- Conference Paper
Understanding the communication complexity of Byzantine agreement (BA) is a fundamental problem in distributed computing. In particular, for protocols involving a large number of parties (as in, e.g., the context of blockchain protocols), it is important to understand the dependence of the communication on the number of parties n. Although adaptively secure BA protocols with o(n2) communication are known in the synchronous and partially synchronous settings, no such protocols are known in the fully asynchronous case. We show asynchronous BA protocols with (expected) subquadratic communication complexity tolerating an adaptive adversary who can corrupt f< (1 - ϵ) n/ 3 of the parties (for any ϵ> 0). One protocol assumes initial setup done by a trusted dealer, after which an unbounded number of BA executions can be run; alternately, we can achieve subquadratic amortized communication with no prior setup. We also show that some form of setup is needed for (non-amortized) subquadratic BA tolerating Θ(n) corrupted parties. As a contribution of independent interest, we show a secure-computation protocol in the same threat model that has o(n2) communication when computing no-input functionalities with short output (e.g., coin tossing). Mehr anzeigen
BuchtitelTheory of Cryptography
Zeitschrift / SerieLecture Notes in Computer Science
Seiten / Artikelnummer
Organisationseinheit03338 - Maurer, Ueli / Maurer, Ueli
AnmerkungenDue to the Coronavirus (COVID-19) the conference was conducted virtually.