Asynchronous Byzantine Agreement with Subquadratic ......[CKS20]: Shir Cohen, Idit Keidar, and...

Preview:

Citation preview

Asynchronous Byzantine Agreement with Subquadratic Communication

Julian Loss

U. Maryland

Chen-Da Liu-Zhang

ETH Zurich

Erica

Blum

U. Maryland

TCC 2020

Jonathan

Katz

U. Maryland

Byzantine Agreement

Byzantine Agreement

π‘₯1

π‘₯2

π‘₯3

π‘₯6

π‘₯5

π‘₯4

Byzantine Agreement

All honest parties agree on the same output

𝑦

𝑦

𝑦

𝑦

𝑦

𝑦

Byzantine Agreement

All honest parties agree on the same output

If honest parties have the same input, they keep the same value as output

π‘₯

π‘₯

π‘₯

π‘₯

π‘₯

π‘₯

Byzantine Agreement

All honest parties agree on the same output

If honest parties have the same input, they keep the same value as output

π‘₯

π‘₯

π‘₯

π‘₯

π‘₯

π‘₯

Byzantine Agreement

All honest parties agree on the same output

If honest parties have the same input, they keep the same value as output

π‘₯

π‘₯

π‘₯

π‘₯

Is there an asynchronous BA with π‘œ(𝑛2) communication that tolerates πœƒ(𝑛) adaptive corruptions?

Is there an asynchronous BA with π‘œ(𝑛2) communication that tolerates πœƒ(𝑛) adaptive corruptions?

β€’ Feasibility of asynch. π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 using a trusted dealer(alternately, with amortized π‘œ(𝑛2) and without setup)

Is there an asynchronous BA with π‘œ(𝑛2) communication that tolerates πœƒ(𝑛) adaptive corruptions?

β€’ Feasibility of asynch. π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 using a trusted dealer(alternately, with amortized π‘œ(𝑛2) and without setup)

β€’ Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) corruptions without setup

Related Work

Most previous subquadratic BA are synchronous or partially synchronous [KS06,KS10,M17,A+19,…]

Recent work by Cohen et al. [CKS20] give subquadratic asynchronous BA, but the adversary has restricted scheduling power

Feasibility of asynchronous π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 adaptive

Feasibility of asynchronous π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 adaptive

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝐡𝐴

Feasibility of asynchronous π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 adaptive

CC: 𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝐡𝐴

Size: 𝑂 π‘π‘œπ‘™π‘¦ πœ…

Feasibility of asynchronous π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 adaptive

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝑀𝑃𝐢

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝐡𝐴

CC: 𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

Size: 𝑂 π‘π‘œπ‘™π‘¦ πœ…

Feasibility of asynchronous π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 adaptive

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝑀𝑃𝐢

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝐡𝐴

CC: 𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

Size: 𝑂 π‘π‘œπ‘™π‘¦ πœ…

Initial dealer

Feasibility of asynchronous π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 adaptive

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝑀𝑃𝐢

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝐡𝐴

CC: 𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

Size: 𝑂 π‘π‘œπ‘™π‘¦ πœ…

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

Initial dealer

Feasibility of asynchronous π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 adaptive

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝑀𝑃𝐢

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝐡𝐴

CC: 𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

Size: 𝑂 π‘π‘œπ‘™π‘¦ πœ…

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

𝑂 π‘π‘œπ‘™π‘¦ πœ…

Initial dealer

Feasibility of asynchronous π‘œ(𝑛2) BA for 𝑓 < (1 βˆ’ πœ–) ΀𝑛 3 adaptive

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝑀𝑃𝐢

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝐡𝐴

CC: 𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

Size: 𝑂 π‘π‘œπ‘™π‘¦ πœ…

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

𝑂 π‘π‘œπ‘™π‘¦ πœ…

Initial dealer

𝑀𝑃𝐢𝐡𝐴

…

One-Time BA

𝐺𝐢

πΆπ‘œπ‘–π‘›

𝐺𝐢

πΆπ‘œπ‘–π‘›

Graded Consensus [CR93]Input π‘₯𝑖; Output (𝑧𝑖 , 𝑔𝑖)

If βˆ€ honest 𝑃𝑖 π‘₯𝑖 = π‘₯, then 𝑧𝑖 , 𝑔𝑖 = (π‘₯, 1)If βˆƒ honest 𝑃𝑖 𝑔𝑖 = 1, then 𝑧𝑗 = 𝑧𝑖

One-Time BA

𝐺𝐢

πΆπ‘œπ‘–π‘›

Graded Consensus [CR93]Input π‘₯𝑖; Output (𝑧𝑖 , 𝑔𝑖)

If βˆ€ honest 𝑃𝑖 π‘₯𝑖 = π‘₯, then 𝑧𝑖 , 𝑔𝑖 = (π‘₯, 1)If βˆƒ honest 𝑃𝑖 𝑔𝑖 = 1, then 𝑧𝑗 = 𝑧𝑖

Coin-FlipEach 𝑃𝑖 obtains the same random bit 𝑐𝑖

One-Time BA

𝐺𝐢

πΆπ‘œπ‘–π‘›

Graded Consensus [CR93]Input π‘₯𝑖; Output (𝑧𝑖 , 𝑔𝑖)

If βˆ€ honest 𝑃𝑖 π‘₯𝑖 = π‘₯, then 𝑧𝑖 , 𝑔𝑖 = (π‘₯, 1)If βˆƒ honest 𝑃𝑖 𝑔𝑖 = 1, then 𝑧𝑗 = 𝑧𝑖

Coin-FlipEach 𝑃𝑖 obtains the same random bit 𝑐𝑖

≀ 𝑂(πœ…)

If 𝑔𝑖 = 0: π‘₯𝑖 = 𝑐𝑖Else π‘₯𝑖 = 𝑧𝑖

One-Time BA

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝐺𝐢

πΆπ‘œπ‘–π‘›

≀ 𝑂(πœ…)

Graded Consensus [CR93]Input π‘₯𝑖; Output (𝑧𝑖 , 𝑔𝑖)

If βˆ€ honest 𝑃𝑖 π‘₯𝑖 = π‘₯, then 𝑧𝑖 , 𝑔𝑖 = (π‘₯, 1)If βˆƒ honest 𝑃𝑖 𝑔𝑖 = 1, then 𝑧𝑗 = 𝑧𝑖

Coin-FlipEach 𝑃𝑖 obtains the same random bit 𝑐𝑖

πœ… πœ… πœ…

Each party in set can prove membership

πœ…

Each party in set has a (signed) share of 𝑐𝑖

πœ… πœ… πœ…

One-Time BA

If 𝑔𝑖 = 0: π‘₯𝑖 = 𝑐𝑖Else π‘₯𝑖 = 𝑧𝑖

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝐺𝐢

πΆπ‘œπ‘–π‘›

≀ 𝑂(πœ…)

Graded Consensus [CR93]Input π‘₯𝑖; Output (𝑧𝑖 , 𝑔𝑖)

If βˆ€ honest 𝑃𝑖 π‘₯𝑖 = π‘₯, then 𝑧𝑖 , 𝑔𝑖 = (π‘₯, 1)If βˆƒ honest 𝑃𝑖 𝑔𝑖 = 1, then 𝑧𝑗 = 𝑧𝑖

Coin-FlipEach 𝑃𝑖 obtains the same random bit 𝑐𝑖

Communication 𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

Setup size 𝑂 π‘π‘œπ‘™π‘¦ πœ…

πœ… πœ… πœ…

Each party in set can prove membership

πœ…

Each party in set has a (signed) share of 𝑐𝑖

πœ… πœ… πœ…

One-Time BA

If 𝑔𝑖 = 0: π‘₯𝑖 = 𝑐𝑖Else π‘₯𝑖 = 𝑧𝑖

MPC

MPC

Multi-Party Computation with β„“-output quality

π‘₯1

π‘₯2

π‘₯3

π‘₯6

π‘₯5

π‘₯4

MPC

Multi-Party Computation with β„“-output quality

𝑔(π‘₯1β€² , π‘₯2

β€² , … , π‘₯𝑛′ ), where π‘₯𝑖

β€² = π‘₯𝑖 if 𝑃𝑖 ∈ 𝑆π‘₯𝑖′ =βŠ₯ otherwise

Adversary chooses 𝑆 with size at least β„“

π‘₯1

π‘₯2

π‘₯3

π‘₯6

π‘₯5

π‘₯4

MPC

Agreement on a Common Subset with β„“-output quality

𝐴𝐢𝑆

π‘₯1π‘₯2

π‘₯3π‘₯4

π‘₯𝑛

𝑆 β‰₯ β„“ with β„“ βˆ’ 𝑓 honest inputs

𝑆

…

MPC

Agreement on a Common Subset with β„“-output quality

𝐴𝐢𝑆

π‘₯1π‘₯2

π‘₯3π‘₯4

…

π‘₯𝑛

𝑆

𝑆 β‰₯ β„“ with β„“ βˆ’ 𝑓 honest inputs

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝 𝐡𝐴 𝑆𝑒𝑑𝑒𝑝…

𝐡𝐴 𝑆𝑒𝑑𝑒𝑝

𝑂(β„“)

Communication 𝑂 β„“ β‹… ℐ β‹… π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

Setup size 𝑂 β„“ β‹… π‘π‘œπ‘™π‘¦ πœ…

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝

MPCThreshold Fully Homomorphic Encryption

MPCThreshold Fully Homomorphic Encryption

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝

MPCThreshold Fully Homomorphic Encryption

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝 πœ…

MPCThreshold Fully Homomorphic Encryption

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝 πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

MPCThreshold Fully Homomorphic Encryption

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝 [π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

MPC

𝑦𝑔

Threshold Fully Homomorphic Encryption

π‘₯1

π‘₯2

π‘₯3

π‘₯4…

π‘₯𝑛

π‘Ÿ

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝 [π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

MPCThreshold Fully Homomorphic Encryption

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝 [π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

[π‘₯1]

[π‘₯2]

[π‘₯3]

[π‘₯4]

…

[π‘₯𝑛]

𝑆𝐴𝐢𝑆

MPC

π‘πΈπ‘£π‘Žπ‘™π‘”

Threshold Fully Homomorphic Encryption

𝐴𝐢𝑆

[π‘₯1]

[π‘₯2]

[π‘₯3]

[π‘₯4]

…

[π‘₯𝑛]

𝑆

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝

[π‘₯1]

βŠ₯

[π‘₯3]

βŠ₯

[π‘₯𝑛]

[π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

…

MPC

π‘πΈπ‘£π‘Žπ‘™π‘”

Threshold Fully Homomorphic Encryption

𝐴𝐢𝑆

[π‘₯1]

[π‘₯2]

[π‘₯3]

[π‘₯4]

…

[π‘₯𝑛]

𝑆

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝

[π‘₯1]

βŠ₯

[π‘₯3]

βŠ₯

[π‘₯𝑛]

[π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

Decryption

𝑑𝑗 = π·π‘’π‘π‘†β„Žπ‘Žπ‘Ÿπ‘’π‘‘π‘˜π‘–(𝑐)

𝑑𝑗

𝑃1

𝑃𝑛

……

MPC

π‘πΈπ‘£π‘Žπ‘™π‘”

Threshold Fully Homomorphic Encryption

𝐴𝐢𝑆

[π‘₯1]

[π‘₯2]

[π‘₯3]

[π‘₯4]

…

[π‘₯𝑛]

𝑆

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝

[π‘₯1]

βŠ₯

[π‘₯3]

βŠ₯

[π‘₯𝑛]

[π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

Decryption

𝑑𝑗 = π·π‘’π‘π‘†β„Žπ‘Žπ‘Ÿπ‘’π‘‘π‘˜π‘–(𝑐)

𝑑𝑗

𝑃1

𝑃𝑛

…

𝑦 = 𝑅𝑒𝑐({𝑑𝑗})

All parties output

…

MPC

π‘πΈπ‘£π‘Žπ‘™π‘”

Threshold Fully Homomorphic Encryption

𝐴𝐢𝑆

[π‘₯1]

[π‘₯2]

[π‘₯3]

[π‘₯4]

…

[π‘₯𝑛]

𝑆

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

𝐴𝐢𝑆 𝑆𝑒𝑑𝑒𝑝

[π‘₯1]

βŠ₯

[π‘₯3]

βŠ₯

[π‘₯𝑛]

[π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

Size: 𝑂 (β„“ + 1) β‹… π‘π‘œπ‘™π‘¦ πœ…

Decryption

𝑑𝑗 = π·π‘’π‘π‘†β„Žπ‘Žπ‘Ÿπ‘’π‘‘π‘˜π‘–(𝑐)

𝑑𝑗

𝑃1

𝑃𝑛

…

𝑦 = 𝑅𝑒𝑐({𝑑𝑗})

All parties output

CC: 𝑂 β„“ + 1 β‹… ℐ + π’ͺ β‹… π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

…

MPC for Trusted Dealer

π‘πΈπ‘£π‘Žπ‘™π‘”

Threshold Fully Homomorphic Encryption

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

[π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

Size: 𝑂 (β„“ + 1) β‹… π‘π‘œπ‘™π‘¦ πœ…

Decryption

𝑑𝑗 = π·π‘’π‘π‘†β„Žπ‘Žπ‘Ÿπ‘’π‘‘π‘˜π‘–(𝑐)

𝑑𝑗

𝑃1

𝑃𝑛

…

𝑦 = 𝑅𝑒𝑐({𝑑𝑗})

All parties output

CC: 𝑂 β„“ + 1 β‹… ℐ + π’ͺ β‹… π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

MPC for Trusted Dealer

π‘πΈπ‘£π‘Žπ‘™π‘”

Threshold Fully Homomorphic Encryption

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

[π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

Size: 𝑂 π‘π‘œπ‘™π‘¦ πœ…

Decryption

𝑑𝑗 = π·π‘’π‘π‘†β„Žπ‘Žπ‘Ÿπ‘’π‘‘π‘˜π‘–(𝑐)

𝑑𝑗

𝑃1

𝑃𝑛

…

𝑦 = 𝑅𝑒𝑐({𝑑𝑗})

All parties output

CC: 𝑂 β„“ + 1 β‹… ℐ + π’ͺ β‹… π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

MPC for Trusted Dealer

π‘πΈπ‘£π‘Žπ‘™π‘”

Threshold Fully Homomorphic Encryption

𝑀𝑃𝐢 𝑆𝑒𝑑𝑒𝑝

[π‘Ÿ] πœ…π‘’π‘˜ π‘‘π‘˜1, … , π‘‘π‘˜πœ… for parties in

Size: 𝑂 π‘π‘œπ‘™π‘¦ πœ…

Decryption

𝑑𝑗 = π·π‘’π‘π‘†β„Žπ‘Žπ‘Ÿπ‘’π‘‘π‘˜π‘–(𝑐)

𝑑𝑗

𝑃1

𝑃𝑛

…

𝑦 = 𝑅𝑒𝑐({𝑑𝑗})

All parties output

CC: 𝑂 π‘π‘œπ‘™π‘¦ πœ… β‹… 𝑛

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

Other lower bounds:

[DR85, A+19] adversary can perform after-the-fact removal

[R20] similar to our lower bound, but with idealized PKI

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

𝑃𝑆

𝑆′

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

Impossibility of asynch. π‘œ(𝑛2) BA with πœƒ(𝑛) adaptive corruptions and no setup

𝑃𝑆

𝑆′

βˆ€π‘ƒπ‘– has input 1𝑃 outputs 1

βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

𝑆

𝑆′

𝑃𝑆

𝑆′

𝑃 has input 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ has input 0𝑃 outputs 1; βˆ€π‘ƒπ‘– ∈ 𝑆′ outputs 0

References and CreditsFull version: https://eprint.iacr.org/2020/851

References:[BKLL20]: Ran Canetti and Tal Rabin. Fast asynchronous Byzantine agreement with optimal resilience. STOC 1993.[DR85]: Danny Dolev and RΓΌdiger Reischuk. Bounds on information exchange for Byzantine agreement. Journal of the

ACM 1985.[KS06]: Valerie King, Jared Saia, Vishal Sanwalani, and Erik Vee. Scalable leader election. SODA 2006.[KS10]: Valerie King and Jared Saia. Breaking the 𝑂(𝑛2) bit barrier: scalable byzantine agreement with an adaptive

adversary. PODC 2010.[M17]: Silvio Micali. Very simple and efficient byzantine agreement. ITCS 2017.[A+19]: Ittai Abraham, T.-H. Hubert Chan, Danny Dolev, Kartik Nayak, Rafael Pass, Ling Ren, and Elaine Shi. Communication

complexity of byzantine agreement, revisited. PODC 2019.[CKS20]: Shir Cohen, Idit Keidar, and Alexander Spiegelman. Not a COINcidence: Sub-quadratic asynchronous Byzantine

agreement WHP. DISC 2020.[R20]: Matthieu Rambaud. Lower bounds for authenticated randomized Byzantine consensus under (partial)

synchrony: The limits of standalone digital signatures.

Credits:Icons: https://www.flaticon.com/

Recommended