Efficient Byzantine agreement secure against general adversaries - (Extended abstract)

被引:0
|
作者
Fitzi, M [1 ]
Maurer, U [1 ]
机构
[1] Swiss Fed Inst Technol, Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
来源
DISTRIBUTED COMPUTING | 1998年 / 1499卷
关键词
broadcast; Byzantine agreement; general adversary; multiparty computation; fault detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents protocols for Byzantine agreement, i.e. for reliable broadcast, among a set of n players, some of which may be controlled by an adversary. It is well-known that Byzantine agreement is possible if and only if the number of cheaters is less than n/3. In this paper we consider a general adversary that is specified by a set of subsets of the player set (the adversary structure), and any one of these subsets may be corrupted by the adversary. The only condition we need is that no three of these subsets cover the full player set. A result of Hirt and Maurer implies that this condition is necessary and sufficient for the existence of a Byzantine agreement protocol, but the complexity of their protocols is generally exponential in the number of players. The purpose of this paper is to present the first protocol with polynomial message and computation complexity for any (even exponentially large) specification of the adversary structure. This closes a gap in a recent result of Cramer, Damgard and Maurer on applying span programs to secure multi-party computation.
引用
收藏
页码:134 / 148
页数:15
相关论文
共 50 条
  • [1] Byzantine agreement secure against general adversaries in the dual failure model
    Altmann, B
    Fitzi, M
    Maurer, U
    [J]. DISTRIBUTED COMPUTING, 1999, 1693 : 123 - 137
  • [2] Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)
    Choudhury, Ashish
    Pappu, Nikhil
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 786 - 809
  • [3] Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience
    Choudhury, Ashish
    [J]. PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2023, 2023, : 167 - 176
  • [5] An efficient test for the possibility of information-theoretic key agreement secure against active adversaries
    Wolf, S
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 17 - 17
  • [6] Broadcast from Minicast Secure Against General Adversaries
    Raykov, Pavel
    [J]. AUTOMATA, LANGUAGES, AND PROGRAMMING, PT II, 2015, 9135 : 701 - 712
  • [7] Efficient Adaptively-Secure Byzantine Agreement for Long Messages
    Bhangale, Amey
    Liu-Zhang, Chen-Da
    Loss, Julian
    Nayak, Kartik
    [J]. ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 504 - 525
  • [8] Efficient and short certificateless signatures secure against realistic adversaries
    Raylin Tso
    Xun Yi
    Xinyi Huang
    [J]. The Journal of Supercomputing, 2011, 55 : 173 - 191
  • [9] Efficient and short certificateless signatures secure against realistic adversaries
    Tso, Raylin
    Yi, Xun
    Huang, Xinyi
    [J]. JOURNAL OF SUPERCOMPUTING, 2011, 55 (02): : 173 - 191
  • [10] An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries
    Daniel, Renu Mary
    Rajsingh, Elijah Blessing
    Silas, Salaja
    [J]. INFORMATION AND COMPUTATION, 2020, 275 (275)