Communication lower bounds for cryptographic broadcast protocols

被引:0
|
作者
Blum, Erica [1 ]
Boyle, Elette [2 ,3 ]
Cohen, Ran [2 ]
Liu-Zhang, Chen-Da [4 ,5 ]
机构
[1] Reed Coll, Dept Comp Sci, Portland, OR 97202 USA
[2] Reichman Univ, Efi Arazi Sch Comp Sci, Herzliyya, Israel
[3] NTT Res, Sunnyvale, CA 94085 USA
[4] Lucerne Univ Appl Sci & Arts, Sch Comp Sci & Informat Technol, Rotkreuz, Switzerland
[5] Web3 Fdn, Zug, Switzerland
关键词
Broadcast; Communication complexity; Lower bounds; BYZANTINE; CONSENSUS; AGREEMENT;
D O I
10.1007/s00446-024-00473-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Broadcast protocols enable a set of n parties to agree on the input of a designated sender, even facing attacks by malicious parties. In the honest-majority setting, randomization and cryptography were harnessed to achieve low-communication broadcast with sub-quadratic total communication and balanced sub-linear cost per party. However, comparatively little is known in the dishonest-majority setting. Here, the most communication-efficient constructions are based on Dolev and Strong (SICOMP '83), and sub-quadratic broadcast has not been achieved. On the other hand, the only nontrivial omega(n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\omega (n)$$\end{document} communication lower bounds are restricted to deterministic protocols, or against strong adaptive adversaries that can perform "after the fact" removal of messages. We provide new communication lower bounds in this space, which hold against arbitrary cryptography and setup assumptions, as well as a simple sub-quadratic broadcast protocol showing near tightness of our first bound.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 50 条
  • [1] Communication lower bounds for cryptographic broadcast protocolsCommunication lower bounds for cryptographic broadcast protocolsE. Blum et al.
    Erica Blum
    Elette Boyle
    Ran Cohen
    Chen-Da Liu-Zhang
    Distributed Computing, 2025, 38 (1) : 1 - 17
  • [2] New Lower Bounds for Privacy in Communication Protocols
    Kerenidis, Iordanis
    Lauriere, Mathieu
    Xiao, David
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 69 - 89
  • [3] Upper and lower bounds for deterministic broadcast in powerline communication networks
    Pignolet, Yvonne Anne
    Schmid, Stefan
    Tredan, Gilles
    DISTRIBUTED COMPUTING, 2016, 29 (04) : 239 - 250
  • [4] Upper and lower bounds for deterministic broadcast in powerline communication networks
    Yvonne Anne Pignolet
    Stefan Schmid
    Gilles Tredan
    Distributed Computing, 2016, 29 : 239 - 250
  • [5] A Symbolic Logic with Exact Bounds for Cryptographic Protocols
    Mitchell, John C.
    LOGIC, LANGUAGE, INFORMATION AND COMPUTATION, WOLLIC 2011, 2011, 6642 : 3 - 3
  • [6] Lower Bounds on Average-Case Delay for Video-on-Demand Broadcast Protocols
    Tseng, Wei-Lung Dustin
    Kirkpatrick, David
    PROCEEDINGS OF THE EIGHTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2007, : 834 - 842
  • [7] Lower bounds for the noisy broadcast problem
    Goyal, Navin
    Kindler, Guy
    Saks, Michael
    SIAM JOURNAL ON COMPUTING, 2008, 37 (06) : 1806 - 1841
  • [8] New Lower Bounds on Broadcast Function
    Grigoryan, Hayk
    Harutyunyan, Hovhannes A.
    ALGORITHMIC ASPECTS IN INFORMATION AND MANAGEMENT, AAIM 2014, 2014, 8546 : 174 - 184
  • [9] Threshold circuit lower bounds on cryptographic functions
    Kiltz, E
    Simon, HU
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2005, 71 (02) : 185 - 212
  • [10] Lower bounds on the efficiency of generic cryptographic constructions
    Gennaro, R
    Trevisan, L
    41ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2000, : 305 - 313