Asynchronous Byzantine Agreement with optimal resilience

被引:0
|
作者
Arpita Patra
Ashish Choudhury
C. Pandu Rangan
机构
[1] University of Bristol,Department of Computer Science
[2] IIT Madras,Department of Computer Science and Engineering
来源
Distributed Computing | 2014年 / 27卷
关键词
Byzantine Agreement; Computationally unbounded; Secret sharing; Common coin;
D O I
暂无
中图分类号
学科分类号
摘要
We present an efficient, optimally-resilient Asynchronous Byzantine Agreement (ABA) protocol involving n=3t+1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n = 3t+1$$\end{document} parties over a completely asynchronous network, tolerating a computationally unbounded Byzantine adversary, capable of corrupting at most t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t$$\end{document} out of the n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n$$\end{document} parties. In comparison with the best known optimally-resilient ABA protocols of Canetti and Rabin (STOC 1993) and Abraham et al. (PODC 2008), our protocol is significantly more efficient in terms of the communication complexity. Our ABA protocol is built on a new statistical asynchronous verifiable secret sharing (AVSS) protocol with optimal resilience. Our AVSS protocol significantly improves the communication complexity of the only known statistical and optimally-resilient AVSS protocol of Canetti et al. Our AVSS protocol is further built on an asynchronous primitive called asynchronous weak commitment (AWC), while the AVSS of Canetti et al. is built on the primitive called asynchronous weak secret sharing (AWSS). We observe that AWC has weaker requirements than AWSS and hence it can be designed more efficiently than AWSS. The common coin primitive is one of the most important building blocks for the construction of an ABA protocol. In this paper, we extend the existing common coin protocol to make it compatible with our new AVSS protocol that shares multiple secrets simultaneously. As a byproduct, our new common coin protocol is more communication efficient than all the existing common coin protocols.
引用
收藏
页码:111 / 146
页数:35
相关论文
共 50 条
  • [21] The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited
    Bangalore, Laasya
    Choudhury, Ashish
    Patra, Arpita
    JOURNAL OF THE ACM, 2020, 67 (03)
  • [22] Round-Optimal Byzantine Agreement
    Ghinea, Diana
    Goyal, Vipul
    Chen-Da Liu-Zhang
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 96 - 119
  • [23] ASYNCHRONOUS BYZANTINE AGREEMENT PROTOCOL BASED ON VERIFIABLE SIGNATURE SHARING
    Ji Dongyao Feng Dengguo (State Key Laboratory of Information Security
    Journal of Electronics(China), 2006, (01) : 64 - 68
  • [24] ASYNCHRONOUS BYZANTINE AGREEMENT PROTOCOL BASED ON VERIFIABLE SIGNATURE SHARING
    Ji Dongyao Feng Dengguo State Key Laboratory of Information Security Graduate School Chinese Academia of Sciences Beijing China
    Journal of Electronics, 2006, (01) : 64 - 68
  • [25] Fast Asynchronous Byzantine Agreement and Leader Election with Full Information
    Kapron, Bruce
    Kempe, David
    King, Valerie
    Saia, Jared
    Sanwalani, Vishal
    PROCEEDINGS OF THE NINETEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2008, : 1038 - +
  • [26] Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited
    Bangalore, Laasya
    Choudhury, Ashish
    Patra, Arpita
    PODC'18: PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2018, : 295 - 304
  • [27] Byzantine disk paxos: optimal resilience with byzantine shared memory
    Ittai Abraham
    Gregory Chockler
    Idit Keidar
    Dahlia Malkhi
    Distributed Computing, 2006, 18 : 387 - 408
  • [28] Fast Asynchronous Byzantine Agreement and Leader Election with Full Information
    Kapron, Bruce M.
    Kempe, David
    King, Valerie
    Saia, Jared
    Sanwalani, Vishal
    ACM TRANSACTIONS ON ALGORITHMS, 2010, 6 (04)
  • [29] Byzantine disk paxos: optimal resilience with byzantine shared memory
    Abraham, I
    Chockler, G
    Keidar, I
    Malkhi, D
    DISTRIBUTED COMPUTING, 2006, 18 (05) : 387 - 408
  • [30] Optimal extension protocols for byzantine broadcast and agreement
    Ganesh, Chaya
    Patra, Arpita
    DISTRIBUTED COMPUTING, 2021, 34 (01) : 59 - 77