Sebastian Müller

Sebastian Müller
  • Aix-Marseille University

About

75
Publications
8,039
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
510
Citations
Current institution
Aix-Marseille University

Publications

Publications (75)
Preprint
Full-text available
This paper is a Systematization of Knowledge (SoK) on Directed Acyclic Graph (DAG)-based consensus protocols, analyzing their performance and trade-offs within the framework of consistency, availability, and partition tolerance inspired by the CAP theorem. We classify DAG-based consensus protocols into availability-focused and consistency-focused c...
Preprint
This paper introduces Slipstream, a Byzantine Fault Tolerance (BFT) protocol where nodes concurrently propose blocks to be added to a Directed Acyclic Graph (DAG) and aim to agree on block ordering. Slipstream offers two types of block orderings: an optimistic ordering, which is live and secure in a sleepy model under up to 50% Byzantine nodes, and...
Conference Paper
The Fast Probabilistic Consensus on a Set (FPCS) is a leaderless voting consensus protocol designed for achieving agreement among nodes on a preferred maximal independent set within a graph of conflicts. The protocol’s robustness and efficiency have been previously established for complete graphs under the security threshold of q < β < 1/3, where q...
Preprint
Consensus plays a crucial role in distributed ledger systems, impacting both scalability and decentralization. Many blockchain systems use a weighted lottery based on a scarce resource such as a stake, storage, memory, or computing power to select a committee whose members drive the consensus and are responsible for adding new information to the le...
Chapter
This paper discusses congestion control and inconsistency problems in DAG-based distributed ledgers and proposes an additional filter to mitigate these issues. Unlike traditional blockchains, DAG-based DLTs use a directed acyclic graph structure to organize transactions, allowing higher scalability and efficiency. However, this also introduces chal...
Chapter
The fast probabilistic consensus (FPC) is a leaderless voting consensus protocol that allows a set of nodes to agree on a value of a single bit. FPC is robust and efficient in Byzantine infrastructures and presents a low communicational complexity. In this paper, we introduce a modification of the Fast Probabilistic Consensus protocol (FPC) capable...
Article
The Unspent Transaction Output (UTXO) model is commonly used in the field of Distributed Ledger Technology (DLT) to transfer value between participants. One of its advantages is that it allows parallel processing of transactions, as independent transactions can be added in any order. This property of order invariance and parallelisability has poten...
Preprint
Full-text available
This paper investigates the issue of fairness in Distributed Ledger Technology (DLT), specifically focusing on the shortcomings observed in current blockchain systems due to Miner Extractable Value (MEV) phenomena and systemic centralization. We explore the potential of Directed Acyclic Graphs (DAGs) as a solution to address or mitigate these fairn...
Article
The basic idea of voting protocols is that nodes query a sample of other nodes and adjust their own opinion throughout several rounds based on the proportion of the sampled opinions. In the classic model, it is assumed that all nodes have the same weight. We study voting protocols for heterogeneous weights with respect to fairness. A voting protoco...
Chapter
In this paper, we investigate the performance of the Tangle 2.0 consensus protocol in a Byzantine environment. We use an agent-based simulation model that incorporates the main features of the Tangle 2.0 consensus protocol. Our experimental results demonstrate that the Tangle 2.0 protocol is robust to the bait-and-switch attack up to the theoretica...
Preprint
Full-text available
The robust construction of the ledger data structure is an essential ingredient for the safe operation of a distributed ledger. While in traditional linear blockchain systems, permission to append to the structure is leader-based, in Directed Acyclic Graph-based ledgers, the writing access can be organised leaderless. However, this leaderless appro...
Preprint
Full-text available
DAG-based DLTs allow for parallel, asynchronous writing access to a ledger. Consequently, the perception of the most recent blocks may differ considerably between nodes, and the underlying network properties of the P2P layer have a direct impact on the performance of the protocol. Moreover, the stronger inter-dependencies of several core components...
Preprint
Full-text available
In distributed ledger technologies (DLTs) with a directed acyclic graph (DAG) data structure, a block-issuing node can decide where to append new blocks and, consequently, how the DAG grows. This DAG data structure is typically decomposed into two pools of blocks, dependent on whether another block already references them. The unreferenced blocks a...
Preprint
Full-text available
In this paper, we investigate the performance of the Tangle 2.0 consensus protocol in a Byzantine environment. We use an agent-based simulation model that incorporates the main features of the Tangle 2.0 consensus protocol. Our experimental results demonstrate that the Tangle 2.0 protocol is robust to the bait-and-switch attack up to the theoretica...
Preprint
Full-text available
We introduce the theoretical foundations of the Tangle 2.0, a probabilistic leaderless consensus protocol based on a directed acyclic graph (DAG) called the Tangle. The Tangle naturally succeeds the blockchain as its next evolutionary step as it offers features suited to establish more efficient and scalable distributed ledger solutions. Consensus...
Preprint
Full-text available
The Unspent Transaction Output (UTXO) model is commonly used in the field of Distributed Ledger Technology (DLT) to transfer value between participants. One of its advantages is that it allows parallel processing of transactions, as independent transactions can be added in any order. This property of order invariance and parallelisability has poten...
Article
Multivariate regression models and ANOVA are probably the most frequently applied methods of all statistical analyses. We study the case where the predictors are qualitative variables and the response variable is quantitative. In this case, we propose an alternative to the classic approaches that does not assume homoscedasticity but assumes that a...
Article
Full-text available
We introduce the theoretical foundations of the Tangle 2.0, a probabilistic leaderless consensus protocol based on a directed acyclic graph (DAG) called the Tangle. The Tangle naturally succeeds the blockchain as its next evolutionary step as it offers features suited to establish more efficient and scalable distributed ledger solutions. Consensus...
Preprint
Full-text available
The security of any Distributed Ledger Technology (DLT) depends on the safety of the network layer. Much effort has been put into understanding the consensus layer of DLTs. However, many network layer designs seem ad-hoc and lack a careful analysis of the influence of the design decisions on the whole DLT system. We propose a salt-based automated n...
Article
We review probabilistic models known as majority dynamics (also known as threshold voter models) and discuss their possible applications for achieving consensus in cryptocurrency systems. In particular, we show that using this approach in a straightforward way for practical consensus in a Byzantine setting can be problematic and requires extensive...
Chapter
Voting algorithms have been widely used as consensus protocols in the realization of fault-tolerant systems. These algorithms are best suited for distributed systems of nodes with low computational power or heterogeneous networks, where different nodes may have different levels of reputation or weight. Our main contribution is the construction of a...
Chapter
In this paper, we propose several solutions to the committee selection problem among participants of a DAG distributed ledger. Our methods are based on a ledger intrinsic reputation model that serves as a selection criterion. The main difficulty arises from the fact that the DAG ledger is a priori not totally ordered and that the participants need...
Preprint
Full-text available
We review probabilistic models known as majority dynamics (also known as threshold Voter Models) and discuss their possible applications for achieving consensus in cryptocurrency systems. In particular, we show that using this approach straightforwardly for practical consensus in Byzantine setting can be problematic and requires extensive further r...
Preprint
Full-text available
In this paper, we propose several solutions to the committee selection problem among participants of a DAG distributed ledger. Our methods are based on a ledger intrinsic reputation model that serves as a selection criterion. The main difficulty arises from the fact that the DAG ledger is a priori not totally ordered and that the participants need...
Article
Full-text available
This paper investigates several voting consensus protocols with low computational complexity in noisy Byzantine infrastructures. Using computer simulations, we show that explicit randomization of the consensus protocol can significantly increase the robustness towards faulty and malicious nodes. We identify the optimal amount of randomness for vari...
Preprint
Full-text available
The basic idea of voting protocols is that nodes query a sample of other nodes and adjust their own opinion throughout several rounds based on the proportion of the sampled opinions. In the classic model, it is assumed that all nodes have the same weight. We study voting protocols for heterogeneous weights with respect to fairness. A voting protoco...
Chapter
The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting where the voting power is proportional to the nodes reputations. We model the reputation using a Zipf law and show using simulations that the performance of the protocol in By...
Preprint
Full-text available
Voting algorithms have been widely used as consensus protocols in the realization of fault-tolerant systems. These algorithms are best suited for distributed systems of nodes with low computational power or heterogeneous networks, where different nodes may have different levels of reputation or weight. Our main contribution is the construction of a...
Conference Paper
Full-text available
Voting algorithms have been widely used as consensus protocols in the realization of fault-tolerant systems. These algorithms are best suited for distributed systems of nodes with low computational power or heterogeneous networks, where different nodes may have different levels of reputation or weight. Our main contribution is the construction of a...
Preprint
Full-text available
Multivariate regression models and ANOVA are probably the most frequently applied methods of all statistical analyses. We study the case where the predictors are qualitative variables, and the response variable is quantitative. In this case, we propose an alternative to the classic approaches that do not assume homoscedasticity or normality of the...
Preprint
Full-text available
The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting where the voting power is proportional to the nodes reputations. We model the reputation using a Zipf law and show using simulations that the performance of the protocol in By...
Conference Paper
Full-text available
The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting where the voting power is proportional to the nodes reputations. We model the reputation using a Zipf law and show using simulations that the performance of the protocol in By...
Preprint
Full-text available
We consider a random interacting particle system, known as the frog model, on infinite Galton-Watson trees allowing offspring zero and one. The system starts with one awake particle (frog) at the root of the tree and a random number of sleeping particles at the other vertices. Awake frogs move according to simple random walk on the tree and as soon...
Preprint
This paper investigates leaderless binary majority consensus protocols with low computational complexity in noisy Byzantine infrastructures. Using computer simulations, we show that explicit randomization of the consensus protocol can significantly increase the robustness towards faulty and malicious nodes. We identify the optimal amount of randomn...
Article
This paper investigates leaderless binary majority consensus protocols with low computational complexity in noisy Byzantine infrastructures. Using computer simulations, we show that explicit randomization of the consensus protocol can significantly increase the robustness towards faulty and malicious nodes. We identify the optimal amount of randomn...
Article
The production network under examination consists of a number of workstations. Each workstation is a parallel configuration of machines performing the same kind of tasks on a given part. Parts move from one workstation to another and at each workstation a part is assigned randomly to a machine. We assume that the production network is acyclic , tha...
Article
Full-text available
We consider random walks on the infinite cluster of a conditional bond percolation model on the infinite ladder graph. In a companion paper, we have shown that if the random walk is pulled to the right by a positive bias \(\uplambda > 0\), then its asymptotic linear speed \(\overline{\mathrm {v}}\) is continuous in the variable \(\uplambda > 0\) an...
Preprint
Full-text available
The production network under examination consists of a number of workstations. Each workstation is a parallel configuration of machines performing the same kind of tasks on a given part. Parts move from one workstation to another and at each workstation a part is assigned randomly to a machine. We assume that the production network is acyclic, that...
Preprint
Full-text available
We consider random walks on the infinite cluster of a conditional bond percolation model on the infinite ladder graph. In a companion paper, we have shown that if the random walk is pulled to the right by a positive bias $\lambda > 0$, then its asymptotic linear speed $\overline{\mathrm{v}}$ is continuous in the variable $\lambda > 0$ and different...
Preprint
Full-text available
We propose an approach for the analysis and prediction of a football championship. It is based on Poisson regression models that include the Elo points of the teams as covariates and incorporates differences of team-specific effects. These models for the prediction of the FIFA World Cup 2018 are fitted on all football games on neutral ground of the...
Article
Full-text available
We consider biased random walks on the infinite cluster of a conditional bond percolation model on the infinite ladder graph. Axelsson-Fisk and H\"aggstr\"om established for this model a phase transition for the asymptotic linear speed $\overline{\mathrm{v}}$ of the walk. Namely, there exists some critical value $\lambda_{\mathrm{c}}>0$ such that $...
Chapter
An accessible and panoramic account of the theory of random walks on groups and graphs, stressing the strong connections of the theory with other branches of mathematics, including geometric and combinatorial group theory, potential analysis, and theoretical computer science. This volume brings together original surveys and research-expository pape...
Preprint
We consider biased random walks on the infinite cluster of a conditional bond percolation model on the infinite ladder graph. Axelsson-Fisk and H\"aggstr\"om established for this model a phase transition for the asymptotic linear speed $\overline{\mathrm{v}}$ of the walk. Namely, there exists some critical value $\lambda_{\mathrm{c}}>0$ such that $...
Article
Full-text available
In this article we prove existence of the asymptotic entropy for isotropic random walks on regular Fuchsian buildings. Moreover, we give formulae for the asymptotic entropy, and prove that it is equal to the rate of escape of the random walk with respect to the Green distance. When the building arises from a Fuchsian Kac-Moody group our results imp...
Article
Full-text available
A router configuration on a graph contains in every vertex an infinite ordered sequence of routers, each is pointing to a neighbor of the vertex. After sampling a configuration according to some probability measure, a router walk is a deterministic process: at each step it chooses the next unused router in its current location, and uses it to jump...
Preprint
A rotor configuration on a graph contains in every vertex an infinite ordered sequence of rotors, each is pointing to a neighbor of the vertex. After sampling a configuration according to some probability measure, a rotor walk is a deterministic process: at each step it chooses the next unused rotor in its current location, and uses it to jump to t...
Article
The connective constant $\mu(G)$ of a graph $G$ is the asymptotic growth rate of the number $\sigma_{n}$ of self-avoiding walks of length $n$ in $G$ from a given vertex. We prove a formula for the connective constant for free products of quasi-transitive graphs and show that $\sigma_{n}\sim A_{G} \mu(G)^{n}$ for some constant $A_{G}$ that depends o...
Article
Full-text available
The aim of this paper is to underline the relation between reversible growth processes and invariant percolation. We present two models of interacting branching random walks (BRWs), truncated BRWs and competing BRWs, where survival of the growth process can be formulated as the existence of an infinite cluster in an invariant percolation on a tree....
Article
Full-text available
A rotor-router walk on a graph is a deterministic process, in which each vertex is endowed with a rotor that points to one of the neighbors. A particle located at some vertex first rotates the rotor in a prescribed order, and then it is routed to the neighbor the rotor is now pointing at. In the current work we make a step toward in understanding t...
Article
Full-text available
In this paper we prove a rate of escape theorem and a central limit theorem for isotropic random walks on Fuchsian buildings, giving formulae for the speed and asymptotic variance. In particular, these results apply to random walks induced by bi-invariant measures on Fuchsian Kac-Moody groups, however they also apply to the case where the building...
Article
Full-text available
We prove that the trace of a transient branching random walk on a planar hyperbolic Cayley graph has a.s. continuum many ends and no isolated end.
Article
Full-text available
We construct a renewal structure for random walks on surface groups. The renewal times are defined as times when the random walks enters a particular type of a cone and never leaves it again. As a consequence, the trajectory of the random walk can be expressed as an "aligned union" of i.i.d. trajectories between the renewal times. Once having estab...
Article
Full-text available
We consider a branching random walk on $\Z$, where the particles behave differently in visited and unvisited sites. Informally, each site on the positive half-line contains initially a cookie. On the first visit of a site its cookie is removed and particles at positions with a cookie reproduce and move differently from particles on sites without co...
Article
Full-text available
We study branching random walks on Cayley graphs. A first result is that the trace of a transient branching random walk on a Cayley graph is a.s. transient for the simple random walk. In addition, it has a.s. critical percolation probability less than one and exponential volume growth. The proofs rely on the fact that the trace induces an invariant...
Article
Full-text available
We study certain phase transitions of branching random walks (BRW) on Cayley graphs of free products. The aim of this paper is to compare the size and structural properties of the trace, that is, the subgraph that consists of all edges and vertices that were visited by some particle, with those of the original Cayley graph. We investigate the phase...
Article
Full-text available
Directed covers of finite graphs are also known as periodic trees or trees with finitely many cone types. We expand the existing theory of directed covers of finite graphs to those of infinite graphs. While the lower growth rate still equals the branching number, upper and lower growth rates do not longer coincide in general. Furthermore, the behav...
Article
We consider the random conductance model, where the underlying graph is an infinite supercritical Galton--Watson tree, the conductances are independent but their distribution may depend on the degree of the incident vertices. We prove that, if the mean conductance is finite, there is a deterministic, strictly positive speed $v$ such that $\lim_{n\t...
Article
Full-text available
A spider consists of several, say $N$, particles. Particles can jump independently according to a random walk if the movement does not violate some given restriction rules. If the movement violates a rule it is not carried out. We consider random walk in random environment (RWRE) on $\Z$ as underlying random walk. We suppose the environment $\omega...
Article
Full-text available
Spider walks are systems of interacting particles. The particles move independently as long as their movements do not violate some given rules describing the relative position of the particles; moves that violate the rules are not realized. The goal of this paper is to study qualitative properties, as recurrence, transience, ergodicity, and positiv...
Article
Full-text available
Consider a sequence of i.i.d. random variables $X_n$ where each random variable is refreshed independently according to a Poisson clock. At any fixed time $t$ the law of the sequence is the same as for the sequence at time 0 but at random times almost sure properties of the sequence may be violated. If there are such \emph{exceptional times} we say...
Article
Full-text available
We study survival of nearest-neighbour branching random walks in random environment (BRWRE) on ${\mathbb Z}$. A priori there are three different regimes of survival: global survival, local survival, and strong local survival. We show that local and strong local survival regimes coincide for BRWRE and that they can be characterized with the spectral...
Article
Full-text available
We develop a criterion for transience for a general model of branching Markov chains. In the case of multi-dimensional branching random walk in random environment (BRWRE) this criterion becomes explicit. In particular, we show that \emph{Condition L} of Comets and Popov is necessary and sufficient for transience as conjectured. Furthermore, the cri...
Article
Full-text available
We give three different criteria for transience of a Branching Markov Chain. These conditions enable us to give a classification of Branching Random Walks in Random Environment (BRWRE) on Cayley Graphs in recurrence and transience. This classification is stated explicitly for BRWRE on $\Z^d.$ Furthermore, we emphasize the interplay between Branchin...
Article
Full-text available
The question of recurrence and transience of branching Markov chains is more subtle than for ordinary Markov chains; they can be classified in transience, weak recurrence, and strong recurrence. We briefly summarize criteria for transience and weak recurrence and give several new conditions for weak recurrence and strong recurrence. These condition...
Article
Full-text available
We investigate recurrence and transience of Branching Markov Chains (BMC) in discrete time. Branching Markov Chains are clouds of particles which move (according to an irreducible underlying Markov Chain) and produce offspring independently. The offspring distribution can depend on the location of the particle. If the offspring distribution is cons...

Network

Cited By