E-mail senden E-Mail Adresse kopieren
2023-01-25

Efficient Adaptively-Secure Byzantine Agreement for Long Messages

Zusammenfassung

We investigate the communication complexity of Byzantine agreement protocols for long messages against an adaptive adversary. In this setting, prior results either achieved a communication complexity of O(nl · poly(κ)) or O(nl+n 2 · poly(κ)) for l-bit long messages. We improve the state of the art by presenting protocols with communication complexity O(nl + n · poly(κ)) in both the synchronous and asynchronous communication models. The synchronous protocol tolerates t ≤ (1 − ε) n 2 corruptions and assumes a VRF setup, while the asynchronous protocol tolerates t ≤ (1 − ε) n 3 corruptions under further cryptographic assumptions. Our protocols are very simple and combine subcommittee election with the recent approach of Nayak et al. (DISC ‘20). Surprisingly, the analysis of our protocols is all but simple and involves an interesting new application of Mc Diarmid’s inequality to obtain almost optimal corruption thresholds.

Konferenzbeitrag

International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)

Veröffentlichungsdatum

2023-01-25

Letztes Änderungsdatum

2024-12-13