Send email Copy Email Address
2022-10

State Machine Replication under Changing Network Conditions

Summary

Protocols for state machine replication (SMR) are typically designed for synchronous or asynchronous networks, with a lower corrup- tion threshold in the latter case. Recent network-agnostic protocols are secure when run in either a synchronous or an asynchronous network. We propose two new constructions of network-agnostic SMR protocols that improve on existing protocols in terms of either the adversarial model or communication complexity: 1. an adaptively secure protocol with optimal corruption thresholds and quadratic amortized communication complexity per transaction; 2. a statically secure protocol with near-optimal corruption thresholds and linear amortized communication complexity per transaction. We further explore SMR protocols run in a network that may change between synchronous and asynchronous arbitrarily often; parties can be uncorrupted (as in the proactive model), and the protocol should remain secure as long as the appropriate corruption thresholds are maintained. We show that purely asynchronous proactive secret sharing is impossible without some form of synchronization between the parties, ruling out a natural approach to proactively secure network-agnostic SMR protocols. Motivated by this negative result, we consider a model where the ad- versary is limited in the total number of parties it can corrupt over the duration of the protocol and show, in this setting, that our SMR proto- cols remain secure even under arbitrarily changing network conditions.

Conference Paper

International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)

Date published

2022-10

Date last modified

2024-11-15