Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS

被引:0
|
作者
Asharov, Gilad [1 ]
Chandramouli, Anirudh [1 ]
机构
[1] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
关键词
Perfect Secure Computation; Broadcast; Byzantine Agreement; Verifiable Secret Sharing; MULTIPARTY; TERMINATION; AGREEMENT; SECURITY;
D O I
10.1007/978-3-031-58740-5_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study broadcast protocols in the information-theoretic model under optimal conditions, where the number of corruptions t is at most one-third of the parties, n. While worst-case Omega(n) round broadcast protocols are known to be impossible to achieve, protocols with an expected constant number of rounds have been demonstrated since the seminal work of Feldman and Micali [STOC'88]. Communication complexity for such protocols has gradually improved over the years, reaching O(nL) plus expected O(n(4) log n) for broadcasting a message of size L bits. This paper presents a perfectly secure broadcast protocol with expected constant rounds and communication complexity of O(nL) plus expected O(n(3) log(2) n) bits. In addition, we consider the problem of parallel broadcast, where n senders, each wish to broadcast a message of size L. We show a parallel broadcast protocol with expected constant rounds and communication complexity of O(n(2)L) plus expected O(n(3) log(2) n) bits. Our protocol is optimal (up to expectation) for messages of length L is an element of Omega(n log(2) n). Our main contribution is a framework for obtaining perfectly secure broadcast with an expected constant number of rounds from a statistically secure verifiable secret sharing. Moreover, we provide a new statistically secure verifiable secret sharing where the broadcast cost per participant is reduced from O(n log n) bits to only O(poly log n) bits. All our protocols are adaptively secure.
引用
收藏
页码:310 / 339
页数:30
相关论文
共 24 条
  • [1] Asymptotically Free Broadcast in Constant Expected Time via Packed VSS
    Abraham, Ittai
    Asharov, Gilad
    Patil, Shravani
    Patra, Arpita
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT I, 2022, 13747 : 384 - 414
  • [2] LOCATING FAULTS IN A CONSTANT NUMBER OF PARALLEL TESTING ROUNDS
    BEIGEL, R
    KOSARAJU, SR
    SULLIVAN, GF
    SPAA 89: PROCEEDINGS OF THE 1989 ACM SYMPOSIUM ON PARALLEL ALGORITHMS AND ARCHITECTURES, 1989, : 189 - 198
  • [3] Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited
    Cohen, Ran
    Forghani, Pouyan
    Garay, Juan
    Patel, Rutvik
    Zikas, Vassilis
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 422 - 451
  • [4] Expected Constant Round Byzantine Broadcast Under Dishonest Majority
    Wan, Jun
    Xiao, Hanshen
    Shi, Elaine
    Devadas, Srinivas
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT I, 2020, 12550 : 381 - 411
  • [5] Parallel Graph Algorithms in Constant Adaptive Rounds: Theory meets Practice
    Behnezhad, Soheil
    Dhulipala, Laxman
    Esfandiari, Hossein
    Lacki, Jakub
    Mirrokni, Vahab
    Schudy, Warren
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 13 (13): : 3588 - 3602
  • [6] PERFECT PARALLEL PARKING VIA PONTRYAGINS PRINCIPLE
    PATTEN, WN
    WU, HC
    CAI, W
    JOURNAL OF DYNAMIC SYSTEMS MEASUREMENT AND CONTROL-TRANSACTIONS OF THE ASME, 1994, 116 (04): : 723 - 728
  • [7] Perfect constant-round secure computation via perfect randomizing polynomials
    Ishai, Y
    Kushilevitz, E
    AUTOMATA, LANGUAGES AND PROGRAMMING, 2002, 2380 : 244 - 256
  • [8] Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security
    Ning, Chao
    Xu, Qiuliang
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 572 - 589
  • [9] The expected time to ruin in a risk process with constant barrier via martingales
    Frostig, E
    INSURANCE MATHEMATICS & ECONOMICS, 2005, 37 (02): : 216 - 228
  • [10] On perfect hashing of numbers with sparse digit representation via multiplication by a constant
    Monge, Maurizio
    DISCRETE APPLIED MATHEMATICS, 2011, 159 (11) : 1176 - 1179