|
|
- # Ivy Proofs
-
- ```copyright
- Copyright (c) 2020 Galois, Inc.
- SPDX-License-Identifier: Apache-2.0
- ```
-
- ## Contents
-
- This folder contains:
-
- * `tendermint.ivy`, a specification of Tendermint algorithm as described in *The latest gossip on BFT consensus* by E. Buchman, J. Kwon, Z. Milosevic.
- * `abstract_tendermint.ivy`, a more abstract specification of Tendermint that is more verification-friendly.
- * `classic_safety.ivy`, a proof that Tendermint satisfies the classic safety property of BFT consensus: if every two quorums have a well-behaved node in common, then no two well-behaved nodes ever disagree.
- * `accountable_safety_1.ivy`, a proof that, assuming every quorum contains at least one well-behaved node, if two well-behaved nodes disagree, then there is evidence demonstrating at least f+1 nodes misbehaved.
- * `accountable_safety_2.ivy`, a proof that, regardless of any assumption about quorums, well-behaved nodes cannot be framed by malicious nodes. In other words, malicious nodes can never construct evidence that incriminates a well-behaved node.
- * `network_shim.ivy`, the network model and a convenience `shim` object to interface with the Tendermint specification.
- * `domain_model.ivy`, a specification of the domain model underlying the Tendermint specification, i.e. rounds, value, quorums, etc.
-
- All specifications and proofs are written in [Ivy](https://github.com/kenmcmil/ivy).
-
- The license above applies to all files in this folder.
-
-
- ## Building and running
-
- The easiest way to check the proofs is to use [Docker](https://www.docker.com/).
-
- 1. Install [Docker](https://docs.docker.com/get-docker/) and [Docker Compose](https://docs.docker.com/compose/install/).
- 2. Build a Docker image: `docker-compose build`
- 3. Run the proofs inside the Docker container: `docker-compose run
- tendermint-proof`. This will check all the proofs with the `ivy_check`
- command and write the output of `ivy_check` to a subdirectory of `./output/'
|