Communication Complexity of Byzantine Agreement, Revisited

被引:55
作者
Abraham, Ittai [1 ]
Chan, T-H Hubert [2 ]
Dolev, Danny [3 ]
Nayak, Kartik [1 ]
Pass, Rafael [4 ]
Ren, Ling [1 ]
Shi, Elaine [5 ]
机构
[1] VMware Res, Palo Alto, CA 94304 USA
[2] Univ Hong Kong, Hong Kong, Peoples R China
[3] Hebrew Univ Jerusalem, Jerusalem, Israel
[4] Cornell Tech, New York, NY USA
[5] Cornell Univ, Ithaca, NY 14853 USA
来源
PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC '19) | 2019年
关键词
D O I
10.1145/3293611.3331629
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As Byzantine Agreement (BA) protocols find application in large-scale decentralized cryptocurrencies, an increasingly important problem is to design BA protocols with improved communication complexity. A few existing works have shown how to achieve subquadratic BA under an adaptive adversary. Intriguingly, they all make a common relaxation about the adaptivity of the attacker, that is, if an honest node sends a message and then gets corrupted in some round, the adversary cannot erase the message that was already sent - henceforth we say that such an adversary cannot perform "after-the-fact removal". By contrast, many (super-)quadratic BA protocols in the literature can tolerate after-the-fact removal. In this paper, we first prove that disallowing after-the-fact removal is necessary for achieving subquadratic-communication BA. Next, we show a new subquadratic binary BA construction (of course, assuming no after-the-fact removal) that achieves near-optimal resilience and expected constant rounds under standard cryptographic assumptions and a public-key infrastructure (PKI). In comparison, all known subquadratic protocols make additional strong assumptions such as random oracles or the ability of honest nodes to erase secrets from memory, and even with these strong assumptions, no prior work can achieve the above properties. Lastly, we show that some setup assumption is necessary for achieving subquadratic multicast-based BA.
引用
收藏
页码:317 / 326
页数:10
相关论文
共 27 条
[1]  
Abraham Ittai., 2019, Financial Crypto
[2]  
Attiya H., 2004, Distributed Computing: Fundamentals, Simulations Advanced Topics, V2nd
[3]  
Ben-Or M., 1983, ACM S PRINC DISTR CO, P27
[4]   Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs [J].
Bitansky, Nir .
THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 :567-594
[5]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[6]  
Chandran Nishanth, 2015, ITCS
[7]  
Chen Jing, 2016, ALGORAND EFFICIENT D
[8]   Probabilistic Termination and Composability of Cryptographic Protocols [J].
Cohen, Ran ;
Coretti, Sandro ;
Garay, Juan ;
Zikas, Vassilis .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :240-269
[9]   Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain [J].
David, Bernardo ;
Gazi, Peter ;
Kiayias, Aggelos ;
Russell, Alexander .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 :66-98
[10]   AUTHENTICATED ALGORITHMS FOR BYZANTINE AGREEMENT [J].
DOLEV, D ;
STRONG, HR .
SIAM JOURNAL ON COMPUTING, 1983, 12 (04) :656-666