A Lower Bound for Byzantine Agreement and Consensus for Adaptive Adversaries using VDFs

04/04/2020
by   Thaddeus Dryja, et al.
0

Large scale cryptocurrencies require the participation of millions of participants and support economic activity of billions of dollars, which has led to new lines of work in binary Byzantine Agreement (BBA) and consensus. The new work aims to achieve communication-efficiency—given such a large n, not everyone can speak during the protocol. Several protocols have achieved consensus with communication-efficiency, even under an adaptive adversary, but they require additional strong assumptions—proof-of-work, memory-erasure, etc. All of these protocols use multicast: every honest replica multicasts messages to all other replicas. Under this model, we provide a new communication-efficient consensus protocol using Verifiable Delay Functions (VDFs) that is secure against adaptive adversaries and does not require the same strong assumptions present in other protocols. A natural question is whether we can extend the synchronous protocols to the partially synchronous setting—in this work, we show that using multicast, we cannot. Furthermore, we cannot achieve always safe communication-efficient protocols (that maintain safety with probability 1) even in the synchronous setting against a static adversary when honest replicas only choose to multicast its messages. Considering these impossibility results, we describe a new communication-efficient BBA protocol in a modified partially synchronous network model which is secure against adaptive adversaries with high probability.

READ FULL TEXT

page 14

page 21

page 23

page 32

page 34

research
05/09/2018

Communication-Efficient Byzantine Agreement without Erasures

Byzantine agreement (BA) is one of the most fundamental building blocks ...
research
01/12/2023

Consensus in the Unknown-Participation Message-Adversary Model

We propose a new model that resembles Algorand's mechanism that selects ...
research
09/26/2018

Dissecting Tendermint

In this paper we analyze Tendermint proposed in [7], one of the most pop...
research
08/12/2022

Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries

In this work, we study perfectly-secure multi-party computation (MPC) ag...
research
03/04/2020

Que Sera Consensus: Simple Asynchronous Agreement with Private Coins and Threshold Logical Clocks

It is commonly held that asynchronous consensus is much more complex, di...
research
11/24/2021

Securing Proof-of-Stake Nakamoto Consensus Under Bandwidth Constraint

Satoshi Nakamoto's Proof-of-Work (PoW) longest chain (LC) protocol was a...
research
02/16/2022

Blockchain Security when Messages are Lost

Security analyses for consensus protocols in blockchain research have pr...

Please sign up or login with your details

Forgot password? Click here to reset