On expected constant-round protocols for Byzantine agreement
Title | On expected constant-round protocols for Byzantine agreement |
Publication Type | Journal Articles |
Year of Publication | 2009 |
Authors | Katz J, Koo C-Y |
Journal | Journal of Computer and System Sciences |
Volume | 75 |
Issue | 2 |
Pagination | 91 - 112 |
Date Published | 2009/02// |
ISBN Number | 0022-0000 |
Keywords | broadcast, cryptography, Distributed computing, secure computation |
Abstract | In a seminal paper, Feldman and Micali show an n-party Byzantine agreement protocol in the plain model that tolerates t < n / 3 malicious parties and runs in expected constant rounds. Here, resolving a question that had been open since their work, we show an expected constant-round protocol for authenticated Byzantine agreement assuming honest majority (i.e., t < n / 2 ), and relying only on the existence of signature schemes and a public-key infrastructure. Combined with existing results, this gives the first expected constant-round protocol for secure computation with honest majority in a point-to-point network under the same assumptions. Our key technical tool — a new primitive we introduce called moderated VSS — also yields a simpler proof of the Feldman–Micali result.In addition, we show a simple technique for sequential composition of Byzantine agreement protocols that do not achieve simultaneous termination, something that is inherent for protocols using o ( t ) rounds. |
URL | http://www.sciencedirect.com/science/article/pii/S0022000008000718 |
DOI | 10.1016/j.jcss.2008.08.001 |