paint-brush
How The Hotstuff Protocol is NOT Secure?by@Popcorn_C
268 reads

How The Hotstuff Protocol is NOT Secure?

by Popcorn_C3mApril 26th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Each participant stores a tree of pending commands locally, in addition to the state variables viewNumber (starting at 1, stores the highest QC it voted to commit), and prepareQC (starts at nil) Each participant sends signed messages to the leader participant in a p2p channel (the star topology communication network) Using threshold digital signature schemes, HotStuff achieves linear authenticator complexity regardless of whether the leader is correct or faulty or faulty. Using the star communication network, the network can achieve consensus with reduced communication complexity but increased round complexity. When a participant gives up on a round, it broadcasts a timeout message with the round-entry certificate.

Company Mentioned

Mention Thumbnail
featured image - How The Hotstuff Protocol is NOT Secure?
Popcorn_C HackerNoon profile picture
Popcorn_C

Popcorn_C

@Popcorn_C

L O A D I N G
. . . comments & more!

About Author

Popcorn_C HackerNoon profile picture
Popcorn_C@Popcorn_C

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite