Efficient Adaptively-Secure Byzantine Agreement for Long Messages
We investigate the communication complexity of Byzantine agreement protocols for long messages against an adaptive adversary. In this setting, prior n-party protocols either achieved a communication complexity of O(nl· poly(κ) ) or O(nl+ n2· poly(κ) ) for l-bit long messages and security parameter κ. We improve the state of the art by presenting protocols with communication complexity O(nl+ n· poly(κ) ) in both the synchronous and asynchronous communication models. The synchronous protocol tolerates t≤(1-ε)n2 corruptions and assumes a VRF setup, while the asynchronous protocol tolerates t≤(1-ε)n3 corruptions under further cryptographic assumptions. Our protocols are very simple and combine subcommittee election with the recent approach of Nayak et al. (DISC ‘20). Surprisingly, the analysis of our protocols is all but simple and involves an interesting new application of Mc Diarmid’s inequality to obtain almost optimal corruption thresholds.
Duke Scholars
Published In
DOI
EISSN
ISSN
Publication Date
Volume
Start / End Page
Related Subject Headings
- Artificial Intelligence & Image Processing
- 46 Information and computing sciences
Citation
Published In
DOI
EISSN
ISSN
Publication Date
Volume
Start / End Page
Related Subject Headings
- Artificial Intelligence & Image Processing
- 46 Information and computing sciences