Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Optimal extension protocols for byzantine broadcast and agreement

Published: 01 February 2021 Publication History

Abstract

The problems of Byzantine Broadcast (BB) and Byzantine Agreement (BA) are of interest to both the distributed computing and cryptography communities. Extension protocols for these primitives have been introduced to handle long messages efficiently at the cost of small number of single-bit broadcasts, referred to as seed broadcasts. While the communication optimality has remained the most sought-after property of an extension protocol in the literature, we prioritize both communication and round optimality in this work. In a setting with n parties and a static adversary controlling at most t parties in Byzantine fashion, we present BB and BA extension protocols with t<n, t<n/2 and t<n/3 that are simultaneously optimal in terms of communication and round complexity. The best communication that an extension protocol can achieve in any setting is O(n) bits for a message of length bits. The best achievable round complexity is O(n) for the setting t<n and O(1) in the other two settings t<n/2 and t<n/3. The existing constructions are either optimal only in terms of communication complexity, or require more rounds than our protocols, or achieve optimal round complexity at the cost of sub-optimal communication. Specifically, we construct communication-optimal protocols in the three corruption scenarios with the following round complexities:
t<n/3:
3 rounds, improving over O(+n2)
t<n/2:
5 rounds, improving over 6
t<n:
O(n) rounds, improving over O(n2)
A concrete protocol from an extension protocol is obtained by replacing the seed broadcasts with a BB protocol for a single bit. Our extension protocols minimize the seed-round complexity and seed-communication complexity. The former refers to the number of rounds in an extension protocol in which seed broadcasts are invoked and impacts the round complexity of a concrete protocol due to a number of sequential calls to bit broadcast. The latter refers to the number of bits communicated through the seed broadcasts and impacts the round and communication complexity due to parallel instances of single-bit broadcast. In the settings of t<n/3, t<n/2 and t<n, our protocols improve the seed-round complexity from O(+n2) to 1, from 3 to 2 and from O(n2) to O(n) respectively. Our protocols keep the seed-communication complexity independent of the message length and, either improve or keep the complexity almost in the same order compared to the existing protocols.

References

[1]
Beerliová-Trubíniová, Z., Hirt, M.: Efficient multi-party computation with dispute control. In: Halevi, S., Rabin, T. (eds.) Theory of Cryptography, pp. 305–328. Springer, Berlin (2006)
[2]
Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: Proceedings of the 25th Annual ACM Symposium on Theory of computing, pp. 52–61. ACM (1993)
[3]
Ben-Or M and El-Yaniv R Resilient-optimal interactive consistency in constant time Distrib. Comput. 2003 16 4 249-262
[4]
Blum, N.: A new approach to maximum matching in general graphs. In: Automata, Languages and Programming, 17th International Colloquium, ICALP90, Warwick University, England, July 16-20, 1990, Proceedings, pp. 586–597 (1990)
[5]
Braud-Santoni, N., Guerraoui, R., Huc, F.: Fast byzantine agreement. In: Proceedings of the 2013 ACM Symposium on Principles of Distributed Computing, pp. 57–64. ACM (2013)
[6]
Canetti, R.: Studies in secure multiparty computation and applications. Ph.D. thesis, The Weizmann Institute of Science (1996)
[7]
Chongchitmate, W., Ostrovsky, R.: Information-theoretic broadcast with dishonest majority for long messages. Cryptology ePrint Archive, Report 2018/829 (2018). https://eprint.iacr.org/2018/829
[8]
Coan BA and Welch JL Modular construction of a byzantine agreement protocol with optimal message bit complexity Inform. Comput. 1992 97 1 61-85
[9]
Cohen, R., Coretti, S., Garay, J., Zikas, V.: Probabilistic termination and composability of cryptographic protocols. Proceedings. Part III, of the 36th Annual International Cryptology Conference on Advances in Cryptology–CRYPTO 2016-Volume 9816, pp. 240–269. Springer, New York, Inc (2016)
[10]
Cohen, R., Coretti, S., Garay, J., Zikas, V.: Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols. In: 44th International Colloquium on Automata, Languages, and Programming (ICALP 2017), Leibniz International Proceedings in Informatics (LIPIcs), vol. 80, pp. 37:1–37:15 (2017)
[11]
Cramer R, Gennaro R, and Schoenmakers B Fumy W A secure and optimally efficient multi-authority election scheme Advances in Cryptology - EUROCRYPT 1997 1997 Berlin Springer 103-118
[12]
Dolev D and Reischuk R Bounds on information exchange for byzantine agreement J. ACM 1985 32 1 191-204
[13]
Dolev D and Strong HR Authenticated algorithms for byzantine agreement SIAM J. Comput. 1983 12 4 656-666
[14]
Even S, Goldreich O, and Lempel A A randomized protocol for signing contracts Commun. ACM 1985 28 6 637-647
[15]
Feldman P and Micali S An optimal probabilistic protocol for synchronous byzantine agreement SIAM J. Comput. 1997 26 4 873-933
[16]
Fitzi, M., Hirt, M.: Optimally efficient multi-valued byzantine agreement. In: Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing, pp. 163–168. ACM (2006)
[17]
Ganesh, C., Patra, A.: Broadcast extensions with optimal communication and round complexity. In: Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, pp. 371–380. ACM (2016)
[18]
Garay, J., Givens, C., Ostrovsky, R., Raykov, P.: Broadcast (and round) efficient verifiable secret sharing. In: International Conference on Information Theoretic Security, pp. 200–219. Springer (2013)
[19]
Garay, J., Katz, J., Koo, C.Y., Ostrovsky, R.: Round complexity of authenticated broadcast with a dishonest majority. In: Foundations of Computer Science, 2007. FOCS’07, pp. 658–668. IEEE (2007)
[20]
Garey, M.R., Johnson, D.S.: Computers and intractability: a guide to the theory of np-completeness, W. H. Freeman & Co, USA (1990)
[21]
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 218–229. ACM (1987)
[22]
Hirt, M., Maurer, U.M., Przydatek, B.: Efficient secure multi-party computation. In: Okamoto, T. (ed.) Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3–7, 2000, Proceedings, Lecture Notes in Computer Science, vol. 1976, pp. 143–161. Springer (2000)
[23]
Hirt, M., Raykov, P.: Multi-valued byzantine broadcast: The t<n case. In: Sarkar, P., Iwata, T. (eds.) Advances in Cryptology–ASIACRYPT 2014, pp. 448–465. Springer (2014)
[24]
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) Advances in Cryptology-CRYPTO 2003, pp. 145–161. Springer (2003)
[25]
Karlin, A., Yao, A.C.C.: Probabilistic lower bounds for byzantine agreement. Tech. rep, Manuscript (1986)
[26]
Katz J and Koo C On expected constant-round protocols for byzantine agreement Adv. Cryptol - CRYPTO 2006 2006 445-462
[27]
Katz J and Koo CY Round-efficient secure computation in point-to-point networks Adv Cryptolo-EUROCRYPT 2007 2007 311-328
[28]
Katz, J., Koo, C.Y., Kumaresan, R.: Improving the round complexity of vss in point-to-point networks. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) International Colloquium on Automata, Languages, and Programming, pp. 499–510. Springer (2008)
[29]
King, V., Lonargan, S., Saia, J., Trehan, A.: Load balanced scalable byzantine agreement through quorum building, with full information. In: Distributed Computing and Networking - 12th International Conference, ICDCN 2011, Bangalore, India, January 2–5, 2011. Proceedings, pp. 203–214 (2011)
[30]
King, V., Saia, J.: From almost everywhere to everywhere: Byzantine agreement with O~(n3/2) bits. In: International Symposium on Distributed Computing, pp. 464–478. Springer (2009)
[31]
King V and Saia J Breaking the o(n2) bit barrier: scalable byzantine agreement with an adaptive adversary J. ACM (JACM) 2011 58 4 18
[32]
King, V., Saia, J., Sanwalani, V., Vee, E.: Scalable leader election. In: Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithm, pp. 990–999. Society for Industrial and Applied Mathematics (2006)
[33]
Lamport, L., Fischer, M.: Byzantine generals and transaction commit protocols. Tech. rep., Technical Report 62, SRI International (1982). https://lamport.azurewebsites.net/pubs/trans.pdf
[34]
Liang, G., Vaidya, N.: Error-free multi-valued consensus with byzantine failures. In: Proceedings of the 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, pp. 11–20. ACM (2011)
[35]
Lindell, Y., Lysyanskaya, A., Rabin, T.: Sequential composition of protocols without simultaneous termination. In: Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, PODC 2002, Monterey, California, USA, July 21–24, 2002, pp. 203–212 (2002)
[36]
Lindell Y, Lysyanskaya A, and Rabin T On the composition of authenticated byzantine agreement J. ACM (JACM) 2006 53 6 881-917
[37]
Lynch NA Distributed Algorithms 1996 Burlington Morgan Kaufmann
[38]
MacWilliams FJ and Sloane NJA The Theory of Error Correcting Codes 1978 Amsterdam North-Holland Publishing Company
[39]
Micali, S.: Very simple and efficient byzantine agreement. In: 8th Innovations in Theoretical Computer Science Conference, ITCS 2017, January 9–11, 2017, Berkeley, CA, USA, pp. 6:1–6:1 (2017)
[40]
Patra, A.: Error-free multi-valued broadcast and byzantine agreement with optimal communication complexity. In: Proceedings of Principles of Distributed Systems - 15th International Conference, OPODIS 2011, pp. 34–49 (2011)
[41]
Patra A and Rangan CP Abdalla M and Barreto PSLM Communication optimal multi-valued asynchronous broadcast protocol Progress in Cryptology - LATINCRYPT 2010 LATINCRYPT 2010. Lecture Notes in Computer Science 2010 Berlin, Heidelberg Springer 162-177
[42]
Patra, A., Rangan, C.P.: Communication optimal multi-valued asynchronous byzantine agreement with optimal resilience. In: Proceedings of the 5th International Conference on Information Theoretic Security, pp. 206–226. Springer-Verlag (2011)
[43]
Pease M, Shostak R, and Lamport L Reaching agreement in the presence of faults J ACM (JACM) 1980 27 2 228-234
[44]
Pfitzmann, B., Waidner, M.: Information-theoretic pseudosignatures and byzantine agreement for t n/3. Technical Report RZ 2882 (#90830), IBM Research (1996). https://www.csa.iisc.ac.in/~arpita/BroadcastBAReadingGroup/PW96.pdf
[45]
Reed IS and Solomon G Polynomial codes over certain finite fields J. Soc. Ind. Appl. Math. 1960 8 2 300-304
[46]
Turpin R and Coan BA Extending binary byzantine agreement to multivalued byzantine agreement Inform. Process. Lett. 1984 18 2 73-76
[47]
Yao, A.C.C.: Some complexity questions related to distributive computing(preliminary report). In: Proceedings of the 11th Annual ACM Symposium on Theory of Computing, STOC ’79, pp. 209–213. ACM (1979)

Cited By

View all
  • (2024)SPRINT: High-Throughput Robust Distributed Schnorr SignaturesAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58740-5_3(62-91)Online publication date: 26-May-2024
  • (2022)Asymptotically Free Broadcast in Constant Expected Time via Packed VSSTheory of Cryptography10.1007/978-3-031-22318-1_14(384-414)Online publication date: 7-Nov-2022

Index Terms

  1. Optimal extension protocols for byzantine broadcast and agreement
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Distributed Computing
        Distributed Computing  Volume 34, Issue 1
        Feb 2021
        89 pages

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 01 February 2021
        Accepted: 14 July 2020
        Received: 22 October 2017

        Author Tags

        1. Byzantine Agreement
        2. Byzantine Broadcast
        3. Extension Protocols
        4. Round Complexity
        5. Communication Complexity

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 11 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)SPRINT: High-Throughput Robust Distributed Schnorr SignaturesAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58740-5_3(62-91)Online publication date: 26-May-2024
        • (2022)Asymptotically Free Broadcast in Constant Expected Time via Packed VSSTheory of Cryptography10.1007/978-3-031-22318-1_14(384-414)Online publication date: 7-Nov-2022

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media