Asynchronous Byzantine Agreement with Subquadratic Communication

被引:20
作者
Blum, Erica [1 ]
Katz, Jonathan [1 ]
Liu-Zhang, Chen-Da [2 ]
Loss, Julian [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
[2] Swiss Fed Inst Technol, Zurich, Switzerland
来源
THEORY OF CRYPTOGRAPHY, TCC 2020, PT I | 2020年 / 12550卷
关键词
MULTIPARTY COMPUTATION; CONSENSUS;
D O I
10.1007/978-3-030-64375-1_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Understanding the communication complexity of Byzantine agreement (BA) is a fundamental problem in distributed computing. In particular, for protocols involving a large number of parties (as in, e.g., the context of blockchain protocols), it is important to understand the dependence of the communication on the number of parties n. Although adaptively secure BA protocols with o(n(2)) communication are known in the synchronous and partially synchronous settings, no such protocols are known in the fully asynchronous case. We show asynchronous BA protocols with (expected) subquadratic communication complexity tolerating an adaptive adversary who can corrupt f < (1-c)n/3 of the parties (for any c > 0). One protocol assumes initial setup done by a trusted dealer, after which an unbounded number of BA executions can be run; alternately, we can achieve subquadratic amortized communication with no prior setup. We also show that some form of setup is needed for (non-amortized) subquadratic BA tolerating T(n) corrupted parties. As a contribution of independent interest, we show a securecomputation protocol in the same threat model that has o(n(2)) communication when computing no-input functionalities with short output (e.g., coin tossing).
引用
收藏
页码:353 / 380
页数:28
相关论文
共 40 条
[1]   Communication Complexity of Byzantine Agreement, Revisited [J].
Abraham, Ittai ;
Chan, T-H Hubert ;
Dolev, Danny ;
Nayak, Kartik ;
Pass, Rafael ;
Ren, Ling ;
Shi, Elaine .
PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC '19), 2019, :317-326
[2]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[3]  
Bellare M., 2001, INT C THEOR APPL CRY, V2248, P566
[4]  
Ben-Or M., 1994, Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, P183, DOI 10.1145/197917.198088
[5]  
Ben-Or M., 1993, Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, P52, DOI 10.1145/167088.167109
[6]   Threshold Cryptosystems from Threshold Fully Homomorphic Encryption [J].
Boneh, Dan ;
Gennaro, Rosario ;
Goldfeder, Steven ;
Jain, Aayush ;
Kim, Sam ;
Rasmussen, Peter M. R. ;
Sahai, Amit .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 :565-596
[7]   ASYNCHRONOUS BYZANTINE AGREEMENT PROTOCOLS [J].
BRACHA, G .
INFORMATION AND COMPUTATION, 1987, 75 (02) :130-143
[8]   ASYNCHRONOUS CONSENSUS AND BROADCAST PROTOCOLS [J].
BRACHA, G ;
TOUEG, S .
JOURNAL OF THE ACM, 1985, 32 (04) :824-840
[9]   Efficient Fully Homomorphic Encryption from (Standard) LWE [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :97-106
[10]  
Cachin C., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P524