On expected constant-round protocols for Byzantine agreement

TitleOn expected constant-round protocols for Byzantine agreement
Publication TypeJournal Articles
Year of Publication2009
AuthorsKatz J, Koo C-Y
JournalJournal of Computer and System Sciences
Volume75
Issue2
Pagination91 - 112
Date Published2009/02//
ISBN Number0022-0000
Keywordsbroadcast, cryptography, Distributed computing, secure computation
Abstract

In a seminal paper, Feldman and Micali show an n-party Byzantine agreement protocol in the plain model that tolerates t < n / 3 malicious parties and runs in expected constant rounds. Here, resolving a question that had been open since their work, we show an expected constant-round protocol for authenticated Byzantine agreement assuming honest majority (i.e., t < n / 2 ), and relying only on the existence of signature schemes and a public-key infrastructure. Combined with existing results, this gives the first expected constant-round protocol for secure computation with honest majority in a point-to-point network under the same assumptions. Our key technical tool — a new primitive we introduce called moderated VSS — also yields a simpler proof of the Feldman–Micali result.In addition, we show a simple technique for sequential composition of Byzantine agreement protocols that do not achieve simultaneous termination, something that is inherent for protocols using o ( t ) rounds.

URLhttp://www.sciencedirect.com/science/article/pii/S0022000008000718
DOI10.1016/j.jcss.2008.08.001