Title | Robust P2P Primitives Using SGX Enclaves |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Jia, Yaoqi, Tople, Shruti, Moataz, Tarik, Gong, Deli, Saxena, Prateek, Liang, Zhenkai |
Conference Name | 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS) |
Keywords | Byzantine Fault Tolerance, Computational modeling, Distributed Systems, Human Behavior, Metrics, Peer-to-peer computing, PKI Trust Models, Portable computers, Protocols, pubcrawl, reliability, Resiliency, Scalability, Servers, SGX, Trusted Computing |
Abstract | Peer-to-peer (P2P) systems such as BitTorrent and Bitcoin are susceptible to serious attacks from byzantine nodes that join as peers. Due to well-known impossibility results for designing P2P primitives in unrestricted byzantine settings, research has explored many adversarial models with additional assumptions, ranging from mild (such as pre-established PKI) to strong (such as the existence of common random coins). One such widely-studied model is the general-omission model, which yields simple protocols with good efficiency, but has been considered impractical or unrealizable since it artificially limits the adversary only to omitting messages.In this work, we study the setting of a synchronous network wherein peer nodes have CPUs equipped with a recent trusted computing mechanism called Intel SGX. In this model, we observe that the byzantine adversary reduces to the adversary in the general-omission model. As a first result, we show that by leveraging SGX features, we eliminate any source of advantage for a byzantine adversary beyond that gained by omitting messages, making the general-omission model realizable. Our evaluation of 1000 nodes running on 40 DeterLab machines confirms theoretical efficiency claim. |
DOI | 10.1109/ICDCS47774.2020.00134 |
Citation Key | jia_robust_2020 |