**Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited**

*Yuan Lu and Zhenliang Lu and Qiang Tang and Guiling Wang*

**Abstract: **Multi-valued validated asynchronous Byzantine agreement (MVBA), proposed in the elegant work of Cachin et al. (CRYPTO '01), is fundamental for critical fault-tolerant services such as atomic broadcast in the asynchronous network. It was left as an open problem to asymptotically reduce the $O(ln^2+n^2*lambda+n^3)$ communication (where $n$ is the number of parties, $l$ is the input length, and $lambda$ is the security parameter). Recently, Abraham et al. (PODC '19) removed the $n^3$ term to partially answer the question when input is small. However, in other typical cases, e.g., building atomic broadcast through MVBA, the input length $l >= n*lambda$, and thus the communication is dominated by the $ln^2$ term and the problem raised by Cachin et al. remains open.

We fill the gap and answer the remaining part of the above open problem. In particular, we present two MVBA protocols with $O(ln+n^2*lambda)$ communicated bits, which is optimal when $l >= n*lambda$. We also maintain other benefits including optimal resilience to tolerate up to $n/3$ adaptive Byzantine corruptions, optimal expected constant running time, and optimal $O(n^2)$ messages.

At the core of our design, we propose asynchronous provable dispersal broadcast (APDB) in which each input can be split and dispersed to every party and later recovered in an efficient way. Leveraging APDB and asynchronous binary agreement, we design an optimal MVBA protocol, Dumbo-MVBA; we also present a general self-bootstrap framework Dumbo-MVBA* to reduce the communication of any existing MVBA protocols.

**Category / Keywords: **cryptographic protocols / Byzantine agreement, external validity, asynchronous network, optimal protocol

**Original Publication**** (with minor differences): **ACM PODC 2020
**DOI: **10.1145/3382734.3405707

**Date: **received 7 Jul 2020, last revised 20 Aug 2020

**Contact author: **yl768 at njit edu,zl425@njit edu,qiang@njit edu,gwang@njit edu

**Available format(s): **PDF | BibTeX Citation

**Version: **20200820:204305 (All versions of this report)

**Short URL: **ia.cr/2020/842

[ Cryptology ePrint archive ]