On the round complexity of randomized Byzantine agreement
From MaRDI portal
Publication:2121502
Abstract: We prove lower bounds on the round complexity of randomized Byzantine agreement (BA) protocols, bounding the halting probability of such protocols after one and two rounds. In particular, we prove that: (1) BA protocols resilient against [resp., ] corruptions terminate (under attack) at the end of the first round with probability at most [resp., ]. (2) BA protocols resilient against a fraction of corruptions greater than terminate at the end of the second round with probability at most . (3) For a large class of protocols (including all BA protocols used in practice) and under a plausible combinatorial conjecture, BA protocols resilient against a fraction of corruptions greater than [resp., ] terminate at the end of the second round with probability at most [resp., ]. The above bounds hold even when the parties use a trusted setup phase, e.g., a public-key infrastructure (PKI). The third bound essentially matches the recent protocol of Micali (ITCS'17) that tolerates up to corruptions and terminates at the end of the third round with constant probability.
Recommendations
- On the round complexity of randomized Byzantine agreement
- On the round complexity of Byzantine agreement without initial set-up
- An O (log n ) expected rounds randomized byzantine generals protocol
- Round-optimal Byzantine agreement
- On expected constant-round protocols for Byzantine agreement
- On Expected Constant-Round Protocols for Byzantine Agreement
- Byzantine agreement in the full-information model in \(O(\log n)\) rounds
- Byzantine agreement in polynomial expected time (extended abstract)
- Byzantine Agreement in Expected Polynomial Time
Cites work
- scientific article; zbMATH DE number 5764832 (Why is no real title available?)
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 1304079 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A lower bound for the time to assure interactive consistency
- A tight lower bound for randomized synchronous consensus
- Adaptively secure coin-flipping, revisited
- An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement
- Analysis of Boolean Functions
- Authenticated Algorithms for Byzantine Agreement
- Automatically increasing the fault-tolerance of distributed algorithms
- Boolean functions with low average sensitivity depend on few coordinates
- Byzantine agreement in polynomial expected time (extended abstract)
- Byzantine agreement in the full-information model in \(O(\log n)\) rounds
- Communication Complexity of Byzantine Agreement, Revisited
- Early stopping in Byzantine agreement
- Easy impossibility proofs for distributed consensus problems
- Efficient player-optimal protocols for strong and differential consensus
- Fault-tolerant Computation in the Full Information Model
- Fully polynomial Byzantine agreement in t + 1 rounds
- Hybrid consensus: efficient consensus in the permissionless model
- Lower bounds for randomized consensus under a weak adversary
- New techniques for noninteractive zero-knowledge
- Non-interactive correlation distillation, inhomogeneous Markov chains, and the reverse Bonami-Beckner inequality
- On Expected Constant-Round Protocols for Byzantine Agreement
- On reverse hypercontractivity
- On the Number of Synchronous Rounds Sufficient for Authenticated Byzantine Agreement
- On the composition of authenticated Byzantine Agreement
- On the round complexity of randomized Byzantine agreement
- Probabilistic Termination and Composability of Cryptographic Protocols
- Reaching Agreement in the Presence of Faults
- Round-preserving parallel composition of probabilistic-termination cryptographic protocols
- Simple constant-time consensus protocols in realistic failure models
- Synchronous Byzantine agreement with expected \(O(1)\) rounds, expected \(O(n^2)\) communication, and optimal resilience
- The Byzantine Generals Problem
- The contest between simplicity and efficiency in asynchronous Byzantine agreement
- Thunderella: blockchains with optimistic instant confirmation
- Tight bounds for asynchronous randomized consensus
- Unconditional Byzantine agreement for any number of faulty processors (extended abstract)
- Verifiable random functions from standard assumptions
Cited in
(12)- Byzantine Agreement in Expected Polynomial Time
- From Almost Everywhere to Everywhere: Byzantine Agreement with $\tilde{O}(n^{3/2})$ Bits
- A tradeoff between safety and liveness for randomized coordinated attack protocols
- Concurrent asynchronous Byzantine agreement in expected-constant rounds, revisited
- Fully Polynomial Byzantine Agreement for n > 3t Processors in t + 1 Rounds
- On the round complexity of randomized Byzantine agreement
- Sublinear-round Byzantine agreement under corrupt majority
- Round-optimal Byzantine agreement
- The best of both worlds: Guaranteeing termination in fast randomized Byzantine agreement protocols
- Byzantine agreement in the full-information model in \(O(\log n)\) rounds
- Round efficient Byzantine agreement from VDFs
- How Byzantine is a send corruption?
This page was built for publication: On the round complexity of randomized Byzantine agreement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2121502)