Paper 2024/209

General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption

Konstantinos Brazitikos, University of Edinburgh
Vassilis Zikas, Purdue University West Lafayette

Typical results in multi-party computation (in short, MPC) capture faulty parties by assuming a threshold adversary corrupting parties actively and/or fail-corrupting. These corruption types are, however, inadequate for capturing correct parties that might suffer temporary network failures and/or localized faults - these are particularly relevant for MPC over large, global scale networks. Omission faults and general adversary structures have been proposed as more suitable alternatives. However, to date, there is no characterization of the feasibility landscape combining the above ramifications of fault types and patterns. In this work we provide a tight characterization of feasibility of MPC in the presence of general adversaries - characterized by an adversary structure - that combine omission and active corruption. To this front we first provide a tight characterization of feasibility for Byzantine agreement (BA), a key tool in MPC protocols - this BA result can be of its own separate significance. Subsequently, we demonstrate that the common techniques employed in the threshold MPC literature to deal with omission corruptions do not work in the general adversary setting, not even for proving bounds that would appear straightforward, e.g, sufficiency of the well known $Q^3$ condition on omission-only general adversaries. Nevertheless we provide a new protocol that implements general adversary MPC under a surprisingly complex, yet tight as we prove, bound. All our results are for the classical synchronous model of computation. As a contribution of independent interest, our work puts forth, for the first time, a formal treatment of general-adversary MPC with (active and) omission corruptions in Canetti's universal composition framework.

Available format(s)
Publication info
Secure Multiparty ComputationGeneral AdversariesSimulationActive corruptionOmission-corruption
Contact author(s)
K Brazitikos @ sms ed ac uk
vzikas @ purdue edu
2024-02-15: revised
2024-02-11: received
See all versions
Short URL
Creative Commons Attribution


      author = {Konstantinos Brazitikos and Vassilis Zikas},
      title = {General Adversary Structures in Byzantine Agreement and Multi-Party Computation with Active and Omission Corruption},
      howpublished = {Cryptology ePrint Archive, Paper 2024/209},
      year = {2024},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.