passed the callback
as an argument by reference uses `move` to ensure that when the `std::function`
stack value in its caller pointing to the heap gets destroyed, it does not
free the value on the heap, and then stashes the moved `std::function` in some
safe place.
Another issue is that rust, python, and all the rest cannot talk to C++, they can only
talk C. On the other hand, the compiler will probably optimise the `std::function` that
consists of a lamda that is a call to function pointer and that captures a pointer to void.
Again, since compiler is designed for arcane optimization issues, have to see what happens
in [compiler explorer].
But rather than guessing about the compiler correctly guessing intent, make the
callback a C union type implementing std variant in C, being a union of `std:monostate`
a C callback taking no arguments, a C++ callback taking no arguments, C and C++ callbacks
taking a void pointer argument, a c++ callback that is a pointer to method, and
a C++ callback that is an `std::function`
In the old win32 apis, which were designed for C, and then retrofitted for C++
they would have a static member function that took an LPARAM, which was a pointer
to void pointing at the actual object, and then the static member function
would directly call the appropriate, usually virtual, actual member function.
Member function pointers have syntax that no one can wrap their brains around
so people wrap them in layers of typedefs.
Sometimes you want to have indefinitely many data structures, which are dynamically allocated
and then discarded.
Sometimes you want to have a single data structure that gets overwritten frequently. The latter is
preferable when it suffices, since it means that asynch callback code is more like sync code.
In one case, you would allocate the object every time, and when does with it, discard it.
In the other case it would be a member variable of struct that hangs around and is continually
re-used.
### C compatibility
Bind the two together in a way that C can understand:
The code that calls the callback knows nothing about how the blob is structured.
The event management code knows nothing about how the blob is structured.
But the function pointer in the blob *does* know how the blob is structured.
```C
// p points to or into a blob of data containing a pointer to the callback
// and the data that the callback needs is in a position relative to the pointer
// that is known to the callback function.
enum event_type { monovalue, reply, timeout, unreachable, unexpected_error };
struct callback;
typedef extern "C" void (*callback_)(callback * pp, event_type evtype, void* event);
struct callback
{
callback_ p;
};
callback * pp;
// Within the actual function in the event handling code,
// one has to cast `callback* pp` from its base type to its actual type
// that has the rest of the data, which the event despatcher code knows nothing of.
// The event despatch code should not include the headers of the event handling code,
// as this would make possible breach of separation of responsibilities.
try{
(*((*pp).p))(pp, evtype, event );
}
catch(...){
// log error and release event handler.
// if an exception propagates from the event handling code into the event despatch code
// it is programming error, a violation of separation of responsibilities
// and the event despatch code cannot do anything with the error.
}
```
`pp` points into a blob that containst the data needed for handling the event when will happen,
and a pointer to the code that will handle it when it happens, ptrEvent is a ptr to a
struct containing an index that will tell us what kind of struct it is. It is a C union
of very different structs. Since it is dynamicaly allocated, we don't waste space, we create
the particular struct, cast it to the union, and then cast the union to the struct it actually is.
But, that C code will be quite happy if given a class whose first field is a pointer to a C calling
convention static member function that calls the next field, the
next field being a lambda whose unnameable type is known to the templated object when
it was defined, or if it is given a class whose first field is a pointer to a C calling convention
static function that does any esoteric C++, or Rust, or Lua thing.
# auto and decltype(variable) # auto and decltype(variable)
In good c++, a tremendous amount of code behavior is specified by type In good c++, a tremendous amount of code behavior is specified by type

View File

@ -28,7 +28,7 @@ just actions that are cryptographically possible or impossible.
But scriptless scripts cannot in themselves solve the hard problem, that all But scriptless scripts cannot in themselves solve the hard problem, that all
participants in a multilateral transaction need to know _in a short time_ that participants in a multilateral transaction need to know _in a short time_ that
the whole multilateral transaction has definitely succeeded or definitely the whole multilateral transaction has definitely succeeded or definitely
failed. This inherently requires a reliable broadcast channel, though if failed. This inherently requires a total order broadcast channel, though if
everyone is cooperating, they dont have to actually put anything on that everyone is cooperating, they dont have to actually put anything on that
channel. But they need the capability to resort to that channel if something channel. But they need the capability to resort to that channel if something
funny happens, and that capability has to be used or lost within a time limit. funny happens, and that capability has to be used or lost within a time limit.
@ -48,18 +48,18 @@ broadcast channel if the information is available, yet certain time limits are
nonetheless exceeded. nonetheless exceeded.
My conclusion was that full circle unbreakability of lightning network My conclusion was that full circle unbreakability of lightning network
transactions within time limits needs a reliable broadcast, and I envisaged transactions within time limits needs a total order broadcast, and I envisaged
a hierarchy of reliable broadcasters, (sidechains, with some sidechains a hierarchy of total order broadcasters, (sidechains, with some sidechains
representing a group of bilateral lightning network gateways that act as representing a group of bilateral lightning network gateways that act as
one multilateral lightning network gateway) But this conclusion may be one multilateral lightning network gateway) But this conclusion may be
wrong or overly simple though we are still going to need sidechains and wrong or overly simple though we are still going to need sidechains and
hierarchical reliable broadcasting, because it can do no end of things that hierarchical total order broadcasting, because it can do no end of things that
are very difficult otherwise. are very difficult otherwise.
But reliable broadcast mechanism both supplies and requires a solution to But total order broadcast mechanism both supplies and requires a solution to
distributed Byzantine fault tolerant consensus, so the problem of getting a distributed Byzantine fault tolerant consensus, so the problem of getting a
lock up and bringing it down is a general distributed Byzantine fault lock up and bringing it down is a general distributed Byzantine fault
tolerant consensus problem, and perhaps viewing it as a reliable broadcast tolerant consensus problem, and perhaps viewing it as a total order broadcast
problem is a misperception and misanalysis. problem is a misperception and misanalysis.
Rather, the blockdag requires a mechanism to establish a total order of Rather, the blockdag requires a mechanism to establish a total order of
@ -329,10 +329,10 @@ from Carol. Full circle transaction. We need to guarantee that either the
full circle goes through, or none of the separate unilateral transactions in full circle goes through, or none of the separate unilateral transactions in
the circle go through. the circle go through.
## Reliable broadcast channel ## total order broadcast channel
The solution to atomicity and maintaining consistency between different The solution to atomicity and maintaining consistency between different
entities on the lightning network is the reliable broadcast channel. entities on the lightning network is the total order broadcast channel.
Such as the blockchain itself. Create a special zero value transaction that Such as the blockchain itself. Create a special zero value transaction that
has no outputs and carries its own signature, but can be a required input to has no outputs and carries its own signature, but can be a required input to
@ -349,49 +349,49 @@ time limit, the transaction succeeds, and each party could potentially play
the transaction, and thus effectively owns the corresponding part of the the transaction, and thus effectively owns the corresponding part of the
gateway coin, regardless of whether they play it or not. gateway coin, regardless of whether they play it or not.
A reliable broadcast channel is something that somehow works like a A total order broadcast channel is something that somehow works like a
classified ad did back in the days of ink on paper newspapers. The physical classified ad did back in the days of ink on paper newspapers. The physical
process of producing the newspaper guaranteed that every single copy had the process of producing the newspaper guaranteed that every single copy had the
exact same classified ad in it, and that ad must have been made public on a exact same classified ad in it, and that ad must have been made public on a
certain date. Easy to do this with a printing press that puts ink on certain date. Easy to do this with a printing press that puts ink on
paper. Very hard to do this, with electronic point to point communications. paper. Very hard to do this, with electronic point to point communications.
But let us assume we somehow have a reliable broadcast channel: But let us assume we somehow have a total order broadcast channel:
All the parties agree on a Merkle tree, which binds them if the joint All the parties agree on a Merkle tree, which binds them if the joint
signature to that Merkle tree appears on the reliable broadcast channel signature to that Merkle tree appears on the total order broadcast channel
within a certain short time period. within a certain short time period.
And, if some of them have the joint signature, then knowing that they could And, if some of them have the joint signature, then knowing that they could
upload it to the reliable broadcast channel, they each agree to superseding upload it to the total order broadcast channel, they each agree to superseding
unilateral transactions. If Bob expects payment from Ann and expects to unilateral transactions. If Bob expects payment from Ann and expects to
make payment to Carol, and he has the joint signature, and knows Carol has a make payment to Carol, and he has the joint signature, and knows Carol has a
copy of the authenticated joint signature, because Carol sent him the copy of the authenticated joint signature, because Carol sent him the
signature and he sent Ann the signature, of it, then he knows Carol can signature and he sent Ann the signature, of it, then he knows Carol can
*make* him pay her, and knows he can *make* Ann pay him. So he just goes *make* him pay her, and knows he can *make* Ann pay him. So he just goes
right ahead with unilateral transactions that supersede the transaction that right ahead with unilateral transactions that supersede the transaction that
relies on the reliable broadcast channel. And if every party to the relies on the total order broadcast channel. And if every party to the
transaction does that, none of them actually broadcast the signature the transaction does that, none of them actually broadcast the signature the
reliable broadcast channel. Which in consequence, by merely being available total order broadcast channel. Which in consequence, by merely being available
enforces correct behaviour, and is seldom likely to need to actually enforces correct behaviour, and is seldom likely to need to actually
broadcast anything. And when something is actually broadcast on that broadcast anything. And when something is actually broadcast on that
channel, chances are that all the transactions that that broadcast enables channel, chances are that all the transactions that that broadcast enables
will have been superseded. will have been superseded.
Each party, when receives a copy of the joint signature that he *could* upload Each party, when receives a copy of the joint signature that he *could* upload
to the reliable broadcast channel, sends a copy to the counter party that he to the total order broadcast channel, sends a copy to the counter party that he
expects to pay him, and each party, when he receives a copy from the party he expects to pay him, and each party, when he receives a copy from the party he
expects to pay, performs the unilateral payment to that party that supersedes expects to pay, performs the unilateral payment to that party that supersedes
and the transaction using the reliable broadcast network. and the transaction using the total order broadcast network.
And if a party has a copy of the joint signature and the document that it And if a party has a copy of the joint signature and the document that it
signs for the full circle transaction, but finds himself unable to perform signs for the full circle transaction, but finds himself unable to perform
the superseding unilateral transactions with his counterparties, (perhaps the superseding unilateral transactions with his counterparties, (perhaps
their internet connection or their computer went down) then he uploads the their internet connection or their computer went down) then he uploads the
signature to the reliable broadcast channel. signature to the total order broadcast channel.
When the signature is uploaded to reliable broadcast channel, this does not When the signature is uploaded to total order broadcast channel, this does not
give the reliable broadcast channel any substantial information about the give the total order broadcast channel any substantial information about the
amount of the transaction, and who the parties to the transaction are, but the amount of the transaction, and who the parties to the transaction are, but the
node of the channel sees IP addresses, and this could frequently be used to node of the channel sees IP addresses, and this could frequently be used to
reconstruct a pretty good guess about who is transacting with whom and why. reconstruct a pretty good guess about who is transacting with whom and why.
@ -404,7 +404,7 @@ will have only small fragments of data, not enough to put together to form
a meaningful picture, hence the privacy leak is unlikely to be very useful a meaningful picture, hence the privacy leak is unlikely to be very useful
to those snooping on other peoples business. to those snooping on other peoples business.
### Other use cases for a reliable broadcast channel ### Other use cases for a total order broadcast channel
The use case of joint signatures implies an immutable data structure of the The use case of joint signatures implies an immutable data structure of the
tuple rowid, hash, public key, and two scalars. tuple rowid, hash, public key, and two scalars.
@ -415,7 +415,7 @@ If you continually upload the latest version, you wind up uploading most of
tree, or all of it, which does not add significantly to the cost of each tree, or all of it, which does not add significantly to the cost of each
interaction recorded. The simplest sql friendly data structure is (rowid of interaction recorded. The simplest sql friendly data structure is (rowid of
this item, public key, hash, your index of hash, oids of two child hashes) this item, public key, hash, your index of hash, oids of two child hashes)
with the reliable broadcast channel checking that the child hashes do in fact with the total order broadcast channel checking that the child hashes do in fact
generate the hash, and that the tuple (public key, index of hash) is unique. generate the hash, and that the tuple (public key, index of hash) is unique.
If the data is aged out after say, three months, cannot directly check If the data is aged out after say, three months, cannot directly check
@ -451,7 +451,7 @@ change, with the torch being passed from key to key. In which case the
upload of total state needs to reference the used key, and an earlier, upload of total state needs to reference the used key, and an earlier,
normally the earliest, signing key, with links in the chain of keys normally the earliest, signing key, with links in the chain of keys
authorizing keys being renewed at less than the timeout interval for data to authorizing keys being renewed at less than the timeout interval for data to
be immutable, but unavailable from the reliable broadcast network. If the be immutable, but unavailable from the total order broadcast network. If the
witness asserts that key is authorized by a chain of keys going back to an witness asserts that key is authorized by a chain of keys going back to an
earlier or the earliest keys, then it relies on its previous witness, rather earlier or the earliest keys, then it relies on its previous witness, rather
than re-evaluating the entire, possibly very long, chain of keys every time. than re-evaluating the entire, possibly very long, chain of keys every time.
@ -467,26 +467,26 @@ Because of Byzantine failure or network failure, such a chain may fork. The
protocol has to be such that if a fork develops by network failure, protocol has to be such that if a fork develops by network failure,
it will be fixed, with one of the forks dying when the network functions it will be fixed, with one of the forks dying when the network functions
better, and if it fails by Byzantine failure, better, and if it fails by Byzantine failure,
we get two sets of reliable broadcast channels, we get two sets of total order broadcast channels,
each testifying that the other reliable broadcast channel is unreliable, each testifying that the other total order broadcast channel is unreliable,
and each testifying that a different fork is the valid fork, and each testifying that a different fork is the valid fork,
and which fork you follow depends on which reliable broadcast channel you and which fork you follow depends on which total order broadcast channel you
subscribe to. subscribe to.
Another use case is for wallet recovery, with mutable data structures Another use case is for wallet recovery, with mutable data structures
encrypted by the private key whose primary key is the public key. encrypted by the private key whose primary key is the public key.
## implementing and funding a reliable broadcast channel ## implementing and funding a total order broadcast channel
Tardigrade has a somewhat similar architecture to the proposed Reliable Tardigrade has a somewhat similar architecture to the proposed Reliable
Broadcast network charges $120 per year for per TB of storage, $45 per Broadcast network charges $120 per year for per TB of storage, $45 per
terabyte of download. So for uploading a single signature, and downloading terabyte of download. So for uploading a single signature, and downloading
it six times, which one hash, one elliptic point, and two scalars, one it six times, which one hash, one elliptic point, and two scalars, one
hundred and twenty eight bytes, so the cost of doing what tardigrade does hundred and twenty eight bytes, so the cost of doing what tardigrade does
with reliable broadcast network operated by a single operator would be with total order broadcast network operated by a single operator would be
$4 × 10^{-7}$ dollars. Which might as well be free, except we have to charge some tiny amount to prevent DDoS. $4 × 10^{-7}$ dollars. Which might as well be free, except we have to charge some tiny amount to prevent DDoS.
But, when the system is operating at scale, will want the reliable broadcast But, when the system is operating at scale, will want the total order broadcast
network to have many operators, who synchronize with each other so that the network to have many operators, who synchronize with each other so that the
data is available to each of them and all of them and from each of them and data is available to each of them and all of them and from each of them and
all of them, and can testify when the all of them, and can testify when the
@ -498,11 +498,11 @@ transaction. Maybe we should charge for opening the account, and then
every hundredth transaction. every hundredth transaction.
We also want the operators to be genuinely independent and separate from each We also want the operators to be genuinely independent and separate from each
other. We dont want a single inherently authorized reliable broadcast channel, other. We dont want a single inherently authorized total order broadcast channel,
because it is inherently a low cost target for the fifty one percent attack. because it is inherently a low cost target for the fifty one percent attack.
I have been thinking about implementing a reliable broadcast channel as I have been thinking about implementing a total order broadcast channel as
byzantine Paxos protocol, but this gives us a massive low cost fifty one byzantine Paxos protocol, but this gives us a massive low cost fifty one
percent attack vulnerability. If the reliable broadcast channel is cheap percent attack vulnerability. If the total order broadcast channel is cheap
enough to be useful, it is cheap enough for the fifty one percent attack. enough to be useful, it is cheap enough for the fifty one percent attack.
We want cheap testimony of valuable facts, which makes consensus mechanisms We want cheap testimony of valuable facts, which makes consensus mechanisms
unlikely to work. unlikely to work.

View File

@ -56,14 +56,14 @@ but that is small potatoes compared to capturing a tiny sliver of SWIFT fees.
SWIFT is a messaging system that handles about five hundred standardized structured messages per second SWIFT is a messaging system that handles about five hundred standardized structured messages per second
(many messages of many types) between a few hundred banks, with certain special security guarantees, (many messages of many types) between a few hundred banks, with certain special security guarantees,
in particular reliable and provable delivery. To eat SWIFT's lunch, in particular reliable and provable delivery. To eat SWIFT's lunch,
need a sharded reliable broadcast channel with open entry, without centralization. need a sharded total order broadcast channel with open entry, without centralization.
I am using “reliable broadcast channel” in the cryptographic sense. I am using “total order broadcast channel” in the cryptographic sense.
It will not be reliable in the ordinary sense, since you may attempt to put a message on it, It will not be reliable in the ordinary sense, since you may attempt to put a message on it,
and the message may not get on it, and you have to try again. and the message may not get on it, and you have to try again.
It will not be broadcast in the ordinary sense, It will not be broadcast in the ordinary sense,
since most messages are end to end encrypted so that only the two parties can read them. since most messages are end to end encrypted so that only the two parties can read them.
What makes it a reliable broadcast channel in the cryptographic sense, What makes it a total order broadcast channel in the cryptographic sense,
is that if Bob sends a message to Carol over it, is that if Bob sends a message to Carol over it,
as part of a protocol where Bob has to send a message, as part of a protocol where Bob has to send a message,
and Carol has to send a reply, then if the protocol fails because of Bob, Carol can prove it, and Carol has to send a reply, then if the protocol fails because of Bob, Carol can prove it,
@ -71,9 +71,21 @@ and if the protocol fails because of Carol, Bob can prove it.
And both can prove what messages they received, And both can prove what messages they received,
and what messages they sent that the counterparty should have received. and what messages they sent that the counterparty should have received.
This more or less corresponds to the Celestia blockchain --
atomic broadcast and data availability without a massively
replicated state machine. Transactions being somehow achieved somewhere else.
Celestia is an Ethereum data availability layer, which is in some respects the
opposite of what we want to achieve -- we want a privacy layer so that people
can communicate and transact without revealing network addresses where valuable
secrets that could be stolen reside, but the underlying technological problems
that need to be solved are the same.
Celestia uses erasure coding to achieve scaling.
Being sharded, can handle unlimited volume. Being sharded, can handle unlimited volume.
And once that exists as a neutral protocol with open entry and no central control, And once that exists as a neutral protocol with open entry and no central control,
can put dexes on it, Daos on it, can put dexes on it, daos on it,
uncensored social media on it, web 3.0 on it, and coins on it. uncensored social media on it, web 3.0 on it, and coins on it.
And the first thing that should go on it is a dex that can exchange And the first thing that should go on it is a dex that can exchange
@ -142,7 +154,7 @@ BitcoinOS are addressing that. When last I looked their solution was far from r
but it does not yet urgently need to be ready. but it does not yet urgently need to be ready.
To take over from SWIFT, lightning is unlikely to suffice. To take over from SWIFT, lightning is unlikely to suffice.
Going to need Liquid. Since Liquid uses polynomail commits, it Going to need Liquid. Since Liquid uses polynomial commits, it
might be possible to shard it, but the path to that is unclear, might be possible to shard it, but the path to that is unclear,
in which case replacing SWIFT is going to need to need Liquid Lightning. in which case replacing SWIFT is going to need to need Liquid Lightning.
@ -295,10 +307,10 @@ and Bitmessage being out of support.
> > > >
> > Therefore, fund a privacy protocol that is an update to bitmessage, > > Therefore, fund a privacy protocol that is an update to bitmessage,
> > with additional capability of > > with additional capability of
> > zooko names and reliable broadcast, reliable in the cryptographic > > zooko names and total order broadcast, reliable in the cryptographic
> > sense. > > sense.
> > > >
> > Reliable broadcast in the cryptographic sense being that if one has > > total order broadcast in the cryptographic sense being that if one has
> > a transaction protocol in which Bob is supposed > > a transaction protocol in which Bob is supposed
> > to send a message to Carol, and Carol supposed to send a > > to send a message to Carol, and Carol supposed to send a
> > corresponding response to Bob, the blockchain > > corresponding response to Bob, the blockchain

View File

@ -6,7 +6,7 @@ sidebar: true
notmine: false notmine: false
abstract: >- abstract: >-
Bitcoin does not scale to the required size. Bitcoin does not scale to the required size.
The Bitcoin reliable broadcast channel is a massively replicated public ledger of every transaction that ever there was, The Bitcoin total order broadcast channel is a massively replicated public ledger of every transaction that ever there was,
each of which has to be evaluated for correctness by every full peer. each of which has to be evaluated for correctness by every full peer.
With recursive snarks, we can now instead have a massively replicated public SQL index of private ledgers. With recursive snarks, we can now instead have a massively replicated public SQL index of private ledgers.
Such a blockchain with as many transactions as bitcoin, will, after running for as long as Bitcoin, Such a blockchain with as many transactions as bitcoin, will, after running for as long as Bitcoin,
@ -27,7 +27,7 @@ Which means either centralization,
a central bank digital currency, which is the path Ethereum is walking, or privacy. a central bank digital currency, which is the path Ethereum is walking, or privacy.
You cure both blockchain bloat and blockchain analysis by *not* You cure both blockchain bloat and blockchain analysis by *not*
putting the data on the reliable broadcast channel in the first putting the data on the total order broadcast channel in the first
place, rather than doing what Monero does, putting it on the place, rather than doing what Monero does, putting it on the
blockchain in cleverly encrypted form, bloating the blockchain blockchain in cleverly encrypted form, bloating the blockchain
with chaff intended to obfuscate against blockchain analysis. with chaff intended to obfuscate against blockchain analysis.
@ -132,19 +132,19 @@ is valid, given that rest of the chain was valid, and produce a
recursive snark that the new block, which chains to the previous recursive snark that the new block, which chains to the previous
block, is valid. block, is valid.
## reliable broadcast channel ## total order broadcast channel
If you publish information on a reliable broadcast channel, If you publish information on a total order broadcast channel,
everyone who looks at the channel is guaranteed to see it and to everyone who looks at the channel is guaranteed to see it and to
see the same thing, and if someone did not get the information see the same thing, and if someone did not get the information
that you were supposed to send over the channel, it is his fault, that you were supposed to send over the channel, it is his fault,
not yours. You can prove you performed the protocol correctly. not yours. You can prove you performed the protocol correctly.
A blockchain is a merkle chain *and* a reliable broadcast channel. A blockchain is a merkle chain *and* a total order broadcast channel.
In Bitcoin, the reliable broadcast channel contains the entire In Bitcoin, the total order broadcast channel contains the entire
merkle chain, which obviously does not scale, and suffers from a merkle chain, which obviously does not scale, and suffers from a
massive lack of privacy, so we have to introduce the obscure massive lack of privacy, so we have to introduce the obscure
cryptographic terminology "reliable broadcast channel" to draw a cryptographic terminology "total order broadcast channel" to draw a
distinction that does not exist in Bitcoin. In Bitcoin the merkle distinction that does not exist in Bitcoin. In Bitcoin the merkle
vertices are very large, each block is a single huge merkle vertex, vertices are very large, each block is a single huge merkle vertex,
and each block lives forever on an ever growing public broadcast and each block lives forever on an ever growing public broadcast
@ -155,18 +155,18 @@ which is what is happening with Ethereum's use of recursive snarks.
So we need to structure the data as large dag of small merkle So we need to structure the data as large dag of small merkle
vertices, with all the paths through the dag for which we need to vertices, with all the paths through the dag for which we need to
generate proofs being logarithmic in the size of the contents of generate proofs being logarithmic in the size of the contents of
the reliable broadcast channel and the height of the blockchain. the total order broadcast channel and the height of the blockchain.
### scaling the reliable broadcast channel to billions of peers,exabytes of data, and terabytes per second of bandwidth ### scaling the total order broadcast channel to billions of peers,exabytes of data, and terabytes per second of bandwidth
At scale, which is not going to happen for a long time, At scale, which is not going to happen for a long time,
the reliable broadcast channel will work much like bittorrent. the total order broadcast channel will work much like bittorrent.
There are millions of torrents in bittorrent, There are millions of torrents in bittorrent,
each torrent is shared between many bittorrent peers, each torrent is shared between many bittorrent peers,
each bittorrent peer shares many different torrents, each bittorrent peer shares many different torrents,
but it only shares a handfull of all of the millions of torrents. but it only shares a handfull of all of the millions of torrents.
Each shard of the entire enormous reliable broadcast channel will be Each shard of the entire enormous total order broadcast channel will be
something like one torrent of many in bittorrent, except that something like one torrent of many in bittorrent, except that
torrents in bittorent are immutable, while shards will continually torrents in bittorent are immutable, while shards will continually
agree on a new state, which is a valid state given the previous agree on a new state, which is a valid state given the previous
@ -380,7 +380,7 @@ Those of them that control the inputs to the transaction
commit unspent transactions outputs to that transaction, commit unspent transactions outputs to that transaction,
making them spent transaction outputs. But does not reveal that making them spent transaction outputs. But does not reveal that
transaction, or that they are spent to the same transaction transaction, or that they are spent to the same transaction
though his peer can probably guess quite accurately that they are. The client creates a proof that this an output from a transaction with valid inputs, and his peer creates a proof that the peer verified the client's proof and that output being committed was not already committed to another different transaction, and registers the commitment on the blockchain. The output is now valid for that transaction, and not for any other, without the reliable broadcast channel containing any information about the transaction of which it is an output, nor the transaction of which it will become an input. though his peer can probably guess quite accurately that they are. The client creates a proof that this an output from a transaction with valid inputs, and his peer creates a proof that the peer verified the client's proof and that output being committed was not already committed to another different transaction, and registers the commitment on the blockchain. The output is now valid for that transaction, and not for any other, without the total order broadcast channel containing any information about the transaction of which it is an output, nor the transaction of which it will become an input.
In the next block that is a descendant of that block the parties In the next block that is a descendant of that block the parties
to the transaction prove that the new transaction outputs are to the transaction prove that the new transaction outputs are
@ -388,7 +388,7 @@ valid, and being new are unspent transaction outputs, without
revealing the transaction outputs, nor the transaction, nor the inputs to that transaction. revealing the transaction outputs, nor the transaction, nor the inputs to that transaction.
You have to register the unspent transaction outputs on the public You have to register the unspent transaction outputs on the public
index, the reliable broadcast channel, within some reasonable index, the total order broadcast channel, within some reasonable
time, say perhaps below block height $\lfloor(h/32⌋+2\rfloor)*32$, time, say perhaps below block height $\lfloor(h/32⌋+2\rfloor)*32$,
where h is the block height on which the first commit of an where h is the block height on which the first commit of an
output to the transaction was registered. If not all the inputs to output to the transaction was registered. If not all the inputs to
@ -520,10 +520,10 @@ have download and validate every single transaction, which
validation is quite costly, and more costly with Monero than Bitcoin. validation is quite costly, and more costly with Monero than Bitcoin.
Once all the necessary commits have been registered on the Once all the necessary commits have been registered on the
reliable broadcast channel, only the client wallets of the parties to total order broadcast channel, only the client wallets of the parties to
the transaction can produce a proof for each of the outputs from the transaction can produce a proof for each of the outputs from
that transaction that the transaction is valid. They do not need to that transaction that the transaction is valid. They do not need to
publish on the reliable broadcast channel what transaction that publish on the total order broadcast channel what transaction that
was, and what the inputs to that transaction were. was, and what the inputs to that transaction were.
So we end up with the blockchain carrying only $\bigcirc\ln(h)$ So we end up with the blockchain carrying only $\bigcirc\ln(h)$
@ -578,7 +578,7 @@ blockchain to buy in first. The rest of the blockchain does not
have to know how to verify valid authority, does not need to have to know how to verify valid authority, does not need to
know the preimage of the hash of the method of verification, just know the preimage of the hash of the method of verification, just
verify that the party committing did the correct verification, verify that the party committing did the correct verification,
whatever it was. Rather than showing the reliable broadcast whatever it was. Rather than showing the total order broadcast
channel a snark for the verification of authority, channel a snark for the verification of authority,
which other people might not be able to check, the party committing a which other people might not be able to check, the party committing a
transaction shows it a recursive snark that shows that he verified transaction shows it a recursive snark that shows that he verified

View File

@ -535,7 +535,7 @@ implement private rooms on that model. Indeed we have to, in order to implement
a gateway between our crypto currency and bitcoin lightning, without which a gateway between our crypto currency and bitcoin lightning, without which
we cannot have a liquidity event for our startup. we cannot have a liquidity event for our startup.
In order to do money over a private room, you need a `reliable broadcast channel`, In order to do money over a private room, you need a `total order broadcast channel`,
so that Bob cannot organize a private room with Ann and Carol, so that Bob cannot organize a private room with Ann and Carol,
and make Ann see one three party transaction, and Carol see a different and make Ann see one three party transaction, and Carol see a different
three party transaction. three party transaction.
@ -550,9 +550,9 @@ increasing the likelihood of leaking metadata. But if we want to get paid,
need to address this concern, possibly at the expense of the usability and need to address this concern, possibly at the expense of the usability and
security for other uses of our private rooms. security for other uses of our private rooms.
Existing software does not implement reliable broadcast in private rooms, Existing software does not implement total order broadcast in private rooms,
and is generally used in ways and for purposes that do not need it. And and is generally used in ways and for purposes that do not need it. And
anything that does implement reliable broadcast channel is apt to leak anything that does implement total order broadcast channel is apt to leak
more metadata than software that does not implement it. So for most more metadata than software that does not implement it. So for most
existing uses, existing software is better than this software will be. But to existing uses, existing software is better than this software will be. But to
do business securely and privately over the internet, you need a reliable do business securely and privately over the internet, you need a reliable
@ -640,7 +640,7 @@ unshared secrets. The signed contents of the room are flood filled around
the participants, rather than each participant being required to communicate the participants, rather than each participant being required to communicate
his content to each of the others. his content to each of the others.
To provide a reliable broadcast channel, a hash of the total state of the room is continually constructed To provide a total order broadcast channel, a hash of the total state of the room is continually constructed
# signing and immutability # signing and immutability
@ -793,7 +793,7 @@ private room system.
The elegant cryptography of [Scriptless Scripts] using adaptive Schnorr The elegant cryptography of [Scriptless Scripts] using adaptive Schnorr
signatures and of [Anonymous Multi-Hop Locks] assumes and presupposes signatures and of [Anonymous Multi-Hop Locks] assumes and presupposes
a lightning network that has a private room with a reliable broadcast a lightning network that has a private room with a total order broadcast
channel (everyone in the room can know that everyone else in the room channel (everyone in the room can know that everyone else in the room
sees the same conversation he is seeing, and a reliable anonymous sees the same conversation he is seeing, and a reliable anonymous
broadcast channel within the private room. "We also assume the existence broadcast channel within the private room. "We also assume the existence

View File

@ -283,12 +283,12 @@ a subset of the key recipients can generate a Schnorr signature.
Cryptosystems](./threshold_shnorr.pdf) gives reasonably detailed instructions Cryptosystems](./threshold_shnorr.pdf) gives reasonably detailed instructions
for implementing threshold Schnorr, without any trusted central authority but for implementing threshold Schnorr, without any trusted central authority but
assumes various cryptographic primitives that we do not in fact have, among assumes various cryptographic primitives that we do not in fact have, among
them a reliable broadcast channel. them a total order broadcast channel.
## Reliable Broadcast Channel ## total order broadcast Channel
A key cryptographic primitive in threshold signatures, and indeed in almost A key cryptographic primitive in threshold signatures, and indeed in almost
every group cryptographic protocol, is the reliable broadcast channel that every group cryptographic protocol, is the total order broadcast channel that
any participant can reliably send a message that is available to all any participant can reliably send a message that is available to all
participants. participants.
@ -310,7 +310,7 @@ honest, so one can construct a broadcast channel using the Paxos protocol.
Every distributed cryptographic protocol needs a secure broadcast Every distributed cryptographic protocol needs a secure broadcast
channel, and every blockchain is a secure broadcast channel. channel, and every blockchain is a secure broadcast channel.
One of the requirements of secure reliable broadcast channel is that _it One of the requirements of secure total order broadcast channel is that _it
stays up_. But a secure broadcast channel for a lightning type stays up_. But a secure broadcast channel for a lightning type
transaction is going to be created and shut down. And if it can be transaction is going to be created and shut down. And if it can be
legitimately shut down, it can be shut down at exactly the wrong moment legitimately shut down, it can be shut down at exactly the wrong moment
@ -318,7 +318,7 @@ for some of the participants and exactly the right time for some of the
participants. Hence the use of a “trusted” broadcast authority, who participants. Hence the use of a “trusted” broadcast authority, who
stays up. stays up.
We could attain the same effect by a hierarchy of secure reliable broadcast We could attain the same effect by a hierarchy of secure total order broadcast
channels, in which a narrow subchannel involving a narrower set of channels, in which a narrow subchannel involving a narrower set of
participants can be set up on the broader channel, and shutdown, with its participants can be set up on the broader channel, and shutdown, with its
final shutdown signature available in the broader channel, such that someone final shutdown signature available in the broader channel, such that someone
@ -347,11 +347,11 @@ The Byzantine Paxos protocol is designed for a large group and is intended to
keep going permanently in the face of the hardware or software failure of some keep going permanently in the face of the hardware or software failure of some
participants, and Byzantine defection by a small conspiracy of participants. participants, and Byzantine defection by a small conspiracy of participants.
For a reliable broadcast channel to be reliable, you are relying on it to For a total order broadcast channel to be reliable, you are relying on it to
stay up, because if it goes down and stays down, its state for transactions stay up, because if it goes down and stays down, its state for transactions
near the time it went down cannot be clearly defined. near the time it went down cannot be clearly defined.
For a reliable broadcast channel to be in a well defined state on shutdown, For a total order broadcast channel to be in a well defined state on shutdown,
it has to have continued broadcasting its final state to anyone interested it has to have continued broadcasting its final state to anyone interested
for some considerable time after it reached its final state. So you are for some considerable time after it reached its final state. So you are
trusting someone to keep it going and available. In this sense, no group trusting someone to keep it going and available. In this sense, no group
@ -379,7 +379,7 @@ corporations, and capable of electing producing a chain of signatures
officer identity, CEO organizes the election of the board), capable of being officer identity, CEO organizes the election of the board), capable of being
evaluated by everyone interacting with the business over the net. evaluated by everyone interacting with the business over the net.
Obviously the reliable broadcast protocol of such a very large scale key Obviously the total order broadcast protocol of such a very large scale key
generation will look more like a regular blockchain, since many entities will generation will look more like a regular blockchain, since many entities will
drop out or fail to complete directly. drop out or fail to complete directly.

View File

@ -22,12 +22,12 @@ senators, so Paxos is not worried about people gaming the system to exclude
voters they do not want, nor worried about people gaming the somewhat voters they do not want, nor worried about people gaming the somewhat
arbitrary preselection of the agenda to be voted up and down. arbitrary preselection of the agenda to be voted up and down.
# Analysing [Paxos Made Simple] in terms of Arrow and Reliable Broadcast # Analysing [Paxos Made Simple] in terms of Arrow and total order broadcast
[Paxos Made Simple]:./paxos-simple.pdf [Paxos Made Simple]:./paxos-simple.pdf
The trouble with Lamports proposal, described in [Paxos Made Simple] is that The trouble with Lamports proposal, described in [Paxos Made Simple] is that
it assumes no byzantine failure, and that therefore the reliable broadcast it assumes no byzantine failure, and that therefore the total order broadcast
channel is trivial, and it assumes that any proposal will be acceptable, that channel is trivial, and it assumes that any proposal will be acceptable, that
all anyone cares about is converging on one proposal, therefore it always all anyone cares about is converging on one proposal, therefore it always
converges on the first proposal accepted by one acceptor. converges on the first proposal accepted by one acceptor.
@ -61,7 +61,7 @@ how everything fits together before critiquing that.
If a majority of acceptors accept some proposal, then we have a result. But If a majority of acceptors accept some proposal, then we have a result. But
we do not yet have everyone, or indeed anyone, knowing the result. we do not yet have everyone, or indeed anyone, knowing the result.
Whereupon we have the reliable broadcast channel problem, which Lamport hand Whereupon we have the total order broadcast channel problem, which Lamport hand
waves away. The learners are going to learn it. Somehow. And once we have waves away. The learners are going to learn it. Somehow. And once we have
a result accepted, we then happily go on to the next round. a result accepted, we then happily go on to the next round.
@ -105,11 +105,11 @@ prepare, and accept, instead of two phases, prepare and accept.
Pre-prepare is the “primary” (leader, CEO, primus inter pares) notifying the Pre-prepare is the “primary” (leader, CEO, primus inter pares) notifying the
“replicas” (peers) of the total order of a client message. “replicas” (peers) of the total order of a client message.
Prepare is the “replicas” (peers, reliable broadcast channel) notifying each Prepare is the “replicas” (peers, total order broadcast channel) notifying each
other of association between total order and message digest. other of association between total order and message digest.
Accept is the “replicas” and the client learning that $33\%+1$ of the Accept is the “replicas” and the client learning that $33\%+1$ of the
“replicas” (peers, reliable broadcast channel) agree on the total order of the “replicas” (peers, total order broadcast channel) agree on the total order of the
clients message. clients message.
# Analysing Raft Protocol # Analysing Raft Protocol