Asynchronous Data Dissemination and its Applications

被引:38
作者
Das, Sourav [1 ]
Xiang, Zhuolun [1 ]
Ren, Ling [1 ]
机构
[1] Univ Illinois, Champaign, IL 61820 USA
来源
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
关键词
Data Dissemination; Asynchronous Networks; Reliable Broadcast; Verifiable Secret Sharing; Distributed Key Generation; Communication Complexity; SHORT SIGNATURES;
D O I
10.1145/3460120.3484808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce the problem of Asynchronous Data Dissemination (ADD). Intuitively, an ADD protocol disseminates a message to all honest nodes in an asynchronous network, given that at least t + 1 honest nodes initially hold the message where t is the maximum number of malicious nodes. We design a simple and efficient ADD protocol for n parties that is information-theoretically secure, tolerates up to one-third malicious nodes, and has a communication cost of O(n vertical bar M vertical bar+n(2)) for disseminating a message M. We then use our ADD protocol to improve many important primitives in cryptography and distributed computing. For asynchronous reliable broadcast (RBC), assuming collision-resistant hash functions, we give a RBC protocol with communication cost O(n vertical bar M vertical bar+kappa n(2)) where K is the size of the hash function output. This improves over the prior best scheme with communication cost O(n vertical bar M vertical bar+kappa n(2)log n) under the same setting. Our improved RBC protocol immediately improves the communication cost of asynchronous atomic broadcast and Asynchronous Distributed Key Generation (ADKG) protocols. We also use our improved RBC protocol along with additional new techniques to improve the communication cost of Asynchronous Verifiable Secret Sharing (AVSS), Asynchronous Complete Secret Sharing (ACSS), and dual-threshold ACSS from O(kappa n(2) log n) to O(kappa n(2)) without using any trusted setup.
引用
收藏
页码:2705 / 2721
页数:17
相关论文
共 52 条
[1]   Reaching Consensus for Asynchronous Distributed Key Generation [J].
Abraham, Ittai ;
Jovanovic, Philipp ;
Maller, Mary ;
Meiklejohn, Sarah ;
Stern, Gilad ;
Tomescu, Alin .
PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC '21), 2021, :363-373
[2]   Communication Complexity of Byzantine Agreement, Revisited [J].
Abraham, Ittai ;
Chan, T-H Hubert ;
Dolev, Danny ;
Nayak, Kartik ;
Pass, Rafael ;
Ren, Ling ;
Shi, Elaine .
PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC '19), 2019, :317-326
[3]  
Alhaddad Nicolas, 2021, 2021118 CRYPT EPRINT
[4]  
[Anonymous], 1996, INT C THEOR APPL CRY
[5]  
[Anonymous], 2010, INT C THEOR APPL CRY
[6]  
[Anonymous], 2020, P 39 S PRINC DISTR C, DOI DOI 10.1145/3395035.3425639
[7]  
[Anonymous], 1987, C THEOR APPL CRYPT T
[8]  
[Anonymous], 2004, INT C THEOR APPL CRY
[9]  
[Anonymous], 2016, P 2016 ACM SIGSAC C
[10]  
[Anonymous], 1991, INPROC 11 ANN INT CR, DOI [DOI 10.1007/3--540-46766-1_9, 10.1007/3-540-46766-1_9, DOI 10.1007/3-540-46766-1_9]