[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/FOCS.2007.61guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Round Complexity of Authenticated Broadcast with a Dishonest Majority

Published: 21 October 2007 Publication History

Abstract

Broadcast among n parties in the presence of t \geqslant n/3 malicious parties is possible only with some additional setup. The most common setup considered is the existence of a PKI and secure digital signatures, where so-called authenticated broadcast is achievable for any t \le n. It is known that t + 1 rounds are necessary and sufficient for deterministic protocols achieving authenticated broadcast. Recently, however, randomized protocols running in expected constant rounds have been shown for the case of t \le n/2. It has remained open whether randomization can improve the round complexity when an honest majority is not present. We address this question and show upper/ lower bounds on how much randomization can help: For t \leqslant n/2 + k, we show a randomized broadcast protocol that runs in expected O(k^2 ) rounds. In particular, we obtain expected constant-round protocols for t = n/2 + O(1). On the negative side, we show that even randomized protocols require \Omega (2n/(n - t)) rounds. This in particular rules out expected constant-round protocols when the fraction of honest parties is sub-constant.

Cited By

View all
  • (2016)Broadcast Extensions with Optimal Communication and Round ComplexityProceedings of the 2016 ACM Symposium on Principles of Distributed Computing10.1145/2933057.2933082(371-380)Online publication date: 25-Jul-2016
  • (2016)Efficient Secure Multiparty Computation with Identifiable AbortProceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 998510.1007/978-3-662-53641-4_18(461-490)Online publication date: 31-Oct-2016
  • (2016)Network Oblivious TransferProceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 981510.1007/978-3-662-53008-5_13(366-396)Online publication date: 14-Aug-2016

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
FOCS '07: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
October 2007
695 pages
ISBN:0769530109

Publisher

IEEE Computer Society

United States

Publication History

Published: 21 October 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Broadcast Extensions with Optimal Communication and Round ComplexityProceedings of the 2016 ACM Symposium on Principles of Distributed Computing10.1145/2933057.2933082(371-380)Online publication date: 25-Jul-2016
  • (2016)Efficient Secure Multiparty Computation with Identifiable AbortProceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 998510.1007/978-3-662-53641-4_18(461-490)Online publication date: 31-Oct-2016
  • (2016)Network Oblivious TransferProceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 981510.1007/978-3-662-53008-5_13(366-396)Online publication date: 14-Aug-2016

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media