Paper 2004/181
On the Composition of Authenticated Byzantine Agreement
Yehuda Lindell, Anna Lysyanskaya, and Tal Rabin
Abstract
A fundamental problem of distributed computing is that of
simulating a secure broadcast channel, within the setting of a
point-to-point network. This problem is known as Byzantine
Agreement (or Generals) and has been the focus of much research.
Lamport et al. showed that in order to achieve Byzantine Agreement
in the standard model, more than 2/3 of the participating
parties must be honest. They further showed that by augmenting the
network with a public-key infrastructure for digital signatures,
it is possible to obtain protocols that are secure for any number
of corrupted parties. The problem in this augmented model is
called "authenticated Byzantine Agreement".
In this paper we consider the question of concurrent, parallel and
sequential composition of authenticated Byzantine Agreement
protocols. We present surprising impossibility results showing
that:
* If an authenticated Byzantine Agreement protocol remains
secure under parallel or concurrent composition (even for just two
executions), then more than 2/3 of the participating parties
must be honest.
* Deterministic authenticated Byzantine Agreement protocols that
run for
Metadata
- Available format(s)
-
PDF PS
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. An extended abstract of this paper appeared in STOC 2002.
- Keywords
- Byzantine Agreement and Byzantine GeneralsComposition
- Contact author(s)
- lindell @ cs biu ac il
- History
- 2004-08-07: received
- Short URL
- https://ia.cr/2004/181
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2004/181, author = {Yehuda Lindell and Anna Lysyanskaya and Tal Rabin}, title = {On the Composition of Authenticated Byzantine Agreement}, howpublished = {Cryptology {ePrint} Archive, Paper 2004/181}, year = {2004}, url = {https://eprint.iacr.org/2004/181} }