skip to main content
10.1145/3571306.3571333acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience ✱

Published:04 January 2023Publication History

ABSTRACT

In this work, we present an almost-surely terminating asynchronous Byzantine agreement (ABA) protocol for n parties. Our protocol requires expected time and is secure against a computationally-unbounded malicious (Byzantine) adversary, characterized by a non-threshold adversary structure , which enumerates all possible subsets of potentially corrupt parties. Our protocol has optimal resilience where satisfies the condition; i.e. union of no three subsets from covers all the n parties. To the best of our knowledge, this is the first almost-surely terminating ABA protocol with condition. Previously, almost-surely terminating ABA protocol is known with non-optimal resilience where satisfies the condition; i.e. union of no four subsets from covers all the n parties. To design our protocol, we present a shunning asynchronous verifiable secret-sharing (SAVSS) scheme with condition, which is of independent interest.

References

  1. I. Abraham, D. Dolev, and J. Y. Halpern. 2008. An Almost-surely Terminating Polynomial Protocol for Asynchronous Byzantine Agreement with Optimal Resilience. In PODC. ACM, 405–414.Google ScholarGoogle Scholar
  2. I. Abraham, D. Dolev, and G. Stern. 2020. Revisiting Asynchronous Fault Tolerant Computation with Optimal Resilience. In PODC. ACM, 139–148.Google ScholarGoogle Scholar
  3. A. Appan, A. Chandramouli, and A. Choudhury. 2022. Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees. In PODC. ACM, 92–102.Google ScholarGoogle Scholar
  4. Hagit Attiya and Jennifer Welch. 2004. Distributed Computing: Fundamentals, Simulations, and Advanced Topics. Vol. 19. John Wiley & Sons.Google ScholarGoogle ScholarCross RefCross Ref
  5. L. Bangalore, A. Choudhury, and A. Patra. 2020. The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited. J. ACM 67, 3 (2020), 14:1–14:59.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Z. Beerliová-Trubíniováand M. Hirt. 2007. Simple and Efficient Perfectly-Secure Asynchronous MPC. In ASIACRYPT(LNCS, Vol. 4833). Springer Verlag, 376–392.Google ScholarGoogle Scholar
  7. M. Ben-Or. 1983. Another Advantage of Free Choice (Extended Abstract): Completely Asynchronous Agreement Protocols. In PODC. ACM, 27–30.Google ScholarGoogle Scholar
  8. M. Ben-Or, R. Canetti, and O. Goldreich. 1993. Asynchronous Secure Computation. In STOC. ACM, 52–61.Google ScholarGoogle Scholar
  9. M. Ben-Or, S. Goldwasser, and A. Wigderson. 1988. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In STOC. ACM, 1–10.Google ScholarGoogle Scholar
  10. M. Ben-Or, B. Kelmer, and T. Rabin. 1994. Asynchronous Secure Computations with Optimal Resilience (Extended Abstract). In PODC. ACM, 183–192.Google ScholarGoogle Scholar
  11. E. Blum, J. Katz, and J. Loss. 2019. Synchronous Consensus with Optimal Asynchronous Fallback Guarantees. In TCC(LNCS, Vol. 11891). Springer, 131–150.Google ScholarGoogle Scholar
  12. G. Bracha. 1984. An Asynchronous [(n-1)/3]-Resilient Consensus Protocol. In PODC. ACM, 154–162.Google ScholarGoogle Scholar
  13. R. Canetti. 1995. Studies in Secure Multiparty Computation and Applications. Ph. D. Dissertation. Weizmann Institute, Israel.Google ScholarGoogle Scholar
  14. R. Canetti and T. Rabin. 1993. Fast Asynchronous Byzantine Agreement with Optimal Resilience. In STOC. 42–51.Google ScholarGoogle Scholar
  15. B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. 1985. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. In FOCS. IEEE, 383–395.Google ScholarGoogle Scholar
  16. A. Choudhury. 2020. Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-party Computation. In INDOCRYPT(LNCS, Vol. 12578). Springer, 810–831.Google ScholarGoogle Scholar
  17. A. Choudhury. 2022. Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience. Cryptology ePrint Archive, Paper 2022/917.Google ScholarGoogle Scholar
  18. A. Choudhury and N. Pappu. 2020. Perfectly-Secure Asynchronous MPC for General Adversaries. In INDOCRYPT(LNCS, Vol. 12578). Springer, 786–809.Google ScholarGoogle Scholar
  19. A. Choudhury and A. Patra. 2017. An Efficient Framework for Unconditionally Secure Multiparty Computation. IEEE Trans. Information Theory 63, 1 (2017), 428–468.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Cramer, I. Damgård, and U. M. Maurer. 2000. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. In EUROCRYPT(LNCS, Vol. 1807). Springer Verlag, 316–334.Google ScholarGoogle ScholarCross RefCross Ref
  21. Paul Feldman and Silvio Micali. 1988. Optimal Algorithms for Byzantine Agreement. In STOC. ACM, 148–161.Google ScholarGoogle Scholar
  22. M. J. Fischer, N. A. Lynch, and M. Paterson. 1985. Impossibility of Distributed Consensus with One Faulty Process. J. ACM 32, 2 (1985), 374–382.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Matthias Fitzi. 2002. Generalized Communication and Security Models in Byzantine Agreement. Ph. D. Dissertation.Google ScholarGoogle Scholar
  24. M. Fitzi and U. M. Maurer. 1998. Efficient Byzantine Agreement Secure Against General Adversaries. In DISC(LNCS, Vol. 1499). Springer, 134–148.Google ScholarGoogle Scholar
  25. J. A. Garay and A. Kiayias. 2020. SoK: A Consensus Taxonomy in the Blockchain Era. In CT-RSA(LNCS, Vol. 12006). Springer, 284–318.Google ScholarGoogle Scholar
  26. Martin Hirt. 2001. Multi-Party Computation: Efficient Protocols, General Adversaries, and Voting. Ph. D. Dissertation. ETH Zurich.Google ScholarGoogle Scholar
  27. Martin Hirt and Ueli Maurer. 1997. Complete Characterization of Adversaries Tolerable in Secure Multi-Party Computation. In PODC. ACM, 25–34.Google ScholarGoogle Scholar
  28. M. Hirt and U. Maurer. 2000. Player Simulation and General Adversary Structures in Perfect Multiparty Computation. Journal of Cryptology 13, 1 (2000), 31–60.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. K. Kursawe. 2001. Distributed Trust. Ph. D. Dissertation. Saarland University.Google ScholarGoogle Scholar
  30. K. Kursawe and F. C. Freiling. 2005. Byzantine Fault Tolerance on General Hybrid Adversary Structures. Technical Report, RWTH Aachen.Google ScholarGoogle Scholar
  31. Nancy A Lynch. 1996. Distributed algorithms. Morgan Kaufmann.Google ScholarGoogle Scholar
  32. R. Shostak M. Pease and L. Lamport. 1980. Reaching Agreement in the Presence of Faults. Journal of the ACM (JACM) 27, 2 (1980), 228–234.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. U. M. Maurer. 2002. Secure Multi-party Computation Made Simple. In SCN(LNCS, Vol. 2576). Springer, 14–28.Google ScholarGoogle Scholar
  34. A. Patra, A. Choudhury, and C. Pandu Rangan. 2014. Asynchronous Byzantine Agreement with Optimal Resilience. Distributed Computing 27, 2 (2014), 111–146.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. A. Patra, A. Choudhury, and C. Pandu Rangan. 2015. Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation. J. Cryptology 28, 1 (2015), 49–109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. M. O. Rabin. 1983. Randomized Byzantine Generals. In FOCS. IEEE, 403–409.Google ScholarGoogle Scholar
  37. T. Rabin and M. Ben-Or. 1989. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract). In STOC. ACM, 73–85.Google ScholarGoogle Scholar
  38. C. Wang. 2015. Asynchronous Byzantine Agreement with Optimal Resilience and Linear Complexity. CoRR abs/1507.06165(2015).Google ScholarGoogle Scholar

Index Terms

  1. Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience ✱
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICDCN '23: Proceedings of the 24th International Conference on Distributed Computing and Networking
          January 2023
          461 pages
          ISBN:9781450397964
          DOI:10.1145/3571306

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 January 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format