Communication lower bounds for cryptographic broadcast protocols

被引:0
|
作者
Blum, Erica [1 ]
Boyle, Elette [2 ,3 ]
Cohen, Ran [2 ]
Liu-Zhang, Chen-Da [4 ,5 ]
机构
[1] Reed Coll, Dept Comp Sci, Portland, OR 97202 USA
[2] Reichman Univ, Efi Arazi Sch Comp Sci, Herzliyya, Israel
[3] NTT Res, Sunnyvale, CA 94085 USA
[4] Lucerne Univ Appl Sci & Arts, Sch Comp Sci & Informat Technol, Rotkreuz, Switzerland
[5] Web3 Fdn, Zug, Switzerland
关键词
Broadcast; Communication complexity; Lower bounds; BYZANTINE; CONSENSUS; AGREEMENT;
D O I
10.1007/s00446-024-00473-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Broadcast protocols enable a set of n parties to agree on the input of a designated sender, even facing attacks by malicious parties. In the honest-majority setting, randomization and cryptography were harnessed to achieve low-communication broadcast with sub-quadratic total communication and balanced sub-linear cost per party. However, comparatively little is known in the dishonest-majority setting. Here, the most communication-efficient constructions are based on Dolev and Strong (SICOMP '83), and sub-quadratic broadcast has not been achieved. On the other hand, the only nontrivial omega(n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\omega (n)$$\end{document} communication lower bounds are restricted to deterministic protocols, or against strong adaptive adversaries that can perform "after the fact" removal of messages. We provide new communication lower bounds in this space, which hold against arbitrary cryptography and setup assumptions, as well as a simple sub-quadratic broadcast protocol showing near tightness of our first bound.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 50 条
  • [31] Lower bounds for Subset Cover based Broadcast Encryption
    Austrin, Per
    Kreitz, Gunnar
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 343 - +
  • [32] Lower bounds for the noisy broadcast problem - Extended abstract
    Goyal, N
    Kindler, G
    Saks, M
    46TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2005, : 40 - 49
  • [33] Quantum communication attacks on classical cryptographic protocols: (invited talk)
    Damgård, Ivan
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6673 LNCS
  • [34] LOWER BOUNDS ON COMMUNICATION OVERLAP OF NETWORKS
    HONG, JW
    ZUO, Q
    THEORETICAL COMPUTER SCIENCE, 1986, 47 (03) : 323 - 328
  • [35] Lower bounds for quantum communication complexity
    Klauck, H
    42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 288 - 297
  • [36] Lower bounds on the multiparty communication complexity
    Duris, P
    Rolim, JDP
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1998, 56 (01) : 90 - 95
  • [37] Communication complexity lower bounds by polynomials
    Buhrman, H
    de Wolf, R
    16TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2000, : 120 - 130
  • [38] Lower bounds for quantum communication complexity
    Klauck, Hartmut
    SIAM JOURNAL ON COMPUTING, 2007, 37 (01) : 20 - 46
  • [39] HARDNESS OF CONTINUOUS LOCAL SEARCH: QUERY COMPLEXITY AND CRYPTOGRAPHIC LOWER BOUNDS
    Hubacek, Pavel
    Yogev, Eylon
    SIAM JOURNAL ON COMPUTING, 2020, 49 (06) : 1128 - 1172
  • [40] Tight lower bounds on broadcast function for n=24 and 25
    Barsky, Georgy
    Grigoryan, Hayk
    Harutyunyan, Hovhannes. A.
    DISCRETE APPLIED MATHEMATICS, 2014, 175 : 109 - 114