Efficient Agreement Over Byzantine Gossip

  • Ran Cohen
  • , Julian Loss
  • , Tal Moran

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Byzantine agreement (BA) asks for a set of parties to reach agreement in an adversarial setting. A central question is how to construct efficient BA protocols that scale well with the number of parties. In particular, the communication complexity is a critical barrier for large-scale implementations. State-of-the-art, scalable BA protocols typically work by sampling a small, unpredictable committee of parties that will send messages in each round. These messages must reach all honest parties, to allow the next round’s committee to function. In practice, this is usually accomplished by propagating messages over a gossip network, implemented over a partial communication graph. Most formulations of gossip networks have an ideal guarantee that every message delivered to any honest party will be delivered to every other honest party. Unfortunately, realizing this guarantee necessarily makes the protocol vulnerable to denial-of-service attacks, since an adversary can flood the network with many messages that the protocol must deliver to all parties. In this paper, we make several contributions towards realizing the goal of efficient, scalable byzantine agreement over a gossip network: We define “gossip with abort,” a relaxed gossip model that can be efficiently realized with minor modifications to existing gossip protocols, yet allows for significant savings in communication compared to the full point-to-point model.Our protocols work in a graded PKI model, in which honest parties only have partial agreement about the set of participants in the protocol. This model arises naturally in settings without trusted setup, such as the “permissionless” setting underlying many blockchain protocols.We construct a new, player-replaceable BA protocol in the graded PKI model. The concrete communication complexity of our protocol, for typical parameter values, is more than 25 times better than the current state-of-the-art BA protocols in the honest-majority setting. We define “gossip with abort,” a relaxed gossip model that can be efficiently realized with minor modifications to existing gossip protocols, yet allows for significant savings in communication compared to the full point-to-point model. Our protocols work in a graded PKI model, in which honest parties only have partial agreement about the set of participants in the protocol. This model arises naturally in settings without trusted setup, such as the “permissionless” setting underlying many blockchain protocols. We construct a new, player-replaceable BA protocol in the graded PKI model. The concrete communication complexity of our protocol, for typical parameter values, is more than 25 times better than the current state-of-the-art BA protocols in the honest-majority setting.

Original languageEnglish
Title of host publicationFinancial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers
EditorsJeremy Clark, Elaine Shi
PublisherSpringer Science and Business Media Deutschland GmbH
Pages74-91
Number of pages18
ISBN (Print)9783031786754
DOIs
StatePublished - 2025
Externally publishedYes
Event28th International Conference on Financial Cryptography and Data Security, FC 2024 - Willemstad, Netherlands
Duration: 4 Mar 20248 Mar 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14744 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference28th International Conference on Financial Cryptography and Data Security, FC 2024
Country/TerritoryNetherlands
CityWillemstad
Period4/03/248/03/24

Bibliographical note

Publisher Copyright:
© International Financial Cryptography Association 2025.

Fingerprint

Dive into the research topics of 'Efficient Agreement Over Byzantine Gossip'. Together they form a unique fingerprint.

Cite this