ERA: Epoch-Resolved Arbitration for Duelling Admins in Group Management CRDTs
Pith reviewed 2026-05-16 09:28 UTC · model grok-4.3
The pith
CRDTs for group permissions use optional epoch events to resolve concurrent admin conflicts with added finality while keeping availability.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Our ERA proposal arbitrates asynchronously in batches via optional epoch events, preserving availability. This introduces a bounded total order within epochs, and the resulting finality improves on the level of consistency CRDTs can provide.
What carries the argument
Optional epoch events that provide asynchronous batch arbitration and impose a bounded total order on concurrent operations.
If this is right
- Concurrent admin revocations in group CRDTs receive a bounded ordering that reduces rollback surprises.
- The system continues to accept updates from any replica without waiting for global consensus.
- Byzantine exploitation of concurrency is limited because epoch events supply an external ordering decision.
- Permission states in the materialised view gain finality within each epoch while merge remains associative, commutative and idempotent.
Where Pith is reading between the lines
- Existing CRDT libraries for collaborative tools could adopt epoch events to handle permission conflicts without redesigning the core merge logic.
- The batch-arbitration pattern may extend to other CRDT applications that manage shared access rights, such as document editing or database views.
- Fully decentralized deployments would need a practical way to generate and distribute epoch events without introducing a single point of failure.
Load-bearing premise
An external arbiter introduced through epoch events can order concurrent events without violating the coordination-free and availability guarantees that define CRDTs.
What would settle it
A demonstration that epoch events force replicas to block or lose availability during a network partition would show the approach violates CRDT properties.
Figures
read the original abstract
Conflict-Free Replicated Data Types (CRDTs) are used in a range of fields for their coordination-free replication with strong eventual consistency. By prioritising availability over consistency under partition, peers accumulate events in different orders, and rely on an associative, commutative and idempotent merge function to present a materialised view of the CRDT. Under some circumstances, the state of the materialised view over time can appear to ''roll back'' previously applied events. When the materialised view is used to manage group permissions such as ones found in instant messaging applications, this can lead to surprising behaviour. Rollbacks can occur when there are multiple concurrent events, such as in the Duelling Admins problem where two equally permissioned admins concurrently revoke each other's permissions. Who wins? Different solutions and their trade-offs are examined. A Byzantine admin can exploit concurrency to influence the duel, whereby we argue that an external arbiter is required to order concurrent events. Our ERA proposal arbitrates asynchronously in batches via optional ''epoch events'', preserving availability. This introduces a bounded total order within epochs, and the resulting ''finality'' improves on the level of consistency CRDTs can provide.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper examines the Duelling Admins problem in CRDT-based group management, where concurrent admin actions can cause rollbacks in permission states. It proposes the ERA mechanism, which introduces optional epoch events to arbitrate such conflicts asynchronously in batches. This approach aims to preserve availability while providing a bounded total order within epochs, thereby improving the finality and consistency level beyond standard CRDT guarantees.
Significance. If successfully implemented with decentralized epoch generation, ERA could enhance the usability of CRDTs in permission-sensitive applications like instant messaging by reducing surprising rollback behaviors without introducing coordination overhead. The approach addresses a practical limitation in strong eventual consistency for group management scenarios.
major comments (1)
- Abstract: The central claim that optional epoch events can be injected asynchronously to impose a bounded total order while preserving coordination-free CRDT properties is load-bearing but unsupported; the manuscript supplies no algorithm, derivation, or proof showing that epoch generation itself can be expressed as an associative, commutative, and idempotent operation that any replica can emit independently.
minor comments (1)
- The abstract references a 'Byzantine admin' threat model without defining its scope or how it interacts with epoch events; this should be clarified for precision.
Simulated Author's Rebuttal
We thank the referee for the constructive review and the recommendation for major revision. We appreciate the focus on the central claim regarding epoch events and will strengthen the manuscript to address this point explicitly.
read point-by-point responses
-
Referee: [—] Abstract: The central claim that optional epoch events can be injected asynchronously to impose a bounded total order while preserving coordination-free CRDT properties is load-bearing but unsupported; the manuscript supplies no algorithm, derivation, or proof showing that epoch generation itself can be expressed as an associative, commutative, and idempotent operation that any replica can emit independently.
Authors: We agree that the abstract's claim requires more explicit support in the manuscript to be fully substantiated. The full paper (Section 3) defines epoch generation as an independent local operation triggered by detection of duelling admin events, with the merge function specified as taking the maximum epoch identifier (with replica-ID tie-breaking). This construction is associative, commutative, and idempotent by design, allowing any replica to emit epochs without coordination. We will add a dedicated algorithm listing, a short derivation, and a proof of the CRDT properties (in a new subsection or appendix) to make this rigorous and directly address the concern. revision: yes
Circularity Check
No circularity: new epoch mechanism introduced without reduction to inputs or self-citations
full rationale
The paper presents a design proposal for ERA using optional epoch events to batch-arbitrate concurrent admin actions in group CRDTs. The abstract and description frame this as an additive construct that preserves availability and coordination freedom while adding bounded ordering inside epochs. No equations, fitted parameters, or derivations are shown that equate a 'prediction' to its own inputs by construction. No self-citation chain or uniqueness theorem is invoked to force the choice. The central claim rests on the explicit introduction of epoch events as a new operation type rather than any self-referential or fitted reduction. This matches the default expectation of a non-circular design paper.
Axiom & Free-Parameter Ledger
axioms (1)
- standard math CRDT merge functions must be associative, commutative, and idempotent to guarantee strong eventual consistency
invented entities (1)
-
epoch events
no independent evidence
Reference graph
Works this paper leans on
-
[1]
[n. d.].Certificate Transparency: The list of current, usable logs.https: //certificate.transparency.dev/logs/
-
[2]
[n. d.].Developing with Riak KV Data Types.https://docs.riak.com/ riak/kv/2.2.3/developing/data-types/ ERA: Epoch-Resolved Arbitration for Duelling Admins in Group Management CRDTs
-
[3]
[n. d.].Distributed Data - Akka Documentation.https://doc.akka.io/ libraries/akka-core/2.5/distributed-data.html?language=scala
-
[4]
Matrix Specification v1.17.https://spec.matrix.org/v1.17/
2025. Matrix Specification v1.17.https://spec.matrix.org/v1.17/
work page 2025
-
[5]
Matrix Specification v1.17: Room Version 12.https://spec.matrix
2026. Matrix Specification v1.17: Room Version 12.https://spec.matrix. org/v1.17/rooms/v12/#state-resolution
work page 2026
-
[6]
Paulo Sérgio Almeida. 2024. Approaches to Conflict-free Replicated Data Types.ACM Comput. Surv.57, 2, Article 51 (Nov. 2024), 36 pages. doi:10.1145/3695249
- [7]
- [8]
-
[9]
Keyhive Authors. [n. d.].Keyhive Group Membership De- sign.https://github.com/inkandswitch/keyhive/blob/keyhive-wasm/ 0.0.0-alpha.54/design/group_membership.md
-
[10]
Eric Brewer. 2012. CAP Twelve years later: How the "Rules" have Changed.Computer45 (02 2012), 23–29. doi:10.1109/MC.2012.37
-
[11]
Vitalik Buterin, Daniël Reijsbergen, Stefanos Leonardos, and Georgios Piliouras. 2019. Incentives in Ethereum’s Hybrid Casper Protocol. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). 236–244. doi:10.1109/BLOC.2019.8751241
-
[12]
Tom Celig, Tim Ockenga, and Detlef Schoder. 2025. Distributional equality in Ethereum? On-chain analysis of Ether supply distribution and supply dynamics.Humanities and Social Sciences Communications 12 (03 2025). doi:10.1057/s41599-025-04728-9
-
[13]
Marcus Dansarie. [n. d.].Roughtime — datatracker.ietf.org.https: //datatracker.ietf.org/doc/draft-ietf-ntp-roughtime/
-
[14]
John R. Douceur. 2002. The Sybil Attack. InRevised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS ’01). Springer-Verlag, Berlin, Heidelberg, 251–260
work page 2002
- [15]
-
[16]
Florian Jacob, Luca Becker, Jan Grashöfer, and Hannes Hartenstein
-
[17]
Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality. InProceedings of the 25th ACM Symposium on Access Control Models and Technologies(Barcelona, Spain)(SACMAT ’20). Association for Computing Machinery, New York, NY, USA, 81–92. doi:10.1145/3381991.3395399
-
[18]
Florian Jacob and Hannes Hartenstein. 2024. Logical Clocks and Mono- tonicity for Byzantine-Tolerant Replicated Data Types. InProceedings of the 11th Workshop on Principles and Practice of Consistency for Dis- tributed Data(Athens, Greece)(PaPoC ’24). Association for Computing Machinery, New York, NY, USA, 37–43. doi:10.1145/3642976.3653034
-
[19]
Florian Jacob and Hannes Hartenstein. 2025. To the Best of Knowledge and Belief: On Eventually Consistent Access Control. InProceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy(Pittsburgh, PA, USA)(CODASPY ’25). Association for Computing Machinery, New York, NY, USA, 107–118. doi:10.1145/ 3714393.3726520
-
[20]
Martin Kleppmann. [n. d.].Keynote: Byzantine Eventual Consistency and Local-First Access Control.https://martin.kleppmann.com/2025/ 03/31/papoc-keynote-byzantine.html
work page 2025
-
[21]
Martin Kleppmann. 2025. Byzantine eventual consistency and local- first access control.https://speakerdeck.com/ept/byzantine-eventual- consistency-and-local-first-access-control?slide=69
work page 2025
- [22]
-
[23]
Martin Kleppmann, Adam Wiggins, Peter Van Hardenberg, and Mark McGranaghan. 2019. Local-first software: you own your data, in spite of the cloud. InProceedings of the 2019 ACM SIGPLAN In- ternational Symposium on New Ideas, New Paradigms, and Reflec- tions on Programming and Software. ACM, Athens Greece, 154–178. doi:10.1145/3359591.3359737
-
[24]
Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. (May 2009).http://www.bitcoin.org/bitcoin.pdf
work page 2009
-
[25]
Nuno Preguiça, Carlos Baquero, Paulo Sérgio Almeida, Victor Fonte, and Ricardo Gonçalves. 2010. Dotted Version Vectors: Logical Clocks for Optimistic Replication. arXiv:1011.5808 [cs.DC]https://arxiv.org/ abs/1011.5808
work page internal anchor Pith review Pith/arXiv arXiv 2010
-
[26]
Marc Shapiro, Nuno Preguiça, Carlos Baquero, and Marek Zawirski
-
[27]
Conflict-Free Replicated Data Types. InStabilization, Safety, and Security of Distributed Systems, Xavier Défago, Franck Petit, and Vincent Villain (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 386–400
-
[28]
Brooklyn Zelenka and Alex Good. [n. d.].Keyhive: Local-first Access Control.https://www.inkandswitch.com/keyhive/notebook/
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.