Send email Copy Email Address
2023-01-25

Efficient Adaptively-Secure Byzantine Agreement for Long Messages

Summary

We investigate the communication complexity of Byzantine agreement protocols for long messages against an adaptive adversary. In this setting, prior results either achieved a communication complexity of O(nl · poly(κ)) or O(nl+n 2 · poly(κ)) for l-bit long messages. We improve the state of the art by presenting protocols with communication complexity O(nl + n · poly(κ)) in both the synchronous and asynchronous communication models. The synchronous protocol tolerates t ≤ (1 − ε) n 2 corruptions and assumes a VRF setup, while the asynchronous protocol tolerates t ≤ (1 − ε) n 3 corruptions under further cryptographic assumptions. Our protocols are very simple and combine subcommittee election with the recent approach of Nayak et al. (DISC ‘20). Surprisingly, the analysis of our protocols is all but simple and involves an interesting new application of Mc Diarmid’s inequality to obtain almost optimal corruption thresholds.

Conference Paper

International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)

Date published

2023-01-25

Date last modified

2024-11-15