Skip to main content

Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited

  • Conference paper
  • First Online:
Theory of Cryptography (TCC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14372))

Included in the following conference series:

  • 543 Accesses

Abstract

It is well known that without randomization, Byzantine agreement (BA) requires a linear number of rounds in the synchronous setting, while it is flat out impossible in the asynchronous setting. The primitive which allows to bypass the above limitation is known as oblivious common coin (OCC). It allows parties to agree with constant probability on a random coin, where agreement is oblivious, i.e., players are not aware whether or not agreement has been achieved.

The starting point of our work is the observation that no known protocol exists for information-theoretic multi-valued OCC with optimal resiliency in the asynchronous setting (with eventual message delivery).

This apparent hole in the literature is particularly problematic, as multi-valued OCC is implicitly or explicitly used in several constructions.

In this paper, we present the first information-theoretic multi-valued OCC protocol in the asynchronous setting with optimal resiliency, i.e., tolerating \(t<n/3\) corruptions, thereby filling this important gap. Further, our protocol efficiently implements OCC with an exponential-size domain, a property which is not even achieved by known constructions in the simpler, synchronous setting.

We then turn to the problem of round-preserving parallel composition of asynchronous BA. A protocol for this task was proposed by Ben-Or and El-Yaniv [Distributed Computing ’03]. Their construction, however, is flawed in several ways. Thus, as a second contribution, we provide a simpler, more modular protocol for the above task. Finally, and as a contribution of independent interest, we provide proofs in Canetti’s Universal Composability framework; this makes our work the first one offering composability guarantees, which are important as BA is a core building block of secure multi-party computation protocols.

The full version of this paper can be found at the IACR Cryptology ePrint Archive, report 2023/1003.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    That is, without setup assumptions and without imposing resource restrictions on the adversary.

  2. 2.

    The bound \(t<n/2\) is tight for BA [49]; however, under the same setup assumptions, broadcast can be solved for any number of corruptions.

  3. 3.

    Fitzi and Garay [50] devised expected-constant-round BA for \(t<n/2\) in the PKI model under number-theoretic assumptions. Katz and Koo [61] established a similar result from the minimal assumption of digital signatures, which yields an information-theoretic variant using pseudo-signatures [75].

  4. 4.

    This primitive is sometimes known as a “weak” common coin in the literature.

  5. 5.

    Feldman’s A-VSS suffers from a negligible error probability. An errorless A-VSS scheme for \(t<n/4\) is given in [10] and used to construct a perfectly secure asynchronous MPC protocol with resiliency \(t<n/4\).

  6. 6.

    This is true even if one is interested only in binary concurrent BA (i.e., when the input vectors consist of bits). Multi-valued BA is needed to agree on the leader’s output vector.

  7. 7.

    They are also concerned with obtaining \(O(n^2)\) message complexity. The novelty of their result, even without this more stringent requirement, does not seem to be acknowledged in the paper.

  8. 8.

    This claim no longer appears in the ICALP [43] or journal [45] versions of the paper, or in Feldman’s thesis [44].

  9. 9.

    Ben-Or and El-Yaniv [12] introduced and used a strengthened property for (A-)BA without naming it, which was later called “non-intrusion” validity in [70]. Non-intrusion validity lies between standard validity and “strong” validity [50], as it requires that a value decided by an honest party is either an honest party’s input or a special symbol \(\bot \) (i.e., the adversary cannot intrude malicious values into the output).

  10. 10.

    Recall that while (concurrent) A-BA is not a private task, secure channels are needed to construct an OCC.

  11. 11.

    It is important to note that the term “oblivious” in this context refers to the fact that parties do not learn whether an agreement on a random coin value has been achieved or not, while the adversary does.

  12. 12.

    Feldman calculated the size of the overlap, denoted as x, based on the number of participants n and the maximum number of corruptions t. The general relation is \(x \ge n-t-\frac{t^2}{n-2t}\), which yields \(x \ge n/3\) and \(x \ge 5n/8\) when \(t \le n/3\) and \(t \le n/4\), respectively. This argument was later used in [24] to achieve optimal resiliency.

References

  1. Abraham, I., Asharov, G., Patra, A., Stern, G.: Perfectly secure asynchronous agreement on a core set in constant expected time. IACR Cryptology ePrint Archive, Report 2023/1130 (2023). https://eprint.iacr.org/2023/1130

  2. Abraham, I., Dolev, D., Halpern, J.Y.: An almost-surely terminating polynomial protocol for asynchronous byzantine agreement with optimal resilience. In: 27th ACM PODC, pp. 405–414. ACM (2008)

    Google Scholar 

  3. Abraham, I., Dolev, D., Stern, G.: Revisiting asynchronous fault tolerant computation with optimal resilience. Distributed Comput. 35(4), 333–355 (2022)

    Article  MathSciNet  MATH  Google Scholar 

  4. Abraham, I., Jovanovic, P., Maller, M., Meiklejohn, S., Stern, G., Tomescu, A.: Reaching consensus for asynchronous distributed key generation. In: 40th ACM PODC, pp. 363–373. ACM (2021)

    Google Scholar 

  5. Abraham, I., Malkhi, D., Spiegelman, A.: Asymptotically optimal validated asynchronous byzantine agreement. In: 38th ACM PODC, pp. 337–346. ACM (2019)

    Google Scholar 

  6. Attiya, H., Censor-Hillel, K.: Lower bounds for randomized consensus under a weak adversary. SIAM J. Comput. 39(8), 3885–3904 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  7. Beaver, D., So, N.: Global, unpredictable bit generation without broadcast. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 424–434. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_36

    Chapter  Google Scholar 

  8. Beerliová-Trubíniová, Z., Hirt, M.: Simple and efficient perfectly-secure asynchronous MPC. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 376–392. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-76900-2_23

    Chapter  Google Scholar 

  9. Ben-Or, M.: Another advantage of free choice: completely asynchronous agreement protocols (extended abstract). In: 2nd ACM PODC, pp. 27–30. ACM (1983)

    Google Scholar 

  10. Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: 25th ACM STOC, pp. 52–61. ACM Press (1993)

    Google Scholar 

  11. Ben-Or, M., El-Yaniv, R.: Interactive consistency in constant expected time. Technical report, Inst. of Math. and Comp. Sci., Hebrew University, Jerusalem (1988)

    Google Scholar 

  12. Ben-Or, M., El-Yaniv, R.: Resilient-optimal interactive consistency in constant time. Distrib. Comput. 16(4), 249–262 (2003)

    Article  MATH  Google Scholar 

  13. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: 20th ACM STOC, pp. 1–10. ACM Press (1988)

    Google Scholar 

  14. Ben-Or, M., Kelmer, B., Rabin, T.: Asynchronous secure computations with optimal resilience (extended abstract). In: 13th ACM PODC, pp. 183–192. ACM (1994)

    Google Scholar 

  15. Berman, P., Garay, J.A., Perry, K.J.: Towards optimal distributed consensus (extended abstract). In: 30th FOCS, pp. 410–415. IEEE Computer Society Press (1989)

    Google Scholar 

  16. Blum, E., Liu-Zhang, C.-D., Loss, J.: Always have a backup plan: fully secure synchronous MPC with asynchronous fallback. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020, Part II. LNCS, vol. 12171, pp. 707–731. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-56880-1_25

    Chapter  Google Scholar 

  17. Borcherding, M.: Levels of authentication in distributed agreement. In: Babaoğlu, Ö., Marzullo, K. (eds.) WDAG 1996. LNCS, vol. 1151, pp. 40–55. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61769-8_4

    Chapter  Google Scholar 

  18. Bracha, G.: Asynchronous byzantine agreement protocols. Inf. Comput. 75(2), 130–143 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  19. Bracha, G., Toueg, S.: Asynchronous consensus and broadcast protocols. J. ACM 32(4), 824–840 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  20. Cachin, C., Kursawe, K., Petzold, F., Shoup, V.: Secure and efficient asynchronous broadcast protocols. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 524–541. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_31

    Chapter  Google Scholar 

  21. Cachin, C., Kursawe, K., Shoup, V.: Random oracles in constantinople: practical asynchronous byzantine agreement using cryptography. J. Cryptol. 18(3), 219–246 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  22. Canetti, R.: Studies in secure multiparty computation and applications. Ph.D. thesis, Weizmann Institute of Science (1996)

    Google Scholar 

  23. Canetti, R.: Universally composable security. J. ACM 67(5), 1–94 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  24. Canetti, R., Rabin, T.: Fast asynchronous byzantine agreement with optimal resilience. In: 25th ACM STOC, pp. 42–51. ACM Press (1993)

    Google Scholar 

  25. Canetti, R., Rabin, T.: Fast asynchronous byzantine agreement with optimal resilience. Full version of [24] (1998). https://www.cs.tau.ac.il/~canetti/materials/cr93.ps

  26. Chan, T.H., Pass, R., Shi, E.: Round complexity of Byzantine agreement, revisited. IACR Cryptology ePrint Archive, Report 2019/886 (2019). https://eprint.iacr.org/2019/886

  27. Chan, T.-H.H., Pass, R., Shi, E.: Sublinear-round byzantine agreement under corrupt majority. In: Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V. (eds.) PKC 2020, Part II. LNCS, vol. 12111, pp. 246–265. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45388-6_9

    Chapter  Google Scholar 

  28. Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: 20th ACM STOC, pp. 11–19. ACM Press (1988)

    Google Scholar 

  29. Chor, B., Merritt, M., Shmoys, D.B.: Simple constant-time consensus protocols in realistic failure models. J. ACM 36(3), 591–614 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  30. Cohen, R.: Asynchronous secure multiparty computation in constant time. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) PKC 2016, Part II. LNCS, vol. 9615, pp. 183–207. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49387-8_8

    Chapter  Google Scholar 

  31. Cohen, R., Coretti, S., Garay, J., Zikas, V.: Probabilistic termination and composability of cryptographic protocols. J. Cryptol. 32(3), 690–741 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  32. Cohen, R., Coretti, S., Garay, J.A., Zikas, V.: Round-preserving parallel composition of probabilistic-termination cryptographic protocols. J. Cryptol. 34(2), 12 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  33. Cohen, R., Forghani, P., Garay, J.A., Patel, R., Zikas, V.: Concurrent asynchronous byzantine agreement in expected-constant rounds, revisited. IACR Cryptology ePrint Archive, Report 2023/1003 (2023). https://eprint.iacr.org/2023/1003

  34. Cohen, R., Garay, J., Zikas, V.: Completeness theorems for adaptively secure broadcast (2023), cRYPTO ’23 (2023, to appear)

    Google Scholar 

  35. Cohen, R., Haitner, I., Makriyannis, N., Orland, M., Samorodnitsky, A.: On the round complexity of randomized byzantine agreement. J. Cryptol. 35(2), 10 (2022)

    Article  MathSciNet  MATH  Google Scholar 

  36. Coretti, S., Garay, J., Hirt, M., Zikas, V.: Constant-round asynchronous multi-party computation based on one-way functions. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016, Part II. LNCS, vol. 10032, pp. 998–1021. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53890-6_33

    Chapter  Google Scholar 

  37. Dolev, D., Strong, H.R.: Authenticated algorithms for byzantine agreement. SIAM J. Comput. 12(4), 656–666 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  38. Duan, S., Wang, X., Zhang, H.: Practical signature-free asynchronous common subset in constant time. Cryptology ePrint Archive (2023), cCS ’23 (2023, to appear)

    Google Scholar 

  39. Dwork, C., Lynch, N.A., Stockmeyer, L.J.: Consensus in the presence of partial synchrony. J. ACM 35(2), 288–323 (1988)

    Article  MathSciNet  Google Scholar 

  40. Feige, U., Goldwasser, S., Lovász, L., Safra, S., Szegedy, M.: Approximating clique is almost NP-complete (preliminary version). In: 32nd FOCS, pp. 2–12. IEEE Computer Society Press (1991)

    Google Scholar 

  41. Feldman, P.: Asynchronous byzantine agreement in constant expected time (1989), unpublished manuscript

    Google Scholar 

  42. Feldman, P., Micali, S.: Optimal algorithms for byzantine agreement. In: 20th ACM STOC, pp. 148–161. ACM Press (1988)

    Google Scholar 

  43. Feldman, P., Micali, S.: An optimal probabilistic algorithm for synchronous Byzantine agreement. In: Ausiello, G., Dezani-Ciancaglini, M., Della Rocca, S.R. (eds.) ICALP 1989. LNCS, vol. 372, pp. 341–378. Springer, Heidelberg (1989). https://doi.org/10.1007/BFb0035770

    Chapter  Google Scholar 

  44. Feldman, P.N.: Optimal Algorithms for Byzantine Agreement. Ph.D. thesis, Massachusetts Institute of Technology (1988)

    Google Scholar 

  45. Feldman, P., Micali, S.: An optimal probabilistic protocol for synchronous byzantine agreement. SIAM J. Comput. 26(4), 873–933 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  46. Fischer, M.J., Lynch, N.A.: A lower bound for the time to assure interactive consistency. Inf. Process. Lett. 14(4), 183–186 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  47. Fischer, M.J., Lynch, N.A., Merritt, M.: Easy impossibility proofs for distributed consensus problems. Distrib. Comput. 1(1), 26–39 (1986)

    Article  MATH  Google Scholar 

  48. Fischer, M.J., Lynch, N.A., Paterson, M.: Impossibility of distributed consensus with one faulty process. J. ACM 32(2), 374–382 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  49. Fitzi, M.: Generalized communication and security models in Byzantine agreement. Ph.D. thesis, ETH Zurich, Zürich, Switzerland (2003)

    Google Scholar 

  50. Fitzi, M., Garay, J.A.: Efficient player-optimal protocols for strong and differential consensus. In: 22nd ACM PODC, pp. 211–220. ACM (2003)

    Google Scholar 

  51. Fitzi, M., Nielsen, J.B.: On the number of synchronous rounds sufficient for authenticated byzantine agreement. In: Keidar, I. (ed.) DISC 2009. LNCS, vol. 5805, pp. 449–463. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04355-0_46

    Chapter  Google Scholar 

  52. Gao, Y., Lu, Y., Lu, Z., Tang, Q., Xu, J., Zhang, Z.: Efficient asynchronous byzantine agreement without private setups. In: 42nd ICDCS, pp. 246–257. IEEE (2022)

    Google Scholar 

  53. Garay, J.A., Katz, J., Koo, C., Ostrovsky, R.: Round complexity of authenticated broadcast with a dishonest majority. In: 48th FOCS, pp. 658–668. IEEE Computer Society Press (2007)

    Google Scholar 

  54. Garay, J.A., Moses, Y.: Fully polynomial byzantine agreement for n \(>\) 3t processors in t + 1 rounds. SIAM J. Comput. 27(1), 247–290 (1998)

    Google Scholar 

  55. Ghinea, D., Goyal, V., Liu-Zhang, C.: Round-optimal byzantine agreement. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022, Part I. LNCS, vol. 13275, pp. 96–119. Springer, Heidelberg (2022). https://doi.org/10.1007/978-3-031-06944-4_4

    Chapter  Google Scholar 

  56. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or A completeness theorem for protocols with honest majority. In: 19th ACM STOC, pp. 218–229. ACM Press (1987)

    Google Scholar 

  57. Hirt, M., Nielsen, J.B., Przydatek, B.: Cryptographic asynchronous multi-party computation with optimal resilience. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 322–340. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_19

    Chapter  Google Scholar 

  58. Hirt, M., Nielsen, J.B., Przydatek, B.: Asynchronous multi-party computation with quadratic communication. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 473–485. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70583-3_39

    Chapter  Google Scholar 

  59. Hirt, M., Zikas, V.: Adaptively secure broadcast. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 466–485. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_24

    Chapter  Google Scholar 

  60. Karlin, A.R., Yao, A.C.: Probabilistic lower bounds for Byzantine agreement and clock synchronization (1986). unpublished manuscript

    Google Scholar 

  61. Katz, J., Koo, C.: On expected constant-round protocols for byzantine agreement. J. Comput. Syst. Sci. 75(2), 91–112 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  62. Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Universally composable synchronous computation. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 477–498. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36594-2_27

    Chapter  Google Scholar 

  63. Lamport, L., Shostak, R.E., Pease, M.C.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)

    Article  MATH  Google Scholar 

  64. Lindell, Y., Lysyanskaya, A., Rabin, T.: Sequential composition of protocols without simultaneous termination. In: 21st ACM PODC, pp. 203–212. ACM (2002)

    Google Scholar 

  65. Lindell, Y., Lysyanskaya, A., Rabin, T.: On the composition of authenticated byzantine agreement. J. ACM 53(6), 881–917 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  66. Liu-Zhang, C.-D., Loss, J., Maurer, U., Moran, T., Tschudi, D.: MPC with synchronous security and asynchronous responsiveness. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020, Part III. LNCS, vol. 12493, pp. 92–119. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64840-4_4

    Chapter  Google Scholar 

  67. Lu, Y., Lu, Z., Tang, Q., Wang, G.: Dumbo-MVBA: optimal multi-valued validated asynchronous byzantine agreement, revisited. In: 39th ACM PODC, pp. 129–138. ACM (2020)

    Google Scholar 

  68. Micali, S.: Very simple and efficient byzantine agreement. In: ITCS 2017. LIPIcs, vol. 4266, pp. 6:1–6:1. Schloss Dagstuhl (2017)

    Google Scholar 

  69. Micali, S.: Very simple and efficient byzantine agreement. In: ITCS 2017. LIPIcs, vol. 4266, pp. 6:1–6:1. Schloss Dagstuhl (2017)

    Google Scholar 

  70. Mostéfaoui, A., Raynal, M.: Signature-free asynchronous byzantine systems: from multivalued to binary consensus with t \(<\) n/3, O(n\(^{2}\)) messages, and constant time. Acta Informatica 54(5), 501–520 (2017)

    Google Scholar 

  71. Nielsen, J.B.: A threshold pseudorandom function construction and its applications. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 401–416. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45708-9_26

    Chapter  Google Scholar 

  72. Patra, A.: Error-free multi-valued broadcast and byzantine agreement with optimal communication complexity. In: Fernàndez Anta, A., Lipari, G., Roy, M. (eds.) OPODIS 2011. LNCS, vol. 7109, pp. 34–49. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25873-2_4

    Chapter  Google Scholar 

  73. Patra, A., Choudhury, A., Rangan, C.P.: Asynchronous byzantine agreement with optimal resilience. Distrib. Comput. 27(2), 111–146 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  74. Pease, M.C., Shostak, R.E., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228–234 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  75. Pfitzmann, B., Waidner, M.: Unconditional Byzantine agreement for any number of faulty processors. In: Finkel, A., Jantzen, M. (eds.) STACS 1992. LNCS, vol. 577, pp. 337–350. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-55210-3_195

    Chapter  Google Scholar 

  76. Rabin, M.O.: Randomized byzantine generals. In: 24th FOCS. pp. 403–409. IEEE Computer Society Press (1983)

    Google Scholar 

  77. de Souza, L.F., Kuznetsov, P., Tonkikh, A.: Distributed randomness from approximate agreement. In: 36th DISC. LIPIcs, vol. 246, pp. 24:1–24:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2022)

    Google Scholar 

  78. Srinivasan, S., Loss, J., Malavolta, G., Nayak, K., Papamanthou, C., Thyagarajan, S.A.K.: Transparent batchable time-lock puzzles and applications to byzantine consensus. In: PKC 2023, Part I. LNCS, pp. 554–584. Springer, Heidelberg (2023). https://doi.org/10.1007/978-3-031-31368-4_20

    Chapter  Google Scholar 

  79. Turpin, R., Coan, B.A.: Extending binary byzantine agreement to multivalued byzantine agreement. Inf. Process. Lett. 18(2), 73–76 (1984)

    Article  Google Scholar 

  80. Wan, J., Xiao, H., Devadas, S., Shi, E.: Round-efficient byzantine broadcast under strongly adaptive and majority corruptions. In: Pass, R., Pietrzak, K. (eds.) TCC 2020, Part I. LNCS, vol. 12550, pp. 412–456. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64375-1_15

    Chapter  Google Scholar 

  81. Wan, J., Xiao, H., Shi, E., Devadas, S.: Expected constant round byzantine broadcast under dishonest majority. In: Pass, R., Pietrzak, K. (eds.) TCC 2020, Part I. LNCS, vol. 12550, pp. 381–411. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64375-1_14

    Chapter  Google Scholar 

  82. Yao, A.C.: Protocols for secure computations (extended abstract). In: 23rd FOCS, pp. 160–164. IEEE Computer Society Press (1982)

    Google Scholar 

  83. Zhang, H., Duan, S.: PACE: fully parallelizable BFT from reproposable byzantine agreement. In: ACM CCS 2022, pp. 3151–3164. ACM (2022)

    Google Scholar 

Download references

Acknowledgements

Our original motivation for this project was to provide a simulation-based treatment of concurrent A-BA protocols, such as Ben-Or and El-Yaniv’s [12], but the search for building blocks, in particular of an optimally resilient asynchronous OCC protocol became a bit of a “detective story,” as many references pointed to an unpublished manuscript by Feldman [41], which was nowhere to be found. We thank Michael Ben-Or for providing it to us, which corroborated its in-existence.

Ran Cohen’s research is supported in part by NSF grant no. 2055568. Juan Garay’s research is supported in part by NSF grants no. 2001082 and 2055694. Vassilis Zikas’s research is supported in part by NSF grant no. 2055599 and by Sunday Group. The authors were also supported by the Algorand Centres of Excellence programme managed by Algorand Foundation. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of Algorand Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ran Cohen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cohen, R., Forghani, P., Garay, J., Patel, R., Zikas, V. (2023). Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited. In: Rothblum, G., Wee, H. (eds) Theory of Cryptography. TCC 2023. Lecture Notes in Computer Science, vol 14372. Springer, Cham. https://doi.org/10.1007/978-3-031-48624-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-48624-1_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-48623-4

  • Online ISBN: 978-3-031-48624-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics